咨询与建议

限定检索结果

文献类型

  • 5,058 篇 会议
  • 3,522 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,607 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,805 篇 工学
    • 4,524 篇 计算机科学与技术...
    • 3,701 篇 软件工程
    • 1,038 篇 信息与通信工程
    • 738 篇 控制科学与工程
    • 490 篇 电气工程
    • 470 篇 生物工程
    • 398 篇 机械工程
    • 374 篇 电子科学与技术(可...
    • 265 篇 光学工程
    • 250 篇 生物医学工程(可授...
    • 206 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 171 篇 网络空间安全
    • 164 篇 动力工程及工程热...
    • 159 篇 安全科学与工程
    • 141 篇 建筑学
    • 139 篇 交通运输工程
    • 126 篇 土木工程
  • 2,694 篇 理学
    • 1,721 篇 数学
    • 536 篇 生物学
    • 510 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 328 篇 系统科学
    • 214 篇 化学
  • 1,693 篇 管理学
    • 1,007 篇 管理科学与工程(可...
    • 753 篇 图书情报与档案管...
    • 309 篇 工商管理
  • 197 篇 医学
    • 159 篇 临床医学
    • 139 篇 基础医学(可授医学...
  • 191 篇 法学
    • 142 篇 社会学
  • 101 篇 经济学
  • 88 篇 教育学
  • 73 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 271 篇 laboratories
  • 208 篇 semantics
  • 172 篇 feature extracti...
  • 152 篇 computational mo...
  • 141 篇 data mining
  • 139 篇 software
  • 127 篇 software enginee...
  • 122 篇 training
  • 119 篇 algorithm design...
  • 117 篇 deep learning
  • 113 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 101 篇 cloud computing
  • 98 篇 accuracy
  • 93 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 costs

机构

  • 1,024 篇 state key labora...
  • 213 篇 state key labora...
  • 205 篇 department of co...
  • 204 篇 national key lab...
  • 172 篇 college of compu...
  • 168 篇 department of co...
  • 143 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 113 篇 school of inform...
  • 107 篇 state key labora...
  • 103 篇 college of compu...
  • 102 篇 guangxi key labo...
  • 97 篇 state key labora...
  • 94 篇 beijing key labo...
  • 92 篇 school of comput...
  • 90 篇 key laboratory o...
  • 90 篇 state key labora...
  • 88 篇 school of softwa...
  • 80 篇 shandong provinc...
  • 75 篇 national enginee...

作者

  • 66 篇 junping du
  • 65 篇 gao yang
  • 49 篇 yin baocai
  • 43 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 35 篇 shen linlin
  • 34 篇 yu huiqun
  • 33 篇 xu baowen
  • 31 篇 zhao jian
  • 31 篇 dou wanchun
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 28 篇 li xuandong
  • 28 篇 fan guisheng
  • 27 篇 liu yang

语言

  • 8,059 篇 英文
  • 293 篇 其他
  • 263 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8607 条 记 录,以下是101-110 订阅
排序:
Optimizing Monitoring Utility of Unmanned Aerial Vehicles Considering Adverse Effects
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zhang, Haihan Dai, Haipeng Qiu, Yu Yu, Enze Zhou, Ruiben Wang, Weijun Wang, Jingwu Chen, Guihai Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China South China University of Technology School of Computer Science and Engineering Guangzhou China Beijing China
For Unmanned Aerial Vehicles (UAVs) monitoring tasks, capturing high quality images of target objects is important for subsequent recognition. Concerning the problem, many prior works study placement/trajectory planni... 详细信息
来源: 评论
UNI-IQA: A Unified Approach for Mutual Promotion of Natural and Screen Content Image Quality Assessment
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Song, Mengke Chen, Chenglizhao Song, Wenfeng Fang, Yuming Qingdao Institute of Software School of Computer Science and Technology China University of Petroleum China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software China Computer School Beijing Information Science and Technology University China School of Information Management and Mathematics Jiangxi University of Finance and Economics China
To date, the image quality assessment (IQA) research field has mainly focused on natural images (NIs)-based IQA and screen content images (SCIs)-based IQA. Usually, these two research branches are quite independent du...
来源: 评论
Complementary Learning System Theory-based Active Learning for Audio Classification
Complementary Learning System Theory-based Active Learning f...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hui Geng Zijian Gao Tianjiao Wan Dawei Feng Changjian Wang Kele Xu College of Computer Science and Technology National University of Defense Technology Changsha China State Key Laboratory of Complex & Critical Software Environment Changsha China
Deep learning has significantly advanced the audio classification, achieving remarkable results. However, these successes often rely on extensive manual annotation of audio, a labor-intensive and costly process. Activ... 详细信息
来源: 评论
Probabilistic-Search and Neighbor-Density Based Doppler-Shift Acquisition in Space Communications
收藏 引用
IEEE Transactions on Communications 2025年
作者: Zhang, Zhaowei Du, Shuai Liu, Lin Liu, Hui Zuo, Jiakuo Miao, Wang Zhao, Haitao Nanjing University of Posts and Telecommunications School of Internet of Things China Nanjing University State Key Laboratory for Novel Software Technology China Jinling Institute of Technology School of Software Engineering China University of Exeter Department of Computer Science United Kingdom
In space communications, the signal's long-distance transmission between a flying transmitter-receiver pair encounters two obstacles: a huge path-loss and a high-speed movement. The huge path-loss results in a low... 详细信息
来源: 评论
Image Tampering Detection With Frequency-Aware Attention and Multiview Fusion
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 614-625页
作者: Xu, Xu Chen, Junxin Lv, Wenrui Wang, Wei Zhang, Yushu Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China
Manipulated images are flooding our daily lives, which poses a threat to social security. Recently, many studies have focused on image tampering detection. However, they have poor performance on independent validation... 详细信息
来源: 评论
PIP: Perturbation-based Iterative Pruning for Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Cao, Yi Xu, Wei-Jie Shen, Yucheng Shi, Weijie Chan, Chi-Min Xu, Jiajie School of Computer Science and Technology Soochow University China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
The rapid increase in the parameter counts of Large Language Models (LLMs), reaching billions or even trillions, presents significant challenges for their practical deployment, particularly in resource-constrained env...
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Siddiqi, Hafied Nur Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Department of Information Technology PO Box 84428 Riyadh11671 Saudi Arabia Shenzhen University College of Computer Science & Software Engineering Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Prince Sultan University EIAS Data Science and Blockchain Laboratory CCIS Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
FDC: Feature Dropout Consistency for unsupervised domain adaptation semantic segmentation
收藏 引用
Neural Networks 2025年 189卷 107527页
作者: Rao, Chaoyu Fan, Wanshu Wang, Cong Yang, Xin Wei, Xiaopeng Zhou, Dongsheng National and Local Joint Engineering Laboratory of Computer Aided Design School of Software Engineering Dalian University China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Computer Science and Technology Dalian University of Technology China
In Unsupervised Domain Adaptation Semantic Segmentation (UDASS), while self-training techniques have become one of the most effective methods to date, the absence of target labels makes models susceptible to overfitti... 详细信息
来源: 评论
MODEL CHECKING FOR MULTI-AGENT SYSTEMS MODELED BY EPISTEMIC PROCESS CALCULUS
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Qixian Cao, Zining Hui, Zong Zhou, Yuan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing211106 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing210023 China Faculty of Computer and Software Engineering Huaiyin Institute Of Technology Huaian223001 China
This paper presents a comprehensive framework for modeling and verifying multi-agent systems. The paper introduce an Epistemic Process Calculus for multi-agent systems, which formalizes the syntax and semantics to cap... 详细信息
来源: 评论
Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2889-2905页
作者: Meng Zhu Xingyue Wang Honge Ren Abeer Hakeem Linda Mohaisen College of Information Engineering Harbin UniversityHarbin150086China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin UniversityHarbin150086China College of Computer and Control Engineering Northeast Forestry UniversityHarbin150040China Heilongjiang Forestry Intelligent Equipment Engineering Research Center Northeast Forestry UniversityHarbin150040China Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t... 详细信息
来源: 评论