咨询与建议

限定检索结果

文献类型

  • 14,486 篇 会议
  • 9,402 篇 期刊文献
  • 437 册 图书

馆藏范围

  • 24,325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,436 篇 工学
    • 9,661 篇 计算机科学与技术...
    • 7,858 篇 软件工程
    • 2,807 篇 信息与通信工程
    • 2,597 篇 控制科学与工程
    • 1,755 篇 电气工程
    • 1,539 篇 生物工程
    • 1,496 篇 电子科学与技术(可...
    • 1,113 篇 机械工程
    • 1,110 篇 生物医学工程(可授...
    • 1,018 篇 光学工程
    • 678 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 598 篇 动力工程及工程热...
    • 537 篇 材料科学与工程(可...
    • 525 篇 安全科学与工程
    • 523 篇 交通运输工程
  • 7,860 篇 理学
    • 4,029 篇 数学
    • 2,020 篇 物理学
    • 1,839 篇 生物学
    • 1,278 篇 统计学(可授理学、...
    • 1,212 篇 系统科学
    • 755 篇 化学
  • 3,884 篇 管理学
    • 2,614 篇 管理科学与工程(可...
    • 1,445 篇 图书情报与档案管...
    • 1,264 篇 工商管理
  • 1,156 篇 医学
    • 976 篇 临床医学
    • 846 篇 基础医学(可授医学...
    • 508 篇 药学(可授医学、理...
  • 640 篇 法学
    • 543 篇 社会学
  • 467 篇 经济学
    • 463 篇 应用经济学
  • 316 篇 教育学
  • 256 篇 农学
  • 64 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 906 篇 computer science
  • 502 篇 software enginee...
  • 449 篇 deep learning
  • 330 篇 computational mo...
  • 330 篇 machine learning
  • 280 篇 application soft...
  • 272 篇 feature extracti...
  • 272 篇 accuracy
  • 257 篇 computer archite...
  • 255 篇 training
  • 249 篇 artificial intel...
  • 238 篇 systems engineer...
  • 234 篇 internet of thin...
  • 198 篇 support vector m...
  • 198 篇 neural networks
  • 193 篇 optimization
  • 175 篇 data mining
  • 166 篇 image segmentati...
  • 162 篇 reinforcement le...
  • 157 篇 laboratories

机构

  • 259 篇 college of compu...
  • 113 篇 school of comput...
  • 92 篇 state key labora...
  • 82 篇 school of comput...
  • 76 篇 graduate school ...
  • 70 篇 software enginee...
  • 64 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 39 篇 school of softwa...
  • 39 篇 department of co...
  • 37 篇 school of comput...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 36 篇 inesc tec - inst...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 34 篇 department of el...
  • 32 篇 department of co...

作者

  • 47 篇 rajkumar buyya
  • 43 篇 niyato dusit
  • 41 篇 m. zahn
  • 31 篇 liu yang
  • 30 篇 baowen xu
  • 30 篇 johansson karl h...
  • 28 篇 zhou jie
  • 28 篇 mengchu zhou
  • 26 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 e. rogers
  • 22 篇 bentahar jamal
  • 21 篇 liu xin
  • 20 篇 zhang lei
  • 20 篇 li yang

语言

  • 23,134 篇 英文
  • 865 篇 其他
  • 307 篇 中文
  • 31 篇 日文
  • 11 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24325 条 记 录,以下是621-630 订阅
排序:
Direct data-driven control with signal temporal logic specifications ⁎
收藏 引用
IFAC-PapersOnLine 2024年 第11期58卷 177-182页
作者: B.C. van Huijgevoort C. Verhoek R. Tóth S. Haesaert Eindhoven University of Technology the Netherlands Max Planck Institute for Software Systems Germany The Institute for Computer Science and Control Hungary
Most control synthesis methods under temporal logic properties require a model of the system, however, identifying such a model can be a challenging task. In this work, we develop a direct data-driven control synthesi...
来源: 评论
Transformer-based Text Classification on Unified Bangla Multi-class Emotion Corpus  25
Transformer-based Text Classification on Unified Bangla Mult...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Sourav, Md Sakib Ullah Mahmud, Mohammad Sultan Zheng, Hua Aljaidi, Mohammad Talukder, Md. Simul Hasan Bin Sulaiman, Rejwan Nur, Abdullah Hafez Al-Qerem, Ahmad Shandong University of Finance and Economics School of Management Science and Engineering Jinan China Shenzhen University College of Computer Science and Software Engineering Senzhen China Software Engineering Institute of Guangzhou Department of Software Engineering Guangzhou510990 China Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Dhaka University of Engineering and Technology Department of Electrical and Electronic Engineering Dhaka Bangladesh Northumbria University Newcastle Tayne School of Computer Science & Technology Northumbria United Kingdom International Islamic University Chittagong Department of Electronic and Telecommunication Engineering Chittagong Bangladesh Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan
Due to its importance in studying people's thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low... 详细信息
来源: 评论
A Theoretical Analysis of Backdoor Poisoning Attacks in Convolutional Neural Networks  41
A Theoretical Analysis of Backdoor Poisoning Attacks in Conv...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Boqi Liu, Weiwei School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera... 详细信息
来源: 评论
Sigma-Delta Modulation for Enhanced Underwater Optical Wireless Communication systems  23
Sigma-Delta Modulation for Enhanced Underwater Optical Wirel...
收藏 引用
23rd International Conference on Transparent Optical Networks, ICTON 2023
作者: Araújo, João H. Rocha, Henrique J. Tavares, Joana S. Salgado, Henrique M. Technology and Science INESC TEC - Institute for Systems and Computer Engineering Porto Portugal University of Porto Faculty of Engineering Porto Portugal
This paper presents an experimental investigation of sigma-delta modulation (SDM) as a means of improving the performance of underwater optical communication systems. The study considers the impact of the key paramete... 详细信息
来源: 评论
Hierarchical vectorization for facial images
收藏 引用
Computational Visual Media 2024年 第1期10卷 97-118页
作者: Qian Fu Linlin Liu Fei Hou Ying He School of Computer Science and Engineering Nanyang Technological University639798SingaporeSingapore Data61 Commonwealth Scientific and Industrial Research OrganisationSydney2015Australia Interdisciplinary Graduate School Nanyang Technological University and Alibaba Group639798SingaporeSingapore State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing100190China University of Chinese Academy of Sciences Beijing100049China
The explosive growth of social media means portrait editing and retouching are in high *** portraits are commonly captured and stored as raster images,editing raster images is non-trivial and requires the user to be h... 详细信息
来源: 评论
IPL Data Analysis by Web Scraping and Using PowerBI
IPL Data Analysis by Web Scraping and Using PowerBI
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Mogith P Mothiswar T B G Mohammad Abubak J. Jagannathan N. Balaganesh Software Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Cricket fans throughout the world avidly follow the Indian Premier League (IPL), a competition of great fame. The IPL data is examined in this using Exploratory Data Analysis (EDA) approaches to find hidden trends, pa... 详细信息
来源: 评论
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection  38
Suitable is the Best: Task-Oriented Knowledge Fusion in Vuln...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Li, Xiang Du, Qianjin Kong, Wei Deng, Huan Kuang, Xiaohui Institute of Systems Engineering Academy of Military Sciences PLA China Department of Computer Science and Technology Tsinghua University China School of Information Science and Engineering Zhejiang Sci-Tech University China
Deep learning technologies have demonstrated remarkable performance in vulnerability detection. Existing works primarily adopt a uniform and consistent feature learning pattern across the entire target set. While desi...
来源: 评论
Collaborative Multi-Agent Proximal Policy Based Resource Allocation in Clustered IoV Networks  10
Collaborative Multi-Agent Proximal Policy Based Resource All...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Raza, Arif Xiang, Junfan Khan, Salabat Shrivastava, Shivanshu Ashraf, M. Wasim Abbas Wang, Lu Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen University College of Electronics and Information Engineering Shenzhen China Qilu Institute of Technology College of Computer and Information Engineering Jinan China Rajiv Gandhi Institute of Petroleum Technology Department of Electrical and Electronics Engineering Amethi India Hanjiang Normal University School of Mathematics and Computer Science Shiyan China
The Internet of Vehicles (IoV) necessitates efficient resource management to meet the growing demands for high data rates, low latency, and real-time communication in Intelligent Transportation systems (ITS). This pap... 详细信息
来源: 评论
Yolo Based License Plate Detection of Triple Riders and Violators
Yolo Based License Plate Detection of Triple Riders and Viol...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Nandhakumar, R.G. Devi, K. Nirmala Krishnamoorthy, N. Shanthi, S. Pranesh, V.R. Nikhalyaa, S. Kongu Enginering College Perundurai Department of Computer Science and Engineering Tamilnadu Erode India Vellore Institutte of Technology School of Information and Engineering Department of Software Systems and Engineering Vellore India
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr... 详细信息
来源: 评论
Smart Cities Implementation: Australian Bushfire Disaster Detection System Using IoT Innovation  5th
Smart Cities Implementation: Australian Bushfire Disaster De...
收藏 引用
5th International Conference on Soft Computing and Signal Processing, ICSCSP 2022
作者: Mohammad, Mohammad Mohammed, Aleem Senior Lecturer and Discipline Leader Software Engineering Melbourne Institute of Technology Sydney Campus Sydney Australia Computer Science Engineering Melbourne Institute of Technology Sydney Australia
Over hundreds of years, Australia is well known with bushfire incidents, especially during summer, which are widely spread across the country. This has impacted badly and contributed in shaping an environment in a sig... 详细信息
来源: 评论