咨询与建议

限定检索结果

文献类型

  • 894 篇 会议
  • 572 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 997 篇 工学
    • 676 篇 计算机科学与技术...
    • 594 篇 软件工程
    • 212 篇 信息与通信工程
    • 159 篇 控制科学与工程
    • 108 篇 生物工程
    • 107 篇 电气工程
    • 102 篇 机械工程
    • 73 篇 生物医学工程(可授...
    • 68 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 52 篇 化学工程与技术
    • 40 篇 安全科学与工程
    • 30 篇 动力工程及工程热...
    • 29 篇 土木工程
    • 28 篇 仪器科学与技术
    • 28 篇 建筑学
    • 28 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 494 篇 理学
    • 273 篇 数学
    • 111 篇 生物学
    • 101 篇 物理学
    • 79 篇 统计学(可授理学、...
    • 75 篇 系统科学
    • 51 篇 化学
  • 284 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 43 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 22 篇 经济学
  • 17 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 54 篇 training
  • 38 篇 semantics
  • 34 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 data mining
  • 26 篇 deep learning
  • 26 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 21 篇 accuracy
  • 20 篇 computer science
  • 19 篇 robustness
  • 18 篇 reinforcement le...
  • 18 篇 machine learning
  • 18 篇 data models
  • 16 篇 image segmentati...
  • 16 篇 software enginee...
  • 15 篇 conferences

机构

  • 69 篇 college of compu...
  • 56 篇 beijing key labo...
  • 51 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 36 篇 guangdong key la...
  • 35 篇 key laboratory o...
  • 35 篇 national enginee...
  • 31 篇 state key labora...
  • 29 篇 guangdong provin...
  • 23 篇 school of comput...
  • 22 篇 seventh research...
  • 21 篇 shenzhen institu...
  • 19 篇 school of inform...
  • 19 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 16 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...
  • 14 篇 guangdong key la...

作者

  • 78 篇 junping du
  • 52 篇 shen linlin
  • 51 篇 yingmin jia
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 18 篇 huadong ma
  • 17 篇 jia yingmin
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 yu fashan
  • 12 篇 liang liu
  • 12 篇 wang jinbao
  • 11 篇 deyuan meng
  • 11 篇 zhang qiang
  • 11 篇 xi zhang
  • 11 篇 dou wanchun

语言

  • 1,339 篇 英文
  • 100 篇 其他
  • 30 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1467 条 记 录,以下是211-220 订阅
排序:
Optimization of Memory March X Test Algorithm Based on Nuclear Safety Level DCS System Platform  1
收藏 引用
9th International Conference on Energy engineering and Environmental engineering, ICEEEE 2022
作者: Bai, Yongfei Wu, Zhiqiang Liu, Jie Jiang, Wei Zhong, Ke Han, Wenxing Chen, Zhi School of Computer Science University of South China Hengyang421200 China Nuclear Power Institute of China Chengdu610000 China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hunan Hengyang China
At present, the testing algorithm of nuclear power safety level DCS system for memory is GALPAT algorithm. This algorithm has a high time complexity and low fault coverage for memory. During the testing process, addit... 详细信息
来源: 评论
Performance Verification of State Feedback H∞ State Molecular Controller Via Chemical Reaction Networks  5
Performance Verification of State Feedback H∞ State Molecul...
收藏 引用
5th International Conference on Industrial Artificial Intelligence, IAI 2023
作者: Yao, Jingwang Wang, Xing'An Lv, Hui Li, Yang Zhang, Wujie Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Dalian University College of Environmental and Chemical Engineering Dalian116622 China Dalian Chivy Biotechnology Co. Ltd Dalian116023 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-poi... 详细信息
来源: 评论
Domain Adaptation Random Vector Functional Link for White Blood Cell Classification
Domain Adaptation Random Vector Functional Link for White Bl...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Qin Wang Xi-Zhao Wang Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
There's growing recognition of how machine learning can revolutionize the precision and swiftness of clinical diagnoses by improving the classification of white blood cells. However, a machine learning model speci... 详细信息
来源: 评论
CMANet: A CNN-Mamba aggregation network for face super-resolution
收藏 引用
Pattern Recognition 2025年 168卷
作者: Wu, Ziyi Lu, Tao Zhang, Yanduo Chai, Xiaoyu Hubei Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan China Computer School Hubei University of Arts and Science Xiangyang China National Engineering Research Center for Multimedia Software Wuhan University Wuhan China
Currently, most face super-resolution (FSR) methods rely on convolutional neural networks (CNNs) or Transformers, both of which have inherent limitations: CNNs suffer from a limited receptive field, while Transformers... 详细信息
来源: 评论
Survey of Multimedia Information Mining Techniques Based on Deep Learning in the Context of Crime Domain  20
Survey of Multimedia Information Mining Techniques Based on ...
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Yuandan, Deng Bo, Chen Weiqin, Chen Bohang, Sun Juntao, Zeng Yanling, Mao Sichuan Provincial Key Laboratory of Intelligent Terminal Jointly Built by Hall and City Yi Bin644000 China University of Electronic Science and Technology of China Yi Bin644000 China School of Information and Software Engineering University of Electronic Science and Technology of China Cheng Du61000 China
The rapid expansion of multimedia data has made multimedia data mining a crucial area of research in the field of crime. In the realm of crime, the significance of multimedia data mining lies in its ability to reveal ... 详细信息
来源: 评论
MC-PDARTS: Multi-Cell Progressive Differentiable Architecture Search
MC-PDARTS: Multi-Cell Progressive Differentiable Architectur...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qun Liu Yi Cai Junying Chen School of Software Engineering South China University of Technology Key Laboratory of Big Data and Intelligent Robot (SCUT) Ministry of Education Guangzhou China
Recently, network architecture search has been practiced in more and more tasks, but its high cost makes it difficult for small research teams or individual researchers to follow. Differentiable architecture search (D...
来源: 评论
Security and privacy with opacity-based state observation for finite state machine
Security and privacy with opacity-based state observation fo...
收藏 引用
作者: Zhang, Zhipeng Xia, Chengyi Chen, Shengyong Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China
Topics on security and privacy are very fundamental and important in the Internet of Things (IoT). In this paper, we explore the impact of state observation on the opacity of IoT, which is modeled by Moore-type finite... 详细信息
来源: 评论
Compact and Accurate Adaptive Width Radial Basis Function Neural Network with Discriminative Features for Thyroid Gland Segmentation
Compact and Accurate Adaptive Width Radial Basis Function Ne...
收藏 引用
IEEE/RSJ International Conference on intelligent Robots and Systems (IROS)
作者: Haijun You Junying Chen School of Software Engineering South China University of Technology Key Laboratory of Big Data and Intelligent Robot (SCUT) Ministry of Education Guangzhou China
The goal of this work is to develop a fast, compact, accurate, and robust neural network for automatic thyroid gland segmentation in medical ultrasound images when the computational resources are limited, such as port...
来源: 评论
Predictive ISAC Beamforming Using LoRA-Transformer LSTM Integrated with GNN in Ultra-Dense D2D mmWave Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Liu, Haochen Bi, Jia Li, Bohan Xiang, Luping Yang, Xin Zhang, Zhaolin Wang, Ling Northwestern Polytechnical University School of Electronics and Information Xi'an710019 China Rutherford Appleton Laboratory Scientific Computing Department STFC DidcotOX11 0QX United Kingdom Ocean University of China Faculty of Information Science and Engineering Qingdao266100 China Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou China
Effective beamforming is crucial in ultra-dense device-to-device (D2D) mmWave networks to reduce interference and optimize communication. However, current methods often struggle to balance high data rates with minimal... 详细信息
来源: 评论
Data Augmentation for Vulnerability Detection Based on Code Refactoring and Mixup
Data Augmentation for Vulnerability Detection Based on Code ...
收藏 引用
IEEE International Conference on software Reliability engineering Workshops (ISSRE Wksp)
作者: Ying Xing Jiaqi Huang Guilong Wang Yehao You Bin Yang Xiaofeng Li Yixing Luo School of Intelligent Engineering and Automation Beijing University of Posts and Telecommunications Beijing China School of Artifcial Intelligence Beijing University of Posts and Telecommunications Beijing China Yunnan Key Laboratory of Software Engineering Yunnan China China Unicom Research Institute Beijing China Software Development Center Beijing Institute of Control Engineering Beijing China
In recent years, the number of software vulnerabilities has gradually increased, posing a threat to the security of software, and identifying whether there are vulnerabilities in software is crucial for assuring its q...
来源: 评论