咨询与建议

限定检索结果

文献类型

  • 28,399 篇 会议
  • 11,489 篇 期刊文献
  • 346 册 图书

馆藏范围

  • 40,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,611 篇 工学
    • 19,312 篇 计算机科学与技术...
    • 16,056 篇 软件工程
    • 5,038 篇 信息与通信工程
    • 3,133 篇 控制科学与工程
    • 2,580 篇 生物工程
    • 2,081 篇 电气工程
    • 1,633 篇 机械工程
    • 1,610 篇 电子科学与技术(可...
    • 1,596 篇 生物医学工程(可授...
    • 1,298 篇 光学工程
    • 894 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 798 篇 动力工程及工程热...
    • 710 篇 建筑学
    • 700 篇 交通运输工程
  • 10,991 篇 理学
    • 6,407 篇 数学
    • 2,821 篇 生物学
    • 2,156 篇 物理学
    • 1,844 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 849 篇 化学
  • 7,311 篇 管理学
    • 4,405 篇 管理科学与工程(可...
    • 3,235 篇 图书情报与档案管...
    • 2,029 篇 工商管理
  • 1,392 篇 医学
    • 1,220 篇 临床医学
    • 1,110 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,124 篇 法学
    • 886 篇 社会学
  • 699 篇 教育学
  • 698 篇 经济学
    • 696 篇 应用经济学
  • 380 篇 农学
  • 150 篇 文学
  • 104 篇 军事学
  • 76 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,818 篇 software enginee...
  • 1,653 篇 computer science
  • 877 篇 computational mo...
  • 865 篇 feature extracti...
  • 811 篇 training
  • 707 篇 software
  • 671 篇 semantics
  • 653 篇 deep learning
  • 638 篇 accuracy
  • 562 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 432 篇 computer archite...
  • 421 篇 predictive model...
  • 383 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 368 篇 optimization
  • 368 篇 data models
  • 338 篇 support vector m...

机构

  • 1,260 篇 college of compu...
  • 358 篇 school of comput...
  • 303 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 159 篇 school of softwa...
  • 156 篇 college of compu...
  • 149 篇 state key labora...
  • 140 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of comput...
  • 123 篇 school of softwa...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 101 篇 school of softwa...

作者

  • 69 篇 ruimin hu
  • 61 篇 liu yang
  • 55 篇 baowen xu
  • 52 篇 chen zhong
  • 48 篇 hu ruimin
  • 47 篇 wang ping
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,054 篇 英文
  • 1,681 篇 其他
  • 518 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Computer and Software Engineering"
40234 条 记 录,以下是601-610 订阅
排序:
Boosting Write Performance of KV Stores: An NVM -Enabled Storage Collaboration Approach  40
Boosting Write Performance of KV Stores: An NVM -Enabled Sto...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi He, Jiajian Sun, Kaoyi Dong, Yunhao Chen, Jiaxian Ma, Chenlin Zhou, Amelie Chi Mao, Rui College of Computer Science and Software Engineering Shenzhen University China Hong Kong Baptist University Department of Computer Science Hong Kong
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr... 详细信息
来源: 评论
Spam detection with fasttext based features
Spam detection with fasttext based features
收藏 引用
2024 Innovations in Intelligent Systems and Applications Conference, ASYU 2024
作者: Karadeniz, Talha Tokdemir, Gül Maraş, H. Hakan Department of Software Engineering Çankaya University Ankara Turkey Department of Computer Engineering Çankaya University Ankara Turkey Department of Computer Programming Çankaya University Ankara Turkey
Fasttext is a powerful word representation method that creates word representations based on vectors of character n-grams. In this work, we propose a method that utilizes fasttext features for a novel feature engineer... 详细信息
来源: 评论
Secure Batch Deduplication without Dual Servers in Backup System
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-13页
作者: Zheng, Haoyu Zeng, Shengke Li, Hongwei Li, Zhijun Xihua College Xihua University Chengdu China school of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China MIG Group Cisco Systems Canada Co. Ottawa ON Canada
Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a hot and challenging ... 详细信息
来源: 评论
LeaderKV: Improving Read Performance of KV Stores via Learned Index and Decoupled KV Table  40
LeaderKV: Improving Read Performance of KV Stores via Learne...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi Yuan, Jianan Wu, Shangyu Liu, Huan Chen, Jiaxian Ma, Chenlin Qin, Jianbin Shenzhen University College of Computer Science and Software Engineering China City University of Hong Kong Department of Computer Science Hong Kong
Log-structured merge-tree (LSM-tree) is a storage architecture widely used in key-value (KV) stores. To enhance the read efficiency of LSM-tree, recent works utilize the learned index to learn the mapping between keys... 详细信息
来源: 评论
Traffic sign detection algorithm based on improved YOLOv5  4
Traffic sign detection algorithm based on improved YOLOv5
收藏 引用
4th International Conference on computer Vision and Pattern Analysis, ICCPA 2024
作者: Ma, Chi Li, Qinrong Hu, Hui Li, Jingyan Guo, Qiang School of Computer Science and Engineering Huizhou University Huizhou516007 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces an enhanced YOLOv5 algorithm tailored for real-world traffic sign detection applications. Through the incorporation of Coordinate Attention after the SPPF module of the YOLOv5 backbone, the YOLOv... 详细信息
来源: 评论
Robust Vision Transformer Model Against Adversarial Attacks in Medical Image Classification  47
Robust Vision Transformer Model Against Adversarial Attacks ...
收藏 引用
47th International Conference on Telecommunications and Signal Processing, TSP 2024
作者: Kanca, Elif Gulsoy, Tolgahan Avas, Selen Kablan, Elif Baykal Karadeniz Technical University Department of Software Engineering Trabzon Turkey Karadeniz Technical University Department of Computer Engineering Trabzon Turkey
Recent advancements in deep learning have signif-icantly enhanced the rapid and precise classification of medical images. Vision transformers, an advanced model, have started replacing CNN s in several medical image t... 详细信息
来源: 评论
OCRBench: on the hidden mystery of OCR in large multimodal models
收藏 引用
Science China(Information Sciences) 2024年 第12期67卷 23-35页
作者: Yuliang LIU Zhang LI Mingxin HUANG Biao YANG Wenwen YU Chunyuan LI Xu-Cheng YIN Cheng-Lin LIU Lianwen JIN Xiang BAI School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Electronic and Information Engineering South China University of Technology Microsoft Research School of Computer & Communication Engineering University of Science and Technology Beijing Institute of Automation Chinese Academy of Sciences School of Software Engineering Huazhong University of Science and Technology
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In thi... 详细信息
来源: 评论
Multimodal Classifier for Disaster Response  2nd
Multimodal Classifier for Disaster Response
收藏 引用
2nd International Conference on Advanced engineering, Technology and Applications, ICAETA 2023
作者: Alqaraleh, Saed Sirin, Hatice Computer Engineering Department Hasan Kalyoncu University Gaziantep Turkey Software Engineering Department Hasan Kalyoncu University Gaziantep Turkey
Data obtained from social media has a massive effect on making correct decisions in time-critical situations and natural disasters. Social media content generally consists of messages, images, and videos. In situation... 详细信息
来源: 评论
Efficient Defense Against Model Stealing Attacks on Convolutional Neural Networks  22
Efficient Defense Against Model Stealing Attacks on Convolut...
收藏 引用
22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023
作者: Khaled, Kacem Dhaouadi, Mouna De Magalhaes, Felipe Gohring Nicolescu, Gabriela Polytechnique Department of Computer Engineering and Software Engineering Montreal Canada University of Montreal Department of Computer Science and Operations Research Canada
Model stealing attacks have become a serious concern for deep learning models, where an attacker can steal a trained model by querying its black-box API. This can lead to intellectual property theft and other security... 详细信息
来源: 评论
Feature Selection Using Automatic Programming Methods in Hypertension Risk Prediction  8
Feature Selection Using Automatic Programming Methods in Hyp...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Yagmurcu, Merve Arslan, Sibel Sivas Cumhuriyet University Computer Engineering Department Sivas Turkey Sivas Cumhuriyet University Software Engineering Department Sivas Turkey
Hypertension is a condition where the pressure in the blood vessels is higher than normal. It can lead to serious problems such as heart attack, stroke, heart failure, kidney disease and vision problems. Therefore, ea... 详细信息
来源: 评论