咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是491-500 订阅
排序:
Container-based data-intensive application scheduling in hybrid cloud-edge collaborative environment
Container-based data-intensive application scheduling in hyb...
收藏 引用
作者: Tang, Bing Luo, Jincheng Zhang, Jiaming School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Hunan Xiangtan China School of Information and Communication Engineering Guangzhou Maritime University Guangdong Guangzhou China School of Information Engineering Wuhan University of Technology Hubei Wuhan China
Container virtualization technology represented by Docker has been widely used in the industry due to its advantages of lightweight, fast deployment, and easy portability. It can bring convenience to system deployment... 详细信息
来源: 评论
Attack against UAV Infrared Object Detection Based on Gradient Descent Method  7
Attack against UAV Infrared Object Detection Based on Gradie...
收藏 引用
7th IEEE International Conference on Information Systems and computer Aided Education, ICISCAE 2024
作者: Xu, Mingkang Chen, keyu Xu, Haoli Yang, Xing Lu, Jun Qu, Bin Gao, Haoqi Hu, Zhiyang Wu, Mengjiang Chen, Jun State Key Laboratory of Pulsed Power Laser College of Electronic Engineering National University of Defense Technology Hefei230037 China National University of Defense Technology Hefei China Jianghuai Advance Technology Center Hefei230000 China Key Laboratory of Electronic Restriction of Anhui Province Hefei230037 China College of Computer Science and Software Enginering Hohai University Nanjing211100 China
At present, infrared intelligent detection technology has been widely used in various fields. Due to the development of its technology, how to interfere with important targets such as intelligent recognition of vehicl... 详细信息
来源: 评论
Deep Learning Object Detection  7th
Deep Learning Object Detection
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Liu, Jingnian Huang, Weihong Xiao, Lijun Huo, Yingzi Xiong, Huixuan Li, Xiong Xiao, Weidong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Guangdong Financial High-Tech Zone "Blockchain +" Fintech Research Institute Foshan528253 China School of Computer Science and Engineering University of Electronic Science and Technology of China Xiangtan411201 China School of Software Engineering Xiamen University of Technology Xiamen361024 China
Object detection techniques are a major part of computer vision research, with large-scale applications in industrial, scientific and other scenarios. Technologies such as face detection, medical image detection, auto... 详细信息
来源: 评论
Exploring the Impact of Drivers’ Emotion and Multi-task Learning on Takeover Behavior Prediction in Multimodal Environment Exploring Takeover Behavior Prediction in Multimodal Environment
Exploring the Impact of Drivers’ Emotion and Multi-task Lea...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Feng, Xinyu Gu, Yu Lin, Yuming Cai, Yaojun Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guangxi Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Province Chengdu China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Guangxi Nanning China
With the development of autonomous driving technology, drivers may be immersed in non-driving related tasks. Therefore, takeover safety has received increasing attention. Previous studies have focused on designing the... 详细信息
来源: 评论
Dual-Domain Multi-Model GAN Fingerprint Restoration for Compressed Fake Face Attribution
Dual-Domain Multi-Model GAN Fingerprint Restoration for Comp...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Chengxiang Fan Aohong Shen Zhen Han Cai Tong Zhongyuan Wang Dekang Yi National Engineering Research Center for Multimedia Software and Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China
Recent advances in GAN fingerprint have shown increasing success in fake face attribution. However, the fake faces are usually compressed during network transmission, which causes the degradation of GAN fingerprint an... 详细信息
来源: 评论
Adaptively feature matching via joint transformational-spatial clustering
Adaptively feature matching via joint transformational-spati...
收藏 引用
作者: Wang, Linbo Tan, Li Fang, Xianyong Guo, Yanwen Wan, Shaohua MOE Key Laboratory of Intelligent Computing and Signal Processing School of Computer Science and Technology Anhui University Hefei China National Key Lab for Novel Software Technology Nanjing University Nanjing China School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China
The transformational and spatial proximities are important cues for identifying inliers from an appearance based match set because correct matches generally stay close in input images and share similar local transform... 详细信息
来源: 评论
Test Generation for Mutation Testing by Symbolic Execution  23
Test Generation for Mutation Testing by Symbolic Execution
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security Companion, QRS-C 2023
作者: Su, Rui Zhang, Zhiyi Zhou, Yuqian Yao, Yongming Collage of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Nanjing University of Aeronautics and Astronautics Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing China Army Engineering of PLA Nanjing China
Mutation testing is a crucial technique to assess the effectiveness of test suites, but it can be computationally expensive. Symbolic execution is a formal technique that generates high-coverage test cases, but its sc... 详细信息
来源: 评论
Permutation Invariant Training for Paraphrase Identification  48
Permutation Invariant Training for Paraphrase Identification
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Bai, Jun Yin, Chuantao Hong, Hanhua Zhang, Jianfei Li, Chen Wang, Yanmeng Rong, Wenge Beihang University State Key Laboratory of Software Development Environment Beijing China Beihang University School of Computer Science and Engineering Beijing China Beihang University Sino-French Engineer School Beijing China Ping An Technology Beijing China
Identifying sentences sharing similar meanings is crucial to speech and text understandings. Although currently popular cross-encoder solutions with pre-trained language models as backbone have achieved remarkable per... 详细信息
来源: 评论
Emergency Transportation and Structural Prediction and Optimization of Goods Based on ARIMA and Multi-objective E-commerce Logistics Network Model  1
Emergency Transportation and Structural Prediction and Optim...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable Computing, ICAISC 2023
作者: Nie, Yiyang Chen, Xiang Wu, Xuanli Deng, Zihao Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Hunan University of Science and Technology Shcool of Mathematics and Computational Science Xiangtan China
With the development of the internet, online shopping has gradually become a popular way of shopping among the general public, which in turn poses a greater challenge to the e-commerce logistics network. Predicting th... 详细信息
来源: 评论
BACON: Boundary-guided Polypharmacy Side Effect Prediction via Integrating Molecular Structures and Biochemical Information
BACON: Boundary-guided Polypharmacy Side Effect Prediction v...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Yike Ma, Huifang Gao, Zihao Li, Zhixin Chang, Liang Northwest Normal University College of Computer Science and Engineering Lanzhou China Ministry of Education Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Guangxi Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guangxi Guilin China
Polypharmacy side effect prediction is a vital task in healthcare machine learning, aiming to predict the occurrence of multiple side effects when patients take drugs together. Existing researches mainly follow the de... 详细信息
来源: 评论