咨询与建议

限定检索结果

文献类型

  • 1,692 篇 会议
  • 1,340 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,100 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,018 篇 工学
    • 1,534 篇 计算机科学与技术...
    • 1,264 篇 软件工程
    • 449 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 211 篇 电气工程
    • 162 篇 光学工程
    • 150 篇 电子科学与技术(可...
    • 147 篇 机械工程
    • 141 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 67 篇 网络空间安全
  • 1,024 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 169 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 595 篇 管理学
    • 370 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 148 篇 医学
    • 132 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 108 篇 法学
    • 84 篇 社会学
  • 56 篇 经济学
    • 55 篇 应用经济学
  • 55 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 77 篇 machine learning
  • 71 篇 software enginee...
  • 69 篇 deep learning
  • 63 篇 training
  • 61 篇 feature extracti...
  • 53 篇 data mining
  • 53 篇 computational mo...
  • 52 篇 artificial intel...
  • 46 篇 accuracy
  • 42 篇 semantics
  • 41 篇 cloud computing
  • 39 篇 internet of thin...
  • 37 篇 predictive model...
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 34 篇 authentication
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 71 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 28 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 23 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 23 篇 institute of sof...
  • 22 篇 software enginee...

作者

  • 51 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 19 篇 mahmood khalid
  • 18 篇 ashok kumar das
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 14 篇 wang wei
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,843 篇 英文
  • 208 篇 其他
  • 54 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3100 条 记 录,以下是381-390 订阅
排序:
Speaking from Experience: Co-designing E-textile Projects with Older Adult Fiber Crafters  23
Speaking from Experience: Co-designing E-textile Projects wi...
收藏 引用
17th International Conference on Tangible, Embedded, and Embodied Interaction, TEI 2023
作者: Jelen, Ben Lazar, Amanda Harrington, Christina Pradhan, Alisha Siek, Katie A. Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre HauteIN United States College of Information Studies University of Maryland College ParkMD United States HCI Institute Carnegie Mellon University College ParkMD United States School of Informatics Computing Engineering Indiana University BloomingtonIN United States
Researchers support race, gender, and age diverse groups of people to create with maker electronics. These groups include older adults, who are often overlooked as not interested or capable of learning new technologie... 详细信息
来源: 评论
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3035-3050页
作者: Xiaorui Zhang Xun Sun Xingming Sun Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The leakage of medical audio data in telemedicine seriously violates the privacy of *** order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is p... 详细信息
来源: 评论
Activity Diagram Synthesis Using Labelled Graphs and the Genetic Algorithm
收藏 引用
Journal of computer science & Technology 2021年 第6期36卷 1388-1406页
作者: Chun-Hui Wang Zhi Jin Wei Zhang Didar Zowghi Hai-Yan Zhao Wen-Pin Jiao Key Laboratory of High Confidence Software Technology(Ministry of Education) Peking University Beijing 100871China Institute of Software School of Electronics Engineering and Computer SciencePeking UniversityBeijing 100871China School of Computer Science Inner Mongolia Normal UniversityHohhot 010022China Faculty of Engineering and Information Technology University of TechnologySydney 2007Australia
Many applications need to meet diverse requirements of a large-scale distributed user *** challenges the current requirements engineering ***-based requirements engineering was proposed as an umbrella term for dealing... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection
收藏 引用
computer Systems science & engineering 2022年 第6期41卷 1043-1056页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Xingming Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszowVoivodeship100031Poland
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the *** order to ensure the safe transmission and s... 详细信息
来源: 评论
Cost Minimization in Serverless Computing with Energy Harvesting SECs
Cost Minimization in Serverless Computing with Energy Harves...
收藏 引用
2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2023
作者: Li, Yunqi Liu, Jing Jiang, Bin Yang, Changlin Wang, Qingtian Zhongyuan University of Technology School of Computer Science China State Information Center Beijing China China Scholarship Council China Sun Yat-sen University School of Software Engineering China China Telecom Research Institute Beijing China
With an increasing number of Mobile Users (MUs), Multi-access edge computing (MEC) has become a bottleneck in resource limitation. Serverless edge computing (SEC) is a promising approach to effectively alleviate the s... 详细信息
来源: 评论
HairDiffusion: vivid multi-colored hair editing via latent diffusion  24
HairDiffusion: vivid multi-colored hair editing via latent d...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Yu Zeng Yang Zhang Jiachen Liu Linlin Shen Kaijun Deng Weizhao He Jinbao Wang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University and Shenzhen Institute of Artificial Intelligence and Robotics for Society and National Engineering Laboratory for Big Data System Computing Technology Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University and Guangdong Provincial Key Laboratory of Intelligent Information Processing
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Machine Learning Algorithms for Intrusion Detection Performance Evaluation and Comparative Analysis  4
Machine Learning Algorithms for Intrusion Detection Performa...
收藏 引用
4th International Conference on Smart Electronics and Communication, ICOSEC 2023
作者: Irfan, B. Md. Poornima, V. Mohana Kumar, S. Aswal, Upendra Singh Krishnamoorthy, N. Maranan, Ramya Nalsar University of Law Department of Information Technology Telengana Hyderabad500101 India VISTAS Pallavaram Department of Computer Science Chennai India Ramaiah Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru560054 India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun248002 India Vellore Institute of Technology Vellore Campus Department of Software Systems and Engineering Tamilnadu Vellore632014 India Saveetha School of Engineering Simats Department of Research and Innovation Tamil Nadu Chennai600124 India
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection s... 详细信息
来源: 评论
Tropical Cyclone Intensity Prediction Using Deep Learning Techniques- A Survey
Tropical Cyclone Intensity Prediction Using Deep Learning Te...
收藏 引用
International Conference on Applied Electromagnetics, Signal Processing and Communication (AESPC)
作者: Ilayaraja V S.P. Rajamohana Jagadeesan S V. Aishwarya M. Rakesh School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamilnadu India Department of Computer Science School of Engineering & Technology Pondicherry University Karaikal Puducherry India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India
Tropical cyclones, characterized by strong winds and heavy rainfall, threaten human life in coastal regions crucial to the economy, including fisheries, agriculture, tourism, and infrastructure. Their frequent occurre... 详细信息
来源: 评论
Dual Cross-Stage Partial Learning for Detecting Objects in Dehazed Images
Dual Cross-Stage Partial Learning for Detecting Objects in D...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Jinbiao Zhao Zhao Zhang Jiahuan Ren Haijun Zhang Zhongqiu Zhao Meng Wang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China Department of Computer Science Harbin Institute of Technology Shenzhen China
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf... 详细信息
来源: 评论