咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是481-490 订阅
排序:
Pre-trained Model-based Actionable Warning Identification: A Feasibility Study
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Xiuting Fang, Chunrong Zhang, Quanjun Wu, Daoyuan Yu, Bowen Zheng, Qirui Guo, An Lin, Shangwei Zhao, Zhihong Liu, Yang Chen, Zhenyu The State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Engineering Nanyang Technological University Singapore
Actionable Warning Identification (AWI) plays a pivotal role in improving the usability of static code analyzers. Currently, Machine Learning (ML)-based AWI approaches, which mainly learn an AWI classifier from labele... 详细信息
来源: 评论
FedCA: Federated learning based on classification layer alignment
FedCA: Federated learning based on classification layer alig...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Gang Liu Jing Jia Rui Mao Yan Ji Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The issue of data heterogeneity has long been a significant challenge in federated learning, impacting the speed of global model convergence and potentially lowering the overall performance of the global model, thereb... 详细信息
来源: 评论
Exploring Unlabeled Data in Multiple Aspects for Semi-Supervised MRI Segmentation
收藏 引用
Health Data Science 2024年 第1期4卷 177-190页
作者: Qingyuan He Kun Yan Qipeng Luo Duan Yi Ping Wang Hongbin Han Defeng Liu Radiology Department Peking University Third HospitalBeijingChina Peking University Third Hospital Beijing Key Laboratory of Magnetic Resonance Imaging Devices and TechnologyBeijingChina School of Computer Science Peking UniversityBeijingChina Department of Pain Medicine Peking University Third HospitalBeijingChina School of Software and Microelectronics Peking UniversityBeijingChina National Engineering Research Center for Software Engineering Peking UniversityBeijingChina Key Laboratory of High Conffdence Software Technologies(Peking University) Ministry of EducationBeijingChina Department of Obstetrics and Gynecology Peking University Third HospitalBeijingChina Center for Reproductive Medicine Peking University Third HospitalBeijingChina
Background:MRI segmentation offers crucial insights for automatic *** deep learningbased segmentation methods have attained cutting-edge performance,their efffcacy heavily relies on vast sets of meticulously annotated... 详细信息
来源: 评论
Makespan and Security-Aware Workflow Scheduling for Cloud Service Cost Minimization Using Firefly Optimizer  22nd
Makespan and Security-Aware Workflow Scheduling for Cloud ...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Zhou, Chengliang Wang, Tian Li, Liying Sun, Jin Zhou, Junlong School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China National Trusted Embedded Software Engineering Technology Research Center East China Normal University Shanghai200062 China
As efficient commercial information technology, cloud computing has attracted more and more users to submit their requests to the cloud platform and pay for them based on the amount and quality of services. One of the... 详细信息
来源: 评论
Detection of Java Basic Thread Misuses Based on Static Event Analysis  23
Detection of Java Basic Thread Misuses Based on Static Event...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Baoquan Cui Miaomiao Wang Chi Zhang Jiwei Yan Jun Yan Jian Zhang State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China and University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China and University of Chinese Academy of Sciences Beijing China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China and Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China and University of Chinese Academy of Sciences Beijing China
The fundamental asynchronous thread (***) in Java can be easily misused, due to the lack of deep understanding for garbage collection and thread interruption mechanism. For example, a careless implementation of asynch... 详细信息
来源: 评论
Development of a Soft Hand and Wrist Rehabilitation Robot Utilizing Lattice Structure Actuators
Development of a Soft Hand and Wrist Rehabilitation Robot Ut...
收藏 引用
World Rehabilitation Robot Convention (WRRC)
作者: Jianwei Lai Aiguo Song Wenbin Zhang Ye Lu Jiajin Wang Ye Li State Key Laboratory of Digital Medical Engineering Jiangsu Key Laboratory of Remote Measurement and Control School of Instrument Science and Engineering Southeast University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China
Soft robots offer promising solutions for rehabilitation due to their inherent attributes such as suppleness, lightweight construction, and safety features. However, prevalent soft actuators face limitations in output... 详细信息
来源: 评论
Activity Diagram Synthesis Using Labelled Graphs and the Genetic Algorithm
收藏 引用
Journal of computer Science & Technology 2021年 第6期36卷 1388-1406页
作者: Chun-Hui Wang Zhi Jin Wei Zhang Didar Zowghi Hai-Yan Zhao Wen-Pin Jiao Key Laboratory of High Confidence Software Technology(Ministry of Education) Peking University Beijing 100871China Institute of Software School of Electronics Engineering and Computer SciencePeking UniversityBeijing 100871China School of Computer Science Inner Mongolia Normal UniversityHohhot 010022China Faculty of Engineering and Information Technology University of TechnologySydney 2007Australia
Many applications need to meet diverse requirements of a large-scale distributed user *** challenges the current requirements engineering ***-based requirements engineering was proposed as an umbrella term for dealing... 详细信息
来源: 评论
An Approach to Optimize Symbolic Execution in Ethereum Smart Contracts
An Approach to Optimize Symbolic Execution in Ethereum Smart...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Yi Liu Lizhi Cai Chenchen Chai Yuan Ma School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai Development Center of Computer Software Technology Shanghai China
As the application of smart contracts in blockchain technology becomes increasingly widespread, their security issues have emerged as a focal point of both research and practice. Although symbolic execution technology... 详细信息
来源: 评论
Attack and Improvement of a Hidden Vector Encryption Scheme  12
Attack and Improvement of a Hidden Vector Encryption Scheme
收藏 引用
12th International Conference on Electronics, Communications and Networks, CECNet 2022
作者: Wang, Ke Wang, Zhikun Luo, Song Guan, Zhi Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China Department of Computer Science and Technology Eecs Peking University Beijing China School of Computer Science and Engineering Chongqing University of Technology Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014, Phuong et al. proposed an HVE scheme with consta... 详细信息
来源: 评论
Approximate k-Nearest Neighbor Query over Spatial Data Federation  28th
Approximate k-Nearest Neighbor Query over Spatial Data Fede...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Zhang, Kaining Tong, Yongxin Shi, Yexuan Zeng, Yuxiang Xu, Yi Chen, Lei Zhou, Zimu Xu, Ke Lv, Weifeng Zheng, Zhiming State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing School of Computer Science and Engineering and Institute of Artificial Intelligence Beihang University Beijing China Department of Computer Science and Engineering HKUST Hong Kong Guangzhou China City University of Hong Kong Hong Kong
Approximate nearest neighbor query is a fundamental spatial query widely applied in many real-world applications. In the big data era, there is an increasing demand to scale these queries over a spatial data federatio... 详细信息
来源: 评论