咨询与建议

限定检索结果

文献类型

  • 11,153 篇 会议
  • 6,079 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 17,381 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,939 篇 工学
    • 8,479 篇 计算机科学与技术...
    • 6,991 篇 软件工程
    • 2,338 篇 信息与通信工程
    • 1,417 篇 控制科学与工程
    • 1,229 篇 生物工程
    • 972 篇 电气工程
    • 765 篇 机械工程
    • 754 篇 电子科学与技术(可...
    • 722 篇 生物医学工程(可授...
    • 625 篇 光学工程
    • 413 篇 仪器科学与技术
    • 408 篇 动力工程及工程热...
    • 403 篇 化学工程与技术
    • 398 篇 安全科学与工程
    • 345 篇 交通运输工程
    • 323 篇 网络空间安全
  • 5,059 篇 理学
    • 2,878 篇 数学
    • 1,347 篇 生物学
    • 1,104 篇 物理学
    • 857 篇 统计学(可授理学、...
    • 611 篇 系统科学
    • 420 篇 化学
  • 3,390 篇 管理学
    • 2,093 篇 管理科学与工程(可...
    • 1,451 篇 图书情报与档案管...
    • 887 篇 工商管理
  • 690 篇 医学
    • 599 篇 临床医学
    • 534 篇 基础医学(可授医学...
    • 339 篇 药学(可授医学、理...
  • 525 篇 法学
    • 415 篇 社会学
  • 321 篇 经济学
    • 321 篇 应用经济学
  • 281 篇 教育学
  • 170 篇 农学
  • 52 篇 文学
  • 48 篇 军事学
  • 39 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 445 篇 software enginee...
  • 390 篇 deep learning
  • 362 篇 computational mo...
  • 348 篇 feature extracti...
  • 275 篇 data mining
  • 263 篇 training
  • 237 篇 semantics
  • 236 篇 machine learning
  • 235 篇 optimization
  • 219 篇 accuracy
  • 209 篇 predictive model...
  • 208 篇 educational inst...
  • 205 篇 internet of thin...
  • 180 篇 software
  • 176 篇 neural networks
  • 174 篇 support vector m...
  • 169 篇 wireless sensor ...
  • 163 篇 computer archite...
  • 161 篇 image segmentati...

机构

  • 472 篇 college of compu...
  • 332 篇 state key labora...
  • 270 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 165 篇 school of softwa...
  • 142 篇 school of comput...
  • 130 篇 school of softwa...
  • 101 篇 school of comput...
  • 92 篇 college of compu...
  • 89 篇 school of comput...
  • 75 篇 department of co...
  • 75 篇 school of comput...
  • 73 篇 department of co...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 69 篇 department of co...
  • 69 篇 school of inform...
  • 66 篇 school of softwa...
  • 65 篇 school of softwa...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 30 篇 wang lei
  • 30 篇 jiacun wang
  • 30 篇 qi lianyong
  • 29 篇 niyato dusit
  • 29 篇 shen furao
  • 29 篇 wang chao
  • 27 篇 qi liu
  • 26 篇 zhou zhi-hua
  • 25 篇 yang yang
  • 25 篇 zhang zhao
  • 25 篇 zheng zibin
  • 25 篇 tao dacheng
  • 24 篇 jun zhang
  • 23 篇 rehman attique u...
  • 23 篇 zhao jian
  • 23 篇 wang wei

语言

  • 15,378 篇 英文
  • 1,779 篇 其他
  • 262 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17381 条 记 录,以下是4131-4140 订阅
排序:
Intent Classification of Nepali Factoid Questions
Intent Classification of Nepali Factoid Questions
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Sushil Timilsina Ashim Khadka Jianchu Lin Faculty of Science and Technology Gandaki College of Engineering and Science Pokhara Nepal Faculty of Science and Technology Nepal College of Information Technology Lalitpur Nepal Faculty of Computer and Software Engineer Huaiyin Institute of Technology Jiangsu China
Question Classification plays a vital role in identifying the accurate answer to any question, and is considered as a core component of Question Answering Systems. In Nepali Natural Language Processing, the area of Qu...
来源: 评论
XRF V2: A Dataset for Action Summarization with Wi-Fi Signals, and IMUs in Phones, Watches, Earbuds, and Glasses
arXiv
收藏 引用
arXiv 2025年
作者: Lan, Bo Li, Pei Yin, Jiaxi Song, Yunpeng Wang, Ge Ding, Han Han, Jinsong Wang, Fei School of Software Engineering Xi’an Jiaotong University Shaanxi Xi’an China MOE KLINNS Lab Xi’an Jiaotong University Shaanxi Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an China College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou China
Human Action Recognition (HAR) plays a crucial role in applications such as health monitoring, smart home automation, and human-computer interaction. While HAR has been extensively studied, action summarization, which... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论
Fast Second-order Method for Neural Networks under Small Treewidth Setting
Fast Second-order Method for Neural Networks under Small Tre...
收藏 引用
IEEE International Conference on Big Data
作者: Xiaoyu Li Jiangxuan Long Zhao Song Tianyi Zhou Department of Computer Science Stevens Institute of Technology Hoboken NJ School of Software Engineering South China University of Technology Guangzhou China The Simons Institute for the Theory of Computing University of California Berkeley Berkeley CA Department of Computer Science University of Southern California Los Angeles CA
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order... 详细信息
来源: 评论
Bilevel Progressive Homography Estimation Via Correlative Region-Focused Transformer
SSRN
收藏 引用
SSRN 2023年
作者: Jia, Qi Zhang, Wei Feng, Xiaomei Liu, Yu Pu, Nan Sebe, Nicu DUT School of Software Technology DUT-RU International School of Information Science and Engineering Dalian University of Technology Dalian116620 China Department of Information Engineering and Computer Science University of Trento Trento38122 Italy
We propose a novel correlative region-focused transformer for accurate homography estimation by a bilevel progressive architecture. Existing methods typically consider the entire image features to establish correlatio... 详细信息
来源: 评论
Intelligent Phishing Url Detection: A Solution Based on Deep Learning Framework  18
Intelligent Phishing Url Detection: A Solution Based on Deep...
收藏 引用
18th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2021
作者: Butt, Muhammad Hassaan Farooq Li, Jian Ping Saboor, Tehreem Arslan, Muhammad Butt, Muhammad Adnan Farooq University of Electronic Science and Technology of China School of Computer Science and Engineering China Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Pakistan COMSATS University Islamabad Pakistan Foundation University Department of Software Engineering Pakistan
On the Internet, every different day, kinds of attacks are deployed on innocent users. Among all, phishing is the most severe attack in which users lose their credentials or private information and their financial sta... 详细信息
来源: 评论
Categorical Data Clustering via Value Order Estimated Distance Metric Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yiqun Zhao, Mingjie Jia, Hong Lu, Yang Li, Mengke Cheung, Yiu-Ming School of Computer Science and Technology Guangdong University of Technology Guangzhou China College of Electronics and Information Engineering Shenzhen University Shenzhen China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University China School of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University Hong Kong
Categorical data composed of qualitative valued attributes are ubiquitous in machine learning tasks. Due to the lack of well-defined metric space, categorical data distributions are difficult to be intuitively underst... 详细信息
来源: 评论
Robustness Assessment of Hyperspectral Image Cnns Using Metamorphic Testing
SSRN
收藏 引用
SSRN 2022年
作者: Bouchoucha, Rached Ben Braiek, Houssem Khomh, Foutse Bouzidi, Sonia Zaatour, Rania Department of Computer Engineering and Software Engineering Polytechnique MontrealQCH3T 1J4 Canada Department of Computer Engineering and Software Engineering National Institute of Applied Science and Technology Tunis1080 Tunisia
Remote sensing has proven its utility in many critical domains, such as medicine, military, and ecology. Recently, we have been witnessing a surge in the adoption of deep learning (DL) techniques by the remote sensing... 详细信息
来源: 评论
WoKnack-A Professional Social Media Platform for Women Using Machine Learning Approach  3
WoKnack-A Professional Social Media Platform for Women Using...
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Shanmugarajah, Sutharshan Praisoody, Ashvini Uddin, Md Rakib Paskkaran, Vinojan De Silva, Hansi Tharmaseelan, Janani Thilakarathna, Thusithanjana Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Systems Engineering Malabe Sri Lanka
Today's generation is heavily influenced by social media. However, most users decline to post their abilities on these platforms for a variety of reasons, including security, a lack of basic skills, and a lack of ... 详细信息
来源: 评论
Relay Assisted Covert Communications in Underlay Cognitive Radio Networks
Relay Assisted Covert Communications in Underlay Cognitive R...
收藏 引用
Ubiquitous Communication (Ucom), International Conference on
作者: Hongbin Fan Weiwei Yang Wenqiang Feng Chuanzhen Rong College of Communications Engineering PLA Army Engineering University Nanjing China College of Computer and Artificial Intelligence Xiangnan University Chenzhou China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Cognitive radio can meet the increasing demand for wireless spectrum in 5G and B5G, and relay can relay-assisted covert communications in underlay cognitive radio networks (UCRN) to reaching distant destinations. Ther... 详细信息
来源: 评论