咨询与建议

限定检索结果

文献类型

  • 4,559 篇 会议
  • 3,022 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,862 篇 工学
    • 3,741 篇 计算机科学与技术...
    • 3,072 篇 软件工程
    • 1,077 篇 信息与通信工程
    • 620 篇 控制科学与工程
    • 584 篇 生物工程
    • 527 篇 电气工程
    • 359 篇 生物医学工程(可授...
    • 349 篇 电子科学与技术(可...
    • 325 篇 机械工程
    • 270 篇 光学工程
    • 202 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 172 篇 网络空间安全
    • 171 篇 安全科学与工程
    • 166 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,274 篇 理学
    • 1,332 篇 数学
    • 635 篇 生物学
    • 437 篇 物理学
    • 415 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 190 篇 化学
  • 1,476 篇 管理学
    • 867 篇 管理科学与工程(可...
    • 652 篇 图书情报与档案管...
    • 351 篇 工商管理
  • 357 篇 医学
    • 301 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 207 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 100 篇 教育学
  • 84 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 219 篇 training
  • 212 篇 deep learning
  • 211 篇 feature extracti...
  • 179 篇 computational mo...
  • 166 篇 semantics
  • 160 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 125 篇 optimization
  • 125 篇 predictive model...
  • 122 篇 software enginee...
  • 119 篇 data models
  • 106 篇 data mining
  • 105 篇 cloud computing
  • 100 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 85 篇 image segmentati...
  • 84 篇 artificial intel...

机构

  • 1,260 篇 college of compu...
  • 156 篇 college of compu...
  • 134 篇 shenzhen univers...
  • 116 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 99 篇 software college...
  • 98 篇 college of compu...
  • 91 篇 state key labora...
  • 79 篇 school of softwa...
  • 73 篇 national enginee...
  • 71 篇 school of comput...
  • 62 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 55 篇 college of compu...
  • 54 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,012 篇 英文
  • 510 篇 其他
  • 133 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7648 条 记 录,以下是771-780 订阅
排序:
SLAH: A Siamese Network Vision Tracking Algorithm Using LSTM Adaptive Head  13
SLAH: A Siamese Network Vision Tracking Algorithm Using LSTM...
收藏 引用
13th International Conference on Information science and Technology, ICIST 2023
作者: Liu, Zhitao Wang, Dong Luo, Xiaonan Li, Fang School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China College of Mathematics and Informatics College of Software Engineering South China Agricultural Univerrsity Guangzhou China
In the field of single object tracking, conventional methods often rely on correlation filters or visual image processing. However, these approaches typically focus solely on extracting target object features and cons... 详细信息
来源: 评论
Boosting Write Performance of KV Stores: An NVM - Enabled Storage Collaboration Approach
Boosting Write Performance of KV Stores: An NVM - Enabled St...
收藏 引用
International Conference on Data engineering
作者: Yi Wang Jiajian He Kaoyi Sun Yunhao Dong Jiaxian Chen Chenlin Ma Amelie Chi Zhou Rui Mao College of Computer Science and Software Engineering Shenzhen University Department of Computer Science Hong Kong Baptist University
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr... 详细信息
来源: 评论
Towards Efficient and Diverse Generative Model for Unconditional Human Motion Synthesis  24
Towards Efficient and Diverse Generative Model for Unconditi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Yu, Hua Liu, Weiming Bai, Jiapeng Gui, Xu Hou, Yaqing Ong, Yewsoon Zhang, Qiang Key Laboratory of Social Computing and Cognitive Intelligence Ministry of Education School of Computer Science and Technology Dalian University of Technology Dalian China College of Computer Science Zhejiang University Hangzhou China National and Local Joint Engineering Laboratory of Computer Aided Design School of Software Engineering Dalian University Dalian China College of Computing and Data Science Nanyang Technological University Singapore Singapore Yonsei University Seoul Korea Republic of
Recent generative methods have revolutionized the way of human motion synthesis, such as Variational Autoencoders (VAEs), Generative Adversarial Networks (GANs), and Denoising Diffusion Probabilistic Models (DMs). The... 详细信息
来源: 评论
Near-Linear Time Approximation Algorithms for k-means with Outliers  41
Near-Linear Time Approximation Algorithms for k-means with O...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Huang, Junyu Feng, Qilong Huang, Ziyun Xu, Jinhui Wang, Jianxin School of Computer Science and Engineering Central South University Changsha410083 China Xiangjiang Laboratory Changsha410205 China Department of Computer Science and Software Engineering Penn State Erie The Behrend College United States Department of Computer Science and Engineering State University of New York BuffaloNY United States The Hunan Provincial Key Lab of Bioinformatics Central South University Changsha410083 China
The k-means with outliers problem is one of the most extensively studied clustering problems in the field of machine learning, where the goal is to discard up to z outliers and identify a minimum k-means clustering on... 详细信息
来源: 评论
View Transformation Robustness for Multi-View 3D Object Reconstruction with Reconstruction Error-Guided View Selection  39
View Transformation Robustness for Multi-View 3D Object Reco...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Qi Luo, Zhouhang Yu, Tao Huang, Hui College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen China
View transformation robustness (VTR) is critical for deep-learning-based multi-view 3D object reconstruction models, which indicates the methods' stability under inputs with various view transformations. However, ... 详细信息
来源: 评论
A Review of Link Prediction on Heterogeneous Networks  8th
A Review of Link Prediction on Heterogeneous Networks
收藏 引用
8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Mi, Rui Wang, Changbo Zhang, Liang-Jie Wu, Yirui Chen, Junyang Wang, Huan College of Informatics Huazhong Agricultural University Wuhan China Center of Health Administration and Development Studies Hubei University of Medicine Shiyan China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Hohai University Nanjing China
Link prediction is a central downstream assignment in network analysis, which denotes an attempt to assess the probability of a connection between two nodes based on observed link and node properties, which can be uti... 详细信息
来源: 评论
A Multi-Agent Spatial Logic for Scenario-Based Decision Modeling and Verification in Platoon Systems
收藏 引用
Journal of computer science & Technology 2021年 第6期36卷 1231-1247页
作者: Jingwen Xu Yanhong Huang Jianqi Shi Shengchao Qin National Trusted Embedded Software Engineering Technology Research Center East China Normal University Shanghai 200062China College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518061China
To cater for the scenario of coordinated transportation of multiple trucks on the highway,a platoon system for autonomous driving has been extensively explored in the *** such a platoon is deployed,it is necessary to ... 详细信息
来源: 评论
Linear Time Approximation Algorithm for Column Subset Selection with Local Search  38
Linear Time Approximation Algorithm for Column Subset Select...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zou, Yuanbin Huang, Ziyun Xu, Jinhui Wang, Jianxin Feng, Qilong School of Computer Science and Engineering Central South University Changsha410083 China Xiangjiang Laboratory Changsha410205 China Department of Computer Science and Software Engineering Penn State Erie The Behrend College United States Department of Computer Science and Engineering State University of New York BuffaloNY United States The Hunan Provincial Key Lab of Bioinformatics Central South University Changsha410083 China
The Column Subset Selection (CSS) problem has been widely studied in dimensionality reduction and feature selection. The goal of the CSS problem is to output a submatrix S, consisting of k columns from an n × d i...
来源: 评论
Intelligent Gen: An Efficient On-Demand Access Protocol in MANETs using Network Simulator - 2  18
Intelligent Gen: An Efficient On-Demand Access Protocol in M...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Ganesan, T. Murali, N. Murugan, S. Palani Peter, M. Chandrakumar Raj, P. Anand Manikandan, S. E.G.S. Pillay Engineering College Department of Computer Science and Engineering Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Artificial Intelligence & Data Science Tamil Nadu Nagapattinam India Periyar Maniammai Institute of Science & Technology Department of Software Engineering Tamil Nadu Thanjavur India E.G.S. Pillay Engineering College Department of Computer Science and Business Systems Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Information Technology Tamil Nadu Nagapattinam India
Mobile Ad-Hoc network is a self-configuring and multi-hop collection of mobile devices for making successful communication. The wireless and mobile communication process are encountered based on bandwidth, process con... 详细信息
来源: 评论
Intrusion Detection System (IDS) of Multiclassification IoT by using Pipelining and an Efficient Machine Learning  9
Intrusion Detection System (IDS) of Multiclassification IoT ...
收藏 引用
9th International Conference on engineering and Emerging Technology, ICEET 2023
作者: Hazim, Layth Rafea Jasim, Abdulrahman Ahmed Ata, Oguz Ilyas, Muhammad College of Computer Science and Mathematics Tikrit University Tikrit Iraq Altinbas University Dept. of Electrical and Computer Engineering Istanbul Turkey College of Engineering Al-Iraqia University Baghdad Iraq Altinbas University Istanbul Dept. of Software Engineering Turkey Altinbas University Istanbul Dept. of Computer Engineering Turkey
The Internet of Things (IoT) has quickly advanced and been incorporated into many different fields. With the use of IoT technology, gadgets can receive, process, and send data automatically. IoT has been rapidly accep... 详细信息
来源: 评论