咨询与建议

限定检索结果

文献类型

  • 3,368 篇 会议
  • 2,007 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,320 篇 工学
    • 2,302 篇 计算机科学与技术...
    • 1,853 篇 软件工程
    • 720 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 342 篇 电子科学与技术(可...
    • 329 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 210 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 198 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 123 篇 交通运输工程
    • 103 篇 安全科学与工程
    • 99 篇 材料科学与工程(可...
    • 94 篇 建筑学
  • 1,766 篇 理学
    • 906 篇 数学
    • 503 篇 物理学
    • 355 篇 生物学
    • 291 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 170 篇 化学
  • 935 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 407 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 221 篇 医学
    • 186 篇 临床医学
    • 146 篇 基础医学(可授医学...
  • 148 篇 法学
    • 121 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 教育学
  • 63 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 145 篇 feature extracti...
  • 134 篇 deep learning
  • 121 篇 accuracy
  • 99 篇 computational mo...
  • 91 篇 semantics
  • 90 篇 training
  • 88 篇 computer science
  • 81 篇 optimization
  • 79 篇 data mining
  • 78 篇 machine learning
  • 63 篇 predictive model...
  • 57 篇 internet of thin...
  • 54 篇 data models
  • 53 篇 support vector m...
  • 52 篇 neural networks
  • 52 篇 security
  • 51 篇 information syst...
  • 50 篇 artificial intel...
  • 50 篇 testing
  • 49 篇 visualization

机构

  • 183 篇 hubei province k...
  • 138 篇 school of comput...
  • 107 篇 college of compu...
  • 100 篇 department of co...
  • 59 篇 hubei province k...
  • 58 篇 college of infor...
  • 56 篇 shandong provinc...
  • 55 篇 school of softwa...
  • 48 篇 national enginee...
  • 47 篇 national key lab...
  • 44 篇 tsinghua nationa...
  • 44 篇 school of comput...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 university of ch...
  • 31 篇 college of infor...
  • 26 篇 key laboratory f...
  • 25 篇 college of compu...

作者

  • 29 篇 ren jiadong
  • 27 篇 shen linlin
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 19 篇 li peng
  • 19 篇 liu jun
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 matsuo tokuro
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 hai jin
  • 15 篇 liu zhe
  • 15 篇 wei hu

语言

  • 4,790 篇 英文
  • 481 篇 其他
  • 129 篇 中文
  • 6 篇 日文
  • 4 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Computer System and Information Technology"
5395 条 记 录,以下是851-860 订阅
排序:
Object Relations Focused Siamese Network for Remote Sensing Image Change Detection  16th
Object Relations Focused Siamese Network for Remote Sensing ...
收藏 引用
16th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2021
作者: Wang, Jie-pei Tang, Lei-yu Fan, Jian-cong Liu, Guo-qiang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China College of Mathematics and System Science Shandong University of Science and Technology Qingdao China Provincial Key Lab for Information Technology of Wisdom Mining of Shandong Province Shandong University of Science and Technology Qingdao China
In recent years, deep learning methods, especially convolutional neural networks (CNNs), have shown powerful discriminative ability in the field of remote sensing change detection. However, the multi-temporal remote s... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense Networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
Power Control and Interference Pricing Strategies for Heterogeneous Networks With Renewable Energy Sources
Power Control and Interference Pricing Strategies for Hetero...
收藏 引用
作者: Zhou, Chengcheng Xu, Haitao Tang, Runze Lin, Ruijie Guo, Chao Han, Zhu University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China Beijing Institute of Electronic System Engineering Beijing China China Academy of Information and Communications Technology Beijing China Beijing Electronics Science and Technology Institute Department of Electronic and Communication Engineering Beijing China University of Houston HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
In this article, the power control and interference pricing problems between the macro base station (MBS) and small cell base stations (SBSs) in Heterogeneous networks (HetNets) are investigated. To optimally allocate... 详细信息
来源: 评论
Convolutions of String Data Structures: A Case Study of Finding Number of Palindrome Substrings in a String  5
Convolutions of String Data Structures: A Case Study of Find...
收藏 引用
5th International Conference on Advancement in Data Science, E-Learning and information systems, ICADEIS 2023
作者: Kumar, Kamal Jain, Anuj Kumar Tiwari, Raj Gaurang Jain, Nitin Witarsyah, Deden Misra, Alok National Institute of Technology Uttarakhand Dept. of Computer Science and Engineering Uttarakhand Srinagar India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Manav Rachna International Institute of Research and Studies Career Development Centre Haryana Faridabad India Telkom University Information System Departement Bandung Indonesia
In computer science, substring search or string Matching is a vulnerable problem when text resources are very large. Productivity of diverse scraping applications depend on the effectiveness of searching algorithms. P... 详细信息
来源: 评论
Taxonomy of Multi-Agent systems Attacks and their Defense Tactics in Certifying Security of Cyber Physical systems
Taxonomy of Multi-Agent Systems Attacks and their Defense Ta...
收藏 引用
Advances in Computation, Communication and information technology (ICAICCIT), International Conference on
作者: Garima Jain N. R Solomon Jebaraj Department of Computer Science & Business System Noida Institute Of Engineering and Technology Greater Noida Uttar Pradesh India Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India
The utilization of multi-agent systems has been increasingly prevalent across various sectors, owing to their notable efficacy in execution. However, a multitude of hazards exist that possess the capability to undermi...
来源: 评论
Facial Expression Recognition Using Reversible Neural Network
SSRN
收藏 引用
SSRN 2023年
作者: Barman, Asit Dutta, Paramartha Dept. of Computer Science & Engineering and Information Technology Siliguri Institute of Technology Darjeeling734009 India Dept. of Computer & System Sciences Visva-Bharati University Santiniketan731235 India
When identifying facial expressions using a set of salient features, reversible neural network plays a crucial role. In order to create a prominent feature set, these salient features are extracted from a face image u... 详细信息
来源: 评论
Handwritten Digit Classification based on Ensemble Majority Voting Classifier
Handwritten Digit Classification based on Ensemble Majority ...
收藏 引用
International Conference on systems and Control (ICSC)
作者: Mariam Alsharif Amina Abdo Kenz A Bozed Faculty of Information Technology University of Benghazi Benghazi Libya Departemnt of Artificial Intelligence Collage of Computer Technology-Benghazi Benghazi Libya Department of Computer System Design University of Benghazi Benghazi Libya
Handwritten digit recognition is a significant challenge in the field of machine learning, particularly for pattern recognition and computer vision applications. It has found applications in various areas, such as ide...
来源: 评论
CorcPUM: Efficient Processing Using Cross-Point Memory via Cooperative Row-Column Access Pipelining and Adaptive Timing Optimization in Subarrays  23
CorcPUM: Efficient Processing Using Cross-Point Memory via C...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Chengning Wang Dan Feng Wei Tong Jingning Liu Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China (School of Computer Science and Technology Huazhong University of Science and Technology) Wuhan China
Emerging cross-point memory can in-situ perform vector-matrix multiplication (VMM) for energy-efficient scientific computation. However, parasitic-capacitance-induced row charging and discharging latency is a major pe...
来源: 评论
DRCTL: A Disorder-Resistant Computation Translation Layer Enhancing the Lifetime and Performance of Memristive CIM Architecture
DRCTL: A Disorder-Resistant Computation Translation Layer En...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Heng Zhou Bing Wu Huan Cheng Jinpeng Liu Taoming Lei Dan Feng Wei Tong Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology School of Computer Science and Technology Huazhong University of Science and Technology Ministry of Education of China
The memristive Computing-in-Memory (CIM) sys-tem can efficiently accelerate matrix-vector multiplication (MVM) operations through in-situ computing. The data layout has a significant impact on the communication perfor... 详细信息
来源: 评论