咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是521-530 订阅
排序:
FAS-reid: Fair Architecture Search for Person Re-IDentification
FAS-reid: Fair Architecture Search for Person Re-IDentificat...
收藏 引用
Information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Shengbo Chen Shijie Chen Zhou Lei School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ...
来源: 评论
Self-Supervised Reinforcement Learning for Out-of-Distribution Recovery via Auxiliary Reward
Self-Supervised Reinforcement Learning for Out-of-Distributi...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufeng Xie Yinan Wang Han Wang Qingshan Li Xi’an Key Laboratory of Intelligent Software Engineering Xidian University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
Recently, the real-world applications of reinforcement learning (RL) have seen the problem of taking actions in an out-of-distribution (OOD) state. However, most existing research is limited to take actions to narrow ...
来源: 评论
Response Time Analysis for Real-Time DAG Tasks Under Partitioned Scheduling
Response Time Analysis for Real-Time DAG Tasks Under Partiti...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Yumeng Chen Songlin Liu Jianhong Zhou Xiang Ling National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China China School of Computer and Software Engineering Xihua University China
Parallel task systems with real-time constraints are widely applied in various fields. Response time analysis is a necessary condition for online admission of applications in dynamic systems. This article focuses on t... 详细信息
来源: 评论
Recommending Missed Citations Identified by Reviewers: A New Task, Dataset and Baselines
arXiv
收藏 引用
arXiv 2024年
作者: Long, Kehan Li, Shasha Wang, Pancheng Bao, Chenlong Tang, Jintao Wang, Ting School of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China
Citing comprehensively and appropriately has become a challenging task with the explosive growth of scientific publications. Current citation recommendation systems aim to recommend a list of scientific papers for a g... 详细信息
来源: 评论
Pooling Under the Sun: A Mining Pool Centralized Revisit and Solution
Pooling Under the Sun: A Mining Pool Centralized Revisit and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Kundu Chen Jie Luo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Mining pools are fundamental infrastructure in most public blockchain networks that utilize Proof-of-Work consensus, ensuring that miners receive stable rewards and contribute to the computational power and storage of... 详细信息
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and Security (IDS)
作者: Jingnian Liu Wei Liang Yuxiang Chen Kai Jin School of Computer Science and Engineering Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
A Comprehensive Overview of Object Detection Based on Deep Learning
A Comprehensive Overview of Object Detection Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Gaojing Yuan Linshu Chen Jiahong Cai Chaoyi Yang Jinnian Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Target detection is an important task in the field of computer vision and its application has been extended to the medical field. In the medical field, target detection techniques can be used for diagnosis, treatment ... 详细信息
来源: 评论
Contribution of Ambient Air Pollution on Risk Assessment of Type 2 Diabetes Mellitus via Explainable Machine Learning
收藏 引用
Biomedical and Environmental Sciences 2023年 第6期36卷 557-560页
作者: DING Zhong Ao ZHANG Li Ying LI Rui Ying NIU Miao Miao ZHAO Bo DONG Xiao Kang LIU Xiao Tian HOU Jian MAO Zhen Xing WANG Chong Jian Department of Epidemiology and Biostatistics College of Public HealthZhengzhou UniversityZhengzhou 450001HenanChina Department of Software Engineering School of Computer and Artificial IntelligenceZhengzhou UniversityZhengzhou 450001HenanChina Department of Statistics University of Illinois at Urbana-ChampaignChampaignU.S.A NHC Key Laboratory of Prevention and Treatment of Cerebrovascular Diseases Zhengzhou 450001HenanChina
Type 2 diabetes mellitus(T2DM)is recognized as a heterogeneous and complicated disease that is able to influence individuals at various life stages[1].Apart from traditional predictors such as age,family history of di... 详细信息
来源: 评论
RGA-Reid: Neural Architecture Search Based on Relation-Aware Global Attention for Person Re-Identification
RGA-Reid: Neural Architecture Search Based on Relation-Aware...
收藏 引用
IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
作者: Shijie Chen Shengbo Chen Zhou Lei School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the continuous development of deep learning, reid has been continually improved. However, the network backbones of reid are mostly manually designed. This paper proposes RGA-Reid based on auto-reid. NASBR-Reid ob...
来源: 评论
ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps  23
ICTDroid: Parameter-Aware Combinatorial Testing for Componen...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Shixin Zhang Shanna Li Xi Deng Jiwei Yan Jun Yan Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences and Information Technology Center Beijing Jiaotong University Information Technology Center Beijing Jiaotong University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences
Components are the fundamental building blocks of Android applications. Different functional modules represented by components often rely on inter-component communication mechanisms to achieve cross-module data transf... 详细信息
来源: 评论