咨询与建议

限定检索结果

文献类型

  • 4,130 篇 会议
  • 3,687 篇 期刊文献
  • 64 册 图书

馆藏范围

  • 7,881 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,405 篇 工学
    • 4,033 篇 计算机科学与技术...
    • 3,341 篇 软件工程
    • 1,269 篇 信息与通信工程
    • 650 篇 控制科学与工程
    • 650 篇 生物工程
    • 535 篇 电气工程
    • 413 篇 电子科学与技术(可...
    • 410 篇 光学工程
    • 405 篇 生物医学工程(可授...
    • 384 篇 机械工程
    • 229 篇 动力工程及工程热...
    • 215 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 166 篇 网络空间安全
    • 161 篇 安全科学与工程
    • 153 篇 交通运输工程
    • 151 篇 建筑学
  • 2,623 篇 理学
    • 1,424 篇 数学
    • 710 篇 生物学
    • 649 篇 物理学
    • 441 篇 统计学(可授理学、...
    • 254 篇 系统科学
    • 230 篇 化学
  • 1,571 篇 管理学
    • 925 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 358 篇 工商管理
  • 357 篇 医学
    • 302 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
  • 264 篇 法学
    • 195 篇 社会学
  • 135 篇 经济学
  • 129 篇 教育学
  • 81 篇 农学
  • 31 篇 文学
  • 29 篇 军事学
  • 21 篇 艺术学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 190 篇 feature extracti...
  • 165 篇 semantics
  • 155 篇 computational mo...
  • 155 篇 training
  • 150 篇 deep learning
  • 147 篇 machine learning
  • 111 篇 data mining
  • 106 篇 optimization
  • 104 篇 internet of thin...
  • 103 篇 cloud computing
  • 95 篇 accuracy
  • 90 篇 convolution
  • 89 篇 predictive model...
  • 84 篇 authentication
  • 81 篇 software enginee...
  • 80 篇 computer science
  • 80 篇 reinforcement le...
  • 79 篇 data models
  • 78 篇 image segmentati...
  • 77 篇 neural networks

机构

  • 267 篇 school of inform...
  • 261 篇 school of comput...
  • 163 篇 school of comput...
  • 106 篇 state key labora...
  • 98 篇 college of compu...
  • 92 篇 school of softwa...
  • 85 篇 school of inform...
  • 68 篇 school of comput...
  • 61 篇 school of comput...
  • 55 篇 college of compu...
  • 47 篇 shandong provinc...
  • 45 篇 school of softwa...
  • 44 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 school of comput...
  • 40 篇 school of softwa...
  • 39 篇 shanghai key lab...
  • 39 篇 school of comput...
  • 38 篇 school of softwa...
  • 38 篇 school of comput...

作者

  • 50 篇 yang jian
  • 35 篇 qi lianyong
  • 34 篇 zhang wenqiang
  • 32 篇 wang wei
  • 32 篇 xu xiaolong
  • 30 篇 tao dacheng
  • 26 篇 sun xingming
  • 24 篇 wang lei
  • 23 篇 yang yang
  • 23 篇 hu shengshan
  • 23 篇 wang yan
  • 22 篇 qi liu
  • 22 篇 zhang zhao
  • 22 篇 wang meng
  • 20 篇 lu dianjie
  • 20 篇 liu yang
  • 20 篇 timofte radu
  • 19 篇 niyato dusit
  • 19 篇 liu qi
  • 19 篇 tao zhang

语言

  • 7,252 篇 英文
  • 518 篇 其他
  • 120 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Applied Software Engineering Lab School of Computer Engineering & Information Technology"
7881 条 记 录,以下是61-70 订阅
排序:
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第1期9卷 250-263页
作者: Yilong Yang Yibo Liu Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin School of Software Beihang UniversityBeijingChina College of Computer Science and Technology Guizhou UniversityGuiyangGuizhouChina Faculty of Information Technology Beijing University of TechnologyBeijingChina Department of Electrical Engineering and Computer Sciences University of CincinnatiCincinnatiOhioUSA
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction  3
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Srinivasa Gupta, N. Valarmathi, B. Hiwanj, Ishaan Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer Science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
Multi-Objective Equilibrium Optimizer for Feature Selection in High-Dimensional English Speech Emotion Recognition
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1957-1975页
作者: Liya Yue Pei Hu Shu-Chuan Chu Jeng-Shyang Pan Fanli Business School Nanyang Institute of TechnologyNanyang473004China School of Computer and Software Nanyang Institute of TechnologyNanyang473004China College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Department of Information Management Chaoyang University of TechnologyTaichung413310Taiwan
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely hi... 详细信息
来源: 评论
Virtual Assembly Collision Detection Algorithm Using Backpropagation Neural Network
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1085-1100页
作者: Baowei Wang Wen You School of Computer Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the f... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
A Fine-Grained Detector of Face Mask Wearing Status Based on Improved YOLOX
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1816-1830页
作者: Xiao, Hongli Wang, Bingshu Zheng, Jiangbin Liu, Licheng Philip Chen, C.L. Northwestern Polytechnical University School of Software Taicang Campus Suzhou215400 China Shanghai Jiaotong University School of Electronic Information and Electrical Engineering Shanghai200240 China Hunan University College of Electrical and Information Engineering Changsha410082 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
The fast outbreak of coronavirus disease 2019 (COVID-19) and rapid proliferation of its variants have continued to pose a huge challenge to people around the world. Wearing medical masks properly in public and private... 详细信息
来源: 评论
Loop Subgraph-Level Greedy Mapping Algorithm for Grid Coarse-Grained Reconfigurable Array
收藏 引用
Tsinghua Science and technology 2023年 第2期28卷 330-343页
作者: Naijin Chen Fei Cheng Chenghao Han Jianhui Jiang Xiaoqing Wen School of Computer and Information Science Anhui Polytechnic UniversityWuhu 241000China School of Software Engineering Tongji UniversityShanghai 201804China Department of Computer Science and Networks Kyushu Institute of TechnologyFukuoka 820-8502Japan
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the... 详细信息
来源: 评论
VMCTE:Visualization-BasedMalware Classification Using Transfer and Ensemble Learning
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4445-4465页
作者: Zhiguo Chen Jiabing Cao Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
The Corona Virus Disease 2019(COVID-19)effect has made telecommuting and remote learning the *** growing number of Internet-connected devices provides cyber attackers with more attack *** development of malware by cri... 详细信息
来源: 评论
Anomaly Detection in Spatial information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论