咨询与建议

限定检索结果

文献类型

  • 3,644 篇 会议
  • 2,503 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,161 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,187 篇 工学
    • 3,198 篇 计算机科学与技术...
    • 2,631 篇 软件工程
    • 759 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 364 篇 生物工程
    • 329 篇 电气工程
    • 298 篇 机械工程
    • 264 篇 电子科学与技术(可...
    • 218 篇 光学工程
    • 200 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 129 篇 网络空间安全
    • 118 篇 动力工程及工程热...
    • 102 篇 交通运输工程
    • 98 篇 安全科学与工程
    • 97 篇 建筑学
    • 94 篇 材料科学与工程(可...
  • 1,852 篇 理学
    • 1,161 篇 数学
    • 398 篇 生物学
    • 327 篇 物理学
    • 322 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 150 篇 化学
  • 1,220 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 553 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 136 篇 医学
    • 112 篇 临床医学
    • 93 篇 基础医学(可授医学...
  • 131 篇 法学
    • 99 篇 社会学
  • 74 篇 经济学
  • 69 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 161 篇 computer science
  • 139 篇 software enginee...
  • 137 篇 feature extracti...
  • 126 篇 laboratories
  • 123 篇 training
  • 117 篇 computational mo...
  • 100 篇 software
  • 99 篇 data mining
  • 96 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 88 篇 accuracy
  • 87 篇 algorithm design...
  • 81 篇 optimization
  • 80 篇 cloud computing
  • 72 篇 clustering algor...
  • 67 篇 data models
  • 63 篇 authentication
  • 63 篇 predictive model...

机构

  • 449 篇 state key labora...
  • 278 篇 state key labora...
  • 208 篇 school of comput...
  • 182 篇 college of compu...
  • 175 篇 state key labora...
  • 150 篇 state key labora...
  • 145 篇 school of inform...
  • 128 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 106 篇 shanghai key lab...
  • 103 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 90 篇 shandong provinc...
  • 77 篇 state key labora...
  • 73 篇 shandong provinc...
  • 66 篇 department of co...
  • 62 篇 school of comput...

作者

  • 73 篇 junping du
  • 56 篇 shen linlin
  • 50 篇 tao dacheng
  • 49 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 41 篇 gao yang
  • 41 篇 shi yinghuan
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 limin xiao
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 liu hong
  • 30 篇 baowen xu
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,278 篇 英文
  • 755 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6161 条 记 录,以下是971-980 订阅
排序:
HAPG-SAQAM: Human Auditory Perception Guided Spatial Audio Quality Assessment Metric
HAPG-SAQAM: Human Auditory Perception Guided Spatial Audio Q...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yuanming Zheng Jiaxuan Yao Xiangyu Deng Yuhong Yang Ruiqi Liao Weiping Tu Cedar Lin National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan China Guangdong OPPO Mobile Telecommunications Corp. China
Spatial audio quality evaluation is essential for applications like virtual and augmented reality, where accurate sound reproduction enhances user immersion. While subjective listening tests are the gold standard, the... 详细信息
来源: 评论
A BiLSTM cardinality estimator in complex database systems based on attention mechanism
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第3期7卷 537-546页
作者: Qiang Zhou Guoping Yang Haiquan Song Jin Guo Yadong Zhang Shengjie Wei Lulu Qu Louis Alberto Gutierrez Shaojie Qiao School of Information Science and Technology Southwest Jiaotong UniversityChengduChina School of Software Engineering Chengdu University of Information TechnologyChengduChina School of Energy Power and Mechanical Engineering North China Electric Power UniversityBaodingChina Digital Media Art Key Laboratory of Sichuan ProvinceSichuan Conservatory of MusicChengduChina Department of Computer Science Rensselaer Polytechnic InstituteNew YorkNew YorkUSA
An excellent cardinality estimation can make the query optimiser produce a good execution *** there are some studies on cardinality estimation,the prediction results of existing cardinality estimators are inaccurate a... 详细信息
来源: 评论
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts
Siguard: Detecting Signature-Related Vulnerabilities in Smar...
收藏 引用
International Conference on software engineering - Companion, ICSE, Companion
作者: Jiashuo Zhang Yue Li Jianbo Gao Zhi Guan Zhong Chen Key Laboratory of High Confidence Software Technologies MoE Peking University Beijing China School of Computer Science Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
Ethereum smart contract enables developers to en-force access control policies of critical functions using built-in signature verification interfaces, i.e., ecrecover. However, due to the lack of best practices for th...
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications
DIDAPPER: A Practical and Auditable On-Chain Identity Servic...
收藏 引用
IEEE International Conference on Decentralized Applications and Infrastructures
作者: Libin Xia Jiashuo Zhang Xihan Zhang Yue Li Jianbo Gao Zhi Guan Zhong Chen Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China School of Computer Science Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
The popularity of decentralized applications brings increasing on-chain audit concerns. Since on-chain accounts do not link to real-world identities, decentralized applications have been wildly used for illegal activi...
来源: 评论
TD3-Based Collaborative Computation Offloading and Charging Scheduling in Multi-UAV-Assisted MEC Networks
TD3-Based Collaborative Computation Offloading and Charging ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Liang Zhao Yujun Yao Huan Zhou Hao Wang Victor C. M. Leung Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering College of Computer and Information Technology China Three Gorges University Yichang China School of Computer Science Northwestern Polytechnical University Xi'an China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Computation offloading, resource allocation, and endurance issues in unmanned aerial vehicle (UAV)-aided mobile edge computing (MEC) networks have always been a research focus. UAV-aided MEC allows mobile users (MUs)&... 详细信息
来源: 评论
Federated Distributed Deep Reinforcement Learning for Recommendation-enabled Edge Caching
Federated Distributed Deep Reinforcement Learning for Recomm...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Hao Wang Huan Zhou Mingze Lit Liang Zhao Victor C.M. Leung Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering College of Computer and Information Technology China Three Gorges University Yichang China School of Computer Science Northwestern Polytechnical University Xi'an China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
This paper investigates a content recommendation-based edge caching method in multi-tier edge-cloud networks while considering content delivery and cache replacement decisions as well as bandwidth allocation strategie... 详细信息
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
A Survey of Recommender Systems Based on Hypergraph Neural Networks  1
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Liu, Canwei He, Tingqin Zhu, Hangyu Li, Yanlu Xie, Songyou Hosam, Osama School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Guangdong Financial High-tech Zone "Blockchain +" Fintech Research Institute Guangzhou510623 China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan411201 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China Higher Colleges of Technology Abu Dhabi United Arab Emirates
Unlike highly purposeful search, a recommender system tends to uncover the user’s potential interests and is a personalized information filtering system. Recently, the performance of hypergraph neural networks in cla... 详细信息
来源: 评论
Contrastive Learning Guided Latent Diffusion Model for Image-to-Image Translation
arXiv
收藏 引用
arXiv 2025年
作者: Si, Qi Wang, Bo Zhang, Zhao Zhao, Mingbo Jin, Xiaojie Xu, Mingliang Wang, Meng School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China School of Computer Science and Engineering Donghua University Shanghai China ByteDance Culver City United States School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China
The diffusion model has demonstrated superior performance in synthesizing diverse and high-quality images for text-guided image translation. However, there remains room for improvement in both the formulation of text ... 详细信息
来源: 评论