咨询与建议

限定检索结果

文献类型

  • 2,948 篇 会议
  • 2,521 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,829 篇 工学
    • 2,883 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 705 篇 信息与通信工程
    • 542 篇 控制科学与工程
    • 330 篇 生物工程
    • 312 篇 电气工程
    • 279 篇 电子科学与技术(可...
    • 266 篇 机械工程
    • 218 篇 光学工程
    • 195 篇 生物医学工程(可授...
    • 152 篇 仪器科学与技术
    • 137 篇 化学工程与技术
    • 135 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 89 篇 土木工程
    • 87 篇 建筑学
  • 1,828 篇 理学
    • 1,126 篇 数学
    • 393 篇 物理学
    • 374 篇 生物学
    • 306 篇 统计学(可授理学、...
    • 237 篇 系统科学
    • 140 篇 化学
  • 1,087 篇 管理学
    • 666 篇 管理科学与工程(可...
    • 454 篇 图书情报与档案管...
    • 218 篇 工商管理
  • 149 篇 医学
    • 126 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 76 篇 药学(可授医学、理...
  • 136 篇 法学
    • 100 篇 社会学
  • 77 篇 经济学
    • 77 篇 应用经济学
  • 53 篇 教育学
  • 47 篇 农学
  • 17 篇 文学
  • 15 篇 艺术学
  • 14 篇 军事学

主题

  • 179 篇 computer science
  • 135 篇 laboratories
  • 133 篇 semantics
  • 98 篇 feature extracti...
  • 94 篇 wireless sensor ...
  • 91 篇 optimization
  • 91 篇 training
  • 81 篇 data mining
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 76 篇 software
  • 70 篇 algorithm design...
  • 64 篇 software enginee...
  • 61 篇 clustering algor...
  • 61 篇 testing
  • 60 篇 cloud computing
  • 59 篇 accuracy
  • 57 篇 software testing
  • 57 篇 web services
  • 56 篇 application soft...

机构

  • 1,069 篇 state key labora...
  • 223 篇 department of co...
  • 223 篇 national key lab...
  • 176 篇 department of co...
  • 138 篇 school of inform...
  • 116 篇 state key labora...
  • 114 篇 state key labora...
  • 108 篇 state key labora...
  • 103 篇 college of compu...
  • 88 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 shandong provinc...
  • 71 篇 shandong provinc...
  • 69 篇 department of co...
  • 59 篇 school of softwa...
  • 57 篇 school of artifi...
  • 57 篇 shanghai key lab...
  • 51 篇 state key labora...
  • 51 篇 state key labora...
  • 50 篇 collaborative in...

作者

  • 67 篇 gao yang
  • 47 篇 shi yinghuan
  • 44 篇 dou wanchun
  • 42 篇 guihai chen
  • 38 篇 sanglu lu
  • 38 篇 li wu-jun
  • 37 篇 zhou zhi-hua
  • 32 篇 baowen xu
  • 32 篇 junping du
  • 31 篇 shen furao
  • 31 篇 yu huiqun
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 zhang lijun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 liu hong
  • 27 篇 xu xiaolong
  • 26 篇 yang tianbao
  • 26 篇 xu chang

语言

  • 4,977 篇 英文
  • 353 篇 其他
  • 153 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Department of Computer Science and Technology"
5483 条 记 录,以下是611-620 订阅
排序:
RAT: A Refactoring-Aware Tool for Tracking Code History
RAT: A Refactoring-Aware Tool for Tracking Code History
收藏 引用
International Conference on software Engineering - Companion, ICSE, Companion
作者: Feifei Niu Junqian Shao Chaofan Xu Christoph Mayr-Dorn Wesley K. G. Assunção Liguo Huang Chuanyi Li Jidong Ge Bin Luo Alexander Egyed State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science North Carolina State University North Carolina USA Department of Computer Science and Engineering Southern Methodist University Dallas Texash USA
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source... 详细信息
来源: 评论
Quantum Pseudorandom Scramblers
arXiv
收藏 引用
arXiv 2023年
作者: Lu, Chuhan Qin, Minglong Song, Fang Yao, Penghui Zhao, Mingnan Computer Science Department Portland State University United States State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Hefei National Laboratory Hefei230088 China
Quantum pseudorandom state generators (PRSGs) have stimulated exciting developments in recent years. A PRSG, on a fixed initial (e.g., all-zero) state, produces an output state that is computationally indistinguishabl... 详细信息
来源: 评论
Typical curve with G1 constraints for curve completion
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2021年 第1期4卷 283-294页
作者: Chuan He Gang Zhao Aizeng Wang Fei Hou Zhanchuan Cai Shaolin Li School of Mechanical Engineering and Automation Beihang UniversityBeijing 100191China State Key Laboratory of Lunar and Planetary Sciences Macao University of Science and TechnologyMacao 999078China State Key Laboratory of Virtual Reality Technology and Systems Beihang UniversityBeijing 100191China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100049China Faculty of Information Technology Macao University of Science and TechnologyMacao 999078China
This paper presents a novel algorithm for planar G1 interpolation using typical curves with monotonic *** G1 interpolation problem is converted into a system of nonlinear equations and sufficient conditions are provid... 详细信息
来源: 评论
Nerftap: Enhancing Transferability of Adversarial Patches on Face Recognition Using Neural Radiance Fields
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Xiaoliang Shen, Furao Han, Feng Zhao, Jian Nie, Changhai National Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
An End-to-End Graph Attention Network Hashing for Cross-Modal Retrieval  38
An End-to-End Graph Attention Network Hashing for Cross-Moda...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jin, Huilong Zhang, Yingxue Shi, Lei Zhang, Shuang Kou, Feifei Yang, Jiapeng Zhu, Chuangying Luo, Jia College of Engineering Hebei Normal University China College of Computer and Cyber Security Hebei Normal University China State Key Laboratory of Media Convergence and Communication Communication University of China China Key Laboratory of Education Informatization for Nationalities Yunnan Normal University Ministry of Education China School of Computer Science Beijing University of Posts and Telecommunications China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology China Chongqing Research Institute Beijing University of Technology China
Due to its low storage cost and fast search speed, cross-modal retrieval based on hashing has attracted widespread attention and is widely used in real-world applications of social media search. However, most existing...
来源: 评论
Beyond Mandatory Federations: Balancing Egoism, Utilitarianism and Egalitarianism in Mixed-Motive Games  39
Beyond Mandatory Federations: Balancing Egoism, Utilitariani...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Dong, Shaokang Li, Chao Yang, Shangdong Cao, Hongye Yang, Wanqi Gao, Yang School of Computer and Electronic Information Nanjing Normal University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the field of mixed-motive games, extensive multi-agent learning studies have explored the balance between egoism (individual interest), utilitarianism (collective interest), and egalitarianism (fairness). Tradition...
来源: 评论
ALOFT: A Lightweight MLP-Like Architecture with Dynamic Low-Frequency Transform for Domain Generalization
ALOFT: A Lightweight MLP-Like Architecture with Dynamic Low-...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Jintao Guo Na Wang Lei Qi Yinghuan Shi State Key Laboratory for Novel Software Technology Nanjing University National Institute of Healthcare Data Science Nanjing University School of Computer Science and Engineering Southeast University
Domain generalization (DG) aims to learn a model that generalizes well to unseen target domains utilizing multiple source domains without re-training. Most existing DG works are based on convolutional neural networks ...
来源: 评论
Class-Aware Feature Perturbation for Long-Tailed Visual Recognition
Class-Aware Feature Perturbation for Long-Tailed Visual Reco...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xicheng Chen Haibo Ye Fangyu Zhou College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization
The distribution of data in the real world is often imbalanced, with a small number of classes having a large number of instances, while most other classes have relatively few sample instances, resulting in a long-tai... 详细信息
来源: 评论
IOMatch: Simplifying Open-Set Semi-Supervised Learning with Joint Inliers and Outliers Utilization
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zekun Qi, Lei Shi, Yinghuan Gao, Yang The State Key Laboratory for Novel Software Technology National Institute of Healthcare Data Science Nanjing University China The School of Computer Science and Engineering Southeast University China
Semi-supervised learning (SSL) aims to leverage massive unlabeled data when labels are expensive to obtain. Unfortunately, in many real-world applications, the collected unlabeled data will inevitably contain unseen-c... 详细信息
来源: 评论
DomainDrop: Suppressing Domain-Sensitive Channels for Domain Generalization
DomainDrop: Suppressing Domain-Sensitive Channels for Domain...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Jintao Guo Lei Qi Yinghuan Shi State Key Laboratory for Novel Software Technology Nanjing University National Institute of Healthcare Data Science Nanjing University School of Computer Science and Engineering Southeast University
Deep Neural Networks have exhibited considerable success in various visual tasks. However, when applied to unseen test datasets, state-of-the-art models often suffer performance degradation due to domain shifts. In th...
来源: 评论