咨询与建议

限定检索结果

文献类型

  • 3,635 篇 会议
  • 2,478 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,161 篇 工学
    • 3,174 篇 计算机科学与技术...
    • 2,622 篇 软件工程
    • 744 篇 信息与通信工程
    • 487 篇 控制科学与工程
    • 363 篇 生物工程
    • 306 篇 电气工程
    • 294 篇 机械工程
    • 257 篇 电子科学与技术(可...
    • 215 篇 光学工程
    • 198 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 138 篇 化学工程与技术
    • 122 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 101 篇 材料科学与工程(可...
    • 96 篇 建筑学
    • 96 篇 交通运输工程
    • 94 篇 安全科学与工程
  • 1,839 篇 理学
    • 1,165 篇 数学
    • 397 篇 生物学
    • 328 篇 统计学(可授理学、...
    • 320 篇 物理学
    • 213 篇 系统科学
    • 146 篇 化学
  • 1,210 篇 管理学
    • 718 篇 管理科学与工程(可...
    • 549 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 132 篇 医学
    • 108 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 130 篇 法学
    • 98 篇 社会学
  • 74 篇 经济学
  • 68 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 161 篇 computer science
  • 138 篇 software enginee...
  • 134 篇 feature extracti...
  • 126 篇 laboratories
  • 121 篇 training
  • 115 篇 computational mo...
  • 100 篇 software
  • 97 篇 data mining
  • 96 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 85 篇 accuracy
  • 80 篇 optimization
  • 80 篇 cloud computing
  • 72 篇 clustering algor...
  • 67 篇 data models
  • 63 篇 authentication
  • 62 篇 predictive model...

机构

  • 447 篇 state key labora...
  • 280 篇 state key labora...
  • 210 篇 school of comput...
  • 179 篇 college of compu...
  • 176 篇 state key labora...
  • 152 篇 state key labora...
  • 146 篇 school of inform...
  • 126 篇 school of electr...
  • 124 篇 key laboratory o...
  • 112 篇 state key labora...
  • 111 篇 national key lab...
  • 107 篇 shanghai key lab...
  • 103 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 90 篇 shandong provinc...
  • 77 篇 state key labora...
  • 72 篇 shandong provinc...
  • 66 篇 department of co...
  • 62 篇 school of comput...

作者

  • 73 篇 junping du
  • 56 篇 shen linlin
  • 49 篇 tao dacheng
  • 48 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 shi yinghuan
  • 39 篇 gao yang
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 limin xiao
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 30 篇 baowen xu
  • 30 篇 liu hong
  • 29 篇 zhao jian
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,418 篇 英文
  • 581 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6127 条 记 录,以下是951-960 订阅
排序:
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set
Locating Framework-specific Crashing Faults with Compact and...
收藏 引用
International Conference on software engineering (ICSE)
作者: Jiwei Yan Miaomiao Wang Yepang Liu Jun Yan Long Zhang Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Nowadays, many applications do not exist independently but rely on various frameworks or libraries. The frequent evolution and the complex implementation of framework APIs induce lots of unexpected post-release crashe...
来源: 评论
Rsta: A Reversible Signal Transmission Architecture for Breaking the Limitation of Unidirectional Transmission
SSRN
收藏 引用
SSRN 2025年
作者: Liu, Xin Cui, Shuang Zhang, Xun Zhou, Fuxing Sheng, Kaikai Wang, Bin Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian116622 China
Molecular circuits are essential tools for biosensing and molecular information processing. However, the long-distance and reversible transmission of orthogonal signals remains a significant challenge in molecular cir... 详细信息
来源: 评论
Visual Style Prompt Learning Using Diffusion Models for Blind Face Restoration
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Wanglong Wang, Jikai Wang, Tao Zhang, Kaihao Jiang, Xianta Zhao, Hanli Key Laboratory of Intelligent Informatics for Safety and Emergency of Zhejiang Province Wenzhou University China Department of Computer Science Memorial University of Newfoundland St. John’s Canada State Key Laboratory for Novel Software Technology Nanjing University China College of Engineering and Computer Science Australian National University Australia
Blind face restoration aims to recover high-quality facial images from various unidentified sources of degradation, posing significant challenges due to the minimal information retrievable from the degraded images. Pr... 详细信息
来源: 评论
ST-Tree with Interpretability for Multivariate Time Series Classification
arXiv
收藏 引用
arXiv 2024年
作者: Du, Mingsen Wei, Yanxuan Tang, Yingxia Zheng, Xiangwei Wei, Shoushui Ji, Cun School of Control Science and Engineering Shandong University Jinan China School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Multivariate time series classification is of great importance in practical applications and is a challenging task. However, deep neural network models such as Transformers exhibit high accuracy in multivariate time s... 详细信息
来源: 评论
Vision Transformer (ViT)-based Applications in Image Classification
Vision Transformer (ViT)-based Applications in Image Classif...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and Security (IDS)
作者: Yingzi Huo Kai Jin Jiahong Cai Huixuan Xiong Jiacheng Pang School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China the College of Computer Science and Electronics Engineering Hunan University Changsha China
In recent years, the ViT model has been widely used in the field of computer vision, especially for image classification tasks. This paper summarizes the application of ViT in image classification tasks, first introdu... 详细信息
来源: 评论
Relay Assisted Covert Communications in Underlay Cognitive Radio Networks
Relay Assisted Covert Communications in Underlay Cognitive R...
收藏 引用
Ubiquitous Communication (Ucom), International Conference on
作者: Hongbin Fan Weiwei Yang Wenqiang Feng Chuanzhen Rong College of Communications Engineering PLA Army Engineering University Nanjing China College of Computer and Artificial Intelligence Xiangnan University Chenzhou China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Cognitive radio can meet the increasing demand for wireless spectrum in 5G and B5G, and relay can relay-assisted covert communications in underlay cognitive radio networks (UCRN) to reaching distant destinations. Ther... 详细信息
来源: 评论
TextIM: Part-aware Interactive Motion Synthesis from Text
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Siyuan Du, Bo Cai, Xiantao Peng, Bo Sun, Longling National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Institute of Artificial Intelligence Wuhan University China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
In this work, we propose TextIM, a novel framework for synthesizing TEXT-driven human Interactive Motions, with a focus on the precise alignment of part-level semantics. Existing methods often overlook the critical ro... 详细信息
来源: 评论
Linear time approximation algorithm for column subset selection with local search  24
Linear time approximation algorithm for column subset select...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Yuanbin Zou Ziyun Huang Jinhui Xu Jianxin Wang Qilong Feng School of Computer Science and Engineering Central South University Changsha China and Xiangjiang Laboratory Changsha China Department of Computer Science and Software Engineering Penn State Erie The Behrend College Department of Computer Science and Engineering State University of New York at Buffalo NY School of Computer Science and Engineering Central South University Changsha China and Xiangjiang Laboratory Changsha China and The Hunan Provincial Key Lab of Bioinformatics Central South University Changsha China
The Column Subset Selection (CSS) problem has been widely studied in dimensionality reduction and feature selection. The goal of the CSS problem is to output a submatrix S, consisting of k columns from an n × d i...
来源: 评论
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Search Based on Knowledge Graph
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Se...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Yuxin Zhao Xinjun Mao Tanghaoran Zhang Zhang Zhang College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China
Reusing ROS components, specifically ROS Nodes, is crucial for improving the efficiency and quality of robotic software development. However, developers face challenges in finding the desired ROS Nodes for reuse due t...
来源: 评论
TSCA: Enhancing Smartphone Security with a Touchpoints-Sensitive and Context-Aware Model for Touchscreen-Based Authentication
TSCA: Enhancing Smartphone Security with a Touchpoints-Sensi...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingjie Wang Ruimin Hu National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Whuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Whuhan China
With the widespread use of smartphones, more and more private information is stored on them, which requires a more secure authentication method. Continuous authentication methods show potential for privacy protection ... 详细信息
来源: 评论