咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是651-660 订阅
排序:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Ying Wang, Yibo Wang, Sinan Liu, Yepang Xu, Chang Cheung, Shing-Chi Yu, Hai Zhu, Zhiliang The Software College Northeasthern University China The Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China The State Key Lab for Novel Software Technology The Department of Computer Science and Technology Nanjing University China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong
Android introduces a new permission model that allows apps to request permissions at runtime rather than at the installation time since 6.0 (Marshmallow, API level 23). While this runtime permission model provides use... 详细信息
来源: 评论
Genetic evidence for facial variation being a composite phenotype of cranial variation and facial soft tissue thickness
收藏 引用
Journal of Genetics and Genomics 2022年 第10期49卷 934-942页
作者: Wei Qian Manfei Zhang Kaiwen Wan Yunxia Xie Siyuan Du Jiarui Li Xiongzheng Mu Jiange Qiu Xiangyang Xue Xiahai Zhuang Yingzhi Wu Fan Liu Sijia Wang State Key Laboratory of Genetic Engineering Human Phenome InstituteZhangjiang Fudan International Innovation CenterFudan UniversityShanghai 201203China School of Computer Science Fudan UniversityShanghai 200438China CAS Key Laboratory of Computational Biology Shanghai Institute of Nutrition and HealthUniversity of Chinese Academy of SciencesChinese Academy of SciencesShanghai 200031China School of Data Science Fudan UniversityShanghai 200433China Academy of Medical Science Zhengzhou UniversityZhengzhouHenan 450052China Department of Plastic Surgery Huashan HospitalFudan UniversityShanghai 200040China CAS Key Laboratory of Genomic and Precision Medicine Beijing Institute of GenomicsUniversity of Chinese Academy of SciencesBeijing 100101China School of Future Technology University of Chinese Academy of SciencesBeijing 101408China Center for Excellence in Animal Evolution and Genetics Chinese Academy of SciencesKunmingYunnan 650223China
Facial and cranial variation represent a multidimensional set of highly correlated and heritable *** is known about the genetic basis explaining this *** develop a software package ALo SFL for simultaneous localizatio... 详细信息
来源: 评论
Robust Generalization against Photon-Limited Corruptions via Worst-Case Sharpness Minimization
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Zhuo Zhu, Miaoxi Xia, Xiaobo Shen, Li Yu, Jun Gong, Chen Han, Bo Du, Bo Liu, Tongliang Syndey Ai Centre The University of Sydney Australia National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Jd Explore Academy China Department of Automation University of Science and Technology of China China Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Department of Computer Science Hong Kong Baptist University Hong Kong
Robust generalization aims to tackle the most challenging data distributions which are rare in the training set and contain severe noises, i.e., photon-limited corruptions. Common solutions such as distributionally ro... 详细信息
来源: 评论
Approximate equivalence checking of noisy quantum circuits
arXiv
收藏 引用
arXiv 2021年
作者: Hong, Xin Ying, Mingsheng Feng, Yuan Zhou, Xiangzhen Li, Sanjiang Centre for Quantum Software and Information University of Technology Sydney Australia State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Department of Computer Science and Technology Tsinghua University China State Key Lab of Millimeter Waves Southeast University China
We study the fundamental design automation problem of equivalence checking in the NISQ (Noisy Intermediate-Scale Quantum) computing realm where quantum noise is present inevitably. The notion of approximate equivalenc... 详细信息
来源: 评论
Task Delay and Energy Consumption Minimization for Low-altitude MEC via Evolutionary Multi-objective Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Geng Ma, Weilong Li, Jiahui Sun, Zemin Wang, Jiacheng Niyato, Dusit Mao, Shiwen College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore College of Software Jilin University Changchun130012 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation... 详细信息
来源: 评论
GUARD: Multigranularity-based Unsupervised Anomaly Detection Algorithm for Multivariate Time Series  8
GUARD: Multigranularity-based Unsupervised Anomaly Detection...
收藏 引用
8th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2022
作者: Meng, Fan Yang, Qunli He, Zhengda Yang, Shangdong Tang, Weidong Public Credit Information Center Jiangsu Strategy and Development Research Center Nanjing China Nanjing University State Key Lab for Novel Software Technology Nanjing China China Pharmaceutical University School of Science Nanjing China The School of Computer Science Nanjing University of Posts and Teleconnnunications Nanjing China China Telecom Corporation Limited Nanjing Branch Customer Operations Department Nanjing China
Unsupervised anomaly detection on multivariate time series (MTS) is a valuable problem in practice because it significantly reduces labeling costs. Even though most classical methods begin to consider inter-series dep... 详细信息
来源: 评论
Out-of-Distribution Detection by Principal Component Correspondence
Out-of-Distribution Detection by Principal Component Corresp...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoyuan Guan Zhiyong Gan Ling Deng Wei Shi Jiankang Chen Shenshen Bu Chunliang Zhao Jianfang Hu Yuren Zhou Wei-Shi Zheng Ruixuan Wang School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE Guangzhou China Network Business Group China Unicom Guangzhou China Department of Network Intelligence Pengcheng Laboratory Shenzhen China School of Data and Science Qingdao University of Science and Technology Qingdao China School of Software Engineering Sun Yat-Sen University Zhuhai China
Out-of-distribution (OOD) detection is vital for the safe application of intelligent systems in real-world scenarios. This paper proposes an enhancement to OOD detection by leveraging the consistency in cognition betw... 详细信息
来源: 评论
QUSL: Quantum Unsupervised Image Similarity Learning with Enhanced Performance
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Lian-Hui Li, Xiao-Yu Chen, Geng Zhu, Qin-Sheng Li, Hui Yang, Guo-Wu School of Physics University of Electronic Science and Technology of China Si Chuan Chengdu610054 China School of Information and Software Engineering University of Electronic Science and Technology of China Si Chuan Chengdu610054 China School of Computer Science and Engineering University of Electronic Science and Technology of China Si Chuan Chengdu610054 China JILA Department of Physics University of Colorado BoulderCO80309-0440 United States Advanced Cryptography and System Security Key Laboratory of Sichuan Province Si Chuan Chengdu610103 China
Leveraging quantum properties to enhance complex learning tasks has been proven feasible, with excellent recent achievements in the field of unsupervised learning. However, current quantum schemes neglect adaptive adj... 详细信息
来源: 评论
QUEST-A: Untrained Filtering with Trained Focusing led to Enhanced Quantum Architectures
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Lian-Hui Li, Xiao-Yu Chen, Geng Zhu, Qin-Sheng Li, Hui Yang, Guo-Wu School of Physics University of Electronic Science and Technology of China Si Chuan Chengdu610054 China School of Information and Software Engineering University of Electronic Science and Technology of China Si Chuan Chengdu610054 China School of Computer Science and Engineering University of Electronic Science and Technology of China Si Chuan Chengdu610054 China JILA Department of Physics University of Colorado BoulderCO80309-0440 United States Advanced Cryptography and System Security Key Laboratory of Sichuan Province Si Chuan Chengdu610103 China
Quantum architecture search (QAS) represents a fundamental challenge in quantum machine learning, with SOTA methods primarily categorized into training-free and gradient-guided approaches. However, treating QAS solely... 详细信息
来源: 评论
Four-Valued Monitorability of ω -Regular Languages  22nd
Four-Valued Monitorability of ω -Regular Languages
收藏 引用
22nd International Conference on Formal Engineering Methods, ICFEM 2020
作者: Chen, Zhe Chen, Yunyun Hierons, Robert M. Wu, Yifan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shanghai Key Laboratory of Trustworthy Computing Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science The University of Sheffield Sheffield United Kingdom
The use of runtime verification has led to interest in deciding whether a property is monitorable: whether it is always possible for the satisfaction or violation of the property to be determined after a finite future... 详细信息
来源: 评论