咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,220 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,465 篇 计算机科学与技术...
    • 1,180 篇 软件工程
    • 317 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 133 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 893 篇 理学
    • 552 篇 数学
    • 184 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 546 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 202 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,524 篇 英文
  • 90 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2701 条 记 录,以下是11-20 订阅
排序:
An energy constraint position-based dynamics with corrected SPH kernel
收藏 引用
science China(Information sciences) 2023年 第1期66卷 144-157页
作者: Wei CAO Luan LYU Zhixin YANG Enhua WU College of Computer Science and Technology China University of Petroleum Faculty of Science and Technology University of Macau State Key Laboratory of Internet of Things for Smart City University of Macau State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Guangzhou Greater Bay Area Virtual Reality Research Institute
We introduce an improved position-based dynamics method with corrected smoothed particle hydrodynamics(SPH) kernel to simulate deformable solids. Using a strain energy constraint that follows the continuum mechanics, ... 详细信息
来源: 评论
Empirically revisiting and enhancing automatic classification of bug and non-bug issues
收藏 引用
Frontiers of computer science 2024年 第5期18卷 25-44页
作者: Zhong LI Minxue PAN Yu PEI Tian ZHANG Linzhang WANG Xuandong LI State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Software Institute Nanjing UniversityNanjing 210093China Department of Computing The Hong Kong Polytechnic UniversityHong KongChina
A large body of research effort has been dedicated to automated issue classification for Issue Tracking Systems(ITSs).Although the existing approaches have shown promising performance,the different design choices,incl... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
ON THE EFFECT OF BATCH SIZE IN BYZANTINE-ROBUST DISTRIBUTED LEARNING  12
ON THE EFFECT OF BATCH SIZE IN BYZANTINE-ROBUST DISTRIBUTED ...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Yang, Yi-Rui Shi, Chang-Wei Li, Wu-Jun National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Byzantine-robust distributed learning (BRDL), in which computing devices are likely to behave abnormally due to accidental failures or malicious attacks, has recently become a hot research topic. However, even in the ... 详细信息
来源: 评论
Migrant Resettlement by Evolutionary Multiobjective Optimization
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 51-65页
作者: Liu, Dan-Xuan Gu, Yu-Ran Qian, Chao Mu, Xin Tang, Ke Nanjing University National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing210023 China Peng Cheng Laboratory Shenzhen518000 China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China
Migration has been a universal phenomenon, which brings opportunities as well as challenges for global development. As the number of migrants (e.g., refugees) increases rapidly, a key challenge faced by each country i... 详细信息
来源: 评论
LAMB: Label-Induced Mixed-Level Blending for Multimodal Multi-label Emotion Detection  19th
LAMB: Label-Induced Mixed-Level Blending for Multimodal Mul...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Qian, Shuwei Guo, Ming Fan, Zhicheng Chen, Mingcai Wang, Chongjun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
To better understand complex human emotions, there is growing interest in utilizing heterogeneous sensory data to detect multiple co-occurring emotions. However, existing studies have focused on extracting static info... 详细信息
来源: 评论
Testing Constraint Checking Implementations via Principled Metamorphic Transformations  31
Testing Constraint Checking Implementations via Principled M...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Gao, Mingchen Wang, Huiyan Xu, Chang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China
Constraint checking techniques are being widely used for ensuring the consistency of software artifacts during their development and evolution (e.g., detecting inconsistency in an application's running contexts or... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
收藏 引用
Frontiers of computer science 2024年 第1期18卷 187-198页
作者: Xingxin LI Youwen ZHU Rui XU Jian WANG Yushu ZHANG College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China Department of Mathematical Informatics University of TokyoTokyo 113-8654Japan Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China School of Computer Science China University of GeosciencesWuhan 430074China
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s... 详细信息
来源: 评论