咨询与建议

限定检索结果

文献类型

  • 4,494 篇 会议
  • 2,969 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,757 篇 工学
    • 3,661 篇 计算机科学与技术...
    • 3,011 篇 软件工程
    • 1,056 篇 信息与通信工程
    • 595 篇 控制科学与工程
    • 581 篇 生物工程
    • 503 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 341 篇 电子科学与技术(可...
    • 318 篇 机械工程
    • 261 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 178 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 154 篇 仪器科学与技术
  • 2,252 篇 理学
    • 1,320 篇 数学
    • 635 篇 生物学
    • 428 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 190 篇 化学
  • 1,457 篇 管理学
    • 860 篇 管理科学与工程(可...
    • 640 篇 图书情报与档案管...
    • 344 篇 工商管理
  • 358 篇 医学
    • 301 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 157 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 206 篇 法学
    • 161 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 218 篇 training
  • 207 篇 deep learning
  • 205 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 123 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 122 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 92 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 82 篇 clustering algor...

机构

  • 1,220 篇 college of compu...
  • 156 篇 college of compu...
  • 129 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 93 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 72 篇 school of comput...
  • 66 篇 national enginee...
  • 62 篇 college of compu...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 57 篇 college of softw...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 53 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 lin qiuzhen
  • 32 篇 zhen ji
  • 32 篇 wang xingwei
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 26 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan
  • 24 篇 wu kaishun

语言

  • 7,094 篇 英文
  • 309 篇 其他
  • 132 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7530 条 记 录,以下是4951-4960 订阅
排序:
A voxel-based filtering algorithm for mobile LiDAR data
A voxel-based filtering algorithm for mobile LiDAR data
收藏 引用
2018 ISPRS TC III Mid-Term Symposium on Developments, Technologies and Applications in Remote Sensing
作者: Qin, Hejuan Guan, Haiyan Yu, Yongtao Zhong, Liang College of Remote Sensing and Geometics Engineering Nanjing University of Information Science and Technology Nanjing210044 China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian223003 China Changjiang Spatial Information Technology Engineering Co. Ltd. Wuhan410010 China
This paper presents a stepwise voxel-based filtering algorithm for mobile LiDAR data. In the first step, to improve computational efficiency, mobile LiDAR points, in xy-plane, are first partitioned into a set of two-d... 详细信息
来源: 评论
DS-GCNs: Connectome Classification Using Dynamic Spectral Graph Convolution Networks with Assistant Task Training
arXiv
收藏 引用
arXiv 2019年
作者: Xing, Xiaodan Li, Qingfeng Wei, Hao Zhang, Minqing Zhan, Yiqiang Zhou, Xiang Sean Xue, Zhong Shi, Feng United Imaging Intelligence Shanghai China Shanghai Advanced Research Institute Shanghai China School of Biomedical Engineering Southern Medical University Guangdong China School of Computer Science and Engineering Central South University Hunan China College of Software Engineering Southeast University Jiangsu China Shanghai Advanced Research Institute Shanghai China
Functional Connectivity (FC) matrices measure the regional interactions in the brain and have been widely used in neurological brain disease classification. However, a FC matrix is neither a natural image which contai... 详细信息
来源: 评论
An Emergency Scenario Reconstruction System Based on ESMM Event Situation Model
收藏 引用
Wuhan University Journal of Natural sciences 2017年 第6期22卷 482-488页
作者: LI Shuoming CHEN Lei LIU Yu CHEN Shihong National Engineering Research Center for Multimedia Software/School of Computer Wuhan University College of Computer Science and Technology Wuhan University of Science and Technology
In order to keep decision-makers better informed with emergencies, it is useful to retrieve the user-oriented disaster relevant event information in an aggregated results list through meta-search engine. However, emer... 详细信息
来源: 评论
MPMPA: A Mitigation and Prevention Model for Social engineering Based Phishing attacks on Facebook
MPMPA: A Mitigation and Prevention Model for Social Engineer...
收藏 引用
2018 IEEE International Conference on Big Data, Big Data 2018
作者: Jamil, Abid Asif, Kashif Ghulam, Zikra Nazir, Muhammad Kashif Mudassar Alam, Syed Ashraf, Rehan Department of Computer Science FAST - NUCES Chinnot Faisalabad Campus Pakistan Department of Software Engineering Foundation University Islamabad Pakistan Institute of Avionics and Aeronautics Air University Islamabad Pakistan Riphah College of Computing Riphah International University Faisalabad Pakistan Department of Computer Science National Textile University Faisalabad Pakistan
The exponential increase in usage of the Internet can be seen in the present era. The use of social media and cyber-physical systems is rapidly increasing. Social Media platforms like Facebook have become an indispens... 详细信息
来源: 评论
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segmentation
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segme...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Changlu Guo Márton Szemenyei Yang Pei Yugen Yi Wei Zhou Department of Control Engineering and Information Technology Budapest University of Technology and Economics Budapest Hungary Budapest University of Technology and Economics Budapest Hungary School of Software Jiangxi Normal University Nanchang China College of Computer Science Shenyang Aerospace University Shenyang China
At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in... 详细信息
来源: 评论
False Trajectory Privacy Protection Scheme Based on Location Service
收藏 引用
IOP Conference Series: Materials science and engineering 2020年 第7期768卷
作者: Chen Yang Wei Yan School of Software Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, w...
来源: 评论
An efficient quantum blind digital signature scheme
收藏 引用
science China(Information sciences) 2017年 第8期60卷 226-239页
作者: Hong LAI Mingxing LUO Josef PIEPRZYK Zhiguo QU Shudong LI Mehmet A.ORGUN College of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences School of Computer and Software Nanjing University of Information Science and Technology College of Mathematics and Information Science Shandong Technology and Business University School of Computer Science National University of Defense Technology Department of Computing Macquarie University Faculty of Information Technology Macau University of Science and Technology
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign... 详细信息
来源: 评论
An Effective Stock Clustering Method Based on Hybrid Correlation Coefficient
An Effective Stock Clustering Method Based on Hybrid Correla...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yahui Lu Xiaochu Tang Hui Wang College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Management Shenzhen University Shenzhen China
Clustering stocks by their time series data is a significant but challenging task in computer supported financial decision systems. In this paper, we propose an effective stocks clustering method based on hybrid corre... 详细信息
来源: 评论
An Efficient File System for Hybrid In-Memory NVM and Block Devices
An Efficient File System for Hybrid In-Memory NVM and Block ...
收藏 引用
IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
作者: Yuansong Zeng Edwin H.-M. Sha Qingfeng Zhuge Xianzhang Chen Zhulin Ma Lin Wu School of Computer Science and Software Engineering East China Normal University Shanghai China College of Computer Science Chongqing University Chongqing China
Emerging Non-Volatile Memory (NVM) technologies are promised to revolutionize storage systems by providing fast, persist data accesses on memory bus. However, the limited capacity of NVM devices calls for multi-layer ... 详细信息
来源: 评论
Trust-Based Security Routing Mechanism in Mobile Social Networks
Trust-Based Security Routing Mechanism in Mobile Social Netw...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Shuang Yang Xingwei Wang Shuang Zhang Min Huang College of Computer Science and Engineering Northeastern University Shenyang China College of Software Northeastern University Shenyang China College of Information Science and Engineering Northeastern University Shenyang China
Malicious and selfish behaviors represent a serious security threat against routing in Mobile Social Network (MSN). Due to the unique network characteristics, it is a challenge to design a misbehavior detection scheme...
来源: 评论