咨询与建议

限定检索结果

文献类型

  • 3,765 篇 会议
  • 1,659 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 5,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,313 篇 工学
    • 2,296 篇 计算机科学与技术...
    • 1,899 篇 软件工程
    • 850 篇 信息与通信工程
    • 524 篇 控制科学与工程
    • 402 篇 电气工程
    • 393 篇 生物工程
    • 340 篇 电子科学与技术(可...
    • 298 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 252 篇 机械工程
    • 205 篇 化学工程与技术
    • 199 篇 网络空间安全
    • 173 篇 安全科学与工程
    • 168 篇 仪器科学与技术
    • 167 篇 动力工程及工程热...
    • 149 篇 材料科学与工程(可...
    • 147 篇 交通运输工程
  • 1,888 篇 理学
    • 885 篇 数学
    • 664 篇 物理学
    • 428 篇 生物学
    • 307 篇 统计学(可授理学、...
    • 219 篇 化学
    • 177 篇 系统科学
  • 962 篇 管理学
    • 614 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 270 篇 医学
    • 206 篇 临床医学
    • 204 篇 基础医学(可授医学...
    • 137 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 47 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 204 篇 accuracy
  • 174 篇 deep learning
  • 140 篇 feature extracti...
  • 132 篇 computational mo...
  • 126 篇 training
  • 124 篇 machine learning
  • 100 篇 hadron colliders
  • 100 篇 convolutional ne...
  • 99 篇 predictive model...
  • 91 篇 support vector m...
  • 91 篇 real-time system...
  • 90 篇 data models
  • 78 篇 security
  • 77 篇 artificial intel...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 68 篇 data mining
  • 68 篇 cloud computing
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 134 篇 yerevan physics ...
  • 131 篇 national and kap...
  • 131 篇 centro brasileir...
  • 131 篇 istanbul technic...
  • 129 篇 university of sp...
  • 129 篇 indian institute...
  • 128 篇 universidad iber...
  • 127 篇 brunel universit...
  • 126 篇 università di to...
  • 126 篇 academy of scien...
  • 126 篇 infn sezione di ...
  • 125 篇 charles universi...
  • 125 篇 zhejiang univers...
  • 124 篇 department of ph...
  • 123 篇 infn sezione di ...
  • 122 篇 university of de...
  • 120 篇 imperial college...
  • 120 篇 rwth aachen univ...
  • 118 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,152 篇 英文
  • 230 篇 其他
  • 82 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5464 条 记 录,以下是11-20 订阅
排序:
A Data Constraint Analysis Method for Full-Digital Simulation Test  24
A Data Constraint Analysis Method for Full-Digital Simulatio...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Wu, Shasha Li, Shiyong Peng, Yanhong Ma, Siyou Deng, Fei Institute of Computer Application China Academy of Engineering Physics Mianyang China
At present, software testing is an effective approach to ensure and improve software quality. However, there is a lack of data dependency analysis methods for constructing full-digital test data scripts, which results... 详细信息
来源: 评论
QVT-based SysML v2 Model Version Difference Transformation
QVT-based SysML v2 Model Version Difference Transformation
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Zhou, Chen Li, Ling Ren, Qiang Mu, Zixin Yu, Bing An, Baoran Institute of Computer Application China Academy of Engineering Physics Mianyang China
In order to address the issue of model version incompatibility in supporting the implementation of Model-Based Systems engineering (MBSE) with SysML v2, this paper first elucidates a feasible engineering modelling met... 详细信息
来源: 评论
Robust LiDAR-Camera Alignment over Point Cloud Density Variation
Robust LiDAR-Camera Alignment over Point Cloud Density Varia...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Zhu, Angfan Ma, Tao Institute of Computer Application China Academy of Engineering Physics Sichuan China
For the first time, we raise and address the research problem of robust LiDAR-Camera alignment (LCA) over point cloud density variation, which is essentially important to the applications like autonomous driving and r... 详细信息
来源: 评论
Chinese Offensive Language Detection Algorithm based on Pre-trained Language model and Pointer Network Augmentation  5
Chinese Offensive Language Detection Algorithm based on Pre-...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information Technology, AINIT 2024
作者: Hou, Boyuan Xie, Xin Zhang, Dongcheng Zheng, Liyuan Yan, Guojun Institute of Computer Application China Academy of Engineering Physics Mianyang China
The traditional offensive language detection methods suffer from issues such as inadequate understanding of semantic information and sensitivity to noise in text. To address these problems, this paper proposes a Chine... 详细信息
来源: 评论
A noise reduction algorithm for industrial CT images incorporating wavelet denoising and guided filtering  24
A noise reduction algorithm for industrial CT images incorpo...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024
作者: Li, Ling Dou, Siyuan Mu, Zixin Yu, Bing Zeng, Sifeng Ren, Qiang Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang China
To address the issues of fuzzy edges and loss of fine features in existing noise reduction algorithms for industrial computed tomography (CT) images, we present a hybrid wavelet denoising and guided filtering algorith... 详细信息
来源: 评论
A Coverage-Oriented Fuzzing Test Method for Embedded Firmware  10
A Coverage-Oriented Fuzzing Test Method for Embedded Firmwar...
收藏 引用
10th International Symposium on System Security, Safety, and Reliability, ISSSR 2024
作者: Yang, Wansheng Luo, Hairu Hu, Chi He, Fengjiao China Academy of Engineering Physics Institute of Computer Application Mianyang China
When it comes to firmware vulnerability detection in embedded systems, traditional static analysis approaches struggle to capture deep-level program execution logic, resulting in unsatisfactory effectiveness. Based on... 详细信息
来源: 评论
An Analytical Survey on Credit Scoring Mechanism in India  2nd
An Analytical Survey on Credit Scoring Mechanism in India
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Bhowmik, Ankan Basu, Arkajyoti Basu, Arittra Paul, Anish Roy, Atrri Department of Computer Application and Science Institute of Engineering and Management Kolkata India
Credit score is an important indicator to lenders of your capability to repay loans. A consumer's creditworthiness is indicated by a number between 300 and 850 called a credit score. The advanced the score, the be... 详细信息
来源: 评论
Permission Governance Method Based on Separation of Responsibilities  7
Permission Governance Method Based on Separation of Responsi...
收藏 引用
7th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2024
作者: Sun, Xiaohan Institute of Computer Application China Academy of Engineering Physics Mianyang China
In complex management information systems, there are a large number of business entities, complex permission relationships, and diverse access requirements. A set of permission governance methods is needed to solve th... 详细信息
来源: 评论
Management of Multiple Microgrids Considering Soft Loads Based on Federated Reinforcement Learning  11
Management of Multiple Microgrids Considering Soft Loads Bas...
收藏 引用
11th International Forum on Electrical engineering and Automation, IFEEA 2024
作者: Mu, Zixin Tang, Lei Zhou, Chen Li, Ling Long, Yang Li, Dong Institute of Computer Application China Academy of Engineering Physics Mianyang China
As the energy transition advances, multi-microgrid systems are being widely applied due to their advantages in effectively accommodating clean energy and achieving zero-carbon power supply within certain areas. Howeve... 详细信息
来源: 评论
Cross-domain Person Search Data Augmentation Based on Style Transfer  24
Cross-domain Person Search Data Augmentation Based on Style ...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information Technology, ADMIT 2024
作者: Liu, Zhen Zhang, Yaohui Lai, Guiyu Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang China
As a computer vision technology that combines pedestrian detection and person re-identification, person search focuses on its application in practical scenarios. However, at present, the academic community pays more a... 详细信息
来源: 评论