咨询与建议

限定检索结果

文献类型

  • 11,215 篇 会议
  • 6,162 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 17,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,079 篇 工学
    • 8,598 篇 计算机科学与技术...
    • 7,053 篇 软件工程
    • 2,411 篇 信息与通信工程
    • 1,492 篇 控制科学与工程
    • 1,237 篇 生物工程
    • 1,047 篇 电气工程
    • 776 篇 电子科学与技术(可...
    • 775 篇 机械工程
    • 732 篇 生物医学工程(可授...
    • 629 篇 光学工程
    • 424 篇 仪器科学与技术
    • 421 篇 动力工程及工程热...
    • 417 篇 安全科学与工程
    • 407 篇 化学工程与技术
    • 364 篇 交通运输工程
    • 354 篇 网络空间安全
  • 5,113 篇 理学
    • 2,897 篇 数学
    • 1,350 篇 生物学
    • 1,123 篇 物理学
    • 858 篇 统计学(可授理学、...
    • 613 篇 系统科学
    • 433 篇 化学
  • 3,452 篇 管理学
    • 2,136 篇 管理科学与工程(可...
    • 1,480 篇 图书情报与档案管...
    • 893 篇 工商管理
  • 712 篇 医学
    • 607 篇 临床医学
    • 535 篇 基础医学(可授医学...
    • 340 篇 药学(可授医学、理...
  • 535 篇 法学
    • 424 篇 社会学
  • 327 篇 经济学
    • 325 篇 应用经济学
  • 285 篇 教育学
  • 170 篇 农学
  • 56 篇 文学
  • 48 篇 军事学
  • 39 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 449 篇 software enginee...
  • 399 篇 deep learning
  • 360 篇 computational mo...
  • 344 篇 feature extracti...
  • 277 篇 training
  • 274 篇 data mining
  • 235 篇 optimization
  • 233 篇 semantics
  • 230 篇 machine learning
  • 221 篇 accuracy
  • 208 篇 predictive model...
  • 207 篇 educational inst...
  • 206 篇 internet of thin...
  • 181 篇 software
  • 180 篇 neural networks
  • 174 篇 support vector m...
  • 166 篇 computer archite...
  • 163 篇 image segmentati...
  • 162 篇 wireless sensor ...

机构

  • 478 篇 college of compu...
  • 337 篇 state key labora...
  • 269 篇 school of inform...
  • 260 篇 school of comput...
  • 222 篇 school of comput...
  • 167 篇 school of softwa...
  • 141 篇 school of comput...
  • 126 篇 school of softwa...
  • 101 篇 school of comput...
  • 96 篇 college of compu...
  • 88 篇 school of comput...
  • 75 篇 school of softwa...
  • 74 篇 department of co...
  • 74 篇 department of co...
  • 71 篇 school of comput...
  • 68 篇 school of comput...
  • 67 篇 department of co...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 65 篇 school of comput...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 33 篇 gao yang
  • 32 篇 qi lianyong
  • 31 篇 jiacun wang
  • 30 篇 wang lei
  • 30 篇 shen furao
  • 29 篇 niyato dusit
  • 29 篇 wang chao
  • 27 篇 qi liu
  • 26 篇 zhou zhi-hua
  • 26 篇 yang yang
  • 26 篇 zhao jian
  • 24 篇 jun zhang
  • 24 篇 zhang zhao
  • 23 篇 rehman attique u...
  • 23 篇 zheng zibin
  • 22 篇 zhou jie
  • 22 篇 xiang li

语言

  • 14,944 篇 英文
  • 2,353 篇 其他
  • 270 篇 中文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17526 条 记 录,以下是3861-3870 订阅
排序:
Revisit the AWGN-Goodness of Polar-Like Lattices
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Ling Yu, Junjiang Lyu, Shanxiang Bai, Baoming Guangzhou Institute of Technology Xidian University Guangzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Cyber Security Jinan University Guangzhou China
This paper aims to provide a comprehensive introduction to lattices constructed based on polar-like codes and demonstrate some of their key properties, such as AWGN-goodness. We first present polar lattices directly f...
来源: 评论
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
arXiv
收藏 引用
arXiv 2023年
作者: Yu, Chuer Zhang, Xuhong Duan, Yuxuan Yan, Senbo Wang, Zonghui Xiang, Yang Ji, Shouling Chen, Wenzhi The College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310027 China The school of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States The School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia
Despite the fact that DeepFake forgery detection algorithms have achieved impressive performance on known manipulations, they often face disastrous performance degradation when generalized to an unseen manipulation. S... 详细信息
来源: 评论
Improved Dingo Optimization Algorithm for Human-robot Collaborative U-shaped Disassembly Line Balancing Problem
Improved Dingo Optimization Algorithm for Human-robot Collab...
收藏 引用
Cyber-Physical Social Intelligence (ICCSI), International Conference on
作者: Jialong Li XiWang Guo Jiacun Wang ShuJin Qin Liang Qi Qi Kang Information and Control Engineering Liaoning Petrochemical University Fushun China Computer Science and Software Eng. Monmouth University Wes Long Branch New Jersey USA Economics and Management Shangqiu Normal University Shangqiu China Computer Science and Technology Shandong University of Science and Technology Qingdao China Electrical and Computer Engineering New Jersey Institute of Technology Newark USA
There is increasing attention on remanufacturing, with the primary focus in the industry on recovering reusable products to generate profit. In the process of optimizing remanufacturing, addressing the balance issue i... 详细信息
来源: 评论
The Early Detection of Dementia Disease Using Machine Learning Approach
The Early Detection of Dementia Disease Using Machine Learni...
收藏 引用
International Conference on computer Communication and Informatics (ICCCI)
作者: Md Shariar Kabir Jakia Khanom Md. Atik Bhuiyan Zerin Nasrin Tumpa Sk. Fazlee Rabby Saurabh Bilgaiyan Dept. of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Dept. of Software Engineering Daffodil International University Dhaka Bangladesh School of Computer Engineering Kalinga Institute of Industrial Technology Bhubaneswar India
Early dementia detection is a crucial but challenging task in Bangladesh. Often, dementia is not recognized until it is too late to receive effective care. This results in part from a lack of knowledge about the illne... 详细信息
来源: 评论
A Neurocognitive Approach to Evaluate Mobile Game Player’s Experience Using EEG
A Neurocognitive Approach to Evaluate Mobile Game Player’s ...
收藏 引用
IEEE International Conference on Multi Topic
作者: Aasim Raheel Noshaba Liaqat Mehr Dua Aun Zaidi Sadam Hussain Noorani Aamir Arsalan Department of Computer Engineering University of Engineering & Technology Taxila Pakistan NUST College of Electrical & Mechanical Engineering Islamabad Pakistan Department of Software Engineering Fatima Jinnah Women University Rawalpindi Pakistan
In recent years, the gaming industry has witnessed exponential growth, with an increasing focus on enhancing player experience and engagement. To achieve this, we propose a method that recognizes game experience trait...
来源: 评论
Fast target-aware learning for few-shot video object segmentation
收藏 引用
Science China(Information Sciences) 2022年 第8期65卷 71-86页
作者: Yadang CHEN Chuanyan HAO Zhi-Xin YANG Enhua WU Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and Technology School of Education Science and Technology Nanjing University of Posts and Telecommunications State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of Macau State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of Sciences Faculty of Science and Technology University of Macau
Few-shot video object segmentation(FSVOS) aims to segment a specific object throughout a video sequence when only the first-frame annotation is given. In this study, we develop a fast target-aware learning approach fo... 详细信息
来源: 评论
Adaptive Control for a Second-order Chaotic System with Unknown Nonsymmetric Actuator Dead-Zone
Adaptive Control for a Second-order Chaotic System with Unkn...
收藏 引用
World Conference on Mechanical engineering and Intelligent Manufacturing (WCMEIM)
作者: Xintong Tian Zhao Zhang Shuqi Niu Xueyan Zhao School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China
In this paper, an adaptive controller design method is proposed for chaotic systems with unknown actuator dead-zone. First, the terminal sliding mode (TSM) manifold is proposed to ensure exponential stability as well ... 详细信息
来源: 评论
PAFT: Prompt-Agnostic Fine-Tuning
arXiv
收藏 引用
arXiv 2025年
作者: Wei, Chenxing Shu, Yao Ou, Mingwen He, Ying Tiffany Yu, Fei Richard College of Computer Science and Software Engineering Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University China China School of Information Technology Carleton University Canada
While Large Language Models (LLMs) adapt well to downstream tasks after fine-tuning, this adaptability often compromises prompt robustness, as even minor prompt variations can significantly degrade performance. To add...
来源: 评论
Binary Equilibrium Optimizer Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第1期7卷 45-58页
作者: Hu, Pei Chu, Shu-Chuan Snášel, Václav Pan, Jeng-Shyang College of Computer Science and Engineering Shandong University of Science and Technology No.579 Qianwan’gang Road Shandong Qingdao266590 China School of Computer and Software Nanyang Institute of Technology No.80 Changjiang Road Henan Nanyang473004 China College of Science and Engineering Flinders University Sturt Rd Bedford ParkSA5042 Australia Department of Computer Science VŠB—Technical University of Ostrava 17. listopadu 2172/15 Poruba Ostrava708 00 Czech Republic Department of Information Management Chaoyang University of Technology No.168 Jifeng E. Rd. Wufeng District Taichung413310 Taiwan
Equilibrium optimizer (EO) is a new proposed meta-heuristic algorithm by utilizing the mass balance model of the control volume. In order to solve the binary appli-cations, this paper proposes a binary version of equi... 详细信息
来源: 评论
EAKM: Efficient Conditional Privacy-Preserving Authentication Scheme with On-Chain Key Management in VANETs
EAKM: Efficient Conditional Privacy-Preserving Authenticatio...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Shunrong Jiang Guohuai Sang Xuedan Jia Fengjiao Li Haotian Chi The Department of Computer Science China University of Mining and Technology Xuzhou China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer and Information Technology Shanxi University Taiyuan China School of Automation and Software Engineering Shanxi University Taiyuan China
Conditional privacy-preserving authentication can provide anonymity and traceability to Vehicular Ad-Hoc Networks (VANETs), which protects users' privacy while resisting malicious users and false messages. However...
来源: 评论