咨询与建议

限定检索结果

文献类型

  • 14,595 篇 会议
  • 9,505 篇 期刊文献
  • 438 册 图书

馆藏范围

  • 24,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,625 篇 工学
    • 9,784 篇 计算机科学与技术...
    • 7,957 篇 软件工程
    • 2,832 篇 信息与通信工程
    • 2,643 篇 控制科学与工程
    • 1,785 篇 电气工程
    • 1,544 篇 生物工程
    • 1,516 篇 电子科学与技术(可...
    • 1,125 篇 机械工程
    • 1,117 篇 生物医学工程(可授...
    • 1,034 篇 光学工程
    • 682 篇 仪器科学与技术
    • 668 篇 化学工程与技术
    • 608 篇 动力工程及工程热...
    • 542 篇 材料科学与工程(可...
    • 535 篇 安全科学与工程
    • 529 篇 交通运输工程
  • 7,919 篇 理学
    • 4,053 篇 数学
    • 2,038 篇 物理学
    • 1,850 篇 生物学
    • 1,290 篇 统计学(可授理学、...
    • 1,214 篇 系统科学
    • 760 篇 化学
  • 3,920 篇 管理学
    • 2,638 篇 管理科学与工程(可...
    • 1,458 篇 图书情报与档案管...
    • 1,283 篇 工商管理
  • 1,171 篇 医学
    • 988 篇 临床医学
    • 857 篇 基础医学(可授医学...
    • 509 篇 药学(可授医学、理...
  • 651 篇 法学
    • 549 篇 社会学
  • 469 篇 经济学
    • 465 篇 应用经济学
  • 324 篇 教育学
  • 254 篇 农学
  • 63 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 908 篇 computer science
  • 504 篇 software enginee...
  • 458 篇 deep learning
  • 332 篇 computational mo...
  • 331 篇 machine learning
  • 280 篇 application soft...
  • 278 篇 accuracy
  • 277 篇 feature extracti...
  • 260 篇 computer archite...
  • 257 篇 training
  • 252 篇 artificial intel...
  • 240 篇 systems engineer...
  • 233 篇 internet of thin...
  • 198 篇 support vector m...
  • 197 篇 neural networks
  • 194 篇 optimization
  • 177 篇 data mining
  • 171 篇 image segmentati...
  • 166 篇 reinforcement le...
  • 159 篇 laboratories

机构

  • 269 篇 college of compu...
  • 115 篇 school of comput...
  • 94 篇 state key labora...
  • 85 篇 school of comput...
  • 78 篇 graduate school ...
  • 72 篇 software enginee...
  • 67 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 40 篇 school of softwa...
  • 39 篇 department of co...
  • 37 篇 school of comput...
  • 37 篇 inesc tec - inst...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 33 篇 department of co...
  • 32 篇 department of el...

作者

  • 47 篇 rajkumar buyya
  • 44 篇 niyato dusit
  • 42 篇 m. zahn
  • 33 篇 liu yang
  • 30 篇 baowen xu
  • 29 篇 johansson karl h...
  • 28 篇 zhou jie
  • 26 篇 mengchu zhou
  • 25 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 tao yang
  • 24 篇 li li
  • 23 篇 bo du
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 22 篇 shen linlin
  • 21 篇 zhang lei
  • 21 篇 e. rogers
  • 21 篇 liu xin

语言

  • 22,861 篇 英文
  • 1,346 篇 其他
  • 308 篇 中文
  • 31 篇 日文
  • 13 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24538 条 记 录,以下是4501-4510 订阅
排序:
Improved 3D photon counting imaging using singular value decomposition (SVD)
Improved 3D photon counting imaging using singular value dec...
收藏 引用
International Conference on Control, Automation and systems ( ICCAS)
作者: Seungwoo Song Gilsu Yeo Hyun-Woo Kim Myungjin Cho Min-Chul Lee Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka City Fukuoka Japan School of ICT Robotics and Mechanical Engineering IITC Hankyoung National University Anseong Republic of Koera
In this paper, we propose improved three-dimensional (3D) photon counting imaging using singular value decomposition (SVD). In conventional 3D photon counting imaging can visualize 3D image under photon-starved condit... 详细信息
来源: 评论
ITSVA: Toward 6G-Enabled Vision Analytics over Integrated Terrestrial-Satellite Network
ITSVA: Toward 6G-Enabled Vision Analytics over Integrated Te...
收藏 引用
Satellite Computing (Satellite), IEEE International Conference on
作者: Miao Zhang Jiaxing Li Jianxin Shi Yifei Zhu Lei Zhang Hengzhi Wang School of Computing Science Simon Fraser University Canada College of Computer Science Nankai University China UM-SJTU Joint Institute Shanghai Jiao Tong University China College of Computer Science and Software Engineering Shenzhen University China
The sixth-generation (6G) mobile communications system is expected to integrate the terrestrial and low Earth orbit satellite networks (LSN) to provide seamless global Internet service. This will create new opportunit...
来源: 评论
Blockchain Anchored Federated Learning and Tokenized Traceability for Sustainable Food Supply Chains  4
Blockchain Anchored Federated Learning and Tokenized Traceab...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information systems, ICUIS 2024
作者: Chaganti, Koushik Reddy Kumar, B. Naveen Gutta, Pruthvi Krishna Elicherla, Sivananda Lahari Reddy Nagesh, C. Raghavendar, K. University of the Cumberlands Dept. of Computer and Information Systems KY United States Vignan Institute of Technology and Science Department of Information Technology Hyderabad India Tesla Dept of It AustinTX United States Dayananda Sagar University Dept of Cse Bangalore India Srinivasa Ramanujan Institute of Technology Dept of Cse Anantapur India Teegala Krishna Reddy Engineering College Dept of Cse Hyderabad India
The management of food supply chains relates to just about the most imperative issues concerning sustainability, quality, and traceability, where existing methodologies usually fail to meet the demands caused by data ... 详细信息
来源: 评论
Guardian - Smart Assistant Tool for Visually Impaired People
Guardian - Smart Assistant Tool for Visually Impaired People
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: C.K. Amarasinghe R.D.S.P. Pinto K.N. Sudusinghe Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
At present, with the advancement of technology, various devices and solutions have been found to aid the visually impaired community (VI Community). Even with the countless technological breakthroughs, yet they face m... 详细信息
来源: 评论
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
Attackers Can Do Better: Over- and Understated Factors of Mo...
收藏 引用
Secure and Trustworthy Machine Learning (SaTML), IEEE Conference on
作者: Daryna Oliynyk Rudolf Mayer Andreas Rauber CDL AsTra Faculty of Computer Science University of Vienna Vienna Austria SBA Research Vienna Austria Faculty of Informatics TU Wien Institute of Information Systems Engineering Vienna Austria
Machine learning (ML) models were shown to be vulnerable to model stealing attacks, which lead to intellectual property infringement. Among other attack methods, substitute model training is an all-encompassing attack... 详细信息
来源: 评论
科学研究的第五范式——以智能驱动的材料设计为例
收藏 引用
engineering 2023年 第5期24卷 126-137,I0003,I0004页
作者: Can Leng Zhuo Tang Yi-Ge Zhou Zean Tian Wei-Qing Huang Jie Liu Keqin Li Kenli Li Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense TechnologyChangsha 410073China Laboratory of Software Engineering for Complex Systems National University of Defense TechnologyChangsha 410073China National Supercomputing Center in Changsha Changsha 410082China College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China Institute of Chemical Biology and Nanomedicine State Key Laboratory of Chemo/Biosensing and ChemometricsCollege of Chemistry and Chemical EngineeringHunan UniversityChangsha 410082China Department of Applied Physics School of Physics and ElectronicsHunan UniversityChangsha 410082China Department of Computer Science State University of New YorkNew PaltzNY 12561USA
科学正在进入一个新时代——第五范式——它被认为是知识整合到不同领域的主要特征,是基于无所不在的机器学习系统的计算社区中智能驱动的工作。在此,我们通过在天河一号超级计算机系统上构建的催化材料专门设计的典型平台案例,生动地... 详细信息
来源: 评论
A Survey of Medical Vision-and-Language Applications and Their Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Qi Zhao, Ruoshan Wang, Sinuo Phan, Vu Minh Hieu van den Hengel, Anton Verjans, Johan Liao, Zhibin To, Minh-Son Xia, Yong Chen, Jian Xie, Yutong Wu, Qi Australian Institute for Machine Learning University of Adelaide Australia School of Software Engineering South China University of Technology China South Australia Medical Imaging Australia School of Computer Science & Engineering Northwestern Polytechnical University China
Medical vision-and-language models (MVLMs) have attracted substantial interest due to their capability to offer a natural language interface for interpreting complex medical data. Their applications are versatile and ... 详细信息
来源: 评论
Health-Care Monitoring of Patient using CNN based Model in Internet of Things
Health-Care Monitoring of Patient using CNN based Model in I...
收藏 引用
Applied Intelligence and Sustainable Computing (ICAISC), International Conference on
作者: B D Parameshachari K.L Hemalatha Javad Rahebi Mohammed Rashad Baker B.P Upendra Roy Department of Electronics and Communications Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Information Science and Engineering Sri Krishna Institute of Technology Bangalore India Department of Software engineering istanbul topkapi university Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Department of Electronics and Communication Engineering Channabasaveshwara Institute of Technology Gubbi Tumkur India
There is rising public concern about exposure to radiofrequency (RF) electromagnetic fields (EMF) as more and more wireless communications become concentrated in everyday living surroundings. There are a number of obs...
来源: 评论
Single Image 3D Reconstruction Based on Attention Mechanism and Graph Convolution Network  22
Single Image 3D Reconstruction Based on Attention Mechanism ...
收藏 引用
8th International Conference on Computing and Artificial Intelligence, ICCAI 2022
作者: Gao, Wei Yu, Liyang Du, Yuanyuan Lu, Songfeng Software Development Center of Industrial and Commercial Bank of China Limited Zhuhai519000 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430072 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China
This paper innovatively proposes a channel attention mechanism and graph convolutional network model adapted to 3D reconstruction, and combines the target detection model to construct a neural network that generates a... 详细信息
来源: 评论
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Oliynyk, Daryna Mayer, Rudolf Rauber, Andreas CDL AsTra Faculty of Computer Science University of Vienna Vienna Austria SBA Research Vienna Austria Institute of Information Systems Engineering Faculty of Informatics TU Wien Vienna Austria
Machine learning (ML) models were shown to be vulnerable to model stealing attacks, which lead to intellectual property infringement. Among other attack methods, substitute model training is an all-encompassing attack... 详细信息
来源: 评论