咨询与建议

限定检索结果

文献类型

  • 871 篇 会议
  • 600 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 943 篇 工学
    • 684 篇 计算机科学与技术...
    • 561 篇 软件工程
    • 157 篇 信息与通信工程
    • 131 篇 控制科学与工程
    • 73 篇 生物工程
    • 56 篇 机械工程
    • 53 篇 光学工程
    • 53 篇 电子科学与技术(可...
    • 52 篇 交通运输工程
    • 46 篇 生物医学工程(可授...
    • 39 篇 仪器科学与技术
    • 38 篇 电气工程
    • 34 篇 动力工程及工程热...
    • 29 篇 建筑学
    • 28 篇 材料科学与工程(可...
    • 27 篇 化学工程与技术
    • 26 篇 土木工程
    • 24 篇 网络空间安全
    • 22 篇 航空宇航科学与技...
    • 22 篇 安全科学与工程
  • 407 篇 理学
    • 246 篇 数学
    • 77 篇 物理学
    • 74 篇 生物学
    • 68 篇 统计学(可授理学、...
    • 47 篇 系统科学
    • 34 篇 化学
  • 262 篇 管理学
    • 158 篇 管理科学与工程(可...
    • 122 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 28 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
  • 16 篇 经济学
  • 12 篇 哲学
  • 9 篇 教育学
  • 8 篇 农学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 40 篇 semantics
  • 36 篇 data models
  • 35 篇 programming
  • 29 篇 computational mo...
  • 29 篇 accuracy
  • 27 篇 feature extracti...
  • 25 篇 servers
  • 25 篇 predictive model...
  • 23 篇 data mining
  • 23 篇 training
  • 22 篇 algorithm design...
  • 22 篇 software
  • 20 篇 deep learning
  • 18 篇 graph neural net...
  • 18 篇 symbolic computa...
  • 17 篇 reinforcement le...
  • 17 篇 optimization
  • 17 篇 computer vision
  • 17 篇 web services
  • 16 篇 computer archite...

机构

  • 667 篇 state key labora...
  • 190 篇 school of comput...
  • 109 篇 state key labora...
  • 64 篇 state key labora...
  • 57 篇 zhongguancun lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 34 篇 institute of art...
  • 27 篇 state key labora...
  • 26 篇 beijing advanced...
  • 21 篇 beihang universi...
  • 20 篇 school of automa...
  • 20 篇 university of ch...
  • 18 篇 microsoft resear...
  • 18 篇 ministry-of-educ...
  • 17 篇 state key lab of...
  • 16 篇 the state key la...
  • 15 篇 state key labora...
  • 14 篇 key laboratory o...
  • 13 篇 school of cyber ...

作者

  • 45 篇 xiao limin
  • 43 篇 huang di
  • 41 篇 li zhoujun
  • 40 篇 liu xianglong
  • 37 篇 limin xiao
  • 33 篇 ruan li
  • 32 篇 weifeng lv
  • 32 篇 tongyu zhu
  • 26 篇 lang bo
  • 26 篇 li ruan
  • 25 篇 ma shilong
  • 25 篇 lv weifeng
  • 24 篇 xu ke
  • 23 篇 wei li
  • 23 篇 bai xiao
  • 22 篇 zhang xiong
  • 20 篇 hao sheng
  • 20 篇 bo lang
  • 20 篇 hui zhang
  • 20 篇 wenjun wu

语言

  • 1,360 篇 英文
  • 87 篇 其他
  • 30 篇 中文
检索条件"机构=State Key Laboratory of Software Developing Environment"
1475 条 记 录,以下是1-10 订阅
排序:
STAL3D: Unsupervised Domain Adaptation for 3D Object Detection via Collaborating Self-Training and Adversarial Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-12页
作者: Zhang, Yanan Zhou, Chao Huang, Di State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Existing 3D object detection suffers from expensive annotation costs and poor transferability to unknown data due to the domain gap, Unsupervised Domain Adaptation (UDA) aims to generalize detection models trained in ... 详细信息
来源: 评论
ALSTNet:Autoencoder fused long-and short-term time-series network for the prediction of tunnel structure
收藏 引用
Deep Underground Science and Engineering 2025年 第1期4卷 72-82页
作者: Bowen Du Haohan Liang Yuhang Wang Junchen Ye Xuyan Tan Weizhong Chen State Key Laboratory of Software Development Environment Beihang UniversityBeijingChina State Key Laboratory of Geomechanics and Geotechnical Engineering Institute of Rock and Soil MechanicsChinese Academy of SciencesWuhanChina
It is crucial to predict future mechanical behaviors for the prevention of structural *** for underground construction,the structural mechanical behaviors are affected by multiple internal and external factors due to ... 详细信息
来源: 评论
Pushing the Limit of Post-Training Quantization
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5556-5570页
作者: Gong, Ruihao Liu, Xianglong Li, Yuhang Fan, Yunqiang Wei, Xiuying Guo, Jinyang Beihang University State Key Laboratory of Complex & Critical Software Environment Beijing100191 China Yale University New HavenCT06511 United States ShanghaiTech University Shanghai201210 China Beihang University State Key Laboratory of Complex & Critical Software Environment Institute of Artificial Intelligence Beijing100191 China
Recently, post-training quantization (PTQ) has become the de facto way to produce efficient low-precision neural networks without long-time retraining. Despite its low cost, current PTQ works fail to succeed under the... 详细信息
来源: 评论
swSpAMM:optimizing large-scale sparse approximate matrix multiplication on Sunway Taihulight
收藏 引用
Frontiers of Computer Science 2023年 第4期17卷 29-41页
作者: Xiaoyan LIU Yi LIU Bohong YIN Hailong YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
Although matrix multiplication plays an essential role in a wide range of applications,previous works only focus on optimizing dense or sparse matrix *** Sparse Approximate Matrix Multiply(SpAMM)is an algorithm to acc... 详细信息
来源: 评论
Rumor Detection on Social Media with Temporal Propagation Structure Optimization  31
Rumor Detection on Social Media with Temporal Propagation St...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Peng, Xingyu Wu, Junran Liu, Ruomei Xu, Ke State Key Laboratory of Complex & Critical Software Environment Beihang University Beijing China
Traditional methods for detecting rumors on social media primarily focus on analyzing textual content, often struggling to capture the complexity of online interactions. Recent research has shifted towards leveraging ... 详细信息
来源: 评论
ValidGen: A Tool for Automatic Generation of Validation Scripts to Support Rapid Requirements Validation  24
ValidGen: A Tool for Automatic Generation of Validation Scri...
收藏 引用
46th International Conference on software Engineering: Companion, ICSE-Companion 2024
作者: Pan, Hongyue Yang, Yilong School of Software Beihang University State Key Laboratory of Complex & Critical Software Environment Beijing China
Rapid prototyping is an effective way for requirement validation in the earliest stages of software development. Our previous work, RM2PT, can automatically generate software prototypes from requirements models to sup... 详细信息
来源: 评论
VGGAN: Visual Grounding GAN Using Panoptic Transformers  8
VGGAN: Visual Grounding GAN Using Panoptic Transformers
收藏 引用
8th International Conference on Image, Vision and Computing, ICIVC 2023
作者: Quan, Fengnan Lang, Bo Beihang University State Key Laboratory of Software Development Environment Beijing China Beihang University State Key Laboratory of Software Development Environment Zhongguancun Laboratory Beijing China
Visual Grounding is an important part of image annotation generation. The existing methods usually use data alignment based on the similarity calculation of visual text features in location inference and multi-modal f... 详细信息
来源: 评论
Self-Supervised Exploration via Temporal Inconsistency in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5530-5539页
作者: Gao, Zijian Xu, Kele Zhai, Yuanzhao Ding, Bo Feng, Dawei Mao, Xinjun Wang, Huaimin National University of Defense Technology School of Computer Changsha410000 China State Key Laboratory of Complex and Critical Software Environment Beijing100191 China
In sparse extrinsic reward settings, reinforcement learning remains a challenge despite increasing interest in this field. Existing approaches suggest that intrinsic rewards can alleviate issues caused by reward spars... 详细信息
来源: 评论
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 43-57页
作者: Brou Bernard Ehui Chen CHEN Shirui WANG Hua GUO Jianwei LIU School of Cyber Sciences and Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Sino-French Engineering School Beihang University Beihang Hangzhou Innovation Institute Yuhang
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use... 详细信息
来源: 评论
Effective Exploration Based on the Structural Information Principles  38
Effective Exploration Based on the Structural Information Pr...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zeng, Xianghua Peng, Hao Li, Angsheng State Key Laboratory of Software Development Environment Beihang University Beijing China Zhongguancun Laboratory Beijing China
Traditional information theory provides a valuable foundation for Reinforcement Learning (RL), particularly through representation learning and entropy maximization for agent exploration. However, existing methods pri...
来源: 评论