咨询与建议

限定检索结果

文献类型

  • 630 篇 会议
  • 353 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 1,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 446 篇 计算机科学与技术...
    • 367 篇 软件工程
    • 140 篇 信息与通信工程
    • 81 篇 控制科学与工程
    • 66 篇 电气工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 生物工程
    • 49 篇 光学工程
    • 44 篇 生物医学工程(可授...
    • 39 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 24 篇 航空宇航科学与技...
    • 22 篇 动力工程及工程热...
    • 20 篇 土木工程
  • 312 篇 理学
    • 146 篇 数学
    • 102 篇 物理学
    • 74 篇 生物学
    • 41 篇 统计学(可授理学、...
    • 40 篇 化学
    • 28 篇 系统科学
  • 187 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 57 篇 医学
    • 50 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 33 篇 法学
    • 31 篇 社会学
  • 18 篇 教育学
  • 15 篇 经济学
  • 8 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 software enginee...
  • 20 篇 semantics
  • 20 篇 training
  • 18 篇 feature extracti...
  • 18 篇 software
  • 16 篇 web services
  • 14 篇 deep learning
  • 13 篇 information tech...
  • 13 篇 machine learning
  • 13 篇 accuracy
  • 12 篇 informatics
  • 12 篇 data mining
  • 12 篇 testing
  • 11 篇 predictive model...
  • 11 篇 convolutional ne...
  • 10 篇 educational inst...
  • 10 篇 quality of servi...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 analytical model...

机构

  • 31 篇 national enginee...
  • 23 篇 university of ch...
  • 21 篇 key laboratory o...
  • 18 篇 institute of inf...
  • 16 篇 guangdong provin...
  • 14 篇 college of compu...
  • 12 篇 school of electr...
  • 12 篇 institute of sof...
  • 11 篇 shenzhen institu...
  • 10 篇 computer vision ...
  • 9 篇 cas center for e...
  • 9 篇 science & techno...
  • 9 篇 national key lab...
  • 9 篇 department of co...
  • 9 篇 guangdong key la...
  • 9 篇 laboratory for i...
  • 9 篇 science and tech...
  • 8 篇 institute of inf...
  • 8 篇 gansu provincial...
  • 7 篇 health managemen...

作者

  • 29 篇 bieliková mária
  • 25 篇 shen linlin
  • 13 篇 valentino vranić
  • 13 篇 vranic valentino
  • 10 篇 zheng changwen
  • 10 篇 vranić valentino
  • 9 篇 wang qing
  • 9 篇 qiang wenwen
  • 9 篇 linlin shen
  • 8 篇 wang jinbao
  • 8 篇 yu zitong
  • 8 篇 gao can
  • 7 篇 barla michal
  • 7 篇 tao dacheng
  • 7 篇 yunhao liu
  • 7 篇 si lingyu
  • 6 篇 chen zhong
  • 6 篇 bin hu
  • 6 篇 si thu thant sin
  • 6 篇 li jiangmeng

语言

  • 870 篇 英文
  • 112 篇 其他
  • 22 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of System and Software Engineering and Information Technologies"
1002 条 记 录,以下是251-260 订阅
排序:
Att-TCN: An Advertising Attribution Method Based on Temporal Convolutional Network with Attention Mechanism
Att-TCN: An Advertising Attribution Method Based on Temporal...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Bowen Xie Yi Sun Zhaowen Lin Baoquan Ma School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Technologies Beijing China National Computer System Engineering Research Institute of China Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China
Advertising attribution is an effective method to measure the effect of various advertisements in the era of Internet advertising. It enables scientific tracking back and refined operation of advertising by quantitati... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Neurocomputational Modelling of EEG Connectivity: Links Between Depression, Inflammation, and Gut-Microbiome  17th
Neurocomputational Modelling of EEG Connectivity: Links Betw...
收藏 引用
17th International Conference on Brain Informatics, BI 2024
作者: Doborjeh, Zohreh lavin, Daniel Hunter, Kirsty Heym, Nadja Heasman, Bryony Doborjeh, Maryam Kasabov, Nikola Gibson, Glen Sumich, Alexander School of Engineering Computer and Mathematical Sciences Knowledge Engineering and Discovery Research Institute Auckland University of Technology Auckland New Zealand School of Population Health Faculty of Medical and Health Sciences The University of Auckland Auckland New Zealand Department of Sport Science School of Science and Technology Nottingham Trent University Nottingham United Kingdom NTU Psychology School of Social Sciences Nottingham Trent University Nottingham United Kingdom School of Software Engineering Dalian University Dalian China Institute for Information and Communication Technologies Bulgarian Academy of Sciences Sofia Bulgaria Department of Food and Nutritional Sciences The University of Reading Whiteknights Reading United Kingdom Department of Psychology and Neuroscience Auckland University of Technology Auckland New Zealand
The immune and enteric systems have been implicated in psychopathology, including depressive disorders. However, the precise neurocognitive mechanisms remain unclear. The present study uses Brain-Inspired Spiking Neur... 详细信息
来源: 评论
FEAT: Towards Fast Environment-Adaptive Task Offloading and Power Allocation in MEC
FEAT: Towards Fast Environment-Adaptive Task Offloading and ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Tao Ren Zheyuan Hu Hang He Jianwei Niu Xuefeng Liu Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China Zhongguancun Laboratory Beijing China Zhengzhou University Research Institute of Industrial Technology School of Information Engineering Zhengzhou University Zhengzhou China
Mobile edge computing (MEC) has been proposed to provide mobile devices with both satisfactory computing resources and latency. Key issues in MEC include task offloading and power allocation (TOPA), for which deep rei...
来源: 评论
A Dimensional Structure based Knowledge Distillation Method for Cross-Modal Learning
arXiv
收藏 引用
arXiv 2023年
作者: Si, Lingyu Dong, Hongwei Qiang, Wenwen Yu, Junzhi Zhai, Wenlong Zheng, Changwen Xu, Fanjiang Sun, Fuchun Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences China College of Engineering Peking University China Department of Computer Science and Technology Tsinghua University China
Due to limitations in data quality, some essential visual tasks are difficult to perform independently. Introducing previously unavailable information to transfer informative dark knowledge has been a common way to so... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
Enabling Communication-Efficient Federated Learning via Distributed Compressed Sensing
Enabling Communication-Efficient Federated Learning via Dist...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Yixuan Guan Xuefeng Liu Tao Ren Jianwei Niu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China Zhongguancun Laboratory Beijing China Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences Beijing China Zhengzhou University Research Institute of Industrial Technology School of Information Engineering Zhengzhou University Zhengzhou China
Federated learning (FL) trains a shared global model by periodically aggregating gradients from local devices. Communication overhead becomes a principal bottleneck in FL since participating devices usually suffer fro...
来源: 评论
DearLLM: Enhancing Personalized Healthcare via Large Language Models-Deduced Feature Correlations  39
DearLLM: Enhancing Personalized Healthcare via Large Languag...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Yongxin Jiang, Xinke Chu, Xu Qiu, Rihong Feng, Yujie Ding, Hongxin Zhao, Junfeng Wang, Yasha Xie, Bing School of Computer Science School of Software & Microelectronics Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China National Engineering Research Center For Software Engineering Peking University Beijing China Center on Frontiers of Computing Studies Peking University Beijing China Peking University Information Technology Institute Binhai Tianjin China Nanhu Laboratory Jiaxing China Department of Computing The Hong Kong Polytechnic University Hong Kong
Exploring the correlations between medical features is essential for extracting patient health patterns from electronic health records (EHR) data, and strengthening medical predictions and decision-making. To constrai... 详细信息
来源: 评论
A Generalized Hybrid Hoare Logic
arXiv
收藏 引用
arXiv 2023年
作者: Zhan, Naijun Jin, Xiangyu Zhan, Bohua Wang, Shuling Guelev, Dimitar School of Computer Science Peking University Institute of Software Chinese Academy of Sciences Beijing China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences University of CAS Beijing China Huawei Technologies Co. Ltd. Beijing China National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences University of CAS Beijing China Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia Bulgaria
Deductive verification of hybrid systems (HSs) increasingly attracts more attention in recent years because of its power and scalability, where a powerful specification logic for HSs is the cornerstone. Often, HSs are... 详细信息
来源: 评论
Scale-Aware Cnn for Crowd Density Estimation and Crowd Behaviour Analysis
SSRN
收藏 引用
SSRN 2022年
作者: Sharma, Vipul Mir, Roohie Naaz Singh, Chandrapal Department of Computer Science Engineering and Information Technology Jaypee Uuiversity of Information Technology Waknaghat India Department of Computer Science and Engineering National Institute of Technology Srinagar India Xsyss Software Technologies Bengaluru India
Visual surveillance is a highly demanded system in various real-time applications for civil and military sectors. For huge gatherings such as rallies and stadiums, crowd monitoring becomes a tedious task. Moreover, cr... 详细信息
来源: 评论