咨询与建议

限定检索结果

文献类型

  • 2,888 篇 会议
  • 2,461 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 5,362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,729 篇 工学
    • 2,808 篇 计算机科学与技术...
    • 2,308 篇 软件工程
    • 691 篇 信息与通信工程
    • 496 篇 控制科学与工程
    • 329 篇 生物工程
    • 297 篇 电气工程
    • 274 篇 电子科学与技术(可...
    • 267 篇 机械工程
    • 213 篇 光学工程
    • 193 篇 生物医学工程(可授...
    • 149 篇 仪器科学与技术
    • 141 篇 化学工程与技术
    • 134 篇 动力工程及工程热...
    • 97 篇 网络空间安全
    • 82 篇 土木工程
    • 79 篇 建筑学
    • 75 篇 安全科学与工程
  • 1,807 篇 理学
    • 1,111 篇 数学
    • 386 篇 物理学
    • 372 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 241 篇 系统科学
    • 142 篇 化学
  • 1,069 篇 管理学
    • 654 篇 管理科学与工程(可...
    • 447 篇 图书情报与档案管...
    • 211 篇 工商管理
  • 144 篇 医学
    • 121 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 133 篇 法学
    • 99 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 53 篇 教育学
  • 48 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 180 篇 computer science
  • 135 篇 laboratories
  • 131 篇 semantics
  • 95 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 89 篇 optimization
  • 85 篇 training
  • 81 篇 data mining
  • 81 篇 computational mo...
  • 75 篇 software
  • 71 篇 deep learning
  • 70 篇 algorithm design...
  • 61 篇 software enginee...
  • 61 篇 testing
  • 60 篇 clustering algor...
  • 60 篇 cloud computing
  • 58 篇 software testing
  • 57 篇 accuracy
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,046 篇 state key labora...
  • 222 篇 department of co...
  • 215 篇 national key lab...
  • 171 篇 department of co...
  • 141 篇 school of inform...
  • 114 篇 state key labora...
  • 112 篇 state key labora...
  • 107 篇 state key labora...
  • 99 篇 college of compu...
  • 85 篇 university of ch...
  • 81 篇 shandong provinc...
  • 77 篇 school of comput...
  • 74 篇 shandong provinc...
  • 67 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 shanghai key lab...
  • 56 篇 school of artifi...
  • 52 篇 state key labora...
  • 51 篇 state key labora...
  • 48 篇 nanjing universi...

作者

  • 65 篇 gao yang
  • 45 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 38 篇 li wu-jun
  • 37 篇 zhou zhi-hua
  • 37 篇 sanglu lu
  • 32 篇 baowen xu
  • 32 篇 yu huiqun
  • 32 篇 junping du
  • 31 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 28 篇 fan guisheng
  • 26 篇 yang tianbao
  • 26 篇 lu sanglu
  • 26 篇 xu xiaolong
  • 26 篇 liu hong
  • 25 篇 li xuandong
  • 25 篇 wanchun dou

语言

  • 5,030 篇 英文
  • 180 篇 其他
  • 152 篇 中文
  • 4 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5362 条 记 录,以下是51-60 订阅
排序:
Understanding and Identifying Technical Debt in the Co-Evolution of Production and Test Code
收藏 引用
IEEE Transactions on software Engineering 2025年
作者: Guo, Yimeng Chen, Zhifei Xiao, Lu Chen, Lin Li, Yanhui Zhou, Yuming Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Stevens Institute of Technology School of Systems and Enterprises HobokenNJ07030 United States
The co-evolution of production and test code (PT co-evolution) has received increasing attention in recent years. However, we found that existing work did not comprehensively study various PT co-evolution scenarios, s... 详细信息
来源: 评论
Unveiling Context-Related Anomalies: Knowledge Graph Empowered Decoupling of Scene and Action for Human-Related Video Anomaly Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Chen, Chenglizhao Liu, Xinyu Song, Mengke Li, Luming Yuan, Shaojiang Yu, Xu Pang, Shanchen Qingdao Institute of Software College of Computer Science and Technology China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software China State Key Laboratory of Chemical Safety China
Video anomaly detection methods are mainly classified into two categories based on their primary feature types: appearance-based and action-based. Appearance-based methods rely on low-level visual features like color,... 详细信息
来源: 评论
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description
收藏 引用
Automated software Engineering 2025年 第2期32卷 1-29页
作者: Wang, Jiyu Chen, Xiang Pei, Wenlong Yang, Shaoyu School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China
To effectively allocate resources for vulnerability remediation, it is crucial to prioritize vulnerability fixes based on vulnerability severity. With the increasingnumber of vulnerabilities in recent years, there is ... 详细信息
来源: 评论
Stitching, Fine-tuning, Re-training: A SAM-enabled Framework for Semi-supervised 3D Medical Image Segmentation
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Li, Shumeng Qi, Lei Yu, Qian Huo, Jing Shi, Yinghuan Gao, Yang Nanjing University State Key Laboratory for Novel Software Technology China Nanjing University National Institute of Healthcare Data Science China School of Computer Science and Engineering China Shandong Women's University School of Data and Computer Science China
Segment Anything Model (SAM) fine-tuning has shown remarkable performance in medical image segmentation in a fully supervised manner, but requires precise annotations. To reduce the annotation cost and maintain satisf... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Hardware Computation Graph for DNN Accelerator Design Automation Without Inter-PU Templates
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Li, Jun Wang, Wei Li, Wu-Jun Nanjing University National Key Laboratory for Novel Software Technology School of Computer Science Jiangsu Nanjing210023 China
Existing deep neural network (DNN) accelerator design automation (ADA) methods adopt architecture templates to predetermine parts of design choices and then explore the remaining design choices beyond templates. Based... 详细信息
来源: 评论
A Fuzzy C-Means Clustering Algorithm for Real Medical Image Segmentation
A Fuzzy C-Means Clustering Algorithm for Real Medical Image ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Feifei Zhang Fei Shi Dayong Ren Yue Li School of Computer Science and Technology Xinjiang University Urumqi China Key Laboratory of Signal Detection and Processing Xinjiang University Urumqi China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
In the field of medical image processing, the presence of noise can often result in the obfuscation of crucial details, which in turn can have a detrimental impact on the accuracy of clinical diagnoses. In order to ef... 详细信息
来源: 评论
TimeDP: Learning to Generate Multi-Domain Time Series with Domain Prompts
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Yu-Hao Xu, Chang Wu, Yueying Li, Wu-Jun Bian, Jiang National Key Laboratory for Novel Software Technology School of Computer Science Nanjing University China Microsoft Research Asia China Peking University China
Time series generation models are crucial for applications like data augmentation and privacy preservation. Most existing time series generation models are typically designed to generate data from one specified domain... 详细信息
来源: 评论
DasAtom: A Divide-and-Shuttle Atom Approach to Quantum Circuit Transformation
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Huang, Yunqi Gao, Dingchao Ying, Shenggang Li, Sanjiang Faculty of Engineering and Information Technology SydneyNSW2007 Australia Institute of Software Chinese Academy of Sciences Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science China
Neutral atom (NA) quantum systems are emerging as a leading platform for quantum computation, offering superior or competitive qubit count and gate fidelity compared to superconducting circuits and ion traps. However,... 详细信息
来源: 评论
Camera Seismocardiogram Based Monitoring of Left Ventricular Ejection Time
收藏 引用
IEEE Transactions on Biomedical Engineering 2025年 PP卷 PP页
作者: Zhou, Zhiqin Huang, Jia Li, Haozhe Liu, Lin Zhu, Yingen Shan, Caifeng Wang, Wenjin Nanjing University State Key Laboratory for Novel Software Technology School of Intelligence Science and Technology China Southern University of Science and Technology Department of Biomedical Engineering China The Third People's Hospital of Shenzhen Intensive Care Unit China Shandong University of Science and Technology College of Electrical Engineering and Automation China
Left Ventricular Ejection Time (LVET), reflecting the duration from the onset to the end of blood ejection by the left ventricle during each heartbeat, is a critical parameter for measuring cardiac pumping efficiency.... 详细信息
来源: 评论