咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是441-450 订阅
排序:
Review Neural Networks about Image Transformation Based on IGC Learning Framework with Annotated Information
arXiv
收藏 引用
arXiv 2022年
作者: Yan, Yuanjie Yang, Suorong Wang, Yan Zhao, Jian Shen, Furao The National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210046 China The School of Electronic Science and Engineering Nanjing University Nanjing210046 China The National Key Laboratory for Novel Software Technology Nanjing University China
Image transformation, a class of vision and graphics problems whose goal is to learn the mapping between an input image and an output image, develops rapidly in the context of deep neural networks. In computer Vision ... 详细信息
来源: 评论
Knowledge-Aware Multimodal Pre-Training for Fake News Detection
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Litian Zhang, Xiaoming Zhou, Ziyi Zhang, Xi Li, Chaozhuo Yu, Philip S. School of Cyber Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing University of Posts and Telecommunications Beijing China Department of Computer Science University of Illinois at Chicago Chicago United States
Amidst the rapid propagation of multimodal fake news across various social media platforms, the identification and filtering of disinformation have emerged as critical areas of academic research. A salient characteris... 详细信息
来源: 评论
Almost Optimal Time Lower Bound for Approximating Parameterized Clique, CSP, and More, under ETH
arXiv
收藏 引用
arXiv 2024年
作者: Guruswami, Venkatesan Lin, Bingkai Ren, Xuandi Sun, Yican Wu, Kewen Simons Institute for the Theory of Computing Departments of EECS and Mathematics UC Berkeley United States State Key Laboratory for Novel Software Technology Nanjing University China Department of EECS UC Berkeley United States School of Computer Science Peking University China
The Parameterized Inapproximability Hypothesis (PIH), which is an analog of the PCP theorem in parameterized complexity, asserts that, there is a constant Ε > 0 such that for any computable function f : N → N, no... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Hybrid Reinforced Medical Report Generation with M-Linear Attention and Repetition Penalty
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Wenting Xu, Zhenghua Chen, Junyang Qi, Chang Lukasiewicz, Thomas State Key Laboratory of Reliability and Intelligence of Electrical Equipment Tianjin Key Laboratory of Bioelectromagnetic Technology and Intelligent Health Hebei University of Technology China College of Computer Science and Software Engineering Shenzhen University China Department of Computer Science University of Oxford United Kingdom
To reduce doctors’ workload, deep-learning-based automatic medical report generation has recently attracted more and more research efforts, where deep convolutional neural networks (CNNs) are employed to encode the i... 详细信息
来源: 评论
Effective, Platform-Independent GUI Testing via Image Embedding and Reinforcement Learning
arXiv
收藏 引用
arXiv 2022年
作者: Yu, Shengcheng Fang, Chunrong Li, Xin Ling, Yuchen Chen, Zhenyu Su, Zhendong State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China Department of Computer Science ETH Zurich Zurich8092 Switzerland
software applications (apps) have been playing an increasingly important role in various aspects of society. In particular, mobile apps and web apps are the most prevalent among all applications and are widely used in... 详细信息
来源: 评论
A Bivariate Control Strategy on Inductive Power Transfer Converter for Multi-Stage Constant Current Charging  48
A Bivariate Control Strategy on Inductive Power Transfer Con...
收藏 引用
48th Annual Conference of the IEEE Industrial Electronics Society, IECON 2022
作者: Ding, Zhaoyi Iam, Io-Wa Ieong, Chi-Fong Lam, Chi-Seng State Key Laboratory of Analog and Mixed-Signal VLSI University of Macau Macau China Institute of Microelectronics University of Macau Macau China Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau Macau China
Compared with the conventional constant current-constant voltage (CC-CV) charging profile of Li-ion battery, multi-stage constant current (MSCC) charging profile that composed of different constant current stages can ... 详细信息
来源: 评论
Efficient Edge Intelligence under Clustering for UAV Swarm Networks
Efficient Edge Intelligence under Clustering for UAV Swarm N...
收藏 引用
2021 IEEE International Conference on Space-Air-Ground Computing, SAGC 2021
作者: Qu, Yuben Dong, Chao Wu, Tao Zhuang, Yan Dai, Haipeng Wu, Fan Nanjing University of Aeronautics and Astronautics The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology China National University of Defense Technology China Shanghai Jiao Tong University Department of Computer Science and Engineering China Nanjing University State Key Laboratory for Novel Software Technology China
Unmanned aerial vehicles (UAVs) are expected to be widely used in many critical applications including monitoring, surveillance, urban target tracking, and delivery of goods, from military to civil fields. To realize ... 详细信息
来源: 评论
Demystifying What Code Summarization Models Learned
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yu Wang, Ke Nanjing University China Visa Research United States State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Jiangsu Nanjing210023 China Security Cryptography Visa Research Palo AltoCA United States
Study patterns that models have learned has long been a focus of pattern recognition research. Explaining what patterns are discovered from training data, and how patterns are generalized to unseen data are instrument... 详细信息
来源: 评论
Learning Self-Target Knowledge for Few-Shot Segmentation
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Yadang Chen, Sihan Yang, Zhi-Xin Wu, Enhua Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical Engineering University of Macau 999078 China State Key Laboratory of Computer Science Institute of Software University of Chinese Academy of Sciences Beijing100190 China
Few-shot semantic segmentation uses a few annotated data of a specific class in the support set to segment the target of the same class in the query set. Most existing approaches fail to perform well when there are si... 详细信息
来源: 评论