咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是511-520 订阅
排序:
A public data-set for synchronous motor electrical faults diagnosis with CNN and LSTM reference classifiers
收藏 引用
Energy and AI 2023年 第4期14卷 221-237页
作者: Zhenglong Sun Ram Machlev Qianchao Wang Juri Belikov Yoash Levron Dmitry Baimel Key Laboratory of Modern Power System Simulation and Control&Renewable Energy Technology Ministry of Education(Northeast Electric Power University)JilinChina The Andrew and Erna Viterbi Faculty of Electrical&Computer Engineering Technion-Israel Institute of TechnologyHaifa 3200003Israel Key Laboratory of Energy Thermal Conversion and Control of Ministry of Education School of Energy and EnvironmentSoutheast UniversityNanjing210096China Department of Software Science Tallinn University of TechnologyAkadeemia tee 15a12618 TallinnEstonia Department of Electrical and Electronics Engineering Sami Shamoon College of EngineeringBeer-Sheva84100Israel
In the last two decades,motor operation monitoring tools have become a necessity,and many studies focus on the detection and diagnosis of motor electrical ***,at present,a core obstacle that prevents the direct compar... 详细信息
来源: 评论
Semantic recommendation through Reinforcement Learning and weighted meta-paths
Semantic recommendation through Reinforcement Learning and w...
收藏 引用
2022 International Conference on Electronic Information engineering, Big Data, and computer Technology, EIBDCT 2022
作者: Yu, Jing Lang, Yue Li, Xuewen Zhang, Jin Zheng, Shaojie Gong, Jibing School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China
Explainable recommendation systems, which can produce high-accuracy recommendations and help users make quick decisions, have become a hotspot in research field. Most of existing research algorithms committed to impro... 详细信息
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars  24
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Nie, Hejing Wen, Yiping Li, Tiancai Ouyang, Sipeng Tian, Muyang School of Computer Science and Engineering Hunan University of Science and Technology China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
Approximate Simulation for Transition Systems with Regular Expressions  2nd
Approximate Simulation for Transition Systems with Regular E...
收藏 引用
2nd International Conference on Artificial Intelligence Logic and Applications, AILA 2022
作者: Cui, Xinyu Li, Zhaokai Chang, Yuting Pan, Haiyu Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Engineering North Minzu University Yinchuan750000 China
Simulation is a well-established technique for verifying wheth-er the behaviors of one labeled transition system (LTS) can mimic all behaviors of another LTS. Transition systems with regular expressions (RE-TSs) are a... 详细信息
来源: 评论
How Well Do Large Language Models Serve as End-to-End Secure Code Producers?
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jianian Duan, Nachuan Tao, Ziheng Gong, Zhaohui Yuan, Yuan Huang, Minlie School of Computer Science and Engineering Beihang University Beijing China School of Computer Science and Engineering Beihang University State Key Laboratory of Software Development Environment Zhongguancun Laboratory Beijing100191 China Tsinghua University Zhongguancun Laboratory Beijing China
The rapid advancement of large language models (LLMs) such as GPT-4 has revolutionized the landscape of software engineering, positioning these models at the core of modern development practices. As we anticipate thes... 详细信息
来源: 评论
Learners' States Monitoring Method Based on Face Recognition Technology  12
Learners' States Monitoring Method Based on Face Recognition...
收藏 引用
12th International Conference on Identification, Information and Knowledge in the internet of Things, IIKI 2021
作者: Qiao, Xiaoyi Zheng, Xiangwei Sun, Xiaofang Li, Shuqin Zhang, Yuang School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China
At present, many scholars focus on the learners' states in online learning, however, a complete real-time monitoring system of learners' states has not been proposed. In order to better detect the learning pro... 详细信息
来源: 评论
Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks
Query Provenance Analysis: Efficient and Robust Defense Agai...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Shaofei Li Ziqi Zhang Haomin Jia Yao Guo Xiangqun Chen Ding Li Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University University of Illinois Urbana-Champaign School of Electronics Engineering and Computer Science Peking University
Query-based black-box attacks have emerged as a significant threat to machine learning systems, where adversaries can manipulate the input queries to generate adversarial examples that can cause misclassification of t... 详细信息
来源: 评论
Understanding and Predicting the Burst of Burnout via Social Media
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2021年 第CSCW3期4卷 1-27页
作者: Wu, Jue Ma, Junyi Wang, Yasha Wang, Jiangtao Key Laboratory of High Confidence Software Technologies Ministry of Education China School of Electronics Engineering and Computer Science Peking University China National Engineering Research Center of Software Engineering Peking University China Center for Intelligent Healthcare Coventry University United Kingdom
Job burnout is a special type of work-related stress that is prevalent in our modern society, and constant burnout is extremely harmful for people's physical health and emotional wellbeing. Traditional studies for... 详细信息
来源: 评论
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Learning Meeting Scheduling System  25
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Lear...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Zhang, Jinsong Mao, Xiaoxuan Li, Lu Wu, Hanqian Joint Graduate School Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration of Ministry of Education Nanjing China
In today's evolving society, the increasing complexity and frequency of meetings necessitate advanced scheduling systems. Traditional methods are constrained by rigid prede-fined strategies, lack intelligent negot... 详细信息
来源: 评论
Wireless Channel Estimation and Equalization Based on Deep Learning
Wireless Channel Estimation and Equalization Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Xueting Huang Linshu Chen Xiaoyan Chen Mo Wang Yuxin Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China School of Software Engineering Xiamen University of Technology Xiamen China
Nowadays, the research on wireless communication is hot, and it has achieved leapfrog development in the past few decades and has made astonishing breakthroughs in emerging applications such as 5G technology, Internet... 详细信息
来源: 评论