咨询与建议

限定检索结果

文献类型

  • 5,952 篇 会议
  • 3,437 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 9,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,633 篇 工学
    • 3,498 篇 计算机科学与技术...
    • 2,782 篇 软件工程
    • 1,100 篇 信息与通信工程
    • 990 篇 控制科学与工程
    • 748 篇 电气工程
    • 744 篇 电子科学与技术(可...
    • 574 篇 生物工程
    • 492 篇 机械工程
    • 449 篇 光学工程
    • 414 篇 生物医学工程(可授...
    • 391 篇 仪器科学与技术
    • 298 篇 动力工程及工程热...
    • 291 篇 化学工程与技术
    • 226 篇 交通运输工程
    • 208 篇 材料科学与工程(可...
    • 191 篇 土木工程
    • 169 篇 安全科学与工程
  • 2,985 篇 理学
    • 1,436 篇 数学
    • 880 篇 物理学
    • 641 篇 生物学
    • 461 篇 统计学(可授理学、...
    • 360 篇 系统科学
    • 299 篇 化学
  • 1,477 篇 管理学
    • 964 篇 管理科学与工程(可...
    • 562 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 391 篇 医学
    • 333 篇 临床医学
    • 256 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 206 篇 法学
    • 172 篇 社会学
  • 157 篇 经济学
  • 97 篇 农学
  • 80 篇 教育学
  • 32 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 178 篇 feature extracti...
  • 173 篇 deep learning
  • 165 篇 computational mo...
  • 146 篇 data mining
  • 145 篇 systems engineer...
  • 129 篇 optimization
  • 122 篇 machine learning
  • 116 篇 neural networks
  • 108 篇 control systems
  • 101 篇 accuracy
  • 99 篇 semantics
  • 93 篇 computer archite...
  • 88 篇 laboratories
  • 85 篇 educational inst...
  • 85 篇 predictive model...
  • 83 篇 costs
  • 82 篇 training
  • 78 篇 bandwidth
  • 78 篇 wireless sensor ...

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 79 篇 school of comput...
  • 73 篇 national enginee...
  • 71 篇 department of co...
  • 56 篇 college of infor...
  • 44 篇 school of comput...
  • 41 篇 the key laborato...
  • 39 篇 school of comput...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 29 篇 huazhong univers...
  • 28 篇 school of comput...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...

作者

  • 71 篇 hai jin
  • 39 篇 jin hai
  • 31 篇 yang yang
  • 30 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 hu shengshan
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 20 篇 dutta paramartha
  • 19 篇 jianchao zeng
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 16 篇 wang wei
  • 15 篇 wang lei
  • 15 篇 li peng
  • 15 篇 long zheng
  • 15 篇 zhuang songlin

语言

  • 8,767 篇 英文
  • 415 篇 其他
  • 219 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering"
9430 条 记 录,以下是371-380 订阅
排序:
Acute Lymphoblastic Leukemia Detection Using DenseNet Model from Microscopic Blood Smear Images
Acute Lymphoblastic Leukemia Detection Using DenseNet Model ...
收藏 引用
International Conference on Data science and Network engineering, ICDSNE 2023
作者: Prasath, Navamani Jasthi, Monika Saikia, Rabul Loganathan, Muralidaran Devi, Salam Shuleenda Department of Electronics and Communication Engineering NIT Meghalaya Meghalaya Shillong793003 India Department of Computer Science and Information System Engineering St. Joseph University Dae Es Salaam Tanzania United Republic of
Acute lymphoblastic leukemia (ALL) is a cancerous condition that affects the bone marrow and blood. It is a fast developing illness that, if not identified and treated as soon as possible, could be fatal. ALL is often... 详细信息
来源: 评论
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning  8
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Huang, Wenlian Zhu, Guanming Huang, Qiang Chen, Zhuangzhuang Chen, Jie Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning  27
Video2Reward: Generating Reward Function from Videos for Leg...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论
Smart Material Selection: Leveraging Machine Learning for Sustainable and Cost-Effective Building Design  2
Smart Material Selection: Leveraging Machine Learning for Su...
收藏 引用
2nd Jordanian International Biomedical engineering Conference, JIBEC 2024
作者: Hashim, Wassan Adnan Khoshaba, Lina Sami Kareem, Shahab Wahhab Khoshaba, Farah Sami Al-Qalam University College Medical Device Engineering Department Kirkuk Iraq Lebanese French University College of Engineering and Computer Science Architecture Engineering Department Erbil Iraq Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq
In modern-day architecture, the choice of building material plays an important role in sustainability, cost-value engineering, and design integrity. Moreover, the traditional methods for selecting materials tended to ... 详细信息
来源: 评论
A lightweight point cloud analysis network based on graph walking  8
A lightweight point cloud analysis network based on graph wa...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical sciences, ICIIBMS 2023
作者: Li, Wenju Ji, Qianqian Sha, Liye Cui, Liu Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China Shanghai Precision Dosing & Weighing System Co Shanghai China
Based on the irregularity and permutation invariance of point clouds, graph neural networks have been widely used in 3D point cloud analysis tasks in recent years. However, these works suffer from insufficient feature... 详细信息
来源: 评论
Integrated operating room planning and scheduling: an ILP-Based off-line approach for emergency responsiveness at a local hospital in Naples
收藏 引用
Soft Computing 2024年 第20期28卷 11987-12003页
作者: Boccia, Maurizio Mancuso, Andrea Masone, Adriano Sterle, Claudio Department of Electrical Engineering and Information Technology University of Naples "Federico II" Via Claudio 21 Naples80125 Italy Institute for System Analysis and Computer Science "Antonio Ruberti" National Research Council of Italy via dei Taurini 19 Rome00185 Italy
This paper addresses a real-world Integrated Operating Room Planning and Scheduling (IORPS) problem encountered by a local hospital in Naples, characterized by stringent emergency management constraints, requiring tre... 详细信息
来源: 评论
A motion-level-aware denoising framework for x-ray fluoroscopic images
A motion-level-aware denoising framework for x-ray fluorosco...
收藏 引用
Medical Imaging 2023: Physics of Medical Imaging
作者: Jo, Geonhui Jang, Minhee Jeon, Sun-Young Kim, Wonjin Choi, Jang-Hwan Department of Computer Science and Engineering Ewha Womans University Seoul03760 Korea Republic of Division of Mechanical and Biomedical Engineering Graduate Program in System Health Science and Engineering Ewha Womans University Seoul03760 Korea Republic of
Fluoroscopy in a low-dose tube output is used to reduce the damage associated with radiation exposure. However, lowering the radiation dose inevitably increases random noise in x-ray images, resulting in poor diagnost... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain Technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论