咨询与建议

限定检索结果

文献类型

  • 3,624 篇 会议
  • 2,501 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,193 篇 工学
    • 3,207 篇 计算机科学与技术...
    • 2,658 篇 软件工程
    • 760 篇 信息与通信工程
    • 492 篇 控制科学与工程
    • 368 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 259 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 202 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 141 篇 化学工程与技术
    • 122 篇 网络空间安全
    • 118 篇 动力工程及工程热...
    • 98 篇 交通运输工程
    • 96 篇 建筑学
    • 95 篇 安全科学与工程
    • 92 篇 材料科学与工程(可...
  • 1,863 篇 理学
    • 1,177 篇 数学
    • 402 篇 生物学
    • 329 篇 统计学(可授理学、...
    • 320 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,221 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 555 篇 图书情报与档案管...
    • 235 篇 工商管理
  • 132 篇 法学
    • 98 篇 社会学
  • 130 篇 医学
    • 108 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 74 篇 经济学
  • 68 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 178 篇 semantics
  • 161 篇 computer science
  • 132 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 121 篇 training
  • 112 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 89 篇 deep learning
  • 87 篇 algorithm design...
  • 82 篇 accuracy
  • 80 篇 optimization
  • 78 篇 cloud computing
  • 72 篇 clustering algor...
  • 66 篇 data models
  • 61 篇 authentication
  • 61 篇 wireless sensor ...

机构

  • 456 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 179 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 112 篇 national key lab...
  • 109 篇 state key labora...
  • 107 篇 shanghai key lab...
  • 104 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 87 篇 shandong provinc...
  • 77 篇 state key labora...
  • 71 篇 shandong provinc...
  • 65 篇 department of co...
  • 63 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 48 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 41 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 30 篇 zhao jian
  • 30 篇 liu hong
  • 29 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,658 篇 英文
  • 328 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6139 条 记 录,以下是771-780 订阅
排序:
Free-space Continuous-variable Quantum Secret Sharing
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Fangli Chang, Liang Qiu, Daowen Pan, Minghua Xiong, Wanjun Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Free-space quantum cryptography has the potential to enable global quantum communication. However, most existing continuous-variable quantum secret sharing (CV-QSS) schemes rely on fiber channels. In this paper, we pr... 详细信息
来源: 评论
Optimization of Memory March X Test Algorithm Based on Nuclear Safety Level DCS System Platform  1
收藏 引用
9th International Conference on Energy engineering and Environmental engineering, ICEEEE 2022
作者: Bai, Yongfei Wu, Zhiqiang Liu, Jie Jiang, Wei Zhong, Ke Han, Wenxing Chen, Zhi School of Computer Science University of South China Hengyang421200 China Nuclear Power Institute of China Chengdu610000 China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hunan Hengyang China
At present, the testing algorithm of nuclear power safety level DCS system for memory is GALPAT algorithm. This algorithm has a high time complexity and low fault coverage for memory. During the testing process, addit... 详细信息
来源: 评论
Challenges of Using Pre-trained Models: the Practitioners' Perspective
Challenges of Using Pre-trained Models: the Practitioners' P...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Xin Tan Taichuan Li Ruohe Chen Fang Liu Li Zhang State Key Laboratory of Complex & Critical Software Environment School of Computer Science and Engineering Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Economics and Management Beihang University Beijing China
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ... 详细信息
来源: 评论
Spatial-Temporal Motion Compensation for Learned Video Compression
Spatial-Temporal Motion Compensation for Learned Video Compr...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qian Huang Wenting Liu Hao Lu Yiming Wang College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China
In the past few years, learned video compression has received increasing attention. However, most current learned methods rely on the bilinear warping operations in motion compensation, which is equivalent to a low-pa... 详细信息
来源: 评论
Anomize: Better Open Vocabulary Video Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Li, Fei Liu, Wenxuan Chen, Jingjing Zhang, Ruixu Wang, Yuran Zhong, Xian Wang, Zheng National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China State Key Laboratory for Multimedia Information Processing School of Computer Science Peking University China Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology China
Open Vocabulary Video Anomaly Detection (OVVAD) seeks to detect and classify both base and novel anomalies. However, existing methods face two specific challenges related to novel anomalies. The first challenge is det...
来源: 评论
Research on Optimization of Nuclear Power Security DCS Gateway Encryption Communication Based on OPC UA Protocol  9th
Research on Optimization of Nuclear Power Security DCS Gatew...
收藏 引用
9th International Conference on Energy engineering and Environmental engineering, ICEEEE 2022
作者: Zhou, Pengjun Chen, Zhi Jiang, Wei Liu, Jie Zhang, Yan Zhong, Ke Wu, Zhiqiang School of Computer Science University of South China Hengyang421200 China Nuclear Power Institute of China Chengdu610000 China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hunan Hengyang China
Nuclear power safety grade DCS gateway is an important hub for information transmission between safety grade equipment and non-safety grade equipment, and its security is very important in the transmission process. At... 详细信息
来源: 评论
Learned Video Compression with Spatial-Temporal Optimization
Learned Video Compression with Spatial-Temporal Optimization
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yiming Wang Qian Huang Bin Tang Wenting Liu Wenchao Shan Qian Xu College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China
Previous optical flow based video compression is gradually replaced by unsupervised deformable convolution (DCN) based method. This is mainly due to the fact that the motion vector (MV) estimated by the existing optic...
来源: 评论
Domain Adaptation Random Vector Functional Link for White Blood Cell Classification
Domain Adaptation Random Vector Functional Link for White Bl...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Qin Wang Xi-Zhao Wang Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
There's growing recognition of how machine learning can revolutionize the precision and swiftness of clinical diagnoses by improving the classification of white blood cells. However, a machine learning model speci... 详细信息
来源: 评论
Detection of Deepfakes: Protecting Images and Vedios Against Deepfake
Detection of Deepfakes: Protecting Images and Vedios Against...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Ying Tian Wang Zhou Amin Ul Haq Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College LuZhou China School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching  39
DAMPER: A Dual-Stage Medical Report Generation Framework wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论