咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,230 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,921 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,193 篇 软件工程
    • 325 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 41 篇 建筑学
    • 40 篇 安全科学与工程
    • 40 篇 网络空间安全
    • 38 篇 交通运输工程
  • 897 篇 理学
    • 555 篇 数学
    • 185 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 61 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 deep learning
  • 32 篇 protocols
  • 31 篇 cloud computing

机构

  • 508 篇 state key labora...
  • 202 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 85 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 gao yang
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun

语言

  • 2,503 篇 英文
  • 139 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2729 条 记 录,以下是941-950 订阅
排序:
Transformers in Medical Image Analysis: A Review
arXiv
收藏 引用
arXiv 2022年
作者: He, Kelei Gan, Chen Li, Zhuoyuan Rekik, Islem Yin, Zihao Ji, Wen Gao, Yang Wang, Qian Zhang, Junfeng Shen, Dinggang Medical School of Nanjing University Nanjing China National Institute of Healthcare Data Science Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China BASIRA Lab Faculty of Computer and Informatics Engineering Istanbul Technical University Istanbul Turkey School of Science and Engineering Computing University of Dundee United Kingdom School of Biomedical Engineering ShanghaiTech University Shanghai China Department of Research and Development Shanghai United Imaging Intelligence Co. Ltd. Shanghai China
Transformers have dominated the field of natural language processing, and recently impacted the computer vision area. In the field of medical image analysis, Transformers have also been successfully applied to full-st... 详细信息
来源: 评论
CSPs: Catchy short passwords making offline and online attacks impossible
收藏 引用
International Journal of Information and computer Security 2019年 第3期11卷 255-274页
作者: Shen, Jaryn Zeng, Qingkai State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China
This paper proposes to address online and offline attacks to passwords without increasing users' efforts in choosing and memorising their passwords. In CSPS, a password consists of two parts, a user-chosen short p... 详细信息
来源: 评论
Selective oxidation of benzyl alcohol to benzaldehyde using palladium nanoparticle-loaded poly(ionic liquid)s catalysts
收藏 引用
Molecular Catalysis 2025年 584卷
作者: Liu, Yaping Pan, Chao Qiu, Xiaomin Zhang, Hailin Feng, Haijun Tang, Yubao Shang, Zhijie Song, Hongbing College of Chemical Engineering Qingdao University of Science and Technology Zhengzhou Road No.53 Qingdao 266042 China China University of Petroleum (Beijing) School of Chemical Engineering and Environment State Key Laboratory of Heavy Oil Processing Beijing 102249 China School of Computer and Software Shenzhen Institute of Information Technology Guangdong Shenzhen 518172 China College of Chemistry and Molecular Engineering Qingdao University of Science and Technology Zhengzhou Road No.53 Qingdao 266042 China
The conversion of readily accessible chemicals into high-value-added products is a key process in industrial chemistry. This research showcases an efficient transformation of benzyl alcohol to benzaldehyde utilizing p... 详细信息
来源: 评论
Solving string constraints with regex-dependent functions through transducers with priorities and variables
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Taolue Hague, Matthew Han, Zhilei Hu, Denghang Flores-Lamas, Alejandro Lin, ANTHONY Widjaja Kan, Shuanglong Rümmer, Philipp Wu, Zhilin Department of Computer Science Birkbeck University of London Malet Street London United Kingdom Department of Computer Science Royal Holloway University of London Egham Hill Egham SurreyTW20 0EX United Kingdom School of Software Tsinghua University China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences & University of Chinese Academy of Sciences China University of Kaiserslautern Max-Planck Institute Kaiserslautern Germany University of Kaiserslautern Kaiserslautern Germany Department of Information Technology Uppsala University Box 337 UppsalaSE-751 05 Sweden
Regular expressions are a classical concept in formal language theory. Regular expressions in programming languages (RegEx) such as JavaScript, feature non-standard semantics of operators (e.g. greedy/lazy Kleene star... 详细信息
来源: 评论
Shifu2: A network representation learning based model for advisor-advisee relationship mining
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Jiaying Xia, Feng Wang, Lei Xu, Bo Kong, Xiangjie Tong, Hanghang King, Irwin Key Laboratory for Ubiquitous Network Service Software of Liaoning Province School of Software Dalian University of Technology China School of Science Engineering and Information Technology Federation University Australia Australia School of Software Dalian University of Technology China Department of Computer Science University of Illinois at Urbana-Champaign United States Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong
The advisor-advisee relationship represents direct knowledge heritage, and such relationship may not be readily available from academic libraries and search engines. This work aims to discover advisor-advisee relation... 详细信息
来源: 评论
Bagged Tree And ResNet Based Joint End-to-End Fast CTU Partition Decision Algorithm For Video Intra Coding
Research Square
收藏 引用
Research Square 2021年
作者: Li, Yixiao Li, Lixiang Fang, Yuan Peng, Haipeng Ling, Nam Information Security Center State Key Laboratory of Networking and Switching Technology National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science and Engineering Santa Clara University Santa ClaraCA95053 United States
In the development of video coding standards, advanced ones have greatly improved the bit rate compared with those of previous generation, but also brought a huge increase in coding complexity. Coding standards, such ... 详细信息
来源: 评论
A novel Skin lesion prediction and classification technique: ViT-GradCAM
收藏 引用
Skin research and technology : official journal of International Society for Bioengineering and the Skin (ISBS) [and] International Society for Digital Imaging of Skin (ISDIS) [and] International Society for Skin Imaging (ISSI) 2024年 第9期30卷 e70040页
作者: Muhammad Shafiq Kapil Aggarwal Jagannathan Jayachandran Gayathri Srinivasan Rajasekhar Boddu Adugna Alemayehu School of Information Engineering Qujing Normal University Qujing China. Key Laboratory of Intelligent Sensor and System Design College of Information Engineering Qujing Normal University Qujing China. Department of CSE Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India. Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Katpadi Vellore India. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India. Department of AIML Gokaraju Rangaraju Institute of Engineering and Technology Bachupally Hyderabad India. Lecturer in Software Engineering Wachemo University Hosaina Ethiopia.
BACKGROUND:Skin cancer is one of the highly occurring diseases in human life. Early detection and treatment are the prime and necessary points to reduce the malignancy of infections. Deep learning techniques are suppl... 详细信息
来源: 评论
Identity-aware attribute recognition via real-time distributed inference in mobile edge clouds
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zichuan Zhou, Pan Wu, Jiangkai Ren, Jiankang Xia, Qiufen Liang, Huizhi Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Software Dalian University of Technology Dalian China School of Computer Science Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science University of Reading Reading United Kingdom
With the development of deep learning technologies, attribute recognition and person re-identification (re-ID) have attracted extensive attention and achieved continuous improvement via executing computing-intensive d... 详细信息
来源: 评论
A comparative study of large-scale cluster workload traces via multiview analysis  21
A comparative study of large-scale cluster workload traces v...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data science and Systems, HPCC/SmartCity/DSS 2019
作者: Ruan, Li Xu, Xiangrong Xiao, Limin Yuan, Feng Li, Yin Dai, Dong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Institute of Software Application Technology Guangzhou AND Chinese Academy of Sciences Guangzhou China Department of Computer Science University of North Carolina Charlotte CharlotteNC United States
Understanding the characteristics of workloads of the large-scale Clusters is the key to diagnose the system bottlenecks, making optimal configuration decisions, improving the system throughput and resource usage. Due... 详细信息
来源: 评论
Fully automated functional fuzzing of Android apps for detecting non-crashing logic bugs
arXiv
收藏 引用
arXiv 2020年
作者: Su, Ting Yan, Yichen Wang, Jue Sun, Jingling Xiong, Yiheng Pu, Geguang Wang, Ke Su, Zhendong ETH Zurich East China Normal University Shanghai Key Laboratory of Trustworthy Computing China Nanjing University State Key Laboratory for Novel Software Technology China Visa Research United States ETH Zurich Department of Computer Science Switzerland
Android apps are GUI-based event-driven software and have become ubiquitous in recent years. Obviously, functional correctness is critical for an app's success. However, in addition to crash bugs, non-crashing fun... 详细信息
来源: 评论