咨询与建议

限定检索结果

文献类型

  • 14,721 篇 会议
  • 9,588 篇 期刊文献
  • 436 册 图书

馆藏范围

  • 24,745 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,731 篇 工学
    • 9,872 篇 计算机科学与技术...
    • 7,974 篇 软件工程
    • 2,901 篇 信息与通信工程
    • 2,729 篇 控制科学与工程
    • 1,851 篇 电气工程
    • 1,546 篇 生物工程
    • 1,543 篇 电子科学与技术(可...
    • 1,152 篇 机械工程
    • 1,115 篇 生物医学工程(可授...
    • 1,040 篇 光学工程
    • 691 篇 仪器科学与技术
    • 673 篇 化学工程与技术
    • 620 篇 动力工程及工程热...
    • 565 篇 安全科学与工程
    • 561 篇 交通运输工程
    • 553 篇 材料科学与工程(可...
  • 7,977 篇 理学
    • 4,073 篇 数学
    • 2,065 篇 物理学
    • 1,856 篇 生物学
    • 1,295 篇 统计学(可授理学、...
    • 1,216 篇 系统科学
    • 778 篇 化学
  • 3,961 篇 管理学
    • 2,676 篇 管理科学与工程(可...
    • 1,473 篇 图书情报与档案管...
    • 1,290 篇 工商管理
  • 1,180 篇 医学
    • 992 篇 临床医学
    • 854 篇 基础医学(可授医学...
    • 510 篇 药学(可授医学、理...
  • 658 篇 法学
    • 557 篇 社会学
  • 473 篇 经济学
    • 468 篇 应用经济学
  • 324 篇 教育学
  • 255 篇 农学
  • 66 篇 文学
  • 46 篇 军事学
  • 41 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 905 篇 computer science
  • 508 篇 software enginee...
  • 474 篇 deep learning
  • 338 篇 computational mo...
  • 335 篇 machine learning
  • 298 篇 accuracy
  • 284 篇 feature extracti...
  • 280 篇 application soft...
  • 261 篇 computer archite...
  • 261 篇 artificial intel...
  • 260 篇 training
  • 242 篇 internet of thin...
  • 237 篇 systems engineer...
  • 199 篇 neural networks
  • 198 篇 support vector m...
  • 198 篇 optimization
  • 174 篇 reinforcement le...
  • 173 篇 data mining
  • 171 篇 image segmentati...
  • 161 篇 software

机构

  • 273 篇 college of compu...
  • 115 篇 school of comput...
  • 94 篇 state key labora...
  • 90 篇 school of comput...
  • 78 篇 graduate school ...
  • 71 篇 software enginee...
  • 69 篇 school of comput...
  • 67 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 40 篇 school of softwa...
  • 38 篇 school of comput...
  • 38 篇 inesc tec - inst...
  • 37 篇 department of co...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 graduate school ...
  • 32 篇 department of co...
  • 31 篇 school of automa...

作者

  • 46 篇 rajkumar buyya
  • 45 篇 niyato dusit
  • 42 篇 m. zahn
  • 31 篇 baowen xu
  • 31 篇 johansson karl h...
  • 30 篇 liu yang
  • 28 篇 zhou jie
  • 27 篇 mengchu zhou
  • 26 篇 jiang liu
  • 25 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 22 篇 shen linlin
  • 21 篇 zhang lei
  • 21 篇 liu xin
  • 20 篇 soni mukesh

语言

  • 20,837 篇 英文
  • 3,605 篇 其他
  • 307 篇 中文
  • 31 篇 日文
  • 19 篇 德文
  • 6 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24745 条 记 录,以下是1251-1260 订阅
排序:
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论
Unknown Input Observers Breaking Confidentiality of Controller States  63
Unknown Input Observers Breaking Confidentiality of Controll...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Breukelman, Enno Sandberg, Henrik Kth Royal Institute of Technology School of Electrical Engineering and Computer Science Division of Decision and Control Systems Malvinas väg 10 StockholmSE-100 44 Sweden
Driven by ubiquitous digitalization and cyberattacks on critical infrastructure, there is a high interest in research on the security of cyber-physical systems. If an attacker gains access to protected and sensitive i... 详细信息
来源: 评论
Universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects  10th
Universal Construction for Linearizable but Not Strongly L...
收藏 引用
10th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2024
作者: Wang, Chao Wu, Peng Petri, Gustavo Jia, Qiaowen He, Youlin Lv, Yi Liu, Zhiming Centre for Research and Innovation in Software Engineering College of Computer and Information Science Southwest University Chongqing China and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Arm Research Cambridge United Kingdom China Great Wall Technology Group Co. Ltd. Shenzhen China University of Chinese Academy of Sciences Beijing China
Strong linearizability is a variant of linearizability and is more suitable for verification. In this paper we investigate the following two problems: (1) for which deterministic sequential specifications there e...
来源: 评论
Enhancing Language Models Through Prompt engineering - A Survey
Enhancing Language Models Through Prompt Engineering - A Sur...
收藏 引用
Intelligent systems, Smart and Green Technologies (ICISSGT), IEEE International Conference on
作者: Chinimilli Venkata Rama Padmaja S Lakshminarayana Computer Science & Engineering Institute of Aeronautical Engineering Hyderabad India Computer Science & Systems Engineering Andhra University Visakhapatnam India
In recent years, language models have undergone significant advancements with models like GPT-3, showcasing impressive abilities in natural language processing and generation. However, these models often experience fr... 详细信息
来源: 评论
Speech Enhancement Using U-Net-Based Progressive Learning with Squeeze-TCN  5th
Speech Enhancement Using U-Net-Based Progressive Learning wi...
收藏 引用
5th International Conference on Advances in Distributed Computing and Machine Learning, ICADCML 2024
作者: Vanambathina, Sunny Dayal Nandyala, Sivaprasad Jannu, Chaitanya Sirisha Devi, J. Yechuri, Sivaramakrishna Parisae, Veeraswamy School of Electronics Engineering VIT-AP University Amaravati India Secure Systems Research Center Technology Innovation Institute Masdar City United Arab Emirates NRI Institute of Technology Vijayawada Agiripalli India Computer Science and Engineering Institute of Aeronautical Engineering Telangana Hyderabad India
Speech enhancement is crucial in many speech processing applications. Recently, researchers have been exploring ways to improve performance by effectively capturing the long-term contextual relationships within speech... 详细信息
来源: 评论
SP-Net: A Sparse Convolution and Point-Encoding Enhanced Network for 3D Object Detection in LiDAR Point Clouds
SP-Net: A Sparse Convolution and Point-Encoding Enhanced Net...
收藏 引用
2023 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2023
作者: Liu, Meng Niu, Jianwei Liu, Yu China North Vehicle Research Institute Beijing100072 China Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing100191 China Beihang University School of Computer Science and Engineering Beijing100191 China
LiDAR 3D object detection for autonomous driving is an important issue. To address this issue, this paper provides a two-stage anchor-based solution. Firstly, voxel feature encoding and sparse convolution networks wer... 详细信息
来源: 评论
An Elite Archive-Assisted Multi-Objective Evolutionary Algorithm for mRNA Design  13
An Elite Archive-Assisted Multi-Objective Evolutionary Algor...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Hong, Wenjing Chen, Cheng Zhu, Zexuan Tang, Ke Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
Messenger RNA (mRNA) vaccines have emerged as highly effective strategies in the prophylaxis and treatment of diseases. mRNA design, a key to the success of mRNA vaccines, in-volves finding optimal codons and increasi... 详细信息
来源: 评论
Data Migration from Relational to NoSQL Database: Review and Comparative Study
Data Migration from Relational to NoSQL Database: Review a...
收藏 引用
International Conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Saadouni, Chaimae El Bouchti, Karim Reda, Oussama Mohamed Ziti, Soumia Department of Computer Science Intelligent Processing Systems and Security Team Mohammed V University Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Team Faculty of Sciences Mohammed V University Rabat Morocco
New storage requirements, analysis, and visualization of Big Data, which includes structured, semi-structured, and unstructured data, have caused the developers in the past decade to begin preferring Big Data database... 详细信息
来源: 评论
Digital Assistant for Visually Impaired People  5
Digital Assistant for Visually Impaired People
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Thayaparan, Thuvaraka Jayakumar, Sanjay Fernando, B.A.I. Ananthanadarajan, Gobisan Abeywardana, Lakmini Kasthurirathna, Dharshana Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Computer Science and Software Engineering Malabe Sri Lanka
This research paper presents a comprehensive exploration of various components to enhance the capabilities of a digital assistant tailored for visually impaired individuals. The first component explores how various im... 详细信息
来源: 评论
Global-Local Consistency for Cost-Effective Anomaly Localization with Point Annotations
Global-Local Consistency for Cost-Effective Anomaly Localiza...
收藏 引用
IIAI International Conference on Advanced Applied Informatics (IIAIAAI)
作者: Keiichi Nakanishi Ryoya Katafuchi Terumasa Tokunaga Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan
Creating pixel-level ground-truth (GT) masks is quite costly for deep learning-based image segmentation. Specialists in areas such as anomaly detection and medical diagnostics face difficulties in producing many GT ma... 详细信息
来源: 评论