咨询与建议

限定检索结果

文献类型

  • 6,333 篇 会议
  • 4,558 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,439 篇 工学
    • 5,600 篇 计算机科学与技术...
    • 4,597 篇 软件工程
    • 1,382 篇 信息与通信工程
    • 966 篇 控制科学与工程
    • 674 篇 电气工程
    • 667 篇 生物工程
    • 569 篇 电子科学与技术(可...
    • 557 篇 机械工程
    • 425 篇 光学工程
    • 331 篇 生物医学工程(可授...
    • 301 篇 化学工程与技术
    • 274 篇 仪器科学与技术
    • 219 篇 网络空间安全
    • 203 篇 动力工程及工程热...
    • 190 篇 建筑学
    • 180 篇 土木工程
    • 178 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 170 篇 材料科学与工程(可...
  • 3,530 篇 理学
    • 2,143 篇 数学
    • 754 篇 物理学
    • 738 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 400 篇 系统科学
    • 311 篇 化学
  • 2,097 篇 管理学
    • 1,236 篇 管理科学与工程(可...
    • 927 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 259 篇 法学
    • 191 篇 社会学
  • 239 篇 医学
    • 198 篇 临床医学
  • 143 篇 经济学
  • 94 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 295 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 213 篇 feature extracti...
  • 190 篇 computational mo...
  • 173 篇 deep learning
  • 157 篇 optimization
  • 143 篇 data mining
  • 135 篇 training
  • 133 篇 wireless sensor ...
  • 130 篇 software enginee...
  • 129 篇 software
  • 115 篇 algorithm design...
  • 114 篇 image segmentati...
  • 109 篇 accuracy
  • 106 篇 neural networks
  • 105 篇 educational inst...
  • 105 篇 machine learning
  • 104 篇 task analysis
  • 99 篇 predictive model...

机构

  • 1,840 篇 state key labora...
  • 243 篇 national key lab...
  • 210 篇 department of co...
  • 203 篇 university of ch...
  • 175 篇 department of co...
  • 175 篇 state key labora...
  • 132 篇 tianjin key labo...
  • 123 篇 nanjing universi...
  • 110 篇 state key labora...
  • 107 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 state key labora...
  • 91 篇 college of compu...
  • 90 篇 school of comput...
  • 88 篇 beijing key labo...
  • 88 篇 college of compu...
  • 88 篇 school of inform...
  • 84 篇 key laboratory o...
  • 79 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 93 篇 gao yang
  • 52 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 zhou zhi-hua
  • 45 篇 junping du
  • 43 篇 sanglu lu
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 41 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 34 篇 baocai yin
  • 34 篇 zhang yan
  • 34 篇 shi yinghuan
  • 33 篇 wang wei
  • 31 篇 wanchun dou
  • 30 篇 yang yang

语言

  • 9,141 篇 英文
  • 1,465 篇 其他
  • 319 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10906 条 记 录,以下是4891-4900 订阅
排序:
A Comparison of Representation Learning Methods for Medical Concepts in Electronic Health Record Databases
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Xuan Liu, Zhangdaihong Zhao, Yizheng Yang, Yang Clifton, David A. The Oxford Suzhou Centre for Advanced Research Suzhou215123 China The Department of Engineering Science Institute of Biomedical Engineering University of Oxford OxfordOX1 2JD United Kingdom The National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China The School of Public Health Shanghai Jiao Tong University School of Medicine Shanghai200025 China The Department of Engineering Science Institute of Biomedical Engineering University of Oxford OxfordOX1 2JD United Kingdom
Electronic health records (EHR) contain a comprehensive history of patients’ diagnostic, procedural, and prescription data, which are expressed in medical concepts coded in diverse standards, such as ICD-10-CM, ICD-1... 详细信息
来源: 评论
Context decoupling augmentation for weakly supervised semantic segmentation
arXiv
收藏 引用
arXiv 2021年
作者: Su, Yukun Sun, Ruizhou Lin, Guosheng Wu, Qingyao School of Software and Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot Ministry of Education India School of Computer Science and Engineering Nanyang Technological University Singapore
Data augmentation is vital for deep learning neural networks. By providing massive training samples, it helps to improve the generalization ability of the model. Weakly supervised semantic segmentation (WSSS) is a cha... 详细信息
来源: 评论
Using evolutionary process for cross-version software defect prediction
收藏 引用
International Journal of Performability Engineering 2019年 第9期15卷 2484-2493页
作者: Li, Yong Liu, Zhandong Zhang, Haijun College of Computer Science and Technology Xinjiang Normal University Urumqi830054 China Data Security Key Laboratory Xinjiang Normal University Urumqi830054 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing211106 China
Cross-version defect prediction can effectively reduce the construction cost of a model, which is of great significance for understanding the causes of defects in subsequent software versions and improving the quality... 详细信息
来源: 评论
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Si...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Congcong Shi Rui Song Xinyu Qi Yubo Song Bin Xiao Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing University School of Cyber Science and Engineering Southeast University Department of Computing The Hong Kong Polytechnic University
Advertising income depends on the amount of clicks by users of websites and mobile applications. However, the emergence of click fraud greatly reduces the real benefits of the advertisement. Most existing researches f... 详细信息
来源: 评论
Opcode sequence analysis of Android malware by a convolutional neural network
Opcode sequence analysis of Android malware by a convolution...
收藏 引用
作者: Li, Dan Zhao, Lichao Cheng, Qingfeng Lu, Ning Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Computer Science and Technology Xidian University Xi'an China School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China
The number of malware has exploded due to the openness of the Android platform, and the endless stream of malware poses a threat to the privacy, tariffs, and device of mobile phone users. A novel Android mobile malwar... 详细信息
来源: 评论
Plagiarism detection of multi-threaded programs using frequent behavioral pattern mining  32
Plagiarism detection of multi-threaded programs using freque...
收藏 引用
32nd International Conference on software Engineering and Knowledge Engineering, SEKE 2020
作者: Wang, Qing Tian, Zhenzhou Gao, Cong Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China College of Information Sciences and Technology Pennsylvania State University PA United States
software dynamic birthmark techniques construct birthmarks using the captured execution traces from running the programs, which serve as one of the most promising methods for obfuscation-resilient software plagiarism ... 详细信息
来源: 评论
A Method of Calculating the Semantic Similarity Between English and Chinese Concepts  4th
A Method of Calculating the Semantic Similarity Between Engl...
收藏 引用
4th International Conference on Machine Learning and Intelligent Communications, MLICOM 2019
作者: Cao, Jingwen Wang, Tiexin Li, Wenxin Tao, Chuanqi College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics 29# Jiangjun Road Jiangning District Nanjing211106 China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Ministry of Industry and Information Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In the big data era, data and information processing is a common concern of diverse fields. To achieve the two keys "efficiency" and "intelligence" to the processing process, it’s necessary to sea... 详细信息
来源: 评论
Will Dependency Conflicts Affect My Program’s Semantics?
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Ying Wu, Rongxin Wang, Chao Wen, Ming Liu, Yepang Cheung, ShingChi Yu, Hai Xu, Chang Zhu, Zhiliang Software College Northeasthern University China Department of Cyber Space Security Xiamen University China School of Cyber Science and Engineering Huazhong University of Science and Technology China Department of Computer Science and Engineering Southern University of Science and Technology China Department of Computer Science and Engineering Hong Kong University of Science and Technology China State Key Lab for Novel Software Technology and Department of Computer Science and Technology Nanjing University China
Java projects are often built on top of various third-party libraries. If multiple versions of a library exist on the classpath, JVM will only load one version and shadow the others, which we refer to as dependency co... 详细信息
来源: 评论
Nearest neighborhood-based deep clustering for source data-absent unsupervised domain adaptation
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Song Yang, Yan Ma, Zhiyuan Hendrich, Norman Zeng, Fanyu Ge, Shuzhi Sam Zhang, Changshui Zhang, Jianwei The Institute of Machine Intelligence University of Shanghai for Science and Technology Shanghai China The State Key Laboratory of Electronic Thin Films and Integrated Devices University of Electronic Science and Technology of China Chengdu China Group Department of Informatics Universität Hamburg Hamburg Germany The Institute of Machine Intelligence University of Shanghai for Science and Technology Shanghai China The State Key Lab. for Novel Software Technology Nanjing University Nanjing China The Engineering Research Center of Wideband Wireless Communication Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China The Department of Electrical and Computer Engineering National University of Singapore Singapore Singapore The Department of Automation Tsinghua University Beijing China
In the classic setting of unsupervised domain adaptation (UDA), the labeled source data are available in the training phase. However, in many real-world scenarios, owing to some reasons such as privacy protection and ... 详细信息
来源: 评论
Towards fine-grained compiler identification with neural modeling  32
Towards fine-grained compiler identification with neural mod...
收藏 引用
32nd International Conference on software Engineering and Knowledge Engineering, SEKE 2020
作者: Xie, Borun Tian, Zhenzhou Gao, Cong Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China College of Information Sciences and Technology Pennsylvania State University PA United States
Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details facilitate essential binary analysis tasks, such as malware fo... 详细信息
来源: 评论