咨询与建议

限定检索结果

文献类型

  • 842 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 994 篇 工学
    • 781 篇 计算机科学与技术...
    • 665 篇 软件工程
    • 166 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 90 篇 生物工程
    • 76 篇 电气工程
    • 65 篇 电子科学与技术(可...
    • 64 篇 机械工程
    • 62 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 41 篇 化学工程与技术
    • 37 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
  • 449 篇 理学
    • 269 篇 数学
    • 106 篇 生物学
    • 100 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 40 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 53 篇 医学
    • 49 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 34 篇 法学
    • 31 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 12 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 34 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 30 篇 feature extracti...
  • 30 篇 training
  • 27 篇 data mining
  • 27 篇 accuracy
  • 26 篇 software
  • 24 篇 software enginee...
  • 21 篇 predictive model...
  • 20 篇 deep learning
  • 20 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 15 篇 optimization
  • 14 篇 conferences
  • 14 篇 convolutional ne...

机构

  • 176 篇 state key labora...
  • 118 篇 university of ch...
  • 94 篇 institute of sof...
  • 52 篇 college of compu...
  • 45 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 35 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 23 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...
  • 16 篇 school of comput...
  • 16 篇 school of comput...

作者

  • 37 篇 tao dacheng
  • 33 篇 du bo
  • 18 篇 fan heng
  • 18 篇 wu enhua
  • 18 篇 zhang libo
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 dai guozhong
  • 10 篇 qing wang

语言

  • 1,386 篇 英文
  • 55 篇 其他
  • 45 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering"
1485 条 记 录,以下是51-60 订阅
Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects  10th
Universal Construction for Linearizable but Not Strongly L...
收藏 引用
10th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2024
作者: Wang, Chao Wu, Peng Petri, Gustavo Jia, Qiaowen He, Youlin Lv, Yi Liu, Zhiming Centre for Research and Innovation in Software Engineering College of Computer and Information Science Southwest University Chongqing China and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Arm Research Cambridge United Kingdom China Great Wall Technology Group Co. Ltd. Shenzhen China University of Chinese Academy of Sciences Beijing China
Strong linearizability is a variant of linearizability and is more suitable for verification. In this paper we investigate the following two problems: (1) for which deterministic sequential specifications there e...
来源: 评论
Human-Centric Considerations in Deploying Biometric Modalities: A Multi-Modal Approach for Public Services Application
Human-Centric Considerations in Deploying Biometric Modaliti...
收藏 引用
International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD)
作者: Elisa Maeko Dustin Van Der Haar Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa Academy of Computer Science and Software Engineering name University of Johannesburg Johannesburg South Africa
This research aims to aid public service organizations in selecting effective multi-modal authentication technology to mitigate authentication risks and facilitate informed decision-making, preventing financial burden... 详细信息
来源: 评论
Offensive Play Recognition of Basketball Video Footage Using ActionFormer  1
收藏 引用
25th International Conference on Human-computer Interaction , HCII 2023
作者: Chiura, Tafadzwa Blessing van der Haar, Dustin Academy of Computer Science and Software Engineering University of Johannesburg Corner of Kingsway Avenue and University Road Auckland Park Gauteng Johannesburg South Africa
This paper will aim to conduct 3 experiments to determine the best-performing action recognition approach on the SpaceJam dataset. The 3 experiments are Temporal Segment Network (TSN), Inflated 3D-CNN (I3D) and Pose-e... 详细信息
来源: 评论
AgileShard: Turning the Sharded Blockchain into a Real-Time Transaction Processing System  44
AgileShard: Turning the Sharded Blockchain into a Real-Time ...
收藏 引用
44th IEEE Real-Time Systems Symposium, RTSS 2023
作者: Shi, Jianfeng Wu, Heng Liu, Wang Gao, Heran Zhang, Wenbo University of Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Nanjing China Software Engineering Technology Research and Development Center Institute of Software Chinese Academy of Sciences Beijing China Nanjing Institute of Software Technology Nanjing China Institute of Software Chinese Academy of Sciences State Key Laboratory of Computer Science Beijing China
Blockchain, as an emerging transaction processing system, suffers from low throughput and high latency. Sharded blockchains can significantly increase throughput by dividing nodes into groups (i.e., shards) to process... 详细信息
来源: 评论
Ethical implications of using artificial intelligence for multimodal biometric selection model evaluation  6
Ethical implications of using artificial intelligence for mu...
收藏 引用
6th International Conference on Information and computer Technologies, ICICT 2023
作者: Maeko, Elisa Van Der Haar, Dustin Academy of Computer Science and Software Engineering and University of Johannesburg Cnr University Road and Kingsway Avenue Auckland Park Gauteng2006 South Africa
In today's digital world, information security, and person In today's digital world, information security, and personal authentication are major concerns. As technology has advanced, so have the methods used t... 详细信息
来源: 评论
Technical Requirements Survey on Multimodal Biometric Selection for Deployment in Governments  8th
Technical Requirements Survey on Multimodal Biometric Select...
收藏 引用
8th International Congress on Information and Communication Technology, ICICT 2023
作者: Maeko, Mapula Elisa Van Der Haar, Dustin Academy of Computer Science and Software Engineering University of Johannesburg Auckland Park CNR University Road and Kingsway Avenue Gauteng2006 South Africa
Biometric selection is an increasingly popular security measure used in public services due to its potential to improve security and privacy, reduce fraud and improve service delivery in governments. Selecting the app... 详细信息
来源: 评论
Parallel intelligent education with ChatGPT
收藏 引用
Frontiers of Information Technology & Electronic engineering 2024年 第1期25卷 12-18页
作者: Jiacun WANG Ying TANG Ryan HARE Fei-Yue WANG Department of Computer Science and Software Engineering Monmouth UniversityNew Jersey 07764USA Department of Electrical and Computer Engineering Rowan UniversityNew Jersey 08028USA Institute of Automation Chinese Academy of SciencesBeijing 100190China
This paper presents a framework for parallel intelligent education that involves physical and virtual learning for a personalized learning *** especially focus on Chat Generative Pre-trained Transformer(ChatGPT)owing ... 详细信息
来源: 评论
Performance Analysis of Lightweight Ciphers for securing images
Performance Analysis of Lightweight Ciphers for securing ima...
收藏 引用
2023 IEEE International Conference on Modelling, Simulation and Intelligent Computing, MoSICom 2023
作者: Nekkanti, Keerthan Sumanth, Lade Sai Renuka, A. Supriya, Musica Kumar, Arun Manipal Institute of Technology Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal India YooBee College of Creative Innovation Department of Computer and Software Engineering Auckland New Zealand
In the digital age, the security of sensitive information and data has become a paramount concern. The modern conventional encryption algorithms are very efficient, but they are very complex and need a lot of resource... 详细信息
来源: 评论
DDA: Distillation-Driven Acceleration of the Reverse Diffusion Process for Stochastic Multi-Ship Trajectory Prediction
DDA: Distillation-Driven Acceleration of the Reverse Diffusi...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ma, Kun Han, Qilong Yao, Jingzheng Wu, Changmao Zhang, Yuntao College of Computer Science and Technology Harbin Engineering University Harbin China Yantai Research Institute Harbin Engineering University Yantai China Institute of Software Chinese Academy of Sciences Beijing China College of Shipbuilding Engineering Harbin Engineering University Harbin China
Modeling stochastic multi-ship trajectories is vital for maritime safety and interaction efficiency. Recent researches show that diffusion models excel in trajectory prediction, surpassing GANs and VAEs in generation ... 详细信息
来源: 评论
Integrating Modern Portfolio Theory into Information Security Control Selection Optimisation
Integrating Modern Portfolio Theory into Information Securit...
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Muhammad Zaid Abrahams Josef J Langerman Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Risk management and optimised security control selection in information technology, particularly information security, is crucial for identifying and mitigating organisational threats. Information security control sel... 详细信息
来源: 评论