咨询与建议

限定检索结果

文献类型

  • 6,710 篇 期刊文献
  • 4,997 篇 会议
  • 21 册 图书

馆藏范围

  • 11,728 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,898 篇 工学
    • 4,926 篇 计算机科学与技术...
    • 3,984 篇 软件工程
    • 1,235 篇 信息与通信工程
    • 907 篇 电子科学与技术(可...
    • 864 篇 控制科学与工程
    • 814 篇 电气工程
    • 591 篇 光学工程
    • 589 篇 生物工程
    • 532 篇 化学工程与技术
    • 530 篇 机械工程
    • 404 篇 材料科学与工程(可...
    • 388 篇 核科学与技术
    • 387 篇 仪器科学与技术
    • 357 篇 生物医学工程(可授...
    • 278 篇 动力工程及工程热...
    • 215 篇 网络空间安全
    • 177 篇 安全科学与工程
    • 173 篇 土木工程
    • 168 篇 力学(可授工学、理...
  • 4,845 篇 理学
    • 2,095 篇 物理学
    • 2,055 篇 数学
    • 750 篇 生物学
    • 580 篇 统计学(可授理学、...
    • 544 篇 化学
    • 324 篇 系统科学
  • 1,755 篇 管理学
    • 1,140 篇 管理科学与工程(可...
    • 695 篇 图书情报与档案管...
    • 338 篇 工商管理
  • 305 篇 医学
    • 247 篇 临床医学
    • 183 篇 基础医学(可授医学...
  • 189 篇 法学
  • 118 篇 农学
  • 114 篇 经济学
  • 59 篇 军事学
  • 54 篇 教育学
  • 28 篇 艺术学
  • 26 篇 文学
  • 6 篇 哲学
  • 1 篇 历史学

主题

  • 243 篇 computer science
  • 233 篇 semantics
  • 186 篇 laboratories
  • 184 篇 hadron colliders
  • 156 篇 deep learning
  • 156 篇 computational mo...
  • 146 篇 feature extracti...
  • 133 篇 software enginee...
  • 133 篇 machine learning
  • 101 篇 optimization
  • 97 篇 software
  • 93 篇 algorithm design...
  • 88 篇 data mining
  • 84 篇 reinforcement le...
  • 84 篇 wireless sensor ...
  • 81 篇 task analysis
  • 81 篇 educational inst...
  • 75 篇 software testing
  • 71 篇 servers
  • 70 篇 accuracy

机构

  • 1,032 篇 university of ch...
  • 873 篇 state key labora...
  • 655 篇 department of ph...
  • 647 篇 cavendish labora...
  • 561 篇 state key labora...
  • 526 篇 oliver lodge lab...
  • 512 篇 infn sezione di ...
  • 510 篇 physikalisches i...
  • 489 篇 infn sezione di ...
  • 467 篇 infn sezione di ...
  • 439 篇 infn laboratori ...
  • 410 篇 infn sezione di ...
  • 364 篇 infn sezione di ...
  • 341 篇 infn sezione di ...
  • 340 篇 infn sezione di ...
  • 337 篇 iccub universita...
  • 324 篇 infn sezione di ...
  • 321 篇 department for p...
  • 299 篇 universiteit maa...
  • 289 篇 infn sezione di ...

作者

  • 189 篇 c. alexa
  • 185 篇 j. m. izen
  • 183 篇 c. amelung
  • 182 篇 g. bella
  • 182 篇 d. calvet
  • 180 篇 j. strandberg
  • 174 篇 n. orlando
  • 167 篇 y. tayalati
  • 165 篇 g. spigo
  • 164 篇 v. chiarella
  • 161 篇 f. siegert
  • 158 篇 barter w.
  • 157 篇 s. veneziano
  • 157 篇 brundu d.
  • 155 篇 a. dimitrievska
  • 152 篇 f. deliot
  • 152 篇 r. ströhmer
  • 150 篇 y. abulaiti
  • 149 篇 m. rijssenbeek
  • 148 篇 s. jin

语言

  • 10,889 篇 英文
  • 460 篇 其他
  • 381 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory of Computer Science Institute of Software"
11728 条 记 录,以下是91-100 订阅
排序:
A Feature-Aware Transformer Approach for Enhanced Maritime Trajectory Prediction
A Feature-Aware Transformer Approach for Enhanced Maritime T...
收藏 引用
2024 International Conference Optoelectronic Information and Optical Engineering, OIOE 2024
作者: Wang, Wuyong Ma, Xingkong Liu, Bo College of Computer Science and Technology National University of Defense Technology Changsha410073 China State Key Laboratory of Complex & Critical Software Environment Changsha410073 China Strategic Evaluation and Consultation Center Academy of Military Sciences Beijing100000 China
Predicting ship trajectories is vital for enhancing maritime safety, optimizing route planning, and boosting the efficiency of maritime traffic management. Current research often neglects the complex marine environmen... 详细信息
来源: 评论
Autonomous sortie scheduling for carrier aircraft fleet under towing mode
收藏 引用
Defence Technology(防务技术) 2025年 第1期43卷 1-12页
作者: Zhilong Deng Xuanbo Liu Yuqi Dou Xichao Su Haixu Li Lei Wang Xinwei Wang Department of Engineering Mechanics State Key Laboratory of Structural AnalysisOptimization and CAE Software for Industrial EquipmentDalian University of TechnologyDalian116024China School of Mathematical Sciences Dalian University of TechnologyDalian 116024China Naval Aviation University Yantai 264001China China State Shipbuilding Corporation Systems Engineering Research Institute Beijing 100094China Department of Automation School of Information Science and TechnologyTsinghua UniversityBeijing 100084China
Safe and efficient sortie scheduling on the confined flight deck is crucial for maintaining high combat effectiveness of the aircraft *** primary difficulty exactly lies in the spatiotemporal coordination,i.e.,allocat... 详细信息
来源: 评论
A wolf in sheep's clothing: practical black-box adversarial attacks for evading learning-based windows malware detection in the wild  24
A wolf in sheep's clothing: practical black-box adversarial ...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Xiang Ling Zhiyu Wu Bin Wang Wei Deng Jingzheng Wu Shouling Ji Tianyue Luo Yanjun Wu Intelligent Software Research Center Institute of Software Chinese Academy of Sciences and Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Zhejiang University Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security and Hangzhou Research Institute Xidian University Intelligent Software Research Center Institute of Software Chinese Academy of Sciences
Given the remarkable achievements of existing learning-based malware detection in both academia and industry, this paper presents MalGuise, a practical black-box adversarial attack framework that evaluates the securit...
来源: 评论
SLAM: Towards Efficient Multilingual Reasoning via Selective Language Alignment  31
SLAM: Towards Efficient Multilingual Reasoning via Selective...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Fan, Yuchun Mu, Yongyu Wang, Yilin Huang, Lei Ruan, Junhao Li, Bei Xiao, Tong Huang, Shujian Feng, Xiaocheng Zhu, Jingbo NLP Lab School of Computer Science and Engineering Northeastern University Shenyang China NiuTrans Research Shenyang China Harbin Institute of Technology Harbin China Meituan Inc. National Key Laboratory for Novel Software Technology Nanjing University China
Despite the significant improvements achieved by large language models (LLMs) in English reasoning tasks, these models continue to struggle with multilingual reasoning. Recent studies leverage a full-parameter and two... 详细信息
来源: 评论
Stitching, Fine-tuning, Re-training: A SAM-enabled Framework for Semi-supervised 3D Medical Image Segmentation
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Li, Shumeng Qi, Lei Yu, Qian Huo, Jing Shi, Yinghuan Gao, Yang Nanjing University State Key Laboratory for Novel Software Technology China Nanjing University National Institute of Healthcare Data Science China School of Computer Science and Engineering China Shandong Women's University School of Data and Computer Science China
Segment Anything Model (SAM) fine-tuning has shown remarkable performance in medical image segmentation in a fully supervised manner, but requires precise annotations. To reduce the annotation cost and maintain satisf... 详细信息
来源: 评论
EF-IMR: Embedded Flash with Interlaced Magnetic Recording Technology
EF-IMR: Embedded Flash with Interlaced Magnetic Recording Te...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Chenlin Ma Xiaochuan Zheng Kaoyi Sun Tianyu Wang Yi Wang College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Radio Frequency Heterogeneous Integration
Interlaced Magnetic Recording (IMR), a technology that improves storage density through track overlap, introduces significant latency due to Read-Modify-Write (RMW) operations. Writing to overlapped tracks affects und... 详细信息
来源: 评论
A Comprehensive Survey on Communication-Efficient Federated Learning in Mobile Edge Environments
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Jia, Ninghui Qu, Zhihao Ye, Baoliu Wang, Yanyan Hu, Shihong Guo, Song Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources College of Computer Science and Software Engineering Nanjing211100 China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing210023 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Kowloon Hong Kong
In traditional centralized machine learning, transmitting raw data to a cloud center incurs high communication costs and raises privacy concerns. This is particularly challenging in mobile edge environments, where dev... 详细信息
来源: 评论
Unmasking Social Robots’Camouflage:A GNN-Random Forest Framework for Enhanced Detection
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 467-483页
作者: Weijian Fan Chunhua Wang Xiao Han Chichen Lin School of Data Science and Intelligent Media Communication University of ChinaBeijing100024China School of Computer and Cyber Sciences Communication University of ChinaBeijing100024China Institute of Communication Studies Communication University of ChinaBeijing100024China State Key Laboratory of Media Convergence and Communication Communication University of ChinaBeijing100024China
The proliferation of robot accounts on social media platforms has posed a significant negative impact,necessitating robust measures to counter network anomalies and safeguard content *** robot detection has emerged as... 详细信息
来源: 评论
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness  10th
Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics...
收藏 引用
10th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2024
作者: Lu, Jiayi Yuan, Shenghao Sanan, David Zhao, Yongwang School of Cyber Science and Technology and College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China InfoComm Technology Cluster Singapore Institute of Technology Singapore Singapore
Binary semantics forms a critical infrastructure for proving the correctness of Just-In-Time (JIT) compilation, an advanced technique to optimize runtime execution by translating the source bytecode of a program into ... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论