咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是511-520 订阅
排序:
Weak Network Oriented Mobile Distributed Storage: A Hybrid Fault-Tolerance Scheme Based on Potential Replicas
Weak Network Oriented Mobile Distributed Storage: A Hybrid F...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Xinlei Wei Yujuan Tan Duo Liu Daitao Wu Yu Wu Xianzhang Chen Jian Li College of Computer Science Chongqing University Chongqing China School of Big Data & Software Engineering Chongqing University Chongqing China School of Electrical Engineering Chongqing University Chongqing China
Node failure is one of the most typical issues in distributed storage systems. The classic fault-tolerance methods can meet the fault tolerance needs of systems deployed in edge storage, 5G IoT, and other high-perform... 详细信息
来源: 评论
SSF-EDZL Scheduling Algorithm on Heterogeneous Multiprocessors
SSF-EDZL Scheduling Algorithm on Heterogeneous Multiprocesso...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Peng Wu Chengzhuo Han Tao Yan Lu Chen Tianhao Guo Zhi Li Institute of Big Data Science and Industry Shanxi University Taiyuan China School of Computer and Information Technology Shanxi University Taiyuan China College of Physics and Electronic Engineering Shanxi University Taiyuan China
With the increasing demand for high performance and low power consumption in embedded real-time systems, performance asymmetric multiprocessor architecture is beginning to be applied to embedded real-time systems, bec... 详细信息
来源: 评论
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Zhenyong Yang, Kedi Tian, Youliang Ma, Jianfeng State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Shandong Jinan250353 China Institute of Cryptography & Data Security GuiZhou University Guiyang550025 China School of Cyber Engineering Xidian University Xi'An710126 China
Metaverse is a vast virtual world parallel to the physical world, where the user acts as an avatar to enjoy various services that break through the temporal and spatial limitations of the physical world. Metaverse all... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Improving Complex Reasoning over Knowledge Graph with Logic-Aware Curriculum Tuning  39
Improving Complex Reasoning over Knowledge Graph with Logic-...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xia, Tianle Ding, Liang Wan, Guojia Zhan, Yibing Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China The University of Sydney Australia JD Explore Academy College of Computing and Data Science Nanyang Technological University 639798 Singapore
Answering complex queries over incomplete knowledge graphs (KGs) is a challenging task. Most previous works have focused on learning entity/relation embeddings and simulating first-order logic operators with various n... 详细信息
来源: 评论
Comprehensive evaluation method of driving behavior based on neural network  4
Comprehensive evaluation method of driving behavior based on...
收藏 引用
2021 4th International Conference on computer Information science and Application Technology, CISAT 2021
作者: Li, Jiayao Li, Li Jiao, Ge Zhao, Xianjing He, Yuhong College of Computer Science and Technology Hengyang Normal University Hunan Hengyang China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Chongqing University of Education Chongqing China Artificial Intelligence and Big Data College Chongqing College of Electronic Engineering Chongqing China
In recent years, the number of traffic accidents in the world has increased sharply. Reasonable mining of the OBD data generated in the process of vehicle driving will help to improve traffic safety. However, the exis...
来源: 评论
Space-Air-Ground Integrated Network (SAGIN) for 6G: Requirements, Architecture and Challenges
收藏 引用
China Communications 2022年 第2期19卷 90-108页
作者: Huanxi Cui Jun Zhang Yuhui Geng Zhenyu Xiao Tao Sun Ning Zhang Jiajia Liu Qihui Wu Xianbin Cao School of Electronic and Information Engineering Beijing Key Laboratory for Network-Based Cooperative Air application ManagementBeihang UniversityBeijing 100191China Advanced Research Institute of Multidisciplinary Science Beijing Institute of TechnologyBeijing 100081China China Mobile Research Institute Beijing 100053China Department of Electrical and Computer Engineering University of WindsorONCanadaN9B 3P4 National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology the School of CybersecurityNorthwestern Polytechnical UniversityXi’anShaanxi710072China College of Electronics and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210007China
As the fifth-generation(5G)mobile communication network may not meet the requirements of emerging technologies and applications,including ubiquitous coverage,industrial internet of things(IIoT),ubiquitous artificial i... 详细信息
来源: 评论
Steel Surface Defect Detection Based on Improved YOLOv8
Steel Surface Defect Detection Based on Improved YOLOv8
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Jichen Zhang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
There are some defects on the surface of steel that are difficult to detect, so we propose an improved algorithm based on YOLOv8 for detecting defects that are difficult to be detected. This improvement includes the i... 详细信息
来源: 评论
Research Progress on Optimization-Based Disassembly Sequence Planning
收藏 引用
computer engineering and Applications 2025年 第11期61卷 51-66页
作者: Guo, Hongfei Fu, Wenjie Li, Leixiao Lin, Hao College of Data Science and Application Inner Mongolia University of Technology Hohhot010080 China Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data Hohhot010080 China College of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China
Disassembly sequence planning, as the first step to achieve product recycling, plays a decisive role in the quality and efficiency of recycling waste products. This paper addresses the three core issues of modelling m... 详细信息
来源: 评论
Research on Enhanced Perception and Attention-Driven Person Re-Identification
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Cancan Wu Dong Li Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论