咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是761-770 订阅
排序:
Deep User and Item Inter-matching Network for CTR Prediction  28th
Deep User and Item Inter-matching Network for CTR Predicti...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yuan, Zhiyang Xiao, Yingyuan Yang, Peilin Hao, Qingbo Wang, Hongya Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China College of Computer Science and Engineering Donghua University Shanghai China
CTR prediction plays an important role in increasing company revenue and user experience, and many efforts start with historical behavior to uncover user interest. There are two main problems with previous works: (1) ... 详细信息
来源: 评论
HIGH RESOLUTION IMAGE QUALITY DATABASE
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Huang Wan, Qiang Korhonen, Jari Shenzhen University School of Computer Science and Software Engineering Shenzhen China University of Aberdeen School of Natural and Computing Sciences Aberdeen United Kingdom
With technology for digital photography and high resolution displays rapidly evolving and gaining popularity, there is a growing demand for blind image quality assessment (BIQA) models for high resolution images. Unfo... 详细信息
来源: 评论
Robust Vietnam’s Motorcycle License Plate Detection and Recognition Using Deep Learning Model  10th
Robust Vietnam’s Motorcycle License Plate Detection and Re...
收藏 引用
10th International Conference on Future Data and Security engineering, FDSE 2023
作者: Le, Duc Hoa Mazumder, Debarshi Quach, Luyl-Da Banerjee, Shreya Nguyen, Vinh Dinh Bosch Global Software Technologies Company Limited Ho Chi Minh city Viet Nam School of Computing and Information Technology Eastern International University Thu Dau Mot Viet Nam Department of Software Engineering FPT University Can Tho City Can Tho Viet Nam Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
Nowadays, driving fast is an emergency state in many countries in the world and Vietnam in particular, and the consequence is really cruel when an accident occurs. Therefore, it is very important to control the speed ... 详细信息
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Jingnian Liu Wei Liang Yuxiang Chen Kai Jin School of Computer Science and Engineering Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 321-330页
作者: Namakshenas, Danyal Yazdinejad, Abbas Dehghantanha, Ali Parizi, Reza M. Srivastava, Gautam University of Guelph Cyber Science Lab Canada Cyber Foundry GuelphONN1G2W1 Canada Kennesaw State University Decentralized Science Lab College of Computing and Software Engineering MariettaGA30060 United States Brandon University Department of Math and Computer Science ManitobaMBR7A6A9 Canada China Medical University Research Centre for Interneural Computing Taichung40402 Taiwan Lebanese American University Department of Computer Science and Mathematics Beirut1102 Lebanon
The expansion of Industrial Cyber-Physical Systems (ICPS) has introduced new challenges in security and privacy, highlighting a research gap in effective anomaly detection while preserving data confidentiality. In the... 详细信息
来源: 评论
Advancing Retinal Image Segmentation: A Denoising Diffusion Probabilistic Model Perspective
Advancing Retinal Image Segmentation: A Denoising Diffusion ...
收藏 引用
IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)
作者: Alnur Alimanov Md Baharul Islam Department of Computer Engineering Bahcesehir University Istanbul Turkey Department of Computing & Software Engineering Florida Gulf Coast University Fort Myers USA Bahcesehir University Istanbul Turkey
Retinal images and vessel trees play a crucial role in aiding ophthalmologists to identify and diagnose various illnesses related to the eyes, blood vessels, and brain. However, manual retinal image segmentation is a ... 详细信息
来源: 评论
A Comprehensive Overview of Object Detection Based on Deep Learning
A Comprehensive Overview of Object Detection Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Gaojing Yuan Linshu Chen Jiahong Cai Chaoyi Yang Jinnian Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Target detection is an important task in the field of computer vision and its application has been extended to the medical field. In the medical field, target detection techniques can be used for diagnosis, treatment ... 详细信息
来源: 评论
Question-Answer Cross Language Image Matching for Weakly Supervised Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Songhe Zhuo, Wei Xie, Jinheng Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Class Activation Map (CAM) has emerged as a popular tool for weakly supervised semantic segmentation (WSSS), allowing the localization of object regions in an image using only image-level labels. However, existing CAM... 详细信息
来源: 评论
Cross-Lingual Word Alignment for ASEAN Languages with Contrastive Learning
Cross-Lingual Word Alignment for ASEAN Languages with Contra...
收藏 引用
International Conference on Asian Language Processing (IALP)
作者: Jingshen Zhang Xinying Qiu Teng Shen Wenyu Wang Kailin Zhang Wenhe Feng School of Information Science and Technolgy College of Computer and Software Engineering Hohai University Nanjing China Laboratory of Language Engineering and Computing Guangdong University of Foreign Studies Guangzhou China
Cross-lingual word alignment plays a crucial role in various natural language processing tasks, particularly for low-resource languages. Recent study proposes a BiLSTM-based encoder-decoder model that outperforms pre-... 详细信息
来源: 评论
GAN vs. LSTM: Network State Prediction  17
GAN vs. LSTM: Network State Prediction
收藏 引用
17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023
作者: Byun, Gyurin Raza, Syed M. Yang, Huigyu Kim, Moonseong Choo, Hyunseung Sungkyunkwan University Dept. of Superintelligence Engineering Suwon Korea Republic of College of Computing and Informatics Sungkyunkwan University Suwon Korea Republic of Seoul Theological University Dept. of It Convergence Software Bucheon Korea Republic of Sungkyunkwan University Dept. of Electrical and Computer Engineering Suwon Korea Republic of
Network Traffic prediction is the prerequisite for proactive traffic management, where a longer duration and high accuracy of prediction ensures a more effective solution. This paper exploits Generative Adversarial Ne... 详细信息
来源: 评论