咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是811-820 订阅
排序:
Towards Fairness-Aware Multi-Objective Optimization
arXiv
收藏 引用
arXiv 2022年
作者: Yu, Guo Ma, Lianbo Du, Wei Du, Wenli Jin, Yaochu The Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education East China University of Science and Technology Shanghai200237 China Software College Northeastern University Shenyang110819 China The Faculty of Technology Bielefeld University Bielefeld33619 Germany The Department of Computer Science University of Surrey Surrey GuildfordGU2 7XH United Kingdom
Recent years have seen the rapid development of fairness-aware machine learning in mitigating unfairness or discrimination in decision-making in a wide range of applications. However, much less attention has been paid... 详细信息
来源: 评论
Animating turbulent fluid with a robust and efficient high-order advection method
Animating turbulent fluid with a robust and efficient high-o...
收藏 引用
作者: Zhu, Jian Li, Silong Cai, Ruichu Hao, Zhifeng Huang, Guoheng Sheng, Bin Wu, Enhua School of Computers Guangdong University of Technology Guangzhou China School of Mathematics and Big Data Foshan University Foshan China Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
The accuracy of advection has a great influence on the visual effect of fluid simulation. Constrained interpolation profile (CIP) method has been an important advection scheme because of its third-order accuracy and t... 详细信息
来源: 评论
Diff9D: Diffusion-Based Domain-Generalized Category-Level 9-DoF Object Pose Estimation
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Jian Sun, Wei Yang, Hui Deng, Pengchao Liu, Chongpei Sebe, Nicu Rahmani, Hossein Mian, Ajmal National Engineering Research Center for Robot Visual Perception and Control Technology College of Electrical and Information Engineering School of Robotics State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body Hunan University Changsha410082 China Institute of Artificial Intelligence and Robotics Xi’an Jiaotong University Xi’an710049 China Department of Information Engineering and Computer Science University of Trento Trento38123 Italy School of Computing and Communications Lancaster University LA1 4YW United Kingdom Department of Computer Science The University of Western Australia WA6009 Australia
Nine-degrees-of-freedom (9-DoF) object pose and size estimation is crucial for enabling augmented reality and robotic manipulation. Category-level methods have received extensive research attention due to their potent... 详细信息
来源: 评论
Test-Time Domain Adaptation by Learning Domain-Aware Batch Normalization
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Yanan Chi, Zhixiang Wang, Yang Plataniotis, Konstantinos N. Feng, Songhe Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education Beijing Jiaotong University Beijing100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Edward S Rogers Sr. ECE Department University of Toronto TorontoM5S3G8 Canada Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Test-time domain adaptation aims to adapt the model trained on source domains to unseen target domains using a few unlabeled images. Emerging research has shown that the label and domain information is separately embe... 详细信息
来源: 评论
MigrationAdvisor: Recommending Library Migrations from Large-Scale Open-Source Data
MigrationAdvisor: Recommending Library Migrations from Large...
收藏 引用
International Conference on software Engineering - Companion, ICSE, Companion
作者: Hao He Yulin Xu Xiao Cheng Guangtai Liang Minghui Zhou Department of Computer Science and Technology Peking University Beijing China Software Analysis Lab Huawei Technologies Co. Ltd. China Key Laboratory of High Confidence Software Technologies Ministry of Education China
During software maintenance, developers may need to migrate an already in-use library to another library with similar functionalities. However, it is difficult to make the optimal migration decision with limited infor... 详细信息
来源: 评论
NLocalSAT: Boosting local search with solution prediction
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenjie Sun, Zeyu Zhu, Qihao Li, Ge Cai, Shaowei Xiong, Yingfei Zhang, Lu MoESoftware Institute Department of Computer Science and Technology Peking University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
The boolean satisfiability problem is a famous NP-complete problem in computer science. An effective way for this problem is the stochastic local search (SLS). However, in this method, the initialization is assigned i... 详细信息
来源: 评论
GRATIS: Deep Learning Graph Representation with Task-specific Topology and Multi-dimensional Edge Features
arXiv
收藏 引用
arXiv 2022年
作者: Song, Siyang Song, Yuxin Luo, Cheng Song, Zhiyuan Kuzucu, Selim Jia, Xi Guo, Zhijiang Xie, Weicheng Shen, Linlin Gunes, Hatice The Department of Computer Science and Technology University of Cambridge CambridgeCB3 0FT United Kingdom Baidu Inc Beijing100193 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China Department of Computer Engineering Middle East Technical University Ankara Turkey School of Computer Science University of Birmingham Birmingham United Kingdom
Graph is powerful for representing various types of real-world data. The topology (edges’ presence) and edges’ features of a graph decides the message passing mechanism among vertices within the graph. While most ex... 详细信息
来源: 评论
Improving Heterogeneous Model Reuse by Density Estimation
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Anke Luo, Yong Hu, Han He, Fengxiang Su, Kehua Du, Bo Chen, Yixin Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Hubei Luojia Laboratory Wuhan China School of Information and Electronics Beijing Institute of Technology China JD Explore Academy *** Inc. China Department of CSE Washington University in St. Louis United States The University of Sydney Australia
This paper studies multiparty learning, aiming to learn a model using the private data of different participants. Model reuse is a promising solution for multiparty learning, assuming that a local model has been train... 详细信息
来源: 评论
A survey of orthogonal moments for image representation: Theory, implementation, and evaluation
arXiv
收藏 引用
arXiv 2021年
作者: Qi, Shuren Zhang, Yushu Wang, Chao Zhou, Jiantao Cao, Xiaochun College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China State Key Laboratory of Internet of Things for Smart City University of Macau China Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-sen University Shenzhen China
Image representation is an important topic in computer vision and pattern recognition. It plays a fundamental role in a range of applications towards understanding visual contents. Moment-based image representation ha... 详细信息
来源: 评论
μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware
arXiv
收藏 引用
arXiv 2022年
作者: Li, Wenqiang Lin, Jingqiang Shi, Jiameng Wang, Wei Li, Fengjun Guan, Le State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security UCAS Beijing China School of Cyber Security University of Science and Technology of China Hefei Anhui China Department of Computer Science the University of Georgia AthensGA United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electrical Engineering and Computer Science the University of Kansas LawrenceKS United States
Fuzzing is one of the most effective approaches to finding software flaws. However, applying it to microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model periph... 详细信息
来源: 评论