咨询与建议

限定检索结果

文献类型

  • 3,635 篇 会议
  • 2,476 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,162 篇 工学
    • 3,175 篇 计算机科学与技术...
    • 2,622 篇 软件工程
    • 744 篇 信息与通信工程
    • 486 篇 控制科学与工程
    • 363 篇 生物工程
    • 305 篇 电气工程
    • 294 篇 机械工程
    • 257 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 198 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 138 篇 化学工程与技术
    • 122 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 101 篇 材料科学与工程(可...
    • 96 篇 建筑学
    • 96 篇 交通运输工程
    • 94 篇 安全科学与工程
  • 1,839 篇 理学
    • 1,164 篇 数学
    • 397 篇 生物学
    • 328 篇 统计学(可授理学、...
    • 320 篇 物理学
    • 213 篇 系统科学
    • 146 篇 化学
  • 1,211 篇 管理学
    • 719 篇 管理科学与工程(可...
    • 549 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 132 篇 医学
    • 108 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 130 篇 法学
    • 98 篇 社会学
  • 74 篇 经济学
  • 68 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 161 篇 computer science
  • 137 篇 software enginee...
  • 135 篇 feature extracti...
  • 126 篇 laboratories
  • 123 篇 training
  • 115 篇 computational mo...
  • 102 篇 software
  • 98 篇 data mining
  • 96 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 86 篇 accuracy
  • 82 篇 cloud computing
  • 80 篇 optimization
  • 73 篇 clustering algor...
  • 68 篇 data models
  • 63 篇 authentication
  • 62 篇 predictive model...

机构

  • 447 篇 state key labora...
  • 286 篇 state key labora...
  • 210 篇 school of comput...
  • 179 篇 college of compu...
  • 177 篇 state key labora...
  • 156 篇 state key labora...
  • 152 篇 school of inform...
  • 130 篇 school of electr...
  • 126 篇 key laboratory o...
  • 113 篇 national key lab...
  • 111 篇 state key labora...
  • 104 篇 shanghai key lab...
  • 103 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 90 篇 shandong provinc...
  • 79 篇 state key labora...
  • 71 篇 shandong provinc...
  • 69 篇 school of comput...
  • 66 篇 department of co...

作者

  • 71 篇 junping du
  • 55 篇 shen linlin
  • 50 篇 du bo
  • 49 篇 tao dacheng
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 39 篇 gao yang
  • 39 篇 shi yinghuan
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 limin xiao
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 30 篇 baowen xu
  • 30 篇 fan guisheng
  • 29 篇 zhao jian
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen
  • 27 篇 liu hong

语言

  • 5,417 篇 英文
  • 581 篇 其他
  • 138 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6125 条 记 录,以下是931-940 订阅
排序:
Improving Factual Error Correction by Learning to Inject Factual Errors
arXiv
收藏 引用
arXiv 2023年
作者: He, Xingwei Zhang, Qianru Jin, A-Long Ma, Jun Yuan, Yuan Yiu, Siu Ming The University of Hong Kong Hong Kong School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment China Zhongguancun Laboratory China
Factual error correction (FEC) aims to revise factual errors in false claims with minimal editing, making them faithful to the provided evidence. This task is crucial for alleviating the hallucination problem encounte... 详细信息
来源: 评论
Testing Non-Commutativity of Reduce Functions with Multi-Column Inputs
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Xuan Zhu, Chenlu Li, Ning Zhang, Peng Liu, Lei College of Software Jilin University Jilin China College of Computer Science and Technology Jilin University Jilin China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Jilin China
With the continuous development of the MapReduce programming model, it is necessary to ensure the reliability of MapReduce programs. In practice, the non-commutativity of Reduce functions seriously affects the reliabi... 详细信息
来源: 评论
Learning a Typhoon Bayesian Network Structure from Natural Language Reports  5th
Learning a Typhoon Bayesian Network Structure from Natural...
收藏 引用
5th IFIP TC 12 International Conference on Intelligence Science, ICIS 2022
作者: Yao, Zhangrui Chen, Junhan Pan, Yinghui Zeng, Yifeng Ma, Biyang Ming, Zhong Department of Automation and Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision-Making Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer and Information Sciences Northumbria University Newcastle upon Tyne United Kingdom School of Computer Science and Engineering Minnan Normal University Zhangzhou China
Given the huge toll caused by natural disasters, it is critically important to develop an effective disaster management and emergency response technique. In this article, we investigate relationships between typhoon-r... 详细信息
来源: 评论
Heterogeneous Graph Convolutional Network for Visual Reinforcement Learning of Action Detection  8
Heterogeneous Graph Convolutional Network for Visual Reinfor...
收藏 引用
8th International Conference on Automation, Control and Robotics engineering, CACRE 2023
作者: Wang, Liangliang Huang, Chengxi Chen, Xinwei Wuhan University of Technology School of Computer Science and Artificial Intelligence Luoshi Road 122 Wuhan430070 China -HIT Research Institute of Engineering and Technology Building 9 Software Park Quanzhou362008 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou350121 China
Existing action detection approaches do not take spatio-temporal structural relationships of action clips into account, which leads to a low applicability in real-world scenarios and can benefit detecting if exploited... 详细信息
来源: 评论
ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps
ICTDroid: Parameter-Aware Combinatorial Testing for Componen...
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Shixin Zhang Shanna Li Xi Deng Jiwei Yan Jun Yan Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Information Technology Center Beijing Jiaotong University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences
Components are the fundamental building blocks of Android applications. Different functional modules represented by components often rely on inter-component communication mechanisms to achieve cross-module data transf...
来源: 评论
Detection of Java Basic Thread Misuses Based on Static Event Analysis
Detection of Java Basic Thread Misuses Based on Static Event...
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Baoquan Cui Miaomiao Wang Chi Zhang Jiwei Yan Jun Yan Jian Zhang State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China
The fundamental asynchronous thread (***. Thread) in Java can be easily misused, due to the lack of deep understanding for garbage collection and thread interruption mechanism. For example, a careless implementation o...
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Junhui Li Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Science and Engineering University of Bristol Bristol U.K
In various applications in Internet of Things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc...
来源: 评论
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
Recognizing Human-object Interactions for a Home Assistive Robot  8
Recognizing Human-object Interactions for a Home Assistive R...
收藏 引用
8th International Conference on Automation, Control and Robotics engineering, CACRE 2023
作者: Wang, Liangliang Huo, Guanglei Chen, Xinwei Huang, Chengxi Wuhan University of Technology School of Computer Science and Artificial Intelligence Luoshi Road 122 Wuhan430070 China -HIT Research Institute of Engineering and Technology Building 9 Software Park Quanzhou362008 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou350121 China
To enable robots to understand a specific assistive task during human-robot interactions under complex home scenes, at the center is the problem of human-object interaction (HOI) recognition. In particular, aiming at ... 详细信息
来源: 评论
Deep Spatio-Temporal Decision Fusion Network for Facial Expression Recognition  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Chen, Xuanchi Yang, Heng Zhang, Xia Zheng, Xiangwei Li, Wei School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Internet Diagnosis and Treatment Center Taian City Central Hospital Taian China Shandong Normal University Library Shandong Normal University Jinan China
Facial expression recognition (FER) becomes research focus in affective computing, as it already plays an important role in public security application scenarios such as urban safety management and safety driving assi... 详细信息
来源: 评论