咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,215 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,179 篇 软件工程
    • 317 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 131 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 91 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 890 篇 理学
    • 551 篇 数学
    • 182 篇 物理学
    • 172 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 544 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 201 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhang lijun
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,520 篇 英文
  • 89 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2696 条 记 录,以下是61-70 订阅
排序:
AoI-aware Incentive Mechanism for Mobile Crowdsensing using Stackelberg Game  42
AoI-aware Incentive Mechanism for Mobile Crowdsensing using ...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Xiao, Mingjun Xu, Yin Zhou, Jinrui Wu, Jie Zhang, Sheng Zheng, Jun University of Science and Technology of China School of Computer Science and Technology China Suzhou Institute for Advanced Research University of Science and Technology of China China Temple Universityy Department of Computer and Information Sciences United States Nanjing University State Key Laboratory for Novel Software Technology China
Mobile CrowdSensing (MCS) is a mobile computing paradigm, through which a platform can coordinate a crowd of workers to accomplish large-scale data collection tasks using their mobile devices. Information freshness ha... 详细信息
来源: 评论
On interleaving space exploration of multi-threaded programs
收藏 引用
Frontiers of computer science 2021年 第4期15卷 17-28页
作者: Dongjie CHEN Yanyan JIANG Chang XU Xiaoxing MA State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China
Exploring the interleaving space of a multithreaded program to efficiently detect concurrency bugs is important but also difficult because of the astronomically many thread *** paper presents a novel framework to deco... 详细信息
来源: 评论
Verifying Contextual Refinement with Ownership Transfer
收藏 引用
Journal of computer science & technology 2021年 第6期36卷 1342-1366页
作者: Zhao-Hui Li Xin-Yu Feng School of Computer Science and Technology University of Science and Technology of ChinaHefei 230026China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
Contextual refinement is a compositional approach to compositional verification of concurrent *** has been much work designing program logics to prove the contextual refinement between the object implementation and it... 详细信息
来源: 评论
RAT: A Refactoring-Aware Tool for Tracking Code History  24
RAT: A Refactoring-Aware Tool for Tracking Code History
收藏 引用
46th International Conference on software Engineering: Companion, ICSE-Companion 2024
作者: Niu, Feifei Shao, Junqian Xu, Chaofan Mayr-Dorn, Christoph Assunção, Wesley K. G. Huang, Liguo Li, Chuanyi Ge, Jidong Luo, Bin Egyed, Alexander State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science North Carolina State University North Carolina United States Department of Computer Science and Engineering Southern Methodist University DallasTX United States
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source... 详细信息
来源: 评论
Deep learning based water leakage detection for shield tunnel lining
收藏 引用
Frontiers of Structural and Civil Engineering 2024年 第6期18卷 887-898页
作者: Shichang LIU Xu XU Gwanggil JEON Junxin CHEN Ben-Guo HE College of Computer Science Sichuan UniversityChengdu 610065China School of Computer Science and Engineering Northeastern UniversityShenyang 110004China Department of Embedded Systems Engineering Incheon National UniversityIncheon 22012Korea School of Software Dalian University of TechnologyDalian 116621China Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern UniversityShenyang 110819China
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous *** avoid tedious and inefficient manual inspection,many proje... 详细信息
来源: 评论
GIRP: Energy-Efficient QoS-Oriented Microservice Resource Provisioning via Multi-Objective Multi-Task Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 5793-5807页
作者: Yuan, Honggang Wang, Ting Fu, Min Shi, Yuanming East China Normal University MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Laboratory of Trustworthy Computing Shanghai200062 China National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore ShanghaiTech University School of Information Science and Technology Shanghai201210 China
Microservice architecture has revolutionized web service development by facilitating loosely coupled and independently developable components distributed as containers or virtual machines. While existing studies empha... 详细信息
来源: 评论
Formal Model of ATM Based on Object Constraint Language (OCL)  10
Formal Model of ATM Based on Object Constraint Language (OCL...
收藏 引用
10th International Conference on Engineering and Emerging Technologies, ICEET 2024
作者: Ahmed, Irfan Naseer, Sadia Umm - E - Habiba Mahmood, Jabar Chaudhry, Shehzad Ashraf Batool, Khadija University of Sialkot Department of Computer Science Sialkot Pakistan School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University State Key Laboratory of Blockchain Hangzhou China College of Engineering Abu Dhabi University Department of Computer Science and Information Technology Abu Dhabi United Arab Emirates Gujranwala Pakistan
Formal methods (FM) are innovative methods which employ mathematical notations to specify explicit and precise requirements. This paper presents a formal model of an automated teller machine (ATM) using Object Constra... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
?-net: Dual supervised medical image segmentation with multi-dimensional self-attention and diversely-connected multi-scale convolution
收藏 引用
NEUROCOMPUTING 2022年 500卷 177-190页
作者: Xu, Zhenghua Liu, Shijie Yuan, Di Wang, Lei Chen, Junyang Lukasiewicz, Thomas Fu, Zhigang Zhang, Rui State Key Laboratory of Reliability and Intelligence of Electrical Equipment Hebei University of Technology China Tianjin Key Laboratory of Bioelectromagnetic Technology and Intelligent Health Hebei University of Technology China College of Computer Science and Software Engineering Shenzhen University China Department of Computer Science University of Oxford United Kingdom Department of Health Management Center 983 Hospital of Joint Logistics Support Force China www.ruizhang.info
Although U-Net and its variants have achieved some great successes in medical image segmentation tasks, their segmentation performances for small objects are still unsatisfactory. Therefore, in this work, a new deep m... 详细信息
来源: 评论
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics
收藏 引用
Journal of computer science & technology 2022年 第1期37卷 182-206页
作者: Zi-Jie Huang Zhi-Qing Shao Gui-Sheng Fan Hui-Qun Yu Xing-Guang Yang Kang Yang Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai 200237China Shanghai Engineering Research Center of Smart Energy Shanghai 200237China
Community smells are sub-optimal developer community structures that hinder *** studies performed smell prediction and provided refactoring guidelines from a top-down aspect to help community ***,refactoring smells al... 详细信息
来源: 评论