咨询与建议

限定检索结果

文献类型

  • 1,023 篇 会议
  • 723 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,747 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,094 篇 工学
    • 864 篇 计算机科学与技术...
    • 738 篇 软件工程
    • 258 篇 信息与通信工程
    • 192 篇 生物工程
    • 132 篇 控制科学与工程
    • 103 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 82 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 68 篇 机械工程
    • 65 篇 化学工程与技术
    • 46 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 32 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 仪器科学与技术
    • 29 篇 材料科学与工程(可...
  • 591 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 70 篇 化学
    • 55 篇 系统科学
  • 339 篇 管理学
    • 194 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 18 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 70 篇 training
  • 69 篇 semantics
  • 64 篇 feature extracti...
  • 63 篇 deep learning
  • 40 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 federated learni...
  • 28 篇 reinforcement le...
  • 28 篇 graph neural net...
  • 27 篇 conferences
  • 27 篇 optimization
  • 27 篇 contrastive lear...
  • 27 篇 cloud computing
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 109 篇 college of compu...
  • 107 篇 national enginee...
  • 67 篇 shenzhen researc...
  • 58 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 31 篇 college of big d...
  • 31 篇 peng cheng labor...
  • 30 篇 key laboratory o...
  • 30 篇 state key labora...
  • 29 篇 chongqing univer...
  • 26 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 25 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 52 篇 shi qingjiang
  • 39 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 19 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 yan meng
  • 17 篇 hongyu zhang
  • 17 篇 li liu
  • 17 篇 hu chunqiang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,458 篇 英文
  • 275 篇 其他
  • 17 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1747 条 记 录,以下是901-910 订阅
排序:
Site Selection of Urban Sewage Treatment Plant Based on Hesitant Fuzzy Linguistic Mcdm Model
SSRN
收藏 引用
SSRN 2022年
作者: Liu, Jun Xie, Mingyue Lin, Mingwei Chen, Shuyu School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China School of Big Data and Software Engineering Chongqing University Chongqing400044 China
With the increasing discharge of municipal wastewater and domestic sewage, the construction of sewage treatment plant is imperative. However, selecting a suitable site for the construction of sewage treatment plants i... 详细信息
来源: 评论
High-dimensional Feature Selection in Classification: A Length-Adaptive Evolutionary Approach
High-dimensional Feature Selection in Classification: A Leng...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Junhai Zhou Jianyun Lu Quanwang Wu Junhao Wen College of Computer Science Chongqing University Chongqing China School of Artificial Intelligence and Big Data Chongqing College of Electronic Engineering Chongqing China College of Software Engineering Chongqing University Chongqing China
Feature selection is an essential technique which has been widely applied in data mining. Recent research has shown that a good feature subset can be obtained by using evolutionary computing (EC) approaches as a wrapp... 详细信息
来源: 评论
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2020年 第3期7卷 790-799页
作者: Hao Zhang Yongdan Li Zhihan Lv Arun Kumar Sangaiah Tao Huang IEEE National Engineering Laboratory for Educational Big Data Central China Normal UniversityWuhan 430072China Lanzhou Central Sub-branch of The People’s Bank of China Lanzhou 730000China School of Data Science and Software Engineering Qingdao UniversityQingdao 266071China School of Computing Science and Engineering Vellore Institute of Technology UniversityTamil Nadu 632014India
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network... 详细信息
来源: 评论
Random Forest and Sobol Method Based data Center PUE Prediction
Random Forest and Sobol Method Based Data Center PUE Predict...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Longchuan Yan Zhaofang Luan Ling He Congfeng Jiang Junming Liu Chuanqi Xu Liangbin Zhang Information & Telecommunication Branch State Grid Corporation of China Beijing China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Information Technology Center Hangzhou Dianzi University Hangzhou China College of Big Data and Software Engineering Zhejiang Wanli University Ningbo China
data centers are critical infrastructures that support a multitude of business loads such as big data, artificial intelligence, and cloud computing. While providing the necessary computing power, the problem of high e... 详细信息
来源: 评论
Cross-Site Scripting (XSS) and SQL Injection Attacks Multi-classification Using Bidirectional LSTM Recurrent Neural Network
Cross-Site Scripting (XSS) and SQL Injection Attacks Multi-c...
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Abdulgbar A. R. Farea Chengliang Wang Ebraheem Farea Abdulfattah Ba Alawi School of Big Data & Software Engineering Chongqing University Chongqing China Software College Northeastern University Shenyang China Software Engineering Taiz University Taiz Yemen
E-commerce, ticket booking, banking, and other web-based applications that deal with sensitive information, such as passwords, payment information, and financial information, are widespread. Some web developers may ha... 详细信息
来源: 评论
A Gait Recognition Method Based on the Combination of Human Body Posture and Human Body Contour  2
A Gait Recognition Method Based on the Combination of Human ...
收藏 引用
2nd International Conference on Artificial Intelligence and Computer Science, AICS 2020
作者: Ma, Yue Wei, Chenghao Long, Hao Ministry of Public Security China Big Data Institute College of Computer Science and Software Engineering Shenzhen University China
Aiming at the issues that affect the gait recognition, such as outfit changes and carry-on-objects during gait recognition, this paper proposes a gait recognition method based on the improved GaitSet network, which re... 详细信息
来源: 评论
Expedited Block Transmission in Blockchain Network by using Clusters
Expedited Block Transmission in Blockchain Network by using ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hua, Xiaoqi Chen, Jian Zhang, Peiyun Fu, Zhangjie Zhu, Haibin Lu, Kezhong Ren, Jigang School of Software Nanjing University of Information Science and Technology Nanjing210044 China Engineering Research Center of Digital Forensics of Ministry of Education The School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China Nipissing University Department of Computer Science and Mathematics North BayONP1B 8L7 Canada School of Big Data and Artificial Intelligence Chizhou University Chizhou247000 China
Blockchain technology has garnered increasing attention from researchers. Because blockchain systems may contain malicious or spatially limited nodes that may delay block verification and reduce block transmission rat... 详细信息
来源: 评论
ENGNN: A General Edge-Update Empowered GNN Architecture for Radio Resource Management in Wireless Networks
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yunqi Li, Yang Shi, Qingjiang Wu, Yik-Chung The Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Shenzhen Research Institute of Big Data Shenzhen518172 China The School of Software Engineering Tongji University Shanghai200092 China
In order to achieve high data rate and ubiquitous connectivity in future wireless networks, a key task is to efficiently manage the radio resource by judicious beamforming and power allocation. Unfortunately, the iter... 详细信息
来源: 评论
A Naming Pattern Based Approach for Method Name Recommendation
A Naming Pattern Based Approach for Method Name Recommendati...
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Yanping Yang Ling Xu Meng Yan Zhou Xu Zhongyang Deng Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China
Method names in software projects are significant for developers to understand the method functionality. Existing state-of-the-art automated approaches tend to explore tokens composing method names from method context... 详细信息
来源: 评论
A Blockchain-Based Multi-Cloud Storage data Consistency Verification Scheme
A Blockchain-Based Multi-Cloud Storage Data Consistency Veri...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Feiyu Wang Jian-tao Zhou Hao Wang Xu Guo College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Users worldwide widely use cloud storage because of its efficiency, convenience, and high availability. Multi-cloud storage is usually selected to ensure the high availability of data. Unfortunately, when data is migr... 详细信息
来源: 评论