咨询与建议

限定检索结果

文献类型

  • 5,047 篇 会议
  • 3,479 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,770 篇 工学
    • 4,493 篇 计算机科学与技术...
    • 3,692 篇 软件工程
    • 1,022 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 479 篇 电气工程
    • 471 篇 生物工程
    • 399 篇 机械工程
    • 359 篇 电子科学与技术(可...
    • 270 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 165 篇 网络空间安全
    • 164 篇 动力工程及工程热...
    • 155 篇 安全科学与工程
    • 143 篇 建筑学
    • 134 篇 交通运输工程
    • 127 篇 土木工程
  • 2,675 篇 理学
    • 1,712 篇 数学
    • 534 篇 生物学
    • 505 篇 物理学
    • 463 篇 统计学(可授理学、...
    • 327 篇 系统科学
    • 211 篇 化学
  • 1,679 篇 管理学
    • 998 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 306 篇 工商管理
  • 193 篇 医学
    • 158 篇 临床医学
    • 137 篇 基础医学(可授医学...
  • 192 篇 法学
    • 142 篇 社会学
  • 101 篇 经济学
  • 87 篇 教育学
  • 74 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 292 篇 computer science
  • 271 篇 laboratories
  • 210 篇 semantics
  • 173 篇 feature extracti...
  • 152 篇 computational mo...
  • 141 篇 data mining
  • 137 篇 software
  • 126 篇 software enginee...
  • 126 篇 training
  • 119 篇 algorithm design...
  • 116 篇 deep learning
  • 112 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 101 篇 cloud computing
  • 96 篇 accuracy
  • 92 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 costs

机构

  • 1,017 篇 state key labora...
  • 215 篇 state key labora...
  • 203 篇 national key lab...
  • 202 篇 department of co...
  • 172 篇 college of compu...
  • 167 篇 department of co...
  • 142 篇 university of ch...
  • 116 篇 tianjin key labo...
  • 116 篇 school of inform...
  • 107 篇 state key labora...
  • 103 篇 college of compu...
  • 102 篇 guangxi key labo...
  • 97 篇 state key labora...
  • 94 篇 beijing key labo...
  • 91 篇 school of comput...
  • 89 篇 key laboratory o...
  • 87 篇 school of softwa...
  • 87 篇 state key labora...
  • 81 篇 shandong provinc...
  • 75 篇 national enginee...

作者

  • 66 篇 gao yang
  • 66 篇 junping du
  • 48 篇 yin baocai
  • 42 篇 shi yinghuan
  • 41 篇 wang wei
  • 39 篇 sanglu lu
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 34 篇 yu huiqun
  • 34 篇 xu baowen
  • 33 篇 shen linlin
  • 32 篇 dou wanchun
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 30 篇 zhao jian
  • 29 篇 fan guisheng
  • 29 篇 li wu-jun
  • 28 篇 li xuandong

语言

  • 8,023 篇 英文
  • 273 篇 其他
  • 263 篇 中文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Computer Software Technology Laboratory"
8553 条 记 录,以下是51-60 订阅
排序:
An efficient and balanced feature pyramid network: shared-FPN
收藏 引用
Optoelectronics Letters 2025年
作者: Tian Sulong Qin Longfei Pang Wenchao Gao Ying Zhao Dexin School of Computer Science and Engineering, Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology
In the field of object detection, it is challenging to achieve a balance between neck complexity and accuracy. To address this issue, we propose an efficient and decoupled neck module called Shared-FPN(Shared Featur...
来源: 评论
Next-POI Recommendation via Spatial-Temporal Knowledge Graph Contrastive Learning and Trajectory Prompt
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年 第6期37卷 3570-3582页
作者: Chen, Wei Huang, Haoyu Zhang, Zhiyu Wang, Tianyi Lin, Youfang Chang, Liang Wan, Huaiyu Guilin University of Electronic Technology Guangxi Key Lab of Trusted Software Guangxi Guilin541004 China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China Chinese University of Hong Kong Department of Computer Science and Engineering Ma Liu Shui Hong Kong Beijing Jiaotong University Beijing Key Laboratory of Traffic Data Mining and Embodied Intelligence Beijing100044 China
Next POI (Point-of-Interest) recommendation aims to forecast users' future movements based on their historical check-in trajectories, holding significant value in location-based services. Existing methods address ... 详细信息
来源: 评论
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline  18th
Profinder: Towards Professionals Recognition on Mobile Devi...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wang, Yong Xiong, Yi Yang, Tianyu Shen, Yiran College of Computer Science and Technology Harbin Engineering University Harbin China Modeling and Emulation in E-Government National Engineering Laboratory Harbin China School of Software Shandong University Jinan China
As the global population continues to age, there is a concurrent rise in the number of individuals experiencing cognitive impairment and dementia, underscoring the critical necessity to address their hospice needs and... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Li, Qi Liu, Gaozhan Zhang, Qianqian Han, Lidong Chen, Wei Li, Rui Xiong, Jinbo School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou225127 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China School of Computer Science and Technology Xidian University Xi'an710071 China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Xining810008 China Faculty of Software Fujian Normal University Fuzhou350108 China
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing s... 详细信息
来源: 评论
SSAST-Adapter: A Parameter-efficient Incremental Learning Algorithm for Underwater Acoustic Target Recognition
SSAST-Adapter: A Parameter-efficient Incremental Learning Al...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhu, Qian Xu, Qisheng Zhu, Boqing Gao, Zijian Zeng, Lingbin Xu, Kele College of Computer Science and Technology National University of Defense Technology Changsha China State Key Laboratory of Complex & Critical Software Environment Changsha China College of Meteorology and Oceanography National University of Defense Technology Changsha China
Underwater acoustic target recognition involves identifying and classifying targets in underwater environments using acoustic signals. In recent years, deep learning has made significant progress in this field. Howeve... 详细信息
来源: 评论
A Hybrid Vectorized Merge Sort on ARM NEON  24th
A Hybrid Vectorized Merge Sort on ARM NEON
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Zhou, Jincheng Zhang, Jin Zhang, Xiang Xiao, Tiaojie Ma, Di Gong, Chunye School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer National University of Defense Technology Hunan Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China
Sorting algorithms are the most extensively researched topics in computer science and serve for numerous practical applications. Although various sorts have been proposed for efficiency, different architectures offer ... 详细信息
来源: 评论
A difference vector angle dominance relation for expensive multi-objective optimization
收藏 引用
Swarm and Evolutionary Computation 2025年 95卷
作者: Yang, Cuicui Chen, Jing Ji, Junzhong Zhang, Xiaoyu Hao, Kangning Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology College of Computer Science Beijing University of Technology Beijing China
For the latest two years, relation classification-based surrogate assisted evolutionary algorithms show good potential for solving expensive multi-objective optimization problems (EMOPs). However, the existing studies... 详细信息
来源: 评论
Research on Microkernel Integrity Semantics Model and Formal Verification
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 43-48页
作者: Zhenjiang Qian Wei Liu Hao Huang State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Microkernel integrity is an important aspect of security for the whole microkernel system. Many of the research works on microkernel integrity focus on analysis and safeguards against the existing kernel attacks, and ... 详细信息
来源: 评论
MLPFormer: MLP-integrated transformer for colorectal histopathology whole slide image segmentation
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4651-4661页
作者: Wang, Yuxuan Li, Dan Li, Xuechen Guo, Yan Zuo, Yanfei Shen, Linlin Department of Computer Science Wenzhou-Kean University Wenzhou China School of Electronics and Information Engineering Wuyi University Jiangmen China Department of Histo Pathology Shanghai Histo Pathology Diagnostic Center Shanghai China College of Computer Sicence and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif... 详细信息
来源: 评论
Learned Video Compression With Refined Adaptive Flow Pyramid And Coordinate-Aware Attention
Learned Video Compression With Refined Adaptive Flow Pyramid...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Qian Liu, Wenting Li, Xin Wang, Yiming College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology Ministry of Water Resources Hohai University Nanjing China
In video compression, motion estimation and motion compensation are critical for achieving efficient encoding. Although the commonly used SpyNet and bilinear interpolation have contributed in improving the compression... 详细信息
来源: 评论