咨询与建议

限定检索结果

文献类型

  • 2,953 篇 会议
  • 2,483 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 5,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,789 篇 工学
    • 2,835 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 694 篇 信息与通信工程
    • 507 篇 控制科学与工程
    • 329 篇 生物工程
    • 315 篇 电气工程
    • 296 篇 电子科学与技术(可...
    • 265 篇 机械工程
    • 219 篇 光学工程
    • 193 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 133 篇 动力工程及工程热...
    • 103 篇 网络空间安全
    • 88 篇 土木工程
    • 87 篇 建筑学
  • 1,797 篇 理学
    • 1,103 篇 数学
    • 389 篇 物理学
    • 372 篇 生物学
    • 303 篇 统计学(可授理学、...
    • 236 篇 系统科学
    • 139 篇 化学
  • 1,081 篇 管理学
    • 664 篇 管理科学与工程(可...
    • 449 篇 图书情报与档案管...
    • 216 篇 工商管理
  • 146 篇 医学
    • 123 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 76 篇 药学(可授医学、理...
  • 135 篇 法学
    • 100 篇 社会学
  • 76 篇 经济学
    • 76 篇 应用经济学
  • 54 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 14 篇 军事学
  • 14 篇 艺术学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 131 篇 semantics
  • 95 篇 feature extracti...
  • 90 篇 optimization
  • 90 篇 wireless sensor ...
  • 90 篇 training
  • 82 篇 data mining
  • 81 篇 deep learning
  • 80 篇 computational mo...
  • 79 篇 software
  • 70 篇 algorithm design...
  • 66 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 61 篇 cloud computing
  • 58 篇 accuracy
  • 57 篇 software testing
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,063 篇 state key labora...
  • 222 篇 national key lab...
  • 210 篇 department of co...
  • 172 篇 department of co...
  • 141 篇 school of inform...
  • 118 篇 state key labora...
  • 117 篇 state key labora...
  • 109 篇 state key labora...
  • 103 篇 college of compu...
  • 89 篇 university of ch...
  • 83 篇 shandong provinc...
  • 80 篇 school of comput...
  • 71 篇 shandong provinc...
  • 70 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 school of artifi...
  • 57 篇 shanghai key lab...
  • 52 篇 state key labora...
  • 52 篇 state key labora...
  • 49 篇 nanjing universi...

作者

  • 65 篇 gao yang
  • 47 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 39 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 li wu-jun
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 shen furao
  • 31 篇 yu huiqun
  • 30 篇 xu baowen
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 26 篇 yang tianbao
  • 26 篇 xu xiaolong
  • 26 篇 xu chang

语言

  • 4,758 篇 英文
  • 549 篇 其他
  • 142 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5449 条 记 录,以下是1391-1400 订阅
排序:
On Multiobjective Knapsack Problems with Multiple Decision Makers
On Multiobjective Knapsack Problems with Multiple Decision M...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Zhen Song Wenjian Luo Xin Lin Zeneng She Qingfu Zhang Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Shenzhen Guangdong China Peng Cheng Laboratory Shenzhen Guangdong China School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China Department of Computer Science City University of Hong Kong Hong Kong
Many real-world optimization problems require optimizing multiple conflicting objectives simultaneously, and such problems are called multiobjective optimization problems (MOPs). As a variant of the classical knapsack... 详细信息
来源: 评论
DeepBoundary: A Coverage Testing Method of Deep Learning software based on Decision Boundary Representation
DeepBoundary: A Coverage Testing Method of Deep Learning Sof...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Yue Liu Lichao Feng Xingya Wang Shiyu Zhang College of Computer Science and Technology Nanjing Tech University Nanjing Jiangsu China Institute of Command and Control Engineering Army Engineering University of PLA Nanjing Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China
With the increasing application of Deep Learning (DL) software in safety-critical fields such as autonomous driving, we need adequate testing to ensure software quality. Observing the decision-making behavior of a Dee... 详细信息
来源: 评论
Hero: On the Chaos When PATH Meets Modules
Hero: On the Chaos When PATH Meets Modules
收藏 引用
International Conference on software Engineering (ICSE)
作者: Ying Wang Liang Qiao Chang Xu Yepang Liu Shing-Chi Cheung Na Meng Hai Yu Zhiliang Zhu Software College Northeastern University China State Key Laboratory for Novel Software Technology and Department of Computer Science and Technology Nanjing University China Southern University of Science and Technology China The Hong Kong University of Science and Technology China Virginia Tech USA
Ever since its first release in 2009, the Go programming language (Golang) has been well received by software communities. A major reason for its success is the powerful support of library-based development, where a G... 详细信息
来源: 评论
Research on key Word Information Retrieval Based on Inverted Index  8th
Research on Key Word Information Retrieval Based on Inverted...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Qi, Meihan Fang, Wei Zhao, Yongming Sha, Yu Sheng, Victor S. School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Severe Weather Chinese Academy of Meteorological Sciences Beijing100081 China China Meteorological Administration Training Center Beijing China Department of Computer Texas Tech University LubbockTX79409 United States
With the advent of the era of big data, data has penetrated into every aspect of social life and become an important production factor in various industries. However, while providing convenience to our life, massive i... 详细信息
来源: 评论
Vehicle Check-In Data-driven POI Recommendation Based on Improved SVD and Graph Convolutional Network
Vehicle Check-In Data-driven POI Recommendation Based on Imp...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yuwen Liu Jie Zhang Ruihan Dou Xiaokang Zhou Xiaolong Xu Shoujin Wang Lianyong Qi College of Computer Science and Technology China University of Petroleum (East China) Qingdao China Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University China Shanghai Meteorological Information and Technology Support Center China Faculty of Mathematics University of Waterloo Waterloo Canada Faculty of Data Science Shiga University Japan RIKEN Center for Advanced Intelligence Project RIKEN Japan School of Computer and Software Nanjing University of Information Science and Technology China School of Computing Macquarie University Australia School of Computer Science Qufu Normal University China
The application of automobile tool software is becoming increasingly widespread, and its functions are becoming increasingly diverse. Using vehicle traffic data to give users with recommendations for Points-of-interes...
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection  39
Look Inside for More: Internal Spatial Modality Perception f...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
A Self-adaptive PSO-Based Dynamic Scheduling Method on Hierarchical Cloud Computing  1
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Meng, Shunmei Huang, Weijia Xu, Xiaolong Li, Qianmu Dou, Wanchun Liu, Bowen Department of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Edge computing has been envisioned as an emerging and prospective computing paradigm for its advantage of low latency, which uses local resources. However, the edge resources are usually limited and could not meet end... 详细信息
来源: 评论
Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation  23
Controllable Quantum Computing Privacy via Inherent Noises a...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Ju, keyi Zhong, Hui Zhang, Xinyue Qin, Xiaoqi Pan, Miao Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China University of Houston Department of Electrical and Computer Engineering HoustonTX77204 United States Kennesaw State University Department of Computer Science MariettaGA30060 United States
Quantum computing has revolutionized the approach to solving complex problems and handling vast datasets. However, data leakage in quantum computing may present privacy risks. While differential privacy (DP) has been ... 详细信息
来源: 评论
Effective Entry-Wise Flow for Molecule Generation
Effective Entry-Wise Flow for Molecule Generation
收藏 引用
International Conference on Data Engineering
作者: Qifan Zhang Junjie Yao Yuquan Yang Yizhou Shi Wei Gao Xiaoling Wang School of Computer Science and Technology East China Normal University Software Engineering Institute East China Normal University Shanghai Key Laboratory of Trustworthy Computing Department of Chemistry University of Massachusetts Boston University of Michigan Ann Arbor.
Molecule generation is a critical process in the fields of drug discovery and materials science. Recently, generative models based on normalizing flows have demonstrated significant potential in this domain. These mod... 详细信息
来源: 评论
Channel-Wise and Spatial Feature Recalibration Network for Nuclear Cataract Classification
Channel-Wise and Spatial Feature Recalibration Network for N...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Zhang, Xiaoqing Xu, Gelei Shen, Junyong Xiao, Zunjie Yan, Qiuyang Yuan, Jin Higashita, Risa Liu, Jiang Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China Sun Yat-sen University State Key Laboratory of Ophthalmology Guangzhou China Tomey Corporation Japan Cixi Institute of Biomedical Engineering Ningbo Institute of Materials Technology and Engineering Chinese Academy of Sciences Ningbo China
Nuclear cataract (NC) is a prior age-related disease for blindness and vision impairment globally. Anterior segment optical coherence tomography (AS-OCT) image is a new ophthalmology image, which can capture the lens ... 详细信息
来源: 评论