咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,215 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,179 篇 软件工程
    • 317 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 91 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 890 篇 理学
    • 551 篇 数学
    • 182 篇 物理学
    • 172 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 544 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 201 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,520 篇 英文
  • 89 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2696 条 记 录,以下是291-300 订阅
排序:
Open Source software Onboarding as a University Course: An Experience Report
Open Source Software Onboarding as a University Course: An E...
收藏 引用
software Engineering: software Engineering Education and Training (ICSE-SEET), IEEE/ACM International Conference on
作者: Hao He Minghui Zhou Qingye Wang Jingyue Li School of Computer Science Peking University China Key Laboratory of High Confidence Software Technologies Ministry of Education China Department of Computer Science Norwegian University of Science and Technology Norway
Without newcomers, open source software (OSS) projects are hardly sustainable. Yet, newcomers face a steep learning curve during OSS onboarding in which they must overcome a multitude of technical, social, and knowled...
来源: 评论
Formal Model of ATM Based on Object Constraint Language (OCL)
Formal Model of ATM Based on Object Constraint Language (OCL...
收藏 引用
International Conference on Engineering and Emerging Technologies (ICEET)
作者: Irfan Ahmed Sadia Naseer Umm - e - Habiba Jabar Mahmood Shehzad Ashraf Chaudhry Khadija Batool Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou China Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi U.A.E International Institute of Science Arts and Technology (IISAT) Gujranwala Pakistan
Formal methods (FM) are innovative methods which employ mathematical notations to specify explicit and precise requirements. This paper presents a formal model of an automated teller machine (ATM) using Object Constra... 详细信息
来源: 评论
On the noise robustness of in-context learning for text generation  24
On the noise robustness of in-context learning for text gene...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Hongfu Gao Feipeng Zhang Wenyu Jiang Jun Shu Feng Zheng Hongxin Wei Department of Statistics and Data Science Southern University of Science and Technology and School of Economics and Finance Xi'an Jiaotong University School of Economics and Finance Xi'an Jiaotong University Department of Statistics and Data Science Southern University of Science and Technology and National Key Laboratory for Novel Software Technology Nanjing University School of Mathematics and Statistics Xi'an Jiaotong University Department of Computer Science and Engineering Southern University of Science and Technology Department of Statistics and Data Science Southern University of Science and Technology
Large language models (LLMs) have shown impressive performance on downstream tasks by in-context learning (ICL), which heavily relies on the quality of demonstrations selected from a large set of annotated examples. R...
来源: 评论
Location-Based Service Recommendation for Cold-Start in Mobile Edge Computing  17th
Location-Based Service Recommendation for Cold-Start in Mobi...
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2020
作者: Yu, Mengshan Fan, Guisheng Yu, Huiqun Chen, Liang Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
With the rapid development of the 5G and Internet of Things (IoT), mobile edge computing has gained considerable popularity in academic and industrial field, which provides physical resources closer to end users. Serv... 详细信息
来源: 评论
MRLATO: An Adaptive Task Offloading Mechanism Based on Meta Reinforcement Learning in Edge Computing Environment
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Zhang, Peiying Liu, Jiamin Guizani, Maher Wang, Jian Kumar, Neeraj Tan, Lizhuang Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao266580 China Ministry of Education Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China University of Texas Arlington Computer Science and Engineering Department TX United States College of Science Qingdao266580 China Thapar University Department of Computer Science and Engineering Patiala147004 India Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Traditional cloud computing models struggle to meet the requirements of latency-sensitive applications when processing large amounts of data. As a solution, Multi-access Edge Computing (MEC) extends computing resource... 详细信息
来源: 评论
SymPhase: Phase Symbolization for Fast Simulation of Stabilizer Circuits
arXiv
收藏 引用
arXiv 2023年
作者: Fang, Wang Ying, Mingsheng State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
This paper proposes an efficient stabilizer circuit simulation algorithm that only traverses the circuit forward once. We introduce phase symbolization into stabilizer generators, which allows possible Pauli faults in... 详细信息
来源: 评论
Detecting Violations of Differential Privacy for Quantum Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Guan, Ji Fang, Wang Huang, Mingyu Ying, Mingsheng State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Quantum algorithms for solving a wide range of practical problems have been proposed in the last ten years, such as data search and analysis, product recommendation, and credit scoring. The concern about privacy and o... 详细信息
来源: 评论
Nerftap: Enhancing Transferability of Adversarial Patches on Face Recognition Using Neural Radiance Fields
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Xiaoliang Shen, Furao Han, Feng Zhao, Jian Nie, Changhai National Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability t... 详细信息
来源: 评论
Heuristic Elastic Scaling for Kubernetes Heterogeneous Microservices  21
Heuristic Elastic Scaling for Kubernetes Heterogeneous Micro...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Wang, Song He, Sheng Ning, Yishuang Gao, Xiang Ding, Zhijun The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China The Department of Computer Science and Technology Tongji University Shanghai201804 China Kingdee Research Kingdee International Software Group Co. Ltd Shenzhen518057 China Intelligent Computing Facility Innovation Center ZhejiangLab Hangzhou30012 China
Kubernetes has become the basic platform for building cloud native applications. However, existing horizontal scaling methods based on Kubernetes have problems with resource redundancy. Furthermore, the combined horiz... 详细信息
来源: 评论
SIMAC: A Semantic-Driven Integrated Multimodal Sensing And Communication Framework
arXiv
收藏 引用
arXiv 2025年
作者: Peng, Yubo Xiang, Luping Yang, Kun Jiang, Feibo Wang, Kezhi Wu, Dapeng Oliver State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Suzhou China School of Information Science and Engineering Hunan Normal University Changsha China Department of Computer Science Brunel University London United Kingdom Department of Computer Science City University of Hong Kong Hong Kong
Traditional single-modality sensing faces limitations in accuracy and capability, and its decoupled implementation with communication systems increases latency in bandwidth-constrained environments. Additionally, sing... 详细信息
来源: 评论