咨询与建议

限定检索结果

文献类型

  • 7,665 篇 会议
  • 5,017 篇 期刊文献
  • 82 册 图书

馆藏范围

  • 12,764 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,174 篇 工学
    • 5,658 篇 计算机科学与技术...
    • 4,689 篇 软件工程
    • 1,697 篇 信息与通信工程
    • 1,452 篇 控制科学与工程
    • 1,013 篇 电气工程
    • 898 篇 生物工程
    • 724 篇 电子科学与技术(可...
    • 709 篇 机械工程
    • 642 篇 生物医学工程(可授...
    • 494 篇 光学工程
    • 376 篇 动力工程及工程热...
    • 362 篇 仪器科学与技术
    • 362 篇 化学工程与技术
    • 291 篇 安全科学与工程
    • 275 篇 交通运输工程
    • 260 篇 网络空间安全
  • 4,113 篇 理学
    • 2,279 篇 数学
    • 988 篇 生物学
    • 920 篇 物理学
    • 682 篇 统计学(可授理学、...
    • 546 篇 系统科学
    • 351 篇 化学
  • 2,293 篇 管理学
    • 1,408 篇 管理科学与工程(可...
    • 937 篇 图书情报与档案管...
    • 528 篇 工商管理
  • 664 篇 医学
    • 559 篇 临床医学
    • 472 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 245 篇 公共卫生与预防医...
  • 313 篇 法学
    • 256 篇 社会学
  • 194 篇 经济学
  • 159 篇 教育学
  • 135 篇 农学
  • 32 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 297 篇 feature extracti...
  • 290 篇 deep learning
  • 280 篇 educational inst...
  • 275 篇 computational mo...
  • 211 篇 training
  • 201 篇 optimization
  • 199 篇 semantics
  • 184 篇 machine learning
  • 163 篇 predictive model...
  • 162 篇 computer science
  • 155 篇 software enginee...
  • 148 篇 data mining
  • 146 篇 neural networks
  • 144 篇 accuracy
  • 140 篇 image segmentati...
  • 127 篇 internet of thin...
  • 123 篇 support vector m...
  • 116 篇 wireless sensor ...
  • 105 篇 real-time system...
  • 104 篇 visualization

机构

  • 1,260 篇 college of compu...
  • 238 篇 college of compu...
  • 171 篇 college of compu...
  • 118 篇 college of contr...
  • 109 篇 college of compu...
  • 108 篇 college of compu...
  • 106 篇 software college...
  • 102 篇 college of compu...
  • 89 篇 college of compu...
  • 81 篇 college of compu...
  • 77 篇 college of compu...
  • 76 篇 state key labora...
  • 75 篇 school of comput...
  • 67 篇 shenzhen univers...
  • 62 篇 college of compu...
  • 60 篇 college of softw...
  • 57 篇 the college of c...
  • 54 篇 college of infor...
  • 54 篇 school of inform...
  • 53 篇 fujian provincia...

作者

  • 39 篇 chen zengqiang
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 niyato dusit
  • 35 篇 lin qiuzhen
  • 33 篇 zhen ji
  • 33 篇 zhong ming
  • 32 篇 victor c. m. leu...
  • 32 篇 zengqiang chen
  • 30 篇 zhou jie
  • 29 篇 kaishun wu
  • 26 篇 liu yang
  • 25 篇 li xin
  • 25 篇 wang hui
  • 25 篇 shen linlin
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 wang jian
  • 22 篇 liu jun
  • 22 篇 zuoyong li
  • 22 篇 ismail leila

语言

  • 11,775 篇 英文
  • 732 篇 其他
  • 257 篇 中文
  • 18 篇 日文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Control Engineering College of Software"
12764 条 记 录,以下是301-310 订阅
排序:
Temporal Dynamics in instrumental Learning: Integrating Entropy Measures and Computational Models  31
Temporal Dynamics in instrumental Learning: Integrating Entr...
收藏 引用
31st National and 9th International Iranian Conference on Biomedical engineering, ICBME 2024
作者: Hassanzadeh, Zakieh Bahrami, Fariba University College of Engineering University of Tehran Human Motor Control and Computational Neuroscience Lab School of Electrical and Computer Engineering Tehran Iran University College of Engineering University of Tehran School of of Electrical and Computer Engineering Tehran Iran
This research explores the dynamics of decision-making within an instrumental learning framework, combining analyses of response times, entropy measures, and computational modeling. We conducted a study using an RLWM ... 详细信息
来源: 评论
Boosting Write Performance of KV Stores: An NVM -Enabled Storage Collaboration Approach  40
Boosting Write Performance of KV Stores: An NVM -Enabled Sto...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi He, Jiajian Sun, Kaoyi Dong, Yunhao Chen, Jiaxian Ma, Chenlin Zhou, Amelie Chi Mao, Rui College of Computer Science and Software Engineering Shenzhen University China Hong Kong Baptist University Department of Computer Science Hong Kong
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr... 详细信息
来源: 评论
DLICA: Deep Learning based novel Strategy for Intelligent Channel Adaption in Wireless SDN-IoT Environment  3
DLICA: Deep Learning based novel Strategy for Intelligent Ch...
收藏 引用
3rd International Conference on Communication, Computing and Digital Systems, C-CODE 2023
作者: Zabeehullah Arif, Fahim Abbas, Yawar Ahmad, Shahbaz Waseem, Muhammad Computer Software Engineering Military College of Signals Rawalpindi Pakistan Computer Science University of Engineering and Technology Lahore Pakistan
software-Defined Network (SDN) is an emerging networking paradigm and provides the cost-effective scalability and flexibility required for an IoT environment. Here, wireless SDN is supposed to efficiently use limited ... 详细信息
来源: 评论
Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity  17
Combatting the TrickBot Threat: Analysis, Impact, and Defens...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Cao, Jintao Null, Allie Stewart, Marissa Bhunia, Suman Salman, Mohammad Miami University Department of Computer Science and Software Engineering OxfordOH United States University of Anbar College of Computer Anbar Iraq
The TrickBot Botnet, emerging in late 2016, has been a significant cybersecurity threat, leveraging sophisticated attack vectors such as phishing emails, network vulnerabilities, and secondary payloads. This paper pro... 详细信息
来源: 评论
LeaderKV: Improving Read Performance of KV Stores via Learned Index and Decoupled KV Table  40
LeaderKV: Improving Read Performance of KV Stores via Learne...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi Yuan, Jianan Wu, Shangyu Liu, Huan Chen, Jiaxian Ma, Chenlin Qin, Jianbin Shenzhen University College of Computer Science and Software Engineering China City University of Hong Kong Department of Computer Science Hong Kong
Log-structured merge-tree (LSM-tree) is a storage architecture widely used in key-value (KV) stores. To enhance the read efficiency of LSM-tree, recent works utilize the learned index to learn the mapping between keys... 详细信息
来源: 评论
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs  22
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Jincheng Cai, Miao Ye, Baoliu Hohai University College of Computer Science and Software Engineering Nanjing China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
High fan-out requests are prevalent in systems employing multi-tier architectures. These requests are divided into several sub-requests for parallel processing. However, a high fan-out request must await all sub-reque... 详细信息
来源: 评论
Privacy-preserving scheme of cotton supply chain based on blockchain  22
Privacy-preserving scheme of cotton supply chain based on bl...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhang, Linlin Li, Wenwen Huo, Jing Bi, Xuehua Zhao, Kai Xinjiang University College of Software Urumqi China Xinjiang University College of Computer Science and Technology Urumqi China Xinjiang Medical University College of Medical Engineering and Technology Urumqi China
With the popularization and development of artificial intelligence and intelligent agriculture, the supply chain has become an effective management method. However, the complexity and variety of data types and the lar... 详细信息
来源: 评论
An Unsupervised Leak Detection Method via Assembling Twin Attention-based Prediction Models for Natural Gas Gathering Pipelines
An Unsupervised Leak Detection Method via Assembling Twin At...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Zhang, Hao Zuo, Zhonglin Zheng, Li Liang, Shan Lü, Qingguo College of Automation Chongqing University Chongqing China College of Control Science and Engineering Zhejiang University Hangzhou China College of Computer Science Chongqing University Chongqing China
Accurately detecting leaks in natural gas gathering pipelines cannot only help enterprises and governments timely cope with the safety management problems, but also maintain the reliable operation of pipelines. The da... 详细信息
来源: 评论
Server-Aided Revocable Identity-Based Signature over Lattices  11
Server-Aided Revocable Identity-Based Signature over Lattice...
收藏 引用
11th International Conference on Information Technology: IoT and Smart City, ICIT 2023
作者: Wang, Bingbing Zhang, Yanhua College of Software Engineering Zhengzhou University of Light Industry China College of Computer and Communication Engineering Zhengzhou University of Light Industry China
Revocable Identity-Based Signatures (RIBS) incorporate revocation mechanisms into traditional identity-based signatures, allowing for the revocation of signing capabilities for users. Specifically, RIBS periodically a... 详细信息
来源: 评论
Velocity Field-Based Surveillance Video Frame Deletion Detection Using Siamese Network  27th
Velocity Field-Based Surveillance Video Frame Deletion Detec...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Su, Yang Tan, ShunQuan Huang, Jiwu College of Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Surveillance videos play a crucial role in providing evidences. However, the deletion of even a few frames can significantly impact the interpretation of events, while the deletion can be performed easily using video ... 详细信息
来源: 评论