[{"name":"计算机网络与信息安全","count":1227,"id":1},{"name":"COMPUTER NETWORKS AND INFORMATION SECURITY","count":916,"id":2},{"name":"模式识别与人工智能","count":872,"id":3},{"name":"PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE","count":660,"id":4},{"name":"系统软件与软件工程","count":660,"id":5},{"name":"SYSTEM SOFTWARE AND SOFTWARE ENGINEERING","count":540,"id":6},{"name":"数据库技术","count":406,"id":7},{"name":"DATABASE TECHNOLOGY","count":327,"id":8},{"name":"计算机图形学与计算机辅助设计","count":267,"id":9},{"name":"COMPUTER GRAPHICS AND COMPUTER AIDED DESIGN","count":213,"id":10},{"name":"算法设计与分析","count":165,"id":11},{"name":"ALGORITHM DESIGN AND ANALYSIS","count":121,"id":12},{"name":"操作系统","count":119,"id":13},{"name":"理论计算机科学","count":115,"id":14},{"name":"OPERATING SYSTEM","count":97,"id":15},{"name":"形式化方法与应用专题","count":73,"id":16},{"name":"SPECIAL TOPIC ON FORMAL METHODS AND APPLICATIONS","count":60,"id":17},{"name":"计算机体系结构","count":48,"id":18},{"name":"THEORETICAL COMPUTER SCIENCE","count":46,"id":19},{"name":"多媒体技术","count":40,"id":20},{"name":"COMPUTER ARCHITECTURE","count":38,"id":21},{"name":"THEORETOCAL COMPUTER SCIENCE","count":35,"id":22},{"name":"软件学报","count":35,"id":23},{"name":"智能化软件新技术专刊","count":25,"id":24},{"name":"SPECIAL ISSUE ON NEW TECHNOLOGIES OF INTELLIGENCE SOFTWARE","count":24,"id":25},{"name":"基于图结构的大数据分析与管理技术专刊","count":24,"id":26},{"name":"面向开放场景的鲁棒机器学习专刊","count":24,"id":27},{"name":"SPECIAL ISSUE ON GRAPH STRUCTURE BASED BIG DATA ANALYSIS AND MANAGEMENT TECHNOLOGIES","count":23,"id":28},{"name":"SPECIAL ISSUE ON ROBUST MACHINE LEARNING IN THE OPEN-WORLD SCENARIOS","count":23,"id":29},{"name":"复杂环境下的机器学习研究专刊","count":22,"id":30},{"name":"大数据分析专刊","count":22,"id":31},{"name":"大数据时代的机器学习研究专刊","count":22,"id":32},{"name":"SPECIAL ISSUE ON MACHINE LEARNING RESEARCH IN COMPLEX ENVIRONMENT","count":21,"id":33},{"name":"SPECIAL ISSUE ON MACHINE LEARNING RESEARCH IN THE ","count":21,"id":34},{"name":"Special Issue on Software Architecture","count":21,"id":35},{"name":"智能数据管理与分析技术专刊","count":21,"id":36},{"name":"软件体系结构专刊","count":21,"id":37},{"name":"SPECIAL ISSUE ON TECHNIQUES FOR INTELLIGENT DATA MANAGEMENT AND ANALYSIS","count":20,"id":38},{"name":"快速三维建模技术专刊","count":20,"id":39},{"name":"MULTIMEDIA TECHNIQUES","count":19,"id":40},{"name":"SPECIAL ISSUE ON TO WARDS HIGH PRECISION FAST 3D MODELING","count":19,"id":41},{"name":"云计算安全研究专刊","count":19,"id":42},{"name":"数据库系统新型技术专题","count":19,"id":43},{"name":"SPECIAL ISSUE ON RESEARCH ON SECURITY OF CLOUD COM","count":18,"id":44},{"name":"SPECIAL TOPIC ON NEW TECHNIQUES OF DATABASE SYSTEMS","count":18,"id":45},{"name":"大数据管理技术专刊","count":18,"id":46},{"name":"支撑人工智能的数据管理与分析技术专刊","count":18,"id":47},{"name":"SPECIAL ISSUE ON BIG DATA MANAGEMENT TECHNOLOGIES","count":17,"id":48},{"name":"SPECIAL ISSUE ON DATA MANAGEMENT AND ANALYLSIS TECHNIQUES FOR ARTIFICIAL INTELLIGENCE","count":17,"id":49},{"name":"Special Issue on Virtual Computing Environment for Sharing Internet Resources","count":17,"id":50},{"name":"嵌入式系统软件设计方法与技术专刊","count":17,"id":51},{"name":"面向互联网资源共享的虚拟计算环境专刊","count":17,"id":52},{"name":"SPECIAL TOPIC ON SOFTWARE VULNERABILITY DETECTION","count":16,"id":53},{"name":"Special Issue on Embedded System Software Design M","count":16,"id":54},{"name":"Special Issue on Wireless Sensor Networks","count":16,"id":55},{"name":"多媒体大数据处理与分析专题","count":16,"id":56},{"name":"大数据治理的理论与技术专题","count":16,"id":57},{"name":"无线传感器网络专刊","count":16,"id":58},{"name":"软件安全漏洞检测专题","count":16,"id":59},{"name":"非经典条件下的机器学习方法专题","count":16,"id":60},{"name":"面向非确定性的软件质量保障方法与技术专题","count":16,"id":61},{"name":"MEDICAL IMAGE PROCESSING AND ANALYSIS","count":15,"id":62},{"name":"SPECIAL TOPIC ON MA CHINE LEARNING METHOD UNDER NON-CLASSICAL CONDITIONS","count":15,"id":63},{"name":"SPECIAL TOPIC ON BIG DATA GOVERNANCE: THEORY AND TECHNIQUES","count":15,"id":64},{"name":"SPECIAL TOPIC ON MULTIMEDIA BIG DATA PROCESSING AND ANALYSIS","count":15,"id":65},{"name":"SPECIAL TOPIC ON NONDETERMINISTIC SOFTWARE QUALITY ASSURANCE","count":15,"id":66},{"name":"医学影像处理与分析","count":15,"id":67},{"name":"领域软件工程专题","count":14,"id":68},{"name":"SPECIAL ISSUE OF RESEARCH ON SEARCH BASED SOFTWARE","count":13,"id":69},{"name":"SPECIAL ISSUE ON FORMAL METHODS IN SOFTWARE AND AP","count":13,"id":70},{"name":"SPECIAL ISSUE ON SOFTWARE ENGINEERING IN THE ERA OF BIG DATA","count":13,"id":71},{"name":"SPECIAL TOPIC ON DATA DRIVEN INTELLIGENT SOFTWARE DEVELOPMENT","count":13,"id":72},{"name":"SPECIAL TOPIC ON DOMAIN-SPECIFIC SOFTWARE ENGINEERING","count":13,"id":73},{"name":"SPECIAL TOPIC ON THEORETICAL FOUNDATION OF FORMAL METHODS","count":13,"id":74},{"name":"可视化及可视分析专题","count":13,"id":75},{"name":"基于搜索的软件工程研究专题","count":13,"id":76},{"name":"大数据时代软件工程专题","count":13,"id":77},{"name":"形式化方法的理论基础专题","count":13,"id":78},{"name":"数据驱动的软件智能化开发方法与技术专题","count":13,"id":79},{"name":"软件形式化方法与应用专题","count":13,"id":80},{"name":"SOFTWARE VISUALIZATION AND INFORMATION VISUALIZATI","count":12,"id":81},{"name":"SPECIAL ISSUE ON FORMAL METHODS AND TOOLS","count":12,"id":82},{"name":"SPECIAL ISSUE ON VISUALIZATION AND VISUAL ANALYTIC","count":12,"id":83},{"name":"SPECIAL SECTION ON SELF-ADAPTIVE SOFTWARE SYSTEMS:","count":12,"id":84},{"name":"SPECIAL TOPIC ON PRIVACY PRESERVING ORIENTED NEW TECHNOLOGIES AND CRYPTOGRAPHIC ALGORITHMS","count":12,"id":85},{"name":"形式化方法与工具专刊","count":12,"id":86},{"name":"绿色低碳机器学习研究与应用专题","count":12,"id":87},{"name":"自适应软件系统:开发方法与运行支撑专题","count":12,"id":88},{"name":"软件可视化和信息可视化","count":12,"id":89},{"name":"面向隐私保护的新型技术与密码算法专题","count":12,"id":90},{"name":"2007年中国计算机大会推荐优秀论文","count":11,"id":91},{"name":"Internet环境下基于构件的软件理论与方法","count":11,"id":92},{"name":"SPECIAL ISSUE ON 2007 CHINA NATIONAL COMPUTER CONF","count":11,"id":93},{"name":"SPECIAL ISSUE ON INFORMATION SYSTEM SECURITY","count":11,"id":94},{"name":"SPECIAL TOPIC ON RESEARCH AND APPLICATION OF GREEN AND LOW CARBON MACHINE LEARNING","count":11,"id":95},{"name":"业务过程管理技术专题","count":11,"id":96},{"name":"信息系统安全专题","count":11,"id":97},{"name":"面向复杂软件的缺陷检测与修复技术专题","count":11,"id":98},{"name":"面向多模态数据的新型数据库技术专题","count":11,"id":99},{"name":"COMOUTER NETWORKS AND INFORMATION SECURITY","count":10,"id":100},{"name":"DATA INTEGRATION","count":10,"id":101},{"name":"Deep Web数据集成","count":10,"id":102},{"name":"PATTERN RECOGNITION AND ARTIFICIAL INTELLEGENCE","count":10,"id":103},{"name":"SPECIAL SECTION ON ADVANCED BUSINESS PROCESS MANAG","count":10,"id":104},{"name":"SPECIAL TOPIC ON AUTONOMOUS AND CONTROLLABLE TRUSTED COMPUTING","count":10,"id":105},{"name":"SPECIAL TOPIC ON BLOCKCHAIN AND DIGITAL CURRENCY TECHNOLOGY","count":10,"id":106},{"name":"SPECIAL TOPIC ON BUSINESS PROCESS MANAGEMENT AND SERVICES TECHNOLOGIES FOR INTELLIGENT MANUFACTURING","count":10,"id":107},{"name":"SPECIAL TOPIC ON CONSTRUCTION AND QUALITY ASSURANCE OF DOMAIN-ORIENTED SOFTWARE SYSTEMS","count":10,"id":108},{"name":"SPECIAL TOPIC ON DEFECT DETECTION AND REPAIR TECHNIQUES FOR COMPLEX SOFTWARE","count":10,"id":109},{"name":"SPECIAL TOPIC ON EMERGING SOFTWARE ENGINEERING TECHNOLOGIES FOR DEVOPS","count":10,"id":110},{"name":"SPECIAL TOPIC ON INTELLIGENT EMBEDDED SYSTEM","count":10,"id":111},{"name":"SPECIAL TOPIC ON KNOWEDGE ENABLED INFORMATION SYSTEMS","count":10,"id":112},{"name":"SPECIAL TOPIC ON NEW DATABASE TECHNOLOGY FOR MULTIMODAL DATA","count":10,"id":113},{"name":"THEORY AND METHODOLOGY FOR INTERNETWARE","count":10,"id":114},{"name":"区块链与数字货币技术专题","count":10,"id":115},{"name":"多模态协同感知与融合技术专题","count":10,"id":116},{"name":"大数据专题","count":10,"id":117},{"name":"定理证明理论与应用专题","count":10,"id":118},{"name":"新兴软件与系统的可信赖性与安全专题","count":10,"id":119},{"name":"智能嵌入式系统专题","count":10,"id":120},{"name":"知识赋能的信息系统专题","count":10,"id":121},{"name":"科学基金","count":10,"id":122},{"name":"系统与网络软件安全专题","count":10,"id":123},{"name":"系统软件安全专题","count":10,"id":124},{"name":"软件学科发展回顾特刊","count":10,"id":125},{"name":"面向DevOps的软件工程新技术专题","count":10,"id":126},{"name":"面向智能制造的业务过程管理与服务技术专题","count":10,"id":127},{"name":"面向自主安全可控的可信计算专题","count":10,"id":128},{"name":"面向领域的软件系统构造与质量保障专题","count":10,"id":129},{"name":"2005年中国计算机大会推荐优秀论文","count":9,"id":130},{"name":"AI软件系统工程化技术与规范专题","count":9,"id":131},{"name":"SPECIAL ISSUE ON 2005 CHINA NATIONAL COMPUTER CONFERENCE (CNCC 2005)","count":9,"id":132},{"name":"SPECIAL ISSUE ON BIG DATA USABILITY: THEORY, METHODS AND TECHNIQUES","count":9,"id":133},{"name":"SPECIAL ISSUE ON SOFTWARE DISCIPLINE REVIEW","count":9,"id":134},{"name":"SPECIAL SECTION ON BIG DATA","count":9,"id":135},{"name":"SPECIAL TOPIC ON CONSTRUCTION AND VERIFICATION TECHNOLOGY OF SYSTEM SOFTWARE","count":9,"id":136},{"name":"SPECIAL TOPIC ON DEPENDABILITY AND SECURITY OF EMERGING SOFTWARE AND SYSTEMS","count":9,"id":137},{"name":"SPECIAL TOPIC ON FORMAL METHODS AND APPLICATION","count":9,"id":138},{"name":"SPECIAL TOPIC ON FORMAL SOFTWARE VERIFICATION","count":9,"id":139},{"name":"SPECIAL TOPIC ON FRONTIERS IN SYSTEM SOFTWARE","count":9,"id":140},{"name":"SPECIAL TOPIC ON LATEST ADVANCES OF NATURAL HUMAN COMPUTER INTERACTION","count":9,"id":141},{"name":"SPECIAL TOPIC ON MULTIMODAL COLLABORATIVE PERCEPTION AND FUSION","count":9,"id":142},{"name":"SPECIAL TOPIC ON PROGRAMMING LANGUAGES AND SYSTEMS","count":9,"id":143},{"name":"SPECIAL TOPIC ON SECURITY OF SYSTEM AND NETWORK SOFTWARE","count":9,"id":144},{"name":"SPECIAL TOPIC ON SYSTEMS SOFTWARE SECURITY","count":9,"id":145},{"name":"SPECIAL TOPIC ON THEOREM PROVING: THEORY AND APPLICATIONS","count":9,"id":146},{"name":"《软件学报》创刊15周年特邀论文","count":9,"id":147},{"name":"云原生数据库技术与系统专题","count":9,"id":148},{"name":"大数据可用性理论、方法和技术专题","count":9,"id":149},{"name":"大模型下的软件质量保障专题","count":9,"id":150},{"name":"智能系统的分析和验证专题","count":9,"id":151},{"name":"物联网建模与分析方法专题","count":9,"id":152},{"name":"程序设计语言与系统前沿专题","count":9,"id":153},{"name":"系统软件前沿进展专题","count":9,"id":154},{"name":"系统软件构造与验证技术专题","count":9,"id":155},{"name":"自然人机交互新进展专题","count":9,"id":156},{"name":"融合预训练技术的多模态学习研究专题","count":9,"id":157},{"name":"软件可信性与供应链安全前沿进展专题","count":9,"id":158},{"name":"软件形式化验证专题","count":9,"id":159},{"name":"PATTERN RECONGNITION AND ARTIFICIAL INTRLLIGENCE ","count":8,"id":160},{"name":"SEMI-SUPERVISED LEARNING","count":8,"id":161},{"name":"SPECIAL TOPIC ON ANALYSIS AND VERIFICATION OF INTELLIGENT SYSTEM","count":8,"id":162},{"name":"SPECIAL TOPIC ON CLOUD-NATIVE DATABASE TECHNOLOGIES AND SYSTEMS","count":8,"id":163},{"name":"SPECIAL TOPIC ON ENGINEERING TECHNOLOGIES AND STANDARDS FOR AI SOFTWARE SYSTEMS","count":8,"id":164},{"name":"SPECIAL TOPIC ON FRONTIERS OF SOFTWARE DEPENDABILITY AND SUPPLY CHAIN SECURITY","count":8,"id":165},{"name":"SPECIAL TOPIC ON SOFTWARE QUALITY ASSURANCE IN THE ERA OF LARGE LANGUAGE MODELS","count":8,"id":166},{"name":"SPECIAL TOPIC: RESEARCH ON MULTIMODAL LEARNING INTEGRATED WITH PRE-TRAINING TECHNIQUES","count":8,"id":167},{"name":"半监督学习","count":8,"id":168},{"name":"国产复杂异构高性能数值软件的研制与测试专题","count":8,"id":169},{"name":"智慧信息系统新技术专题","count":8,"id":170},{"name":"编译技术与编译器设计专题","count":8,"id":171},{"name":"面向高效能的软件及其设计、分析与实现方法","count":8,"id":172},{"name":"COMPUTER NETWORKS AND INFORMA TION SECURITY","count":7,"id":173},{"name":"COMPUTER NETWORKS AND INFORMATIION SECURITY","count":7,"id":174},{"name":"DESIGN, ANALYSIS AND IMPLEMENTATION ME THODS OF HI","count":7,"id":175},{"name":"PATTERN RECOGNITION AND ARTICIAL INTELLIGENCE","count":7,"id":176},{"name":"SPECIAL TOPIC ON BLOCKCHAIN DATA MANAGEMENT","count":7,"id":177},{"name":"SPECIAL TOPIC ON COMPILATION TECHNIQUES AND COMPILER DESIGN","count":7,"id":178},{"name":"SPECIAL TOPIC ON DEVELOPMENT AND TEST OF HIGH-PERFORMANCE NUMERICAL SOFTWARES ON DOMESTIC-MADE COMPLEX HETEROGENEOUS SYSTEMS","count":7,"id":179},{"name":"SPECIAL TOPIC ON EVOLUTIONARY MACHINE LEARNING","count":7,"id":180},{"name":"SPECIAL TOPIC ON KNOWLEDGE CORRELATION AND UNDERSTANDING OF MULTIMEDIA DATA","count":7,"id":181},{"name":"SPECIAL TOPIC ON NEW TECHNOLOGIES OF INTELLIGENT INFORMATION SYSTEMS","count":7,"id":182},{"name":"SYSTEM SORTWARE AND SOFTWARE ENGINEERING","count":7,"id":183},{"name":"区块链数据管理专题","count":7,"id":184},{"name":"多媒体数据的知识关联与理解专题","count":7,"id":185},{"name":"泛在嵌入式智能系统专题","count":7,"id":186},{"name":"演化学习专题","count":7,"id":187},{"name":"约束求解与定理证明专题","count":7,"id":188},{"name":"融合媒体环境下的媒体内容分析与信息服务技术专题","count":7,"id":189},{"name":"计算机图形与计算机辅助设计","count":7,"id":190},{"name":"面向服务的计算专利","count":7,"id":191},{"name":"2008年中国计算机大会推荐优秀论文","count":6,"id":192},{"name":"COMPOSITION AND VERIFICATION IN SERVICE ORIENTED COMPUTING","count":6,"id":193},{"name":"SPECIAL ISSUE ON 2008 CHINA NATIONAL COMPUTER CONF","count":6,"id":194},{"name":"SPECIAL TOPIC FORMAL MODELING AND VERIFICATION FOR EMERGING SOFTWARE SYSTEMS","count":6,"id":195},{"name":"SPECIAL TOPIC ON CONSTRAINT SOLVING AND THEOREM PROVING","count":6,"id":196},{"name":"SPECIAL TOPIC ON CONTENT ANALYSIS AND INFORMATION SERVICES IN MEDIA CONVERGENCE","count":6,"id":197},{"name":"SPECIAL TOPIC ON CONTINUOUS SOFTWARE ENGINEERING ORIENTED MICROSERVICE ARCHITECTURE AND TECHNOLOGY","count":6,"id":198},{"name":"SPECIAL TOPIC ON DISTRIBUTED CLOUD STORAGE:THEORIES, TECHNOLOGIES AND SYSTEMS","count":6,"id":199},{"name":"SPECIAL TOPIC ON ONTOLOGY ENGINEERING AND KNOWLEDGE GRAPH","count":6,"id":200}]