咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是681-690 订阅
排序:
Balancing Load: An Adaptive Traffic Management Scheme for Microservices
Balancing Load: An Adaptive Traffic Management Scheme for Mi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiali Zhou Xin Li Qinhui Wang Xiaolin Qin WeiWei Miao Jianwei Tian College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Military Training and Management Army Command College Nanjing China State Grid Jiangsu Electric Power Co. Ltd. Information & Telecommunication Branch China State Grid Hunan Electric Power Co. Ltd. Information & Telecommunication Branch China
Service Mesh has become one of the most popular microservices governance frameworks. In the service governance function of traffic management, how to design an efficient strategy for request distribution to minimize r... 详细信息
来源: 评论
Biased feature learning for occlusion invariant face recognition  29
Biased feature learning for occlusion invariant face recogni...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Shao, Changbin Huo, Jing Qi, Lei Feng, Zhen-Hua Li, Wenbin Dong, Chuanqi Gao, Yang State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Jiangsu University of Science and Technology Zhenjiang China Department of Computer Science Centre for Vision Speech and Signal Processing University of Surrey Guildford United Kingdom
To address the challenges posed by unknown occlusions, we propose a Biased Feature Learning (BFL) framework for occlusion-invariant face recognition. We first construct an extended dataset using a multi-scale data aug... 详细信息
来源: 评论
Sequential Mechanisms for Multi-type Resource Allocation  21
Sequential Mechanisms for Multi-type Resource Allocation
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Sujoy Sikdar Xiaoxi Guo Haibin Wang Lirong Xia Yongzhi Cao Department of Computer Science Binghamton University Key Laboratory of High Confidence Software Technologies (MOE) Department of Computer Science and Technology Peking University Department of Computer Science Rensselaer Polytechnic Institute
Several resource allocation problems involve multiple types of resources, with a different agency being responsible for "locally" allocating the resources of each type, while a central planner wishes to prov... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Shuang Zhang, Tao Liu, Jiqiang Wang, Jiacheng Wu, Xuangou Zhu, Xiaoqiang Zhang, Ruichen Zhang, Weiting Yuan, Zhenhui Mao, Shiwen Kim, Dong In School of Software Engineering Beijing Jiaotong University Beijing100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Technology An hui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui University of Technology Anhui243002 China College of Computing and Data Science Nanyang Technological University Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering College of Information and Communication Engineering Sungkyunkwan University Suwon16419 Korea Republic of
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Zhiying Xiong Qilin Fan Kai Wang Xiuhua Li Xu Zhang Qingyu Xiong School of Big Data and Software Engineering Chongqing University Chongqing China Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing University Chongqing China School of Computer Science and Technology Harbin Institute of Technology Weihai China Research Institute of Cyberspace Security Harbin Institute of Technology Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China Department of Computer Science University of Exeter Exeter UK
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ...
来源: 评论
Automatic synthesis of generalized winning strategies of impartial combinatorial games using SMT solvers  29
Automatic synthesis of generalized winning strategies of imp...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wu, Kaisheng Fang, Liangda Xiong, Liping Lai, Zhao-Rong Qiao, Yong Chen, Kaidong Rong, Fei Department of Computer Science Jinan University China Department of Computer Science South China Normal University China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology China
Strategy representation and reasoning has recently received much attention in artificial intelligence. Impartial combinatorial games (ICGs) are a type of elementary and fundamental games in game theory. One of the cha... 详细信息
来源: 评论
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Shen, Li Fan, Qilin Xu, Tong Liu, Tongliang Xiong, Hui Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science University of Science and Technology of China Hefei230027 China The School of Big Data and Software Engineering Chongqing University ChinaScience Chongqing401331 China JD Explore Academy The UBTECH Sydney Artificial Intelligence Centre The School of Information Technologies Faculty of Engineering and Information Technologies The University of Sydney DarlingtonNSW2008 Australia Thrust of Artificial Intelligence Nansha Guangdong Guangzhou511400 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
As an essential resource management problem in network virtualization, virtual network embedding (VNE) aims to allocate the finite resources of physical network to sequentially arriving virtual network requests (VNRs)... 详细信息
来源: 评论
Static code analyzer recommendation via preference mining
收藏 引用
Expert Systems with Applications 2025年 285卷
作者: Ge, Xiuting Fang, Chunrong Li, Xuanye Shang, Ye Zhang, Mengyao Pan, Ya China Engineering Research Center of Natural Resource Information Management and Digital Twin Engineering Software Ministry of Education China The State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Southwest University of Science and Technology China
Static Code Analyzers (SCAs) have played a critical role in software quality assurance. However, SCAs with various static analysis techniques suffer from different levels of false positives and false negatives, thereb... 详细信息
来源: 评论
When to update your model: constrained model-based reinforcement learning  22
When to update your model: constrained model-based reinforce...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Tianying Ji Yu Luo Fuchun Sun Mingxuan Jing Fengxiang He Wenbing Huang Department of Computer Science and Technology Tsinghua University Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences JD Explore Academy *** Inc Gaoling School of Artificial Intelligence Renmin University of China and Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China
Designing and analyzing model-based RL (MBRL) algorithms with guaranteed monotonic improvement has been challenging, mainly due to the interdependence between policy optimization and model learning. Existing discrepan...
来源: 评论