咨询与建议

限定检索结果

文献类型

  • 28,399 篇 会议
  • 11,489 篇 期刊文献
  • 346 册 图书

馆藏范围

  • 40,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,611 篇 工学
    • 19,312 篇 计算机科学与技术...
    • 16,056 篇 软件工程
    • 5,038 篇 信息与通信工程
    • 3,133 篇 控制科学与工程
    • 2,580 篇 生物工程
    • 2,081 篇 电气工程
    • 1,633 篇 机械工程
    • 1,610 篇 电子科学与技术(可...
    • 1,596 篇 生物医学工程(可授...
    • 1,298 篇 光学工程
    • 894 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 798 篇 动力工程及工程热...
    • 710 篇 建筑学
    • 700 篇 交通运输工程
  • 10,991 篇 理学
    • 6,407 篇 数学
    • 2,821 篇 生物学
    • 2,156 篇 物理学
    • 1,844 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 849 篇 化学
  • 7,311 篇 管理学
    • 4,405 篇 管理科学与工程(可...
    • 3,235 篇 图书情报与档案管...
    • 2,029 篇 工商管理
  • 1,392 篇 医学
    • 1,220 篇 临床医学
    • 1,110 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,124 篇 法学
    • 886 篇 社会学
  • 699 篇 教育学
  • 698 篇 经济学
    • 696 篇 应用经济学
  • 380 篇 农学
  • 150 篇 文学
  • 104 篇 军事学
  • 76 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,818 篇 software enginee...
  • 1,653 篇 computer science
  • 877 篇 computational mo...
  • 865 篇 feature extracti...
  • 811 篇 training
  • 707 篇 software
  • 671 篇 semantics
  • 653 篇 deep learning
  • 638 篇 accuracy
  • 562 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 432 篇 computer archite...
  • 421 篇 predictive model...
  • 383 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 368 篇 optimization
  • 368 篇 data models
  • 338 篇 support vector m...

机构

  • 1,260 篇 college of compu...
  • 358 篇 school of comput...
  • 303 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 159 篇 school of softwa...
  • 156 篇 college of compu...
  • 149 篇 state key labora...
  • 140 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of comput...
  • 123 篇 school of softwa...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 101 篇 school of softwa...

作者

  • 69 篇 ruimin hu
  • 61 篇 liu yang
  • 55 篇 baowen xu
  • 52 篇 chen zhong
  • 48 篇 hu ruimin
  • 47 篇 wang ping
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,054 篇 英文
  • 1,681 篇 其他
  • 518 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Computer and Software Engineering"
40234 条 记 录,以下是911-920 订阅
排序:
A New End-to-End Image Contrastive Clustering Based on Mining Latent Positive Samples  7
A New End-to-End Image Contrastive Clustering Based on Minin...
收藏 引用
7th International Conference on Machine Learning and Natural Language Processing, MLNLP 2024
作者: Feng, Bo Yan, Xi Yan, Li Luo, Bing Pei, Zheng School of Science Xihua University Chengdu China School of Computer Science and Software Engineering Xihua University Chengdu China
The integration of the contrastive learning paradigm into deep clustering has led to enhanced performance in image clustering. However, in existing researches, the samples in the class of the target may be still treat... 详细信息
来源: 评论
Optimization of Heliostat Field Arrangement Model Based on Geometric Relationship and Particle Swarm Algorithm  4
Optimization of Heliostat Field Arrangement Model Based on G...
收藏 引用
4th IEEE International Conference on Power, Electronics and computer Applications, ICPECA 2024
作者: Liu, Zhishuai Wei, Zhengyang Li, Jiangnan School of Mathematics Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China
With the continuous progress of photovoltaic (PV) technology and the steady reduction of related costs, solar energy, as an important renewable energy source, shows an increasingly strong competitiveness in energy mar... 详细信息
来源: 评论
Security-Oriented Network Intent Placement using Particle Swarm Optimization  7
Security-Oriented Network Intent Placement using Particle Sw...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Landeau, Gabriel Avgeris, Marios Leivadeas, Aris Lambadaris, Ioannis Department of Software and It Engineering Montréal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio... 详细信息
来源: 评论
IsoTGAN: Spatial and Geometrical Constraints at GAN and Transformer for 3D Contour Generation  17th
IsoTGAN: Spatial and Geometrical Constraints at GAN and Tr...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Phuong, Thao Nguyen Duy, Vinh Nguyen Sakaino, Hidetomo FPT Consulting Japan FPT Software Minato Japan Department of Computer Science and Communications Engineering Waseda University Shinjuku Japan
Image generation in 2D and 3D has become an active research topic in Deep Learning. Single or multiple input images with non-orthogonal views are used for another shape and texture with different viewing angles. On th... 详细信息
来源: 评论
An Efficient Privacy-Preserving Face Authentication Scheme Using Local Sensitive Hashing  24
An Efficient Privacy-Preserving Face Authentication Scheme U...
收藏 引用
12th International Conference on Communications and Broadband Networking, ICCBN 2024
作者: Zhu, Hui Xiong, Ling Zhang, XuCheng School of Cyberspace Security School of Cryptology Hainan University China School of Computer and Software Engineering Xihua University China
In the last few years, face recognition gains a huge development because of the popularity of intelligent devices and the development of computer vision. Security and privacy are essential to ensure the widespread app... 详细信息
来源: 评论
Exploiting Secure Multi-Hop Transmissions with NOMA Networks: Performance Analysis  6
Exploiting Secure Multi-Hop Transmissions with NOMA Networks...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Pramitarini, Yushintia Yoga Perdana, Ridho Hendra Shim, Kyusung An, Beongku Graduate School Hongik University Dept. of Software and Communications Engineering Korea Republic of School of Computer Engineering and Applied Mathematics Hankyong National University Korea Republic of Hongik University Dept. of Software and Communications Engineering Korea Republic of
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the NOMA system. More specifically, the multi-hop transmission can extend the coverage of wireless transmission. However, accordin... 详细信息
来源: 评论
A Model for Detection of the Susceptible in Hospital Contact Network Based on Social Network Analysis  14th
A Model for Detection of the Susceptible in Hospital Contact...
收藏 引用
14th International Conference on computer Science and its Applications, CSA 2022 and the 16th KIPS International Conference on Ubiquitous Information Technologies and Applications, CUTE 2022
作者: Yang, Yixuan Park, Doo-Soon Kim, Seok-Hoon Peng, Sony Siet, Sophort Ugli, Sadriddinov Ilkhomjon Rovshan Vilakone, Phonexay Department of Software Convergence Soonchunhyang University Asan Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan Korea Republic of Department of Computer Engineering and Information Technology National University of Laos Vientiane Laos
COVID-19 can be modeled as a SEIR disease transmission model, and early detection and prevention of susceptible is a great way to stop the spread of the virus. The purpose of this paper is to conduct community detecti... 详细信息
来源: 评论
Security and Privacy in Metaverse: A Comprehensive Survey
收藏 引用
Big Data Mining and Analytics 2023年 第2期6卷 234-247页
作者: Yan Huang Yi(Joy)Li Zhipeng Cai Department of Software Engineering and Game Development Kennesaw State UniversityAtlantaCA 30060USA Department of Computer Science Georgia State UniversityAtlantaCA 30303USA
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definition... 详细信息
来源: 评论
Deep Learning in ChatGPT - A Survey  7
Deep Learning in ChatGPT - A Survey
收藏 引用
7th International Conference on Trends in Electronics and Informatics, ICOEI 2023
作者: Hashana, A.M. Jasmine Brundha, P. Ahamed Ayoobkhan, Mohamed Uvaze Fazila, S. Computer Science and Engineering Francis Xavier Engineering College Tirunelveli India Software Engineering New Uzbekistan University Tashkent Uzbekistan
Abstract-As a subset of machine learning, deep learning makes use of multiple-layer neural networks to learn with available data and make decisions or predictions. A large language model called ChatGPT is based on dee... 详细信息
来源: 评论
Experience as Source for Anticipation and Planning: Experiential Policy Learning for Target-driven Recommendation Dialogues
Experience as Source for Anticipation and Planning: Experien...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Dao, Huy Deng, Yang Bui, Khanh-Huyen Le, Dung D. Liao, Lizi Singapore Management University Singapore FPT Software AI Center College of Engineering and Computer Science VinUniversity Viet Nam
Target-driven recommendation dialogues present unique challenges in dialogue management due to the necessity of anticipating user interactions for successful conversations. Current methods face significant limitations... 详细信息
来源: 评论