咨询与建议

限定检索结果

文献类型

  • 7,219 篇 会议
  • 4,730 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 11,969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,023 篇 工学
    • 5,726 篇 计算机科学与技术...
    • 4,718 篇 软件工程
    • 1,449 篇 信息与通信工程
    • 963 篇 控制科学与工程
    • 742 篇 生物工程
    • 623 篇 电气工程
    • 614 篇 机械工程
    • 590 篇 电子科学与技术(可...
    • 445 篇 化学工程与技术
    • 425 篇 光学工程
    • 404 篇 生物医学工程(可授...
    • 307 篇 仪器科学与技术
    • 303 篇 材料科学与工程(可...
    • 267 篇 动力工程及工程热...
    • 214 篇 网络空间安全
    • 211 篇 土木工程
    • 204 篇 建筑学
    • 201 篇 交通运输工程
    • 198 篇 安全科学与工程
  • 3,698 篇 理学
    • 2,198 篇 数学
    • 798 篇 物理学
    • 798 篇 生物学
    • 609 篇 统计学(可授理学、...
    • 380 篇 系统科学
    • 357 篇 化学
  • 2,260 篇 管理学
    • 1,371 篇 管理科学与工程(可...
    • 994 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 270 篇 医学
    • 229 篇 临床医学
  • 260 篇 法学
    • 214 篇 社会学
  • 149 篇 经济学
  • 119 篇 教育学
  • 99 篇 农学
  • 32 篇 艺术学
  • 31 篇 文学
  • 31 篇 军事学
  • 11 篇 哲学

主题

  • 324 篇 semantics
  • 277 篇 feature extracti...
  • 274 篇 software enginee...
  • 256 篇 laboratories
  • 219 篇 computational mo...
  • 204 篇 computer science
  • 201 篇 data mining
  • 184 篇 deep learning
  • 162 篇 training
  • 155 篇 optimization
  • 134 篇 educational inst...
  • 133 篇 algorithm design...
  • 117 篇 predictive model...
  • 116 篇 software
  • 112 篇 wireless sensor ...
  • 109 篇 image segmentati...
  • 108 篇 convolution
  • 107 篇 machine learning
  • 101 篇 conferences
  • 99 篇 quality of servi...

机构

  • 634 篇 state key labora...
  • 481 篇 state key labora...
  • 370 篇 beijing key labo...
  • 211 篇 school of comput...
  • 193 篇 university of ch...
  • 182 篇 college of compu...
  • 142 篇 state key labora...
  • 142 篇 state key labora...
  • 121 篇 key laboratory o...
  • 112 篇 state key labora...
  • 111 篇 national key lab...
  • 103 篇 school of comput...
  • 101 篇 state key labora...
  • 97 篇 school of inform...
  • 92 篇 beijing key labo...
  • 81 篇 guangxi key labo...
  • 80 篇 school of softwa...
  • 77 篇 national enginee...
  • 76 篇 beijing key labo...
  • 74 篇 beijing key labo...

作者

  • 93 篇 yin baocai
  • 93 篇 junping du
  • 79 篇 baocai yin
  • 75 篇 du junping
  • 61 篇 wu bin
  • 58 篇 huadong ma
  • 55 篇 gao yang
  • 53 篇 ma huadong
  • 51 篇 tao dacheng
  • 48 篇 bin wu
  • 42 篇 xiao limin
  • 40 篇 zhang lei
  • 39 篇 wang qing
  • 39 篇 lishan kang
  • 39 篇 huang di
  • 38 篇 shen furao
  • 37 篇 yanfeng sun
  • 36 篇 liu yang
  • 35 篇 yunhui shi
  • 35 篇 xue zhe

语言

  • 10,653 篇 英文
  • 1,035 篇 其他
  • 296 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Intelligent Software and Software Engineering"
11969 条 记 录,以下是61-70 订阅
排序:
Research on Prediction of ChiNext and Blue-Chip Stocks in the Chinese Stock Market Based on Random Forest Algorithm  14
Research on Prediction of ChiNext and Blue-Chip Stocks in th...
收藏 引用
14th International Conference on Electronics, Communications and Networks, CECNet 2024
作者: Xie, Guoli Yang, Lei Tian, Liwei Li, Sijin Lai, Jiacheng Guangdong University of Science and Technology Dongguan China Dongguan Key Laboratory of Industrial Software for Intelligent Manufacturing China
This research focuses on the predictive analysis of ChiNext and blue-chip stocks in the Chinese stock market, employing the random forest model to conduct in-depth research on the stock trends of these two sectors. In... 详细信息
来源: 评论
Unsupervised Multimodal Graph Contrastive Semantic Anchor Space Dynamic Knowledge Distillation Network for Cross-Media Hash Retrieval  40
Unsupervised Multimodal Graph Contrastive Semantic Anchor Sp...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Yu, Yang Liang, Meiyu Yin, Mengran Lu, Kangkang Du, Junping Xue, Zhe Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Communication Software and Multimedia Beijing100876 China
Cross-media hash retrieval are efficient and effective techniques for retrieval on multi-media database. The success of the Multimodal Large Models (MLM) provides a valuable direction to enhance the accuracy of multim... 详细信息
来源: 评论
Defect detection methods for smart contracts based on multimodality
Defect detection methods for smart contracts based on multim...
收藏 引用
2024 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2024
作者: Tambadou, Sidy Zhang, Xueyuan Wang, Guanghui Zuo, Fang School of Software Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University China
With the popularization of blockchain technology, the application of smart contracts in various scenarios is becoming increasingly ***, due to its inherent complexity and dynamism, the security issues of smart contrac... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Decision Tree Prediction Based on Preceding Feature engineering
Decision Tree Prediction Based on Preceding Feature Engineer...
收藏 引用
2024 International Conference on Optical Communication and Optoelectronic Technology, OCOT 2024
作者: Xie, Guoli Yang, Lei Li, Sijin Lai, Jiacheng Guangdong University of Science and Technology Dongguan China Dongguan Key Laboratory of Industrial Software for Intelligent Manufacturing China
This research employed feature engineering techniques to preprocess an original stock dataset, followed by the introduction of a decision tree prediction model for forecasting the dataset. Experimental results demonst... 详细信息
来源: 评论
MLDA:a multi-level k-degree anonymity scheme on directed social network graphs
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 199-215页
作者: Yuanjing HAO Long LI Liang CHANG Tianlong GU Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China Engineering Research Center of Trustworthy AI(Ministry of Education) Jinan UniversityGuangzhou 510632China
With the emergence of network-centric data,social network graph publishing is conducive to data analysts to mine the value of social networks,analyze the social behavior of individuals or groups,implement personalized... 详细信息
来源: 评论
A Novel Locomotion Rule Rmbedding Long Short-Term Memory Network with Attention for Human Locomotor Intent Classification Using Multi-Sensors Signals
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4349-4370页
作者: Jiajie Shen Yan Wang Dongxu Zhang Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of EducationColleague of Computer Science and TechnologyJilin UniversityChangchun130012China College of Software and Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of EducationJilin UniversityChangchun130012China
Locomotor intent classification has become a research hotspot due to its importance to the development of assistive robotics and wearable *** work have achieved impressive performance in classifying steady locomotion ... 详细信息
来源: 评论
Multimodal Interactive Network for Sequential Recommendation
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 911-926页
作者: 韩滕跃 王鹏飞 牛少彰 Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and TelecommunicationsBeijing 100876China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Building an effective sequential recommendation system is still a challenging task due to limited interactions among users and *** work has shown the effectiveness of incorporating textual or visual information into s... 详细信息
来源: 评论
Research on the application of a hybrid model based on deep learning and cluster analysis in anomaly detection of cloud platform access  4
Research on the application of a hybrid model based on deep ...
收藏 引用
4th International Conference on Computer Vision and Pattern Analysis, ICCPA 2024
作者: Li, Guohua Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University Wuzhou China Guangxi Colleges and Universities Key Laboratory of Intelligent Industry Software Wuzhou University Wuzhou China
With the rapid development of digitalization, cloud platforms have become a key technology supporting remote networking. However, the accompanying cybersecurity issues, particularly the detection of anomalous access a... 详细信息
来源: 评论
Expression Recognition and intelligent Classroom State Mining in Teaching Videos Based on Semi-Supervised Learning Generative Adversarial Network  5
Expression Recognition and Intelligent Classroom State Minin...
收藏 引用
5th International Conference on Data-Driven Optimization of Complex Systems, DOCS 2023
作者: Fan, Ruoyu Liang, Meiyu Yin, Mengran Du, Junping Multimedia School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Communication Software Beijing China
We constructed a student classroom teaching video dataset, constructed a student classroom expression dataset through video frame extraction, face detection, face alignment, and facial extraction, and constructed a st... 详细信息
来源: 评论