咨询与建议

限定检索结果

文献类型

  • 21,639 篇 会议
  • 9,606 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,547 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,523 篇 工学
    • 15,489 篇 计算机科学与技术...
    • 12,927 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,369 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,518 篇 电气工程
    • 1,302 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,154 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 577 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,719 篇 理学
    • 5,149 篇 数学
    • 2,272 篇 生物学
    • 1,661 篇 物理学
    • 1,489 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,861 篇 管理学
    • 3,484 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,586 篇 工商管理
  • 1,062 篇 医学
    • 919 篇 临床医学
    • 828 篇 基础医学(可授医学...
  • 889 篇 法学
    • 695 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 548 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 635 篇 feature extracti...
  • 628 篇 training
  • 601 篇 computational mo...
  • 542 篇 deep learning
  • 536 篇 semantics
  • 473 篇 software
  • 419 篇 accuracy
  • 416 篇 application soft...
  • 410 篇 machine learning
  • 386 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 282 篇 predictive model...
  • 276 篇 software systems
  • 258 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,224 篇 college of compu...
  • 354 篇 school of comput...
  • 274 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 170 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 122 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 90 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 51 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,260 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31547 条 记 录,以下是361-370 订阅
排序:
An Efficient Algorithm for the 2-Central Path Problem
收藏 引用
International Journal of Computational Geometry and Applications 2024年 第1-2期34卷 43-61页
作者: Huang, Ziyun Zhu, Yongding Xu, Jinhui Department of Computer Science and Software Engineering Penn State Erie The Behrend College Erie PA United States Department of Computer Science and Engineering State University of New York at Buffalo Buffalo NY United States
In this paper we consider the following 2-Central Path Problem (2CPP): Given a set of m polygonal curves = {P1,P2,...,Pm} in the plane, find two curves Pu and Pl, called 2-central paths, that best represent all curves... 详细信息
来源: 评论
Streaming Histogram Publication over Weighted Sliding Windows Under Differential Privacy
收藏 引用
Tsinghua science and Technology 2024年 第6期29卷 1674-1693页
作者: Xiujun Wang Lei Mo Xiao Zheng Zhe Dang School of Computer Science and Technology Anhui University of TechnologyMa’anshan 243032China Institute for Artificial Intelligence Hefei Comprehensive National Science CenterHefei 230088China Baosight Software(Anhui)Co.Ltd. Ma’anshan 243000China School of Electrical Engineering and Computer Science Washington State UniversityPullman 99164WAUSA
Continuously publishing histograms in data streams is crucial to many real-time applications,as it provides not only critical statistical information,but also reduces privacy leaking *** the importance of elements usu... 详细信息
来源: 评论
Support vector machine with discriminative low-rank embedding
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第5期9卷 1249-1262页
作者: Guangfei Liang Zhihui Lai Heng Kong Computer Vision Institute College of Computer Science and Software EngineeringShenzhen UniversityShenzhenChina Shenzhen Institute of Artificial Intelligence and Robotics for Society ShenzhenChina Department of Breast and Thyroid Surgery BaoAn Central Hospital of ShenzhenShenzhenChina
Support vector machine(SVM)is a binary classifier widely used in machine ***,neglecting the latent data structure in previous SVM can limit the performance of SVM and its *** address this issue,the authors propose a n... 详细信息
来源: 评论
A Space-Efficient One-Pass Online SVM Algorithm
收藏 引用
International Journal of Computational Geometry and Applications 2024年 第1-2期34卷 63-79页
作者: Liu, Yangwei Huang, Ziyun Xu, Jinhui Department of Computer Science and Engineering State University of New York at Buffalo Buffalo NY United States Department of Computer Science and Software Engineering Penn State Erie The Behrend College Erie PA United States
In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based... 详细信息
来源: 评论
Research on Intelligent Voice Broadcast System for Smart Water Conservancy  19
Research on Intelligent Voice Broadcast System for Smart Wat...
收藏 引用
19th International Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Huang, Zhenqian Chen, Lanxin College of Computer Science and Software Engineering Hohai University Nanjing China University of Birmingham Birmingham United Kingdom
Smart water management imposes higher demands on the real-time capabilities and intelligence of watershed information monitoring systems. Therefore, we propose an intelligent voice broadcast system for monitoring wate... 详细信息
来源: 评论
An Efficient Dialogue Policy Agent with Model-Based Causal Reinforcement Learning  31
An Efficient Dialogue Policy Agent with Model-Based Causal R...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Xu, Kai Wang, Zhenyu Zhao, Yangyang Fang, Bopeng School of Software Engineering South China University of Technology Guangdong China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Dialogue policy trains an agent to select dialogue actions frequently implemented via deep reinforcement learning (DRL). The model-based reinforcement methods built a world model to generate simulated data to alleviat... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
Resisting Over-Smoothing in Graph Neural Networks via Dual-Dimensional Decoupling  24
Resisting Over-Smoothing in Graph Neural Networks via Dual-D...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Shen, Wei Ye, Mang Huang, Wenke National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco... 详细信息
来源: 评论
Anomaly Detection in Spatial Information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论