咨询与建议

限定检索结果

文献类型

  • 4,559 篇 会议
  • 3,022 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,862 篇 工学
    • 3,741 篇 计算机科学与技术...
    • 3,072 篇 软件工程
    • 1,077 篇 信息与通信工程
    • 620 篇 控制科学与工程
    • 584 篇 生物工程
    • 527 篇 电气工程
    • 359 篇 生物医学工程(可授...
    • 349 篇 电子科学与技术(可...
    • 325 篇 机械工程
    • 270 篇 光学工程
    • 202 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 172 篇 网络空间安全
    • 171 篇 安全科学与工程
    • 166 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,274 篇 理学
    • 1,332 篇 数学
    • 635 篇 生物学
    • 437 篇 物理学
    • 415 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 190 篇 化学
  • 1,476 篇 管理学
    • 867 篇 管理科学与工程(可...
    • 652 篇 图书情报与档案管...
    • 351 篇 工商管理
  • 357 篇 医学
    • 301 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 207 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 100 篇 教育学
  • 84 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 219 篇 training
  • 212 篇 deep learning
  • 211 篇 feature extracti...
  • 179 篇 computational mo...
  • 166 篇 semantics
  • 160 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 125 篇 optimization
  • 125 篇 predictive model...
  • 122 篇 software enginee...
  • 119 篇 data models
  • 106 篇 data mining
  • 105 篇 cloud computing
  • 100 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 85 篇 image segmentati...
  • 84 篇 artificial intel...

机构

  • 1,260 篇 college of compu...
  • 156 篇 college of compu...
  • 134 篇 shenzhen univers...
  • 116 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 99 篇 software college...
  • 98 篇 college of compu...
  • 91 篇 state key labora...
  • 79 篇 school of softwa...
  • 73 篇 national enginee...
  • 71 篇 school of comput...
  • 62 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 55 篇 college of compu...
  • 54 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,012 篇 英文
  • 510 篇 其他
  • 133 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7648 条 记 录,以下是641-650 订阅
排序:
IEEE 802.11 VANETs for Safety of Autonomous Driving: QoS Requirements & Benchmarking  100
IEEE 802.11 VANETs for Safety of Autonomous Driving: QoS Req...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Ma, Xiaomin Ding, Shengli Zhang, Tingyu Oral Roberts University School of Engineering TulsaOK74171 United States Purdue University Elmore Family School of Electrical and Computer Engineering United States Dalian University of Science and Technology College of Software Engineering China
It is anticipated that wireless vehicular ad hoc networks (VANETs) can further enhance the safety of autonomous vehicles. Recently, two major standards for the next generation of VANET technologies have been suggested... 详细信息
来源: 评论
Distinguishing Sensitive and Insensitive Options for the Winograd Schema Challenge  28th
Distinguishing Sensitive and Insensitive Options for the ...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Li, Dong Wang, Pancheng He, Liangliang Pang, Kunyuan Li, Shasha Tang, Jintao Wang, Ting College of Computer Science and Technology National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Changsha China
The Winograd Schema Challenge (WSC) is a popular benchmark for commonsense reasoning. Each WSC instance has a component that corresponds to the mention of the correct answer option of the two options in the context. W... 详细信息
来源: 评论
Robust graph‐based localization for industrial Internet of things in the presence of flipping ambiguities
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1140-1149页
作者: Mian Imtiaz ul Haq Ruhul Amin Khalil Muhannad Almutiry Ahmad Sawalmeh Tanveer Ahmad Nasir Saeed Faculty of Electrical Engineering Swedish College of Engineering and TechnologyWah CanttPakistan Department of Electrical Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawarPakistan Department of Electrical Engineering Remote Sensing UnitNorthern Border UniversityArarSaudi Arabia Data Science and Artificial Intelligence Department‐College of Science and Information Technology Irbid National UniversityIrbadJordan Innovation Education and Research Center for On‐Device AI Software(Bk21) Department of Computer Science and EngineeringChungnam National UniversityDaejeonRepublic of Korea Department of Electrical and Communication Engineering United Arab Emirates University(UAEU)Al AinUnited Arab Emirates
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ... 详细信息
来源: 评论
Chinese Speech Emotion Recognition Based on Pre-Trained Model  5
Chinese Speech Emotion Recognition Based on Pre-Trained Mode...
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and software engineering, ICBASE 2024
作者: Xu, Sukui Jiang, Nan Lian, Shun Pan, Jingmin Anhui Institute of Information Technology College of Computer and Software Engineering Wuhu China Fujian Polytechnic of Information Technology School of General Education Fuzhou China Anhui University School of Computer Science and Technology Hefei China
This paper proposes a method based on large-scale speech pre-trained models for the task of Chinese speech emotion recognition. Similar to the transfer learning approach in image classification task, speech pre-traine... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论
Instance-adaptive Zero-shot Chain-of-Thought Prompting  38
Instance-adaptive Zero-shot Chain-of-Thought Prompting
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yuan, Xiaosong Shen, Chen Yan, Shaotian Zhang, Xiaofeng Xie, Liang Wang, Wenxiao Guan, Renchu Wang, Ying Ye, Jieping College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering MoE Jilin University China Alibaba Cloud Computing China Shanghai Jiao Tong University China College of Computer Science and Technology Zhejiang University of Technology China College of Software Zhejiang University China
Zero-shot Chain-of-Thought (CoT) prompting emerges as a simple and effective strategy for enhancing the performance of large language models (LLMs) in real-world reasoning tasks. Nonetheless, the efficacy of a singula...
来源: 评论
Performance Analysis of Lightweight Ciphers for securing images
Performance Analysis of Lightweight Ciphers for securing ima...
收藏 引用
2023 IEEE International Conference on Modelling, Simulation and Intelligent Computing, MoSICom 2023
作者: Nekkanti, Keerthan Sumanth, Lade Sai Renuka, A. Supriya, Musica Kumar, Arun Manipal Institute of Technology Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal India YooBee College of Creative Innovation Department of Computer and Software Engineering Auckland New Zealand
In the digital age, the security of sensitive information and data has become a paramount concern. The modern conventional encryption algorithms are very efficient, but they are very complex and need a lot of resource... 详细信息
来源: 评论
Improving students' cognitive abilities in online environment based on neurofeedback  14
Improving students' cognitive abilities in online environmen...
收藏 引用
14th IEEE Global engineering Education Conference, EDUCON 2023
作者: Jamil, Nuraini Lakas, Abderrahmane Belkacem, Abdelkader Nasreddine College of Information Technology United Arab Emirates University Department of Computer Science and Software Engineering United Arab Emirates College of Information Technology United Arab Emirates University Department of Computer and Network Engineering United Arab Emirates
The brain-computer interface (BCI) and eye-tracking technologies can potentially improve the learning environment in education. Cognitive BCIs can give a deep knowledge of brain functioning, enabling the creation of m... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Autonomous Emergency Landing on 3D Terrains: Approaches for Monocular Vision-based UAVs  8
Autonomous Emergency Landing on 3D Terrains: Approaches for ...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Du, Weiming Lin, Junmou Du, Binqing Borhan, Uddin Md. Li, Jianqiang Chen, Jie College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t... 详细信息
来源: 评论