咨询与建议

限定检索结果

文献类型

  • 10,990 篇 会议
  • 6,051 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,849 篇 工学
    • 8,417 篇 计算机科学与技术...
    • 6,977 篇 软件工程
    • 2,331 篇 信息与通信工程
    • 1,391 篇 控制科学与工程
    • 1,226 篇 生物工程
    • 978 篇 电气工程
    • 763 篇 机械工程
    • 748 篇 电子科学与技术(可...
    • 719 篇 生物医学工程(可授...
    • 616 篇 光学工程
    • 411 篇 仪器科学与技术
    • 407 篇 动力工程及工程热...
    • 402 篇 化学工程与技术
    • 396 篇 安全科学与工程
    • 340 篇 交通运输工程
    • 315 篇 网络空间安全
  • 5,056 篇 理学
    • 2,881 篇 数学
    • 1,344 篇 生物学
    • 1,099 篇 物理学
    • 856 篇 统计学(可授理学、...
    • 610 篇 系统科学
    • 418 篇 化学
  • 3,377 篇 管理学
    • 2,090 篇 管理科学与工程(可...
    • 1,441 篇 图书情报与档案管...
    • 883 篇 工商管理
  • 688 篇 医学
    • 596 篇 临床医学
    • 531 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 523 篇 法学
    • 412 篇 社会学
  • 320 篇 经济学
    • 319 篇 应用经济学
  • 279 篇 教育学
  • 171 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 472 篇 computer science
  • 435 篇 software enginee...
  • 379 篇 deep learning
  • 356 篇 computational mo...
  • 329 篇 feature extracti...
  • 269 篇 data mining
  • 267 篇 training
  • 234 篇 semantics
  • 231 篇 optimization
  • 226 篇 machine learning
  • 212 篇 educational inst...
  • 204 篇 internet of thin...
  • 198 篇 predictive model...
  • 197 篇 accuracy
  • 174 篇 software
  • 171 篇 support vector m...
  • 171 篇 neural networks
  • 170 篇 wireless sensor ...
  • 162 篇 computer archite...
  • 158 篇 image segmentati...

机构

  • 447 篇 college of compu...
  • 342 篇 state key labora...
  • 261 篇 school of comput...
  • 257 篇 school of inform...
  • 219 篇 school of comput...
  • 163 篇 school of softwa...
  • 138 篇 school of comput...
  • 128 篇 school of softwa...
  • 100 篇 school of comput...
  • 98 篇 college of compu...
  • 92 篇 school of comput...
  • 73 篇 department of co...
  • 72 篇 department of co...
  • 72 篇 school of comput...
  • 68 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of softwa...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 63 篇 school of comput...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 31 篇 jiacun wang
  • 30 篇 wang chao
  • 30 篇 qi lianyong
  • 29 篇 niyato dusit
  • 29 篇 wang lei
  • 29 篇 shen furao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zhao jian
  • 25 篇 yang yang
  • 24 篇 jun zhang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 22 篇 xiang li
  • 22 篇 tao dacheng
  • 21 篇 zhi-hui wang

语言

  • 16,334 篇 英文
  • 608 篇 其他
  • 265 篇 中文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17189 条 记 录,以下是221-230 订阅
排序:
Adventures in data analysis: a systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems
收藏 引用
Multimedia Tools and Applications 2024年 第8期83卷 22909-22973页
作者: Amiri, Zahra Heidari, Arash Navimipour, Nima Jafari Unal, Mehmet Mousavi, Ali Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Software Engineering Haliç University Istanbul34060 Turkey Department of Computer Engineering Kadir Has Universitesi Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou64002 Taiwan Department of Computer Engineering Nisantasi Universitesi Istanbul Turkey Islamic Azad University Sanandaj Branch Sanandaj Iran
Machine Learning (ML) and Deep Learning (DL) have achieved high success in many textual, auditory, medical imaging, and visual recognition patterns. Concerning the importance of ML/DL in recognizing patterns due to it... 详细信息
来源: 评论
Improve Robustness of Safe Reinforcement Learning Against Adversarial Attacks  4
Improve Robustness of Safe Reinforcement Learning Against Ad...
收藏 引用
4th International Conference on Electronic Information engineering and computer Science, EIECS 2024
作者: Wang, Xiaoyan Zhang, Yujuan Huang, Lan College of Computer Science and Technology Jilin University Changchun China Jilin University Software Engineering Changchun China
Models trained with adversarial attack can be significantly improved stability and performance when faced with new uncertain environment. In this paper, we propose the robust training framework based on Wasserstein SA... 详细信息
来源: 评论
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks  25
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resil...
收藏 引用
25th IEEE Latin American Test Symposium, LATS 2024
作者: Aksoy, Levent Yasin, Muhammad Pagliarini, Samuel National University Of Sciences And Technology Department Of Computer And Software Engineering Islamabad Pakistan Tallinn University Of Technology Department Of Computer Systems Tallinn Estonia Carnegie Mellon University Department Of Electrical And Computer Engineering Pittsburgh United States
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken. The state-of... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
AI-Driven Innovations: Transforming Data Support and Environmental Management for the Future
AI-Driven Innovations: Transforming Data Support and Environ...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Mahfuri, Mahmoud Ibrahim, Amer International University for Science and Technology Computer and Information Technology Department Syria United Arab Emirates University Department of Computer Science and Software Engineering United Arab Emirates
This paper presents the evolving role of artificial intelligence (AI) in improving internal control and management processes. AI-driven technologies, including Generative Adversarial Networks (GANs) and ontologies, in... 详细信息
来源: 评论
FCA-based θ-iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Computer Science and Engineering Soonchunhyang University Asan31538 Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos... 详细信息
来源: 评论
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2287-2308页
作者: Shiyan Zhang Ruohan Xu Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China College of Computer Science and Technology Tianjin UniversityTianjin300072China Institute of Artificial Intelligence Nankai UniversityTianjin300071China College of Information Science and Engineering East China University of Science and TechnologyShanghai200237China
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... 详细信息
来源: 评论
Traffic sign detection algorithm based on improved YOLOv5  4
Traffic sign detection algorithm based on improved YOLOv5
收藏 引用
4th International Conference on computer Vision and Pattern Analysis, ICCPA 2024
作者: Ma, Chi Li, Qinrong Hu, Hui Li, Jingyan Guo, Qiang School of Computer Science and Engineering Huizhou University Huizhou516007 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces an enhanced YOLOv5 algorithm tailored for real-world traffic sign detection applications. Through the incorporation of Coordinate Attention after the SPPF module of the YOLOv5 backbone, the YOLOv... 详细信息
来源: 评论
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Video Editing  24
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Vid...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Luo, Yan Zuo, Zhichao Zhang, Zhao Zhao, Zhongqiu Zhang, Haijun Hong, Richang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China School of Computer Science Harbin Institute of Technology Shenzhen China
Text-guided image generative diffusion models achieve fast development on the generation and editing of high-quality images. To extend such success to video editing, some efforts combining image generation with video ... 详细信息
来源: 评论
An attention-based channel estimation network with residual mechanism for 5G OFDM systems  4
An attention-based channel estimation network with residual ...
收藏 引用
4th International Conference on Electronic Communication, computer Science and technology, ECCST 2024
作者: Jiang, Jinjing Huang, Weipeng Zhang, Xiao Yang, Kun Peng, Tong School of Information Engineering Zhejiang Ocean University China School of Computer Science and Software Engineering Shenzhen Institute of Information Technology China
Due to the significant increase in data transmission speed and gradual increase in Doppler frequency shift, channel estimation accuracy has become one of the most prioritized considerations in many cases. Specifically... 详细信息
来源: 评论