咨询与建议

限定检索结果

文献类型

  • 59 篇 会议
  • 28 篇 期刊文献

馆藏范围

  • 87 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 36 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 电气工程
    • 2 篇 建筑学
    • 2 篇 环境科学与工程(可...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 矿业工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 21 篇 理学
    • 7 篇 数学
    • 7 篇 物理学
    • 5 篇 生物学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 5 篇 computational mo...
  • 4 篇 computer archite...
  • 4 篇 algorithm design...
  • 4 篇 pipelines
  • 4 篇 engines
  • 3 篇 parallel process...
  • 3 篇 neural networks
  • 3 篇 resource managem...
  • 3 篇 benchmark testin...
  • 3 篇 feature extracti...
  • 3 篇 degradation
  • 3 篇 hardware
  • 3 篇 field programmab...
  • 3 篇 training
  • 2 篇 conferences
  • 2 篇 neurons
  • 2 篇 deep learning
  • 2 篇 nonlinear optics
  • 2 篇 computation offl...
  • 2 篇 performance opti...

机构

  • 71 篇 state key labora...
  • 8 篇 neuroscience and...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 nanjing universi...
  • 3 篇 parallel process...
  • 2 篇 state key labora...
  • 2 篇 state key lab of...
  • 2 篇 state key labora...
  • 2 篇 science and tech...
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 pla strategic su...
  • 2 篇 interdisciplinar...

作者

  • 4 篇 depei qian
  • 4 篇 cao lihong
  • 4 篇 xianghui xie
  • 4 篇 zhongzhi luan
  • 4 篇 hailong yang
  • 3 篇 yang hailong
  • 3 篇 weihua zhang
  • 3 篇 xie xianghui
  • 3 篇 fu wenlong
  • 3 篇 zhilei chai
  • 3 篇 da wang
  • 3 篇 zheng fang
  • 3 篇 tegawendé f. bis...
  • 3 篇 dong wu
  • 3 篇 kui liu
  • 2 篇 lin gan
  • 2 篇 zhou jingya
  • 2 篇 gan shuitao
  • 2 篇 jingya zhou
  • 2 篇 li li

语言

  • 81 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing WuXi"
87 条 记 录,以下是31-40 订阅
排序:
On the Impact of Flaky Tests in Automated Program Repair
On the Impact of Flaky Tests in Automated Program Repair
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Yihao Qin Shangwen Wang Kui Liu Xiaoguang Mao Tegawendé F. Bissyandé National University of Defense Technology Changsha China Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China University of Luxembourg Luxembourg
The literature of Automated Program Repair is largely dominated by approaches that leverage test suites not only to expose bugs but also to validate the generated patches. Unfortunately, beyond the widely-discussed co... 详细信息
来源: 评论
Joint Partial Offloading and Resource Allocation for Distributed Multi-access Edge computing Enabled Vehicular Network
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Ma, Guifu Hu, Manjiang Wang, Xiaowei Wu, Di Li, Haoran Bian, Yougang Zhu, Konglin The State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body The College of Mechanical and Vehicle Engineering Hunan University Changsha410082 China Hunan University Wuxi214072 China The College of Design Hunan University Changsha410082 China The Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha410082 China The College of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
In the foreseeable Intelligent Transportation System (ITS), Intelligent Connected Vehicles (ICVs) will play an important role in improving travel efficiency and safety. However, it is challenging for ICVs to support t... 详细信息
来源: 评论
SpTFS: Sparse Tensor Format Selection for MTTKRP via Deep Learning  20
SpTFS: Sparse Tensor Format Selection for MTTKRP via Deep Le...
收藏 引用
Supercomputing Conference
作者: Qingxiao Sun Yi Liu Ming Dun Hailong Yang Zhongzhi Luan Lin Gan Guangwen Yang Depei Qian Beihang University China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Tsinghua University China
Canonical polyadic decomposition (CPD) is one of the most common tensor computations adopted in many scientific applications. The major bottleneck of CPD is matricized tensor times Khatri-Rao product (MTTKRP). To opti... 详细信息
来源: 评论
An Efficient Rule Processing Architecture Based on Reconfigurable Hardware  1
收藏 引用
23rd Annual Conference on Computer engineering and Technology, NCCET 2019
作者: Chen, Mengdong Ren, Xiujiang Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Henghua Science and Technology Park WuxiJiangsu214125 China
In the recovery of security strings in identity authentication mechanism, the combination of dictionary and string transformation rules is an effective method. However, the processing of string transformation rules fa... 详细信息
来源: 评论
Design and implementation of a domain specific rule engine  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Chen, Mengdong Zhou, Xinjian Wu, Dong Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Henghua Science and Technology Park WuxiJiangsu214125 China
Security strings are often needed in identity authentication mechanism. Security strings recovery is a reverse process, which does much calculations on a large amount of possible strings to find the right one, so that... 详细信息
来源: 评论
ZeroSpy: Exploring Software Inefficiency with Redundant Zeros  20
ZeroSpy: Exploring Software Inefficiency with Redundant Zero...
收藏 引用
Supercomputing Conference
作者: Xin You Hailong Yang Zhongzhi Luan Depei Qian Xu Liu Beihang University China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China North Carolina State University USA
Redundant zeros cause inefficiencies in which the zero values are loaded and computed repeatedly, resulting in unnecessary memory traffic and identity computation that waste memory bandwidth and CPU resources. optimiz... 详细信息
来源: 评论
A survey of coverage-guided greybox fuzzing with deep neural models
收藏 引用
Information and Software Technology 2025年 186卷
作者: Junyang Qiu Yupeng Jiang Yuantian Miao Wei Luo Lei Pan Xi Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214123 China School of Computing Macquarie University Sydney 2109 NSW Australia School of Information and Physical Sciences University of Newcastle Newcastle 2308 NSW Australia School of Information Technology Deakin University Melbourne 3125 VIC Australia
Coverage-guided greybox fuzzing (CGF) has emerged as a powerful technique for software vulnerability detection, yet traditional techniques often struggle with the increasing complexity of modern software systems and t... 详细信息
来源: 评论
SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts
SmartGift: Learning to Generate Practical Inputs for Testing...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Teng Zhou Kui Liu Li Li Zhe Liu Jacques Klein Tegawendé F. Bissyandé Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Monash University Melbourne Australia Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained rapid popularity among consumers. Smart contract vulnerabilities however made them a prime target to malicious attack...
来源: 评论
Implementation of Hodgkin-Huxley Spiking Neuron Model Using FPGA  19
Implementation of Hodgkin-Huxley Spiking Neuron Model Using ...
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Yi, Zexuan Fu, Wenlong Cao, Lihong Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
For the study of new computer architecture inspired by brain, implementing neuron function on hardware has become an emerging research direction. To study the feasibility of biological neuron implementation and accele... 详细信息
来源: 评论
Representation Learning on Networks for Community Detection
Representation Learning on Networks for Community Detection
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Jingya Zhou Jianxi Fan Jin Wang Baolei Cheng School of Computer Science and Technology Soochow University Suzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Community detection is a fundamental problem in network analysis. In recent years, network representation learning has been leveraged to help the detection of potential communities. However, representation learning an... 详细信息
来源: 评论