咨询与建议

限定检索结果

文献类型

  • 3,879 篇 会议
  • 2,081 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,740 篇 工学
    • 3,000 篇 计算机科学与技术...
    • 2,472 篇 软件工程
    • 755 篇 信息与通信工程
    • 499 篇 控制科学与工程
    • 413 篇 生物工程
    • 357 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 227 篇 机械工程
    • 224 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 141 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 121 篇 交通运输工程
  • 1,686 篇 理学
    • 958 篇 数学
    • 451 篇 生物学
    • 365 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,130 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 492 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 229 篇 医学
    • 203 篇 临床医学
    • 187 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 130 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 45 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 138 篇 feature extracti...
  • 135 篇 training
  • 132 篇 semantics
  • 122 篇 deep learning
  • 114 篇 machine learning
  • 111 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 223 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 ismail leila
  • 27 篇 buyya rajkumar
  • 24 篇 zhang lei
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 xiaofei wang

语言

  • 5,784 篇 英文
  • 210 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6038 条 记 录,以下是4921-4930 订阅
排序:
Towards Fully Decoupled End-to-End Person Search
Towards Fully Decoupled End-to-End Person Search
收藏 引用
Proceedings of the Digital Image computing: Technqiues and Applications (DICTA)
作者: Pengcheng Zhang Xiao Bai Jin Zheng Xin Ning School of Computer Science and Engineering State Key Laboratory of Software Development Environment Jiangxi Research Institute Beihang University Beijing China Institute of Semiconductors Chinese Academy of Sciences Cognitive Computing Technology Joint Laboratory Wave Group Beijing China
End-to-end person search aims to jointly detect and re-identify a target person in raw scene images with a unified model. The detection task unifies all persons while the re-id task discriminates different identities,...
来源: 评论
CFDIL: A context-aware feature deep interaction learning for app recommendation
Research Square
收藏 引用
Research Square 2021年
作者: Hao, Qingbo Zhu, Ke Wang, Chundong Wang, Peng Mo, Xiuliang Liu, Zhen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Graduate School of Engineering Nagasaki Institute of Applied Science Nagasaki Japan
The rapid development of Mobile Internet has spawned various mobile applications (apps). A large number of apps make it difficult for users to choose apps conveniently, causing the app overload problem. As the most ef... 详细信息
来源: 评论
Bicomp: A bilayer scalable nakamoto consensus protocol
arXiv
收藏 引用
arXiv 2018年
作者: Jiao, Zhenzhen Tian, Rui Shang, Dezhong Ding, Hui Chaincomp Technologies Co. Ltd. Shenzhen518000 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Beijing Engineering Research Center for IoT Software and Systems Beijing University of Technology Beijing100024 China
Blockchain has received great attention in recent years and motivated innovations in different scenarios. However, many vital issues which affect its performance are still open. For example, it is widely convinced tha... 详细信息
来源: 评论
Matrix dimensionality reduction for mining Web logs  03
Matrix dimensionality reduction for mining Web logs
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jianjiang Lu Baowen Xu H. Yang Department of Computer Science and Engineering South-East University Nanjing China People''s Liberation Army University of Science and Technology Nanjing China Jiangsu Institute of Software Quality Nanjing China School of Computing De Montfort University Leicester UK
Web-based logs contain potentially useful data with which designers can assess the usability and effectiveness of their choices. Clustering techniques have been used to automatically discover typical user profiles fro... 详细信息
来源: 评论
Towards Multi-Objective High-Dimensional Feature Selection via Evolutionary Multitasking
arXiv
收藏 引用
arXiv 2024年
作者: Feng, Yinglan Feng, Liang Liu, Songbai Kwong, Sam Tan, Kay Chen Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science Chongqing University China College of Computer Science and Software Engineering Shenzhen University China Department of Computing The Hong Kong Polytechnic University Hong Kong
Evolutionary Multitasking (EMT) paradigm, an emerging research topic in evolutionary computation, has been successfully applied in solving high-dimensional feature selection (FS) problems recently. However, existing E... 详细信息
来源: 评论
Efficient Multi-Grained Wear Leveling for Inodes of Persistent Memory File Systems
Efficient Multi-Grained Wear Leveling for Inodes of Persiste...
收藏 引用
Design Automation Conference
作者: Chaoshu Yang Duo Liu Runyu Zhang Xianzhang Chen Shun Nie Fengshun Wang Qingfeng Zhuge Edwin H.-M. Sha Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China College of Computer Science Chongqing University Chongqing China School of Computer Science and Software Engineering East China Normal University Shanghai China
Existing persistent memory file systems usually store inodes in fixed locations, which ignores the external and internal imbalanced wears of inodes on the persistent memory (PM). Therefore, the PM for storing inodes c... 详细信息
来源: 评论
An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data
An Intelligent Method for Upper Limb Posture Recognition Bas...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Zihao Wu Xueyan Wu Qi Liu Xiaodong Liu Ministry of Education Engineering Research Center of Digital Forensics Nanjing University of Information Science & Technology Nanjing China School of Computer and Software Nanjing University of Information Science & Technology Nanjing China School of Computing Edinburgh Napier University Edinburgh UK
There are more than 10 million new stroke cases worldwide every year, and stroke has become one of the main causes of death and disability. In recent years, with the rapid development of computer science and technolog... 详细信息
来源: 评论
Feature extractions using labeled and unlabeled data
Feature extractions using labeled and unlabeled data
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Bor-Chen Kuo Chun-Hao Chang Tian-Wei Sheu Chih-Cheng Hung Graduate School of Educational Measurement and Statistics National Taichung Teachers College Taichung Taiwan Graduate School of Educational Measurement and Statistics National Taichung Teachers College Taiwan School of Computing and Software Engineering Southern Polytechnic State University GA USA
来源: 评论
HyperFedNet: Communication-Efficient Personalized Federated Learning Via Hypernetwork
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingyun Huang, Yan Xie, Zhenzhen Pang, Junjie The College of Computer Science and Technology Qingdao University Shandong Qingdao266000 China The College of Computing and Software Engineering Kennesaw State University AtlantaGA United States The School of Computer Science and Technology Shandong University Shandong Qingdao266237 China
In response to the challenges posed by nonindependent and identically distributed (non-IID) data and the escalating threat of privacy attacks in Federated Learning (FL), we introduce HyperFedNet (HFN), a novel archite... 详细信息
来源: 评论
Requirements and Specifications for Adaptive Security: Concepts and Analysis
Requirements and Specifications for Adaptive Security: Conce...
收藏 引用
SEAMS International Workshop on software engineering for Adaptive and Self-Managing Systems, ICSE
作者: Thein Than Tun Mu Yang Arosha K. Bandara Yijun Yu Armstrong Nhlabatsi Niamul Khan Khaled M. Khan Bashar Nuseibeh School of Computing & Communications The Open University Milton Keynes UK Department of System Management & Strategy University of Greenwich London UK Computer Science and Engineering Qatar University Qatar Lero - The Irish Software Research Centre University of Limerick Limerick Ireland
In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment... 详细信息
来源: 评论