咨询与建议

限定检索结果

文献类型

  • 17,510 篇 会议
  • 9,104 篇 期刊文献
  • 223 册 图书

馆藏范围

  • 26,837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,000 篇 工学
    • 13,308 篇 计算机科学与技术...
    • 10,896 篇 软件工程
    • 3,437 篇 信息与通信工程
    • 2,136 篇 控制科学与工程
    • 1,674 篇 生物工程
    • 1,412 篇 电气工程
    • 1,183 篇 机械工程
    • 1,156 篇 电子科学与技术(可...
    • 958 篇 生物医学工程(可授...
    • 839 篇 光学工程
    • 614 篇 化学工程与技术
    • 613 篇 仪器科学与技术
    • 564 篇 安全科学与工程
    • 556 篇 动力工程及工程热...
    • 477 篇 交通运输工程
    • 469 篇 网络空间安全
    • 456 篇 建筑学
  • 7,859 篇 理学
    • 4,727 篇 数学
    • 1,827 篇 生物学
    • 1,605 篇 物理学
    • 1,324 篇 统计学(可授理学、...
    • 936 篇 系统科学
    • 634 篇 化学
  • 5,210 篇 管理学
    • 3,221 篇 管理科学与工程(可...
    • 2,240 篇 图书情报与档案管...
    • 1,275 篇 工商管理
  • 870 篇 医学
    • 746 篇 临床医学
    • 663 篇 基础医学(可授医学...
  • 740 篇 法学
    • 581 篇 社会学
  • 450 篇 经济学
    • 449 篇 应用经济学
  • 376 篇 教育学
  • 256 篇 农学
  • 113 篇 文学
  • 67 篇 军事学
  • 65 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 840 篇 computer science
  • 530 篇 software enginee...
  • 502 篇 feature extracti...
  • 501 篇 deep learning
  • 466 篇 computational mo...
  • 427 篇 training
  • 413 篇 semantics
  • 372 篇 data mining
  • 372 篇 software
  • 343 篇 accuracy
  • 304 篇 educational inst...
  • 296 篇 machine learning
  • 292 篇 computer archite...
  • 280 篇 application soft...
  • 246 篇 image segmentati...
  • 244 篇 support vector m...
  • 242 篇 optimization
  • 237 篇 internet of thin...
  • 221 篇 cloud computing
  • 219 篇 conferences

机构

  • 954 篇 state key labora...
  • 450 篇 college of compu...
  • 398 篇 school of comput...
  • 320 篇 school of softwa...
  • 253 篇 department of co...
  • 242 篇 department of co...
  • 219 篇 school of comput...
  • 219 篇 school of inform...
  • 206 篇 school of softwa...
  • 181 篇 school of softwa...
  • 163 篇 college of compu...
  • 150 篇 school of softwa...
  • 145 篇 college of softw...
  • 133 篇 school of comput...
  • 124 篇 school of comput...
  • 124 篇 school of softwa...
  • 119 篇 college of compu...
  • 118 篇 college of compu...
  • 118 篇 national key lab...
  • 112 篇 tianjin key labo...

作者

  • 54 篇 baowen xu
  • 52 篇 liu yang
  • 49 篇 wang lei
  • 44 篇 li li
  • 43 篇 xiang-yang li
  • 42 篇 wei liu
  • 41 篇 lei wang
  • 39 篇 sun xingming
  • 39 篇 aichholzer oswin
  • 38 篇 zhou zhi-hua
  • 38 篇 zhang wen
  • 37 篇 wang hui
  • 37 篇 qi liu
  • 34 篇 jun zhang
  • 33 篇 song mingli
  • 32 篇 li peng
  • 32 篇 zhang hua
  • 31 篇 niyato dusit
  • 31 篇 shen furao
  • 31 篇 wei jun

语言

  • 25,503 篇 英文
  • 799 篇 其他
  • 561 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Computer Software Technology"
26837 条 记 录,以下是151-160 订阅
排序:
Application of optimized deformable convolution in underwater biological detection algorithm  3
Application of optimized deformable convolution in underwate...
收藏 引用
3rd International Symposium on computer Applications and Information Systems, ISCAIS 2024
作者: Zhuang, Hongwei Liu, Weisheng School of Computer and Software Engineering Liaoning University of Science and Technology Liaoning Anshan China
Underwater target detection is an important method for marine life detection. However, the accuracy of target detection and recognition is affected by the problems of image occlusion, blurred water quality and complex... 详细信息
来源: 评论
Uvcgan-Dehaze: a dehazing method for unpaired images
收藏 引用
Soft Computing 2024年 第20期28卷 12217-12226页
作者: Li, Canlin Zhang, Xiangfei Zhang, Wenjiao Su, Haowen Bi, Lihua School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou China School of Software Engineering Zhengzhou University of Light Industry Zhengzhou China
To solve the problems of feature loss and color difference after image dehazing and poor dehazing effect in real hazy images, a method UVCGAN-Dehaze is proposed for unpaired image dehazing. In the proposed model, the ... 详细信息
来源: 评论
Music source separation via hybrid waveform and spectrogram based generative adversarial network
收藏 引用
Multimedia Tools and Applications 2024年 1-15页
作者: Wu, Qiuxia Deng, Haipeng Hu, Kun Wang, Zhiyong School of Software Engineering South China University of Technology Guangdong Province Guangzhou China School of Computer Science The University of Sydney SydneyNSW Australia
Music source separation aims to disentangle individual sources from the mixture of musical signals. Existing generative adversarial network (GAN) based methods generally work on the spectrogram domain only. However, t... 详细信息
来源: 评论
CK-index: A Distribution-Aware Learned Index for Composite Keys  22
CK-index: A Distribution-Aware Learned Index for Composite K...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wei, Zhengyang Ye, Baoliu Cai, Miao Hohai University College of Computer and Software China Nanjing University Department of Computer Science and Technology China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology China
The learned index is a high-performance index structure that uses machine learning methods to predict key positions in a large key space efficiently. Existing learned indexes suffer from underfitting of key-to-positio... 详细信息
来源: 评论
LQG Problem of Descriptor Systems and Separation Principle  63
LQG Problem of Descriptor Systems and Separation Principle
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Nosrati, Komeil Belikov, Juri Tepljakov, Aleksei Petlenkov, Eduard Tallinn University of Technology Department of Computer Systems Estonia Tallinn University of Technology Department of Software Science Estonia
The performance of linear-quadratic regulators (LQRs), which possess robustness with guaranteed levels of gain and phase margin, will be affected by incomplete state information. By furnishing this regulator with a li... 详细信息
来源: 评论
Self-Supervised Exploration via Temporal Inconsistency in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5530-5539页
作者: Gao, Zijian Xu, Kele Zhai, Yuanzhao Ding, Bo Feng, Dawei Mao, Xinjun Wang, Huaimin National University of Defense Technology School of Computer Changsha410000 China State Key Laboratory of Complex and Critical Software Environment Beijing100191 China
In sparse extrinsic reward settings, reinforcement learning remains a challenge despite increasing interest in this field. Existing approaches suggest that intrinsic rewards can alleviate issues caused by reward spars... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
An enterprise portrait tag extraction method based on context embedding and knowledge distillation
收藏 引用
Soft Computing 2024年 第20期28卷 11823-11834页
作者: Li, Xiang Ding, Xingshuo Zhu, Quanyin Ma, Jialin Zhou, Hong Sun, Jizhou Faculty of Computer and Software Huaiyin Institute of Technology Jiangsu Huaian223003 China Qingdao Ocean Shipping Mariners College Shandong Qingdao266400 China
Enterprise portraits are reliant on the meticulous process of tag extraction, with the accuracy and efficiency of this foundational task being pivotal for the construction of high-quality portraits and their subsequen... 详细信息
来源: 评论
ON THE EFFECT OF BATCH SIZE IN BYZANTINE-ROBUST DISTRIBUTED LEARNING  12
ON THE EFFECT OF BATCH SIZE IN BYZANTINE-ROBUST DISTRIBUTED ...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Yang, Yi-Rui Shi, Chang-Wei Li, Wu-Jun National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Byzantine-robust distributed learning (BRDL), in which computing devices are likely to behave abnormally due to accidental failures or malicious attacks, has recently become a hot research topic. However, even in the ... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论