咨询与建议

限定检索结果

文献类型

  • 1,768 篇 会议
  • 1,065 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,878 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,790 篇 工学
    • 1,444 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 356 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 160 篇 电气工程
    • 150 篇 生物医学工程(可授...
    • 105 篇 机械工程
    • 96 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 71 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 563 篇 管理学
    • 370 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 184 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 80 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 7 篇 文学

主题

  • 124 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 66 篇 computational mo...
  • 63 篇 accuracy
  • 61 篇 deep learning
  • 61 篇 software
  • 58 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 50 篇 quality of servi...
  • 48 篇 grid computing
  • 46 篇 security
  • 45 篇 computer archite...
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 37 篇 optimization
  • 37 篇 monitoring

机构

  • 123 篇 college of compu...
  • 71 篇 department of co...
  • 53 篇 department of co...
  • 38 篇 state key labora...
  • 29 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 21 篇 department of co...
  • 20 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 15 篇 department of co...
  • 15 篇 school of softwa...
  • 15 篇 school of comput...
  • 15 篇 college of compu...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 18 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 xiaofei wang
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 11 篇 leila ismail

语言

  • 2,538 篇 英文
  • 328 篇 其他
  • 15 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Software Engineering and Computing"
2878 条 记 录,以下是1051-1060 订阅
排序:
A Light-Weight Object Detection Framework with FPA Module for Optical Remote Sensing Imagery  20
A Light-Weight Object Detection Framework with FPA Module fo...
收藏 引用
4th High Performance computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020
作者: Gu, Xi Kong, Lingbin Wang, Zhicheng Li, Jie Yu, Zhaohui Wei, Gang Department of Computing Science Tongji University China Department of Software Engineering Tsinghua University China Shanghai Aerospaces Electronic Technology Institute Shanghai China
With the development of remote sensing technology, the acquisition of remote sensing images is easier and easier, which provides sufficient data resources for the task of detecting remote sensing objects. However, how... 详细信息
来源: 评论
Understanding the use of message passing interface in exascale proxy applications
Understanding the use of message passing interface in exasca...
收藏 引用
作者: Sultana, Nawrin Rüfenacht, Martin Skjellum, Anthony Bangalore, Purushotham Laguna, Ignacio Mohror, Kathryn Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Computer Science and Engineering University of Tennessee at Chattanooga ChattanoogaTN United States Department of Computer Science University of Alabama at Birmingham BirminghamAL United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory LivermoreCA United States
The Exascale computing Project (ECP) focuses on the development of future exascale-capable applications. Most ECP applications use the message passing interface (MPI) as their parallel programming model with mini-apps... 详细信息
来源: 评论
BcIIS: Blockchain-Based Intelligent Identification Scheme of Massive IoT Devices
BcIIS: Blockchain-Based Intelligent Identification Scheme of...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yi Sun Tong Xu Ali Kashif Bashir Jie Liu Marwan Omar School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Department of Computing and Mathematics Manchester United Kingdom Woxsen School of Business Woxsen University India Information Technology and Management Illinois Institute of Technology USA
With the rapid development of loT technology, various loT devices enter our daily life. The continuously increasing scale of the massive loT devices in both of numbers and types further bring heavy pressure on loT net...
来源: 评论
An Efficient Quantum Private Comparison Protocol Based on Cluster State and Bell State  8th
An Efficient Quantum Private Comparison Protocol Based on Cl...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Li, Chaoyang Qing, Hua Xu, Gang Chen, Xiubo Xin, Xiangjun Dong, Mianxiong Ota, Kaoru College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450002 China School of Computing Science and Technology North China University of Technology Beijing100144 China Information Security Centre State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications Beijing100876 China Department of Sciences and Informatics Muroran Institution of Technology Muroran050-8585 Japan
Quantum private comparison (QPC) is the quantum method that can compare the equality of the distrustful participants’ private information without leaking them. The 4-particle cluster state has a strong violation of l... 详细信息
来源: 评论
Empowering Donors: How Blockchain Technology Can Help Ensure Their Contributions Reach the Right Recipients
Empowering Donors: How Blockchain Technology Can Help Ensure...
收藏 引用
Business Analytics for Technology and Security (ICBATS), International Conference on
作者: Sahar Ajmal Muteeb Bin Muzammil Muhammad Shoaib Muhammad Hassaan Mehmood Department of Software Engineering National University of Computer and Emmerging Sciences Chiniot-Faisalabad Pakistan College of Computing Riphah International University Faisalabad Pakistan Department of Computer Science University of Engineering and Technology Lahore Pakistan School of Computer Science NCBA&E Lahore Pakistan Applied School Research Center Applied Science Private University Amman Jordan
Charity giving is a fundamental aspect of society, but there are concerns about the accountability and transparency of the donation process. Blockchain technology has emerged as a potential solution, offering a secure... 详细信息
来源: 评论
Feature Fusion from Head to Tail for Long-Tailed Visual Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Li, Mengke Hu, Zhikai Lu, Yang Lan, Weichao Cheung, Yiu-Ming Huang, Hui Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University Hong Kong Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China
The imbalanced distribution of long-tailed data presents a considerable challenge for deep learning models, as it causes them to prioritize the accurate classification of head classes but largely disregard tail classe... 详细信息
来源: 评论
Adjusting Logit in Gaussian Form for Long-Tailed Visual Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Li, Mengke Cheung, Yiu-Ming Lu, Yang Hu, Zhikai Lan, Weichao Huang, Hui Shenzhen China The Department of Computer Science Hong Kong Baptist University Hong Kong The Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
It is not uncommon that real-world data are distributed with a long tail. For such data, the learning of deep neural networks becomes challenging because it is hard to classify tail classes correctly. In the literatur... 详细信息
来源: 评论
Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xiaofei Zhao, Yunfeng Qiu, Chao Hu, Qinghua Leung, Victor C.M. College of Intelligence and Computing Tianjin University Tianjin300072 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Amidst the robust impetus from artificial intelligence (AI) and big data, edge intelligence (EI) has emerged as a nascent computing paradigm, synthesizing AI with edge computing (EC) to become an exemplary solution fo... 详细信息
来源: 评论
Evaluating Open-Domain Dialogues in Latent Space with Next Sentence Prediction and Mutual Information
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Kun Yang, Bohao Lin, Chenghua Rong, Wenge Villavicencio, Aline Cui, Xiaohui Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science The University of Sheffield United Kingdom State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Beihang University China
The long-standing one-to-many issue of the open-domain dialogues poses significant challenges for automatic evaluation methods, i.e., there may be multiple suitable responses which differ in semantics for a given conv... 详细信息
来源: 评论
Simple KMP Pattern-Matching on Indeterminate Strings
Simple KMP Pattern-Matching on Indeterminate Strings
收藏 引用
2020 Prague Stringology Conference, PSC 2020
作者: Mhaskar, Neerja Smyth, W.F. Algorithms Research Group Department of Computing & Software McMaster University Canada School of Engineering & Information Technology Murdoch University WA Australia
In this paper we describe a simple, fast, space-efficient approach to finding all matches of an indeterminate pattern p = p[1..m] in an indeterminate string x = x[1..n], where both p and x are defined on a "small... 详细信息
来源: 评论