咨询与建议

限定检索结果

文献类型

  • 3,566 篇 会议
  • 2,464 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,102 篇 工学
    • 3,147 篇 计算机科学与技术...
    • 2,618 篇 软件工程
    • 743 篇 信息与通信工程
    • 468 篇 控制科学与工程
    • 364 篇 生物工程
    • 298 篇 电气工程
    • 291 篇 机械工程
    • 253 篇 电子科学与技术(可...
    • 207 篇 光学工程
    • 199 篇 生物医学工程(可授...
    • 147 篇 仪器科学与技术
    • 139 篇 化学工程与技术
    • 118 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 94 篇 交通运输工程
    • 92 篇 安全科学与工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 建筑学
  • 1,844 篇 理学
    • 1,168 篇 数学
    • 398 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 314 篇 物理学
    • 214 篇 系统科学
    • 146 篇 化学
  • 1,201 篇 管理学
    • 715 篇 管理科学与工程(可...
    • 545 篇 图书情报与档案管...
    • 229 篇 工商管理
  • 129 篇 医学
    • 107 篇 临床医学
    • 91 篇 基础医学(可授医学...
  • 128 篇 法学
    • 97 篇 社会学
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 178 篇 semantics
  • 160 篇 computer science
  • 130 篇 feature extracti...
  • 129 篇 software enginee...
  • 125 篇 laboratories
  • 119 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 98 篇 web services
  • 96 篇 data mining
  • 92 篇 educational inst...
  • 87 篇 deep learning
  • 87 篇 algorithm design...
  • 80 篇 optimization
  • 80 篇 accuracy
  • 78 篇 cloud computing
  • 72 篇 clustering algor...
  • 66 篇 data models
  • 61 篇 wireless sensor ...
  • 61 篇 software testing

机构

  • 454 篇 state key labora...
  • 279 篇 state key labora...
  • 204 篇 school of comput...
  • 176 篇 state key labora...
  • 161 篇 college of compu...
  • 156 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 121 篇 key laboratory o...
  • 112 篇 national key lab...
  • 110 篇 shanghai key lab...
  • 109 篇 state key labora...
  • 102 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 88 篇 shandong provinc...
  • 79 篇 state key labora...
  • 71 篇 shandong provinc...
  • 65 篇 school of comput...
  • 63 篇 department of co...

作者

  • 73 篇 junping du
  • 52 篇 shen linlin
  • 47 篇 tao dacheng
  • 46 篇 du bo
  • 43 篇 xiao limin
  • 41 篇 huang di
  • 40 篇 gao yang
  • 39 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 32 篇 liu hong
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,678 篇 英文
  • 214 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6044 条 记 录,以下是391-400 订阅
排序:
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count  23
Detecting Memory Errors in Python Native Code by Tracking Ob...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Xutong Ma Jiwei Yan Hao Zhang Jun Yan Jian Zhang State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences and Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences
Third-party Python modules are usually implemented as binary extensions by using native code (C/C++) to provide additional features and runtime acceleration. In native code, the heap-allocated PyObjects are managed by... 详细信息
来源: 评论
Low Resolution Face Image Recognition Based on Consistent Discriminant Correlation Analysis with Weight Correction  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Lin, Xiaoan Li, Meihua Pei, Jihong Zhao, Yang College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
Consistent Discriminant Correlation Analysis (CDCA) is an effective algorithm for dual-view learning. However, the importance of information from different samples and features may vary. In CDCA, the sample features f... 详细信息
来源: 评论
Regularized Loose Coupled Deep Non-negative Basis Matrix Factorization for Low-Resolution Face Image Recognition  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Li, Jianhua Wang, Jinxin Pei, Jihong Zhao, Yang College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
Low-resolution face image recognition is a research focus in computer vision and pattern recognition. In this paper, the potential relationship between matched high-resolution face and low-resolution face images is co... 详细信息
来源: 评论
Coupled Non-negative Matrix Factorization with Deep Part-Based Feature Learning for Low-Resolution Image Recognition  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Wang, Jinxin Zhao, Yang Pei, Jihong Yang, Xuan College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
The existing low-resolution (LR) image recognition methods based on coupled relationship learning of high- and low-resolution images usually take similar feature extraction steps for both high- and low-resolution imag... 详细信息
来源: 评论
Learning Deterministic One-Clock Timed Automata via Mutation Testing  20th
Learning Deterministic One-Clock Timed Automata via Mutatio...
收藏 引用
20th International Symposium on Automated Technology for Verification and Analysis, ATVA 2022
作者: Tang, Xiaochen Shen, Wei Zhang, Miaomiao An, Jie Zhan, Bohua Zhan, Naijun School of Software Engineering Tongji University Shanghai China Kaiserslautern Germany State Key Laboratory of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China
In active learning, an equivalence oracle is supposed to answer whether a hypothesis model is equivalent to the system under learning. Its implementation in real applications is considered a major bottleneck for activ... 详细信息
来源: 评论
Towards better dynamic graph learning: new architecture and unified library  23
Towards better dynamic graph learning: new architecture and ...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Le Yu Leilei Sun Bowen Du Weifeng Lv State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University
We propose DyGFormer, a new Transformer-based architecture for dynamic graph learning. DyGFormer is conceptually simple and only needs to learn from nodes' historical first-hop interactions by: (i) a neighbor co-o...
来源: 评论
A Privacy Preserving Method for IoT Forensics
A Privacy Preserving Method for IoT Forensics
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Wenzheng Chen, Boxi Fu, Xiao Gu, Qing Shi, Jin Du, Xiaojiang Zhou, Xiaoyang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University School of Information Management Nanjing China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ United States Innovation Research Institute Nanjing China
The diversity of the Internet of Things (IoT) poses challenges to privacy protection, especially in the field of digital forensics. How to ensure that only the private information of the suspect is provided, and not t... 详细信息
来源: 评论
Blockchain-based Crowd-sensing Trust Management Mechanism for Crowd Evacuation  25
Blockchain-based Crowd-sensing Trust Management Mechanism fo...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Yu, Jiawen Zhang, Guijuan Lu, Dianjie Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology State Key Laboratory of High-end Server and Storage Technology Shandong Jinan China
With the continuous urban expansion, the safety of public places has attracted more and more attention. Once an accident occurs and people distrust their surroundings, it will cause congestion, trampling and other eve... 详细信息
来源: 评论
Data-Driven Crowd Motion Modeling With Group Properties Analysis  25
Data-Driven Crowd Motion Modeling With Group Properties Anal...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Jia, Chuanhua Lu, Dianjie Zhang, Guijuan Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology State Key Laboratory of High-end Server and Storage Technology Shandong Jinan China
Traditional crowd evacuation simulation methods focus on the analysis of individual behavior in the crowd, but ignore the analysis of potential group properties in the process of crowd motion, which reduces the visual... 详细信息
来源: 评论
Federated Learning based Path Planning Method for Crowd Evacuation  25
Federated Learning based Path Planning Method for Crowd Evac...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Yuan, Zihao Lu, Dianjie Zhang, Guijuan Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology State Key Laboratory of High-end Server and Storage Technology Shandong Jinan China
The surveillance videos captured by cameras deployed in large-scale places can provide help for path planning of crowd evacuation in emergencies. However, most surveillance videos are not allowed to be shared in order... 详细信息
来源: 评论