咨询与建议

限定检索结果

文献类型

  • 1,711 篇 会议
  • 1,137 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,878 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,885 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,189 篇 软件工程
    • 326 篇 信息与通信工程
    • 243 篇 控制科学与工程
    • 156 篇 电气工程
    • 145 篇 生物工程
    • 130 篇 机械工程
    • 105 篇 生物医学工程(可授...
    • 101 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 63 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 52 篇 建筑学
    • 46 篇 土木工程
    • 46 篇 安全科学与工程
  • 858 篇 理学
    • 538 篇 数学
    • 177 篇 生物学
    • 154 篇 物理学
    • 139 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 74 篇 化学
  • 588 篇 管理学
    • 363 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 93 篇 医学
    • 80 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
  • 67 篇 法学
    • 45 篇 社会学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 30 篇 教育学
  • 17 篇 农学
  • 11 篇 文学
  • 11 篇 军事学
  • 7 篇 艺术学

主题

  • 231 篇 computer science
  • 182 篇 software enginee...
  • 154 篇 laboratories
  • 77 篇 application soft...
  • 68 篇 data mining
  • 63 篇 semantics
  • 55 篇 quality of servi...
  • 54 篇 software systems
  • 54 篇 computational mo...
  • 54 篇 cloud computing
  • 53 篇 software testing
  • 51 篇 costs
  • 50 篇 software
  • 47 篇 wireless sensor ...
  • 45 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 algorithm design...
  • 41 篇 machine learning
  • 41 篇 protocols
  • 40 篇 testing

机构

  • 219 篇 state key labora...
  • 87 篇 college of compu...
  • 64 篇 department of co...
  • 63 篇 state key labora...
  • 63 篇 shanghai key lab...
  • 60 篇 state key labora...
  • 57 篇 national key lab...
  • 56 篇 department of co...
  • 55 篇 department of co...
  • 42 篇 department of co...
  • 36 篇 state key labora...
  • 33 篇 peng cheng labor...
  • 31 篇 beijing key labo...
  • 30 篇 state key labora...
  • 29 篇 national enginee...
  • 28 篇 school of artifi...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 26 篇 grid computing a...

作者

  • 52 篇 rajkumar buyya
  • 45 篇 junping du
  • 44 篇 buyya rajkumar
  • 34 篇 yu huiqun
  • 31 篇 fan guisheng
  • 29 篇 zhao jian
  • 29 篇 yingmin jia
  • 28 篇 shen furao
  • 25 篇 baowen xu
  • 23 篇 chen liqiong
  • 21 篇 xu baowen
  • 21 篇 fashan yu
  • 20 篇 guihai chen
  • 19 篇 zhou zhi-hua
  • 19 篇 ismail leila
  • 19 篇 shen linlin
  • 19 篇 xu xiaolong
  • 18 篇 stuckey peter j.
  • 18 篇 dou wanchun
  • 17 篇 khan arif ali

语言

  • 2,736 篇 英文
  • 103 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Empirical Software Engineering Laboratory Department of Computer Science and Engineering"
2878 条 记 录,以下是141-150 订阅
排序:
Using analytic hierarchy process to evaluate deep learning for infrared target recognition
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86229-86245页
作者: Xu, Laixiang Cao, Bingxu Wei, Xinhong Li, Bei Su, Jingfeng Ning, Shiyuan Zhao, Junmin School of Computer and Data Science Henan University of Urban Construction Pingdingshan467036 China School of Information Engineering Luohe Vocational Technology College Henan University of Technology Luohe Institute of Technology Luohe462000 China School of Computer and Data Science Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Pingdingshan467036 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Henan University of Urban Construction Pingdingshan467036 China Department of Software Information China Electronics Technology Group Corporation 36-th Research Institute Jiaxing314033 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Research Center of Intelligent Campus Application Engineering of Henan Province Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Henan University of Urban Construction Pingdingshan467036 China
In order to promote the evaluation performance of deep learning infrared automatic target recognition (ATR) algorithms in the complex environment of air-to-air missile research, we proposed an analytic hierarchy proce... 详细信息
来源: 评论
Decentralized Federated Graph Learning with Lightweight Zero Trust Architecture for Next-Generation Networking Security
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 1908-1922页
作者: Zhou, Xiaokang Liang, Wei Wang, Kevin I-Kai Yada, Katsutoshi Yang, Laurence T. Ma, Jianhua Jin, Qun Kansai University Faculty of Business Data Science Osaka565-0823 Japan RIKEN Center for Advanced Intelligence Project RIKEN Tokyo103-0027 Japan Hunan University of Technology and Business School of Computer Science Changsha410205 China Xiangjiang Laboratory Changsha410205 China The University of Auckland Department of Electrical Computer and Software Engineering Auckland1010 New Zealand St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada Hosei University Faculty of Computer and Information Sciences Chiyoda-ku102-8160 Japan Waseda University Faculty of Human Sciences Tokorozawa359-1192 Japan
The rapid development and usage of digital technologies in modern intelligent systems and applications bring critical challenges on data security and privacy. It is essential to allow cross-organizational data sharing... 详细信息
来源: 评论
CFC: a Cascade Forest approach to discover Cancer driver genes using multi-omics data
CFC: a Cascade Forest approach to discover Cancer driver gen...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Zhang, Lei Yang, Yijing Wang, Zhe Li, Dongdong Liu, Jingping Yang, Hai East China University of Science and Technology Department of Computer Science and Engineering Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China University of Illinois Urbana-Champaign Department of Computer Science ChampaignIL United States
With the development of next-generation sequencing technology, massive genomic data has been generated, primarily encouraging research on cancer driver genes. Many bioinformatics methods were proposed to identify driv... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Metric localization for lunar rovers via cross-view image matching
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-14页
作者: Chen, Zihao Li, Kunhong Li, Haoran Fu, Zhiheng Zhang, Hanmo Guo, Yulan School of Electronics and Comunication Engineering the Shenzhen Campus of Sun Yat-sen University Sun Yat-sen University Shenzhen 510275 China Peng Cheng Laboratory Guangdong Shenzhen 518055 China Department of Computer Science and Software Engineering The University of Western Australia Perth 6009 Australia Department of Shanghai Key Laboratory of Aerospace Intelligent Control Technology Shanghai Aerospace Control Technology Institute Shanghai 201109 China College of Electronic Science and Technology National University of Defense Technology Hunan Changsha 410073 China
Accurate localization is critical for lunar rovers exploring lunar terrain features. Traditionally, lunar rover localization relies on sensor data from odometers, inertial measurement units and stereo cameras. However... 详细信息
来源: 评论
HyperDiff: Masked Diffusion Model with High-efficient Transformer for Hyperspectral Image Cross-Scene Classification
HyperDiff: Masked Diffusion Model with High-efficient Transf...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Pei Wang, Dong Wu, Chanyue Yang, Jing Kang, Lei Bai, Zongwen Li, Ying Shen, Qiang School of Computer Science Northwestern Polytechnical University Xi'an China Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data Yan'an University Yan'an China School of Automation and Software Engineering Shanxi University Taiyuan China Qingdao Topscomm Communication Co. Ltd. Qingdao China Department of Computer Science Aberystwyth University Aberystwyth United Kingdom
Hyperspectral Image (HSI) cross-scene classification is a challenging task in remote sensing, particularly when real-time processing of Target Domain (TD) HSI is required, and data cannot be reused for training. While... 详细信息
来源: 评论
Multi-MedVit: a deep learning approach for the diagnosis of COVID-19 with the CT images
Multi-MedVit: a deep learning approach for the diagnosis of ...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Cai, Yunjie Zheng, Zeqi Nie, Shanling Guo, Yue Zhang, Ruijie Yang, Hai East China University of Science and Technology Department of Computer Science and Engineering Shanghai200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China University of Southampton School of Electronics and Computer Science United Kingdom
The grim situation of novel coronavirus pneumonia 2019 (COVID-19) and its terrible spreading speed have already constituted a severe risk to human life, so it is ultimately essential to rapidly and accurately diagnose... 详细信息
来源: 评论
GunitaHu: A VR serious game with montessori approach for dementia patients during COVID-19  1
GunitaHu: A VR serious game with montessori approach for dem...
收藏 引用
1st International Conference on Novelties in Intelligent Digital Systems, NIDS 2021
作者: Ang, Aira Jazel Y. Principio, Roberto D. Juayong, Richelle Ann B. Caro, Jaime D.L. Service Science and Software Engineering Laboratory Department of Computer Science University of the Philippines Diliman Philippines
The study aims to explore VR Serious Games as a form of therapy for people with dementia. It seeks to establish the utility of VR-based interventions with the application of Montessori Method. This study also serves a... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning  22
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Cao, Weipeng Yao, Xuyang Xu, Zhiwu Pan, Yinghui Sun, Yixuan Li, Dachuan Qiu, Bohua Wei, Muheng Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
Dual Cross-Stage Partial Learning for Detecting Objects in Dehazed Images
Dual Cross-Stage Partial Learning for Detecting Objects in D...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Jinbiao Zhao Zhao Zhang Jiahuan Ren Haijun Zhang Zhongqiu Zhao Meng Wang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China Department of Computer Science Harbin Institute of Technology Shenzhen China
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf... 详细信息
来源: 评论