咨询与建议

限定检索结果

文献类型

  • 7,876 篇 期刊文献
  • 6,759 篇 会议
  • 18 册 图书

馆藏范围

  • 14,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,031 篇 工学
    • 5,921 篇 计算机科学与技术...
    • 4,788 篇 软件工程
    • 1,879 篇 信息与通信工程
    • 1,282 篇 控制科学与工程
    • 1,281 篇 电子科学与技术(可...
    • 1,192 篇 电气工程
    • 888 篇 光学工程
    • 773 篇 生物工程
    • 751 篇 机械工程
    • 647 篇 化学工程与技术
    • 557 篇 材料科学与工程(可...
    • 535 篇 仪器科学与技术
    • 455 篇 动力工程及工程热...
    • 453 篇 生物医学工程(可授...
    • 280 篇 土木工程
    • 276 篇 交通运输工程
    • 274 篇 建筑学
    • 269 篇 网络空间安全
    • 229 篇 力学(可授工学、理...
  • 5,723 篇 理学
    • 2,569 篇 数学
    • 2,262 篇 物理学
    • 911 篇 生物学
    • 715 篇 统计学(可授理学、...
    • 637 篇 化学
    • 491 篇 系统科学
  • 2,278 篇 管理学
    • 1,488 篇 管理科学与工程(可...
    • 881 篇 图书情报与档案管...
    • 503 篇 工商管理
  • 377 篇 医学
    • 316 篇 临床医学
    • 232 篇 基础医学(可授医学...
  • 263 篇 法学
  • 190 篇 经济学
  • 143 篇 农学
  • 90 篇 教育学
  • 56 篇 军事学
  • 33 篇 艺术学
  • 25 篇 文学
  • 7 篇 哲学

主题

  • 252 篇 semantics
  • 216 篇 deep learning
  • 192 篇 computational mo...
  • 187 篇 computer science
  • 180 篇 optimization
  • 168 篇 laboratories
  • 168 篇 feature extracti...
  • 154 篇 software enginee...
  • 130 篇 data mining
  • 115 篇 educational inst...
  • 105 篇 reinforcement le...
  • 105 篇 machine learning
  • 99 篇 training
  • 97 篇 quality of servi...
  • 95 篇 authentication
  • 91 篇 image segmentati...
  • 91 篇 servers
  • 88 篇 neural networks
  • 88 篇 convolution
  • 85 篇 simulation

机构

  • 659 篇 department of ph...
  • 636 篇 cavendish labora...
  • 626 篇 state key labora...
  • 517 篇 oliver lodge lab...
  • 516 篇 university of ch...
  • 507 篇 physikalisches i...
  • 425 篇 infn sezione di ...
  • 369 篇 infn sezione di ...
  • 363 篇 infn sezione di ...
  • 347 篇 iccub universita...
  • 337 篇 infn sezione di ...
  • 334 篇 infn sezione di ...
  • 325 篇 department for p...
  • 307 篇 universiteit maa...
  • 301 篇 infn laboratori ...
  • 300 篇 fakultät physik ...
  • 271 篇 horia hulubei na...
  • 267 篇 h.h. wills physi...
  • 264 篇 institute of phy...
  • 263 篇 institute of phy...

作者

  • 193 篇 c. alexa
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 190 篇 d. calvet
  • 189 篇 j. m. izen
  • 189 篇 j. strandberg
  • 188 篇 n. orlando
  • 186 篇 y. tayalati
  • 186 篇 g. spigo
  • 185 篇 v. chiarella
  • 185 篇 f. siegert
  • 178 篇 barter w.
  • 175 篇 brundu d.
  • 170 篇 a. dimitrievska
  • 167 篇 f. deliot
  • 165 篇 r. ströhmer
  • 164 篇 m. rijssenbeek
  • 164 篇 s. jin
  • 164 篇 g. gaudio
  • 164 篇 y. abulaiti

语言

  • 13,298 篇 英文
  • 892 篇 其他
  • 463 篇 中文
检索条件"机构=State Key Laboratory of Software Engineering and School of Computer"
14653 条 记 录,以下是51-60 订阅
排序:
CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale software  35
CAPS: An Efficient Whole-Program Critical Paths Search Frame...
收藏 引用
35th International Conference on software engineering and Knowledge engineering, SEKE 2023
作者: Li, Peiyang Liu, Zixin Su, Yuening Wang, Hao Jiang, Bo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University China
Tracking the flow of external inputs in a program with taint-analysis techniques can help developers better identify potential security vulnerabilities in the software. However, directly using the static taint analysi... 详细信息
来源: 评论
Active Perception for Grasp Detection via Neural Graspness Field  38
Active Perception for Grasp Detection via Neural Graspness F...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Ma, Haoxiang Shi, Modi Gao, Boyang Huang, Di State Key Laboratory of Complex and Critical Software Environment School of Computer Science and Engineering Beihang University Beijing China Geometry Robotics
This paper tackles the challenge of active perception for robotic grasp detection in cluttered environments. Incomplete 3D geometry information can negatively affect the performance of learning-based grasp detection m...
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Minimizing the cost of periodically replicated systems via model and quantitative analysis
收藏 引用
Frontiers of computer Science 2024年 第5期18卷 11-24页
作者: Chenhao ZHANG Liang WANG Limin XIAO Shixuan JIANG Meng HAN Jinquan WANG Bing WEI Guangjun QIN State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China Smart City College Beijing Union UniversityBeijing 100101China
Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage *** consistent replicas comes with high synchronization costs,as it faces more expensive WAN tr... 详细信息
来源: 评论
Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2517-2545页
作者: Wenming Wang Zhiquan Liu Shumin Zhang Guijiang Liu School of Computer and Information Anqing Normal UniversityAnqing246133China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and EconomicsKunming650221China
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among ***,malicious vehicles providing illegal and incorrect information can compromis... 详细信息
来源: 评论
Understanding the effect of cathodic reaction on corrosion-enhanced erosion in sand-entraining electrolyte
收藏 引用
材料科学技术(英文版) 2025年 第6期209卷 103-116页
作者: Qiliang Zhang Long Hao Wanbin Chen Yi Huang Yunze Xu State Key Laboratory of Structural Analysis Optimization and CAE Software for Industrial EquipmentDalian University of TechnologyDalian 116024China School of Naval Architecture and Ocean Engineering Dalian University of TechnologyDalian 116024China State Key Laboratory for Corrosion and Protection Institute of Metal ResearchChinese Academy of SciencesShenyang 110016China
In this study,the pure erosion behaviour of pure iron and its erosion-corrosion behaviour under different anodic polarization currents were investigated in various cathodic reactions(oxygen reduction,hydrogen ion redu... 详细信息
来源: 评论
Generalized splitting-ring number theoretic transform
收藏 引用
Frontiers of computer Science 2024年 第4期18卷 205-207页
作者: Zhichuang LIANG Yunlei ZHAO Zhenfeng ZHANG School of Computer Science Fudan UniversityShanghai 200433China State Key Laboratory of Cryptology Beijing 100036China Institute of Software Chinese Academy of SciencesBeijing 100190China
1 Introduction Lattice-based cryptography is one of the most promising routine of post-quantum cryptography(PQC).The fundamental and time-consuming operation in lattice-based schemes is the polynomial multiplication i... 详细信息
来源: 评论
Iterative Android automated testing
收藏 引用
Frontiers of computer Science 2023年 第5期17卷 15-26页
作者: Yi ZHONG Mengyu SHI Youran XU Chunrong FANG Zhenyu CHEN State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China School of Big Data and Computer Science Chongqing College of Mobile CommunicationChongqing 400065China
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage... 详细信息
来源: 评论
Granular classifier:Building traffic granules for encrypted traffic classification based on granular computing
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1428-1438页
作者: Xuyang Jing Jingjing Zhao Zheng Yan Witold Pedrycz Xian Li State Key Laboratory on Integrated Services Networks School of Cyber EngineeringXidian UniversityChina Department of Electrical and Computer Engineering University of AlbertaCanada Institute for Future(IFF) Qingdao UniversityQingdaoChina
Accurate classification of encrypted traffic plays an important role in network ***,current methods confronts several problems:inability to characterize traffic that exhibits great dispersion,inability to classify tra... 详细信息
来源: 评论
New Results in Cooperative Adaptive Optimal Output Regulation
收藏 引用
Journal of Systems Science & Complexity 2024年 第1期37卷 253-272页
作者: DONG Yuchen GAO Weinan JIANG Zhong-Ping State Key Laboratory of Synthetical Automation for Process Industries Northeastern UniversityShenyang 110819China Department of Electrical and Computer Engineering Tandon School of EngineeringNew York UniversityBrooklynNY 11201USA
This paper investigates the cooperative adaptive optimal output regulation problem of continuous-time linear multi-agent *** the multi-agent system dynamics are uncertain,solving regulator equations and the correspond... 详细信息
来源: 评论