咨询与建议

限定检索结果

文献类型

  • 21,586 篇 会议
  • 9,560 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,495 篇 工学
    • 15,471 篇 计算机科学与技术...
    • 12,929 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,368 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,301 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,152 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 576 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,715 篇 理学
    • 5,147 篇 数学
    • 2,269 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 888 篇 法学
    • 694 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 531 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 416 篇 application soft...
  • 412 篇 accuracy
  • 409 篇 machine learning
  • 382 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,215 篇 college of compu...
  • 352 篇 school of comput...
  • 273 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 154 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 90 篇 school of comput...
  • 89 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,161 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31448 条 记 录,以下是321-330 订阅
排序:
RGB-Based Category-Level Object Pose Estimation via Depth Recovery and Adaptive Refinement
收藏 引用
IEEE Robotics and Automation Letters 2025年 第6期10卷 5377-5384页
作者: Yang, Hui Sun, Wei Liu, Jian Zheng, Jin Zeng, Zhiwen Mian, Ajmal Hunan University National Engineering Research Center for Robot Visual Perception and Control Technology College of Electrical and Information Engineering Changsha410082 China Hunan University State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body Changsha410082 China Central South University School of Architecture and Art Changsha410082 China University of Western Australia Department of Computer Science and Software Engineering CrawleyWA6009 Australia
Category-level pose estimation methods have received widespread attention as they can be generalized to intra-class unseen objects. Although RGB-D-based category-level methods have made significant progress, reliance ... 详细信息
来源: 评论
Unsupervised Distributed Anomaly Detection Framework for IoT in Edge AI Network
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jiang, Xingguo Lu, Chang Luo, Hong Sun, Yan Beijing University of Posts and Telecommunications School of Computer Science National Pilot Software Engineering School Beijing100876 China
Anomaly detection of sensor data is crucial to ensure the stability and effectiveness of IoT system. The task requires high accuracy and low latency, which makes distributed anomaly detection gradually become a resear... 详细信息
来源: 评论
HTM-CDFK: An Online Industrial Control Anomaly Detection Algorithm based on Hierarchical Time Memory
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Jingwen Zhang, Yuanyuan Wang, Zilin Ren, Yi Chen, Liangyin Chen, Yanru Sichuan University College of Computer Science College of Software Engineering Institute for Industrial Internet Research Chengdu610065 China
With the rapid advancement of industrial structures, many factories are deploying anomaly detection systems. However, most existing anomaly detection algorithms are unsuitable for high-noise industrial control system ... 详细信息
来源: 评论
Flexible ViG: Learning the Self-Saliency for Flexible Object Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Yang, Kunshan Zuo, Lin Jing, Mengmeng Tian, Xianlong He, Kunbin Ding, Yongqi University of Electronic Science and Technology of China School of Information and Software Engineering ChengDu611731 China University of Electronic Science and Technology of China School of Computer Science and Engineering ChengDu611731 China
Existing computer vision methods mainly focus on the recognition of rigid objects, whereas the recognition of flexible objects remains unexplored. Recognizing flexible objects poses significant challenges due to their... 详细信息
来源: 评论
A Meta-Model to Support Compatibility Testing of Cross-Browser Web Application
A Meta-Model to Support Compatibility Testing of Cross-Brows...
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Mishal Muneer Uzair Rasheed Muhammad Majid Hussain Department of Computer Science & IT The University of Lahore Lahore Pakistan Department of Computer and Software Engineering College of Electrical and Mechanical Engineering NUST Islamabad Pakistan
Ensuring the user interface (UI) compatibility of web applications across diverse client-side configurations, including various operating systems and browsers, is a significant challenge due to the extensive range of ... 详细信息
来源: 评论
Phoneme Classification in Imagined Speech Using Explainable Machine Learning  13
Phoneme Classification in Imagined Speech Using Explainable ...
收藏 引用
13th International Winter Conference on Brain-computer Interface, BCI 2025
作者: Kim, Sejin Kang, Hyunwook Jeong, Ji-Hoon Lee, Minji Dept. Artificial Intelligence The Catholic University of Korea Bucheon Korea Republic of Dept. Electrical and Computer Engineering Inha University Incheon Korea Republic of Dept. Computer Science Chungbuk National University Cheongju Korea Republic of Dept. Biomedical Software Engineering The Catholic University of Korea Bucheon Korea Republic of
Imagined speech is gaining attention as a next-generation paradigm for brain-computer interfaces in terms of its intuitiveness in communication. Many studies have focused on classifying imagined words as the basis of ... 详细信息
来源: 评论
Human–object interaction detector with unsupervised domain adaptation
收藏 引用
Knowledge-Based Systems 2025年 321卷
作者: Cheng, Yamin Duan, Zhekai Huang, Hualong Wang, Zhi School of Computer and Software Engineering Xihua University Chengdu China Department of Computer Science University College London United Kingdom School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Human–object interaction (HOI) detection constitutes a foundational challenge in fine-grained visual scene understanding. While mainstream HOI detection frameworks rely on supervised training of deep neural networks ... 详细信息
来源: 评论
The 23andMe Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies
arXiv
收藏 引用
arXiv 2025年
作者: Holthouse, Ryan Owens, Serena Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
In October 2023, 23andMe, a prominent provider of personal genetic testing, ancestry, and health information services, suffered a significant data breach orchestrated by a cybercriminal known as "Golem." Ini... 详细信息
来源: 评论
Breaking the Vault: A Case Study of the 2022 LastPass Data Breach
arXiv
收藏 引用
arXiv 2025年
作者: Gentles, Jessica Fields, Mason Goodman, Garrett Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
Managing the security of employee work computers has become increasingly important as today’s work model shifts to remote and hybrid work plans. In this paper, we explore the recent 2022 LastPass data breach, in whic... 详细信息
来源: 评论
Efficient and Effective Prompt Tuning via Prompt Decomposition and Compressed Outer Product
arXiv
收藏 引用
arXiv 2025年
作者: Lan, Pengxiang Xu, Haoyu Yang, Enneng Liang, Yuliang Guo, Guibing Zhao, Jianzhe Wang, Xingwei Software College Northeastern University China School of Computer Science and Engineering Northeastern University China
Prompt tuning (PT) offers a cost-effective alternative to fine-tuning large-scale pre-trained language models (PLMs), requiring only a few parameters in soft prompt tokens added before the input text. However, existin... 详细信息
来源: 评论