咨询与建议

限定检索结果

文献类型

  • 17,673 篇 会议
  • 9,153 篇 期刊文献
  • 224 册 图书

馆藏范围

  • 27,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,177 篇 工学
    • 13,446 篇 计算机科学与技术...
    • 11,004 篇 软件工程
    • 3,470 篇 信息与通信工程
    • 2,205 篇 控制科学与工程
    • 1,681 篇 生物工程
    • 1,423 篇 电气工程
    • 1,189 篇 机械工程
    • 1,165 篇 电子科学与技术(可...
    • 970 篇 生物医学工程(可授...
    • 853 篇 光学工程
    • 615 篇 仪器科学与技术
    • 614 篇 化学工程与技术
    • 568 篇 安全科学与工程
    • 557 篇 动力工程及工程热...
    • 488 篇 交通运输工程
    • 479 篇 网络空间安全
    • 467 篇 建筑学
  • 7,892 篇 理学
    • 4,745 篇 数学
    • 1,834 篇 生物学
    • 1,609 篇 物理学
    • 1,332 篇 统计学(可授理学、...
    • 936 篇 系统科学
    • 633 篇 化学
  • 5,241 篇 管理学
    • 3,236 篇 管理科学与工程(可...
    • 2,257 篇 图书情报与档案管...
    • 1,285 篇 工商管理
  • 875 篇 医学
    • 752 篇 临床医学
    • 669 篇 基础医学(可授医学...
  • 748 篇 法学
    • 586 篇 社会学
  • 452 篇 经济学
    • 451 篇 应用经济学
  • 384 篇 教育学
  • 258 篇 农学
  • 113 篇 文学
  • 67 篇 军事学
  • 65 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 842 篇 computer science
  • 535 篇 software enginee...
  • 507 篇 deep learning
  • 506 篇 feature extracti...
  • 469 篇 computational mo...
  • 436 篇 training
  • 415 篇 semantics
  • 374 篇 data mining
  • 371 篇 software
  • 359 篇 accuracy
  • 303 篇 educational inst...
  • 294 篇 computer archite...
  • 292 篇 machine learning
  • 280 篇 application soft...
  • 248 篇 image segmentati...
  • 247 篇 support vector m...
  • 239 篇 optimization
  • 236 篇 internet of thin...
  • 223 篇 cloud computing
  • 221 篇 conferences

机构

  • 962 篇 state key labora...
  • 474 篇 college of compu...
  • 398 篇 school of comput...
  • 320 篇 school of softwa...
  • 253 篇 department of co...
  • 249 篇 department of co...
  • 221 篇 school of comput...
  • 219 篇 school of softwa...
  • 216 篇 school of inform...
  • 189 篇 school of softwa...
  • 172 篇 college of compu...
  • 151 篇 school of softwa...
  • 147 篇 college of softw...
  • 134 篇 school of comput...
  • 126 篇 college of compu...
  • 124 篇 school of comput...
  • 123 篇 school of softwa...
  • 123 篇 college of compu...
  • 122 篇 national key lab...
  • 113 篇 tianjin key labo...

作者

  • 54 篇 baowen xu
  • 54 篇 liu yang
  • 50 篇 wang lei
  • 45 篇 li li
  • 43 篇 xiang-yang li
  • 42 篇 wei liu
  • 41 篇 lei wang
  • 40 篇 zhang wen
  • 39 篇 sun xingming
  • 39 篇 aichholzer oswin
  • 38 篇 zhou zhi-hua
  • 37 篇 wang hui
  • 37 篇 qi liu
  • 34 篇 jun zhang
  • 33 篇 song mingli
  • 32 篇 li peng
  • 32 篇 shen furao
  • 32 篇 wei jun
  • 32 篇 zhang hua
  • 31 篇 niyato dusit

语言

  • 25,266 篇 英文
  • 1,244 篇 其他
  • 573 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Computer Software Technology"
27050 条 记 录,以下是321-330 订阅
排序:
ViF-SD2E: a robust weakly-supervised framework for neural decoding
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6645-6661页
作者: Feng, Jingyi Luo, Yong Song, Shuang Hu, Han National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China School of Information and Electronics Beijing Institute of Technology Beijing100081 China
Neural decoding plays a vital role in the interaction between the brain and the outside world. Our task in this paper is to decode the movement track of a finger directly based on the neural data. Existing neural deco... 详细信息
来源: 评论
Collaborative Offloading Method for Digital Twin Empowered Cloud Edge Computing on Internet of Vehicles
收藏 引用
Tsinghua Science and technology 2023年 第3期28卷 433-451页
作者: Linjie Gu Mengmeng Cui Linkun Xu Xiaolong Xu Changwang School of Honors Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21044China School of Artificial Intelligence Nanjing University of Information and TechnologyNanjing 210044China
Digital twinning and edge computing are attractive solutions to support computing-intensive and servicesensitive Internet of Vehicles *** of the existing Internet of Vehicles service offloading solutions only consider... 详细信息
来源: 评论
A Step Toward Building User-Relevant Health Care technology
收藏 引用
Mayo Clinic Proceedings: Digital Health 2023年 第3期1卷 379-380页
作者: Sinha, Roopak Department of Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand
来源: 评论
A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3727-3744页
作者: Muhammad Naeem Akram Muhammad Usman Yaseen Muhammad Waqar Muhammad Imran Aftab Hussain Department of Computer Science COMSATS University IslamabadIslamabad45550Pakistan Department of Software Engineering Capital University of Science&TechnologyIslamabad44000Pakistan
This study presents a deep learning model for efficient intracranial hemorrhage(ICH)detection and subtype classification on non-contrast head computed tomography(CT)*** refers to bleeding in the skull,leading to the m... 详细信息
来源: 评论
Streaming Histogram Publication over Weighted Sliding Windows Under Differential Privacy
收藏 引用
Tsinghua Science and technology 2024年 第6期29卷 1674-1693页
作者: Xiujun Wang Lei Mo Xiao Zheng Zhe Dang School of Computer Science and Technology Anhui University of TechnologyMa’anshan 243032China Institute for Artificial Intelligence Hefei Comprehensive National Science CenterHefei 230088China Baosight Software(Anhui)Co.Ltd. Ma’anshan 243000China School of Electrical Engineering and Computer Science Washington State UniversityPullman 99164WAUSA
Continuously publishing histograms in data streams is crucial to many real-time applications,as it provides not only critical statistical information,but also reduces privacy leaking *** the importance of elements usu... 详细信息
来源: 评论
MEM-TET: Improved Triplet Network for Intrusion Detection System
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 471-487页
作者: Weifei Wang Jinguo Li Na Zhao Min Liu College of Computer Science and Technology Shanghai University of Electric PowerShanghai201306China National Pilot School of Software Yunnan UniversityKunming650504China
With the advancement of network communication technology,network traffic shows explosive ***,network attacks occur *** intrusion detection systems are still the primary means of detecting ***,two challenges continue t... 详细信息
来源: 评论
Detection Algorithm for Safety Helmet Wearing of Chemical Plant Personnel Based on Improved YOLOv5m
Detection Algorithm for Safety Helmet Wearing of Chemical Pl...
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Li, Qiangqiang Yu, Kun Wang, Haoran Guan, Qianjun Gao, Shihong Jiang, Jiamin Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huai'an Jiangsu China
Wearing a safety helmet at the work site of a chemical plant can effectively prevent safety accidents caused by head injuries, so it is very important to detect whether employees wear safety helmets. In order to solve... 详细信息
来源: 评论
An Intelligent Model to Predict Cardiovascular Disease using Machine Learning Techniques  25
An Intelligent Model to Predict Cardiovascular Disease using...
收藏 引用
25th International Multi Topic Conference, INMIC 2023
作者: Sadaf, Zawaria Khawaja, Sajid Gul Akram, Muhammad Usman National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan
Human life is the most important asset of human beings. Every year millions of people lose their lives to cardiovascular diseases. It is a group of diseases related to blood vessels and the heart. The chances of devel... 详细信息
来源: 评论
Combining KNN with AutoEncoder for Outlier Detection
收藏 引用
Journal of computer Science & technology 2024年 第5期39卷 1153-1166页
作者: Shu-Zheng Liu Shuai Ma Han-Qing Chen Li-Zhen Cui Jie Ding State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Software Shandong UniversityJinan 250100China Joint SDU-NTU Centre for Artificial Intelligence Research Shandong UniversityJinan 250100China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang 212003China
K-nearest neighbor(KNN)is one of the most fundamental methods for unsupervised outlier detection because of its various advantages,e.g.,ease of use and relatively high ***,most data analytic tasks need to deal with hi... 详细信息
来源: 评论
Iterative Android automated testing
收藏 引用
Frontiers of computer Science 2023年 第5期17卷 15-26页
作者: Yi ZHONG Mengyu SHI Youran XU Chunrong FANG Zhenyu CHEN State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China School of Big Data and Computer Science Chongqing College of Mobile CommunicationChongqing 400065China
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage... 详细信息
来源: 评论