咨询与建议

限定检索结果

文献类型

  • 4,799 篇 会议
  • 3,498 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,321 篇 工学
    • 3,764 篇 计算机科学与技术...
    • 3,111 篇 软件工程
    • 1,222 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 626 篇 电气工程
    • 500 篇 生物工程
    • 498 篇 电子科学与技术(可...
    • 385 篇 机械工程
    • 327 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 194 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 142 篇 网络空间安全
    • 137 篇 交通运输工程
    • 134 篇 建筑学
    • 133 篇 安全科学与工程
  • 2,652 篇 理学
    • 1,449 篇 数学
    • 651 篇 物理学
    • 570 篇 生物学
    • 460 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 208 篇 化学
  • 1,479 篇 管理学
    • 931 篇 管理科学与工程(可...
    • 622 篇 图书情报与档案管...
    • 437 篇 工商管理
  • 297 篇 医学
    • 264 篇 临床医学
    • 217 篇 基础医学(可授医学...
  • 240 篇 法学
    • 189 篇 社会学
  • 133 篇 经济学
    • 133 篇 应用经济学
  • 117 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 156 篇 computational mo...
  • 146 篇 feature extracti...
  • 134 篇 information syst...
  • 134 篇 semantics
  • 133 篇 data mining
  • 122 篇 deep learning
  • 122 篇 quality of servi...
  • 112 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 89 篇 computer archite...
  • 89 篇 software
  • 89 篇 training
  • 87 篇 resource managem...
  • 86 篇 cloud computing
  • 85 篇 artificial intel...
  • 84 篇 protocols

机构

  • 150 篇 state key labora...
  • 112 篇 college of compu...
  • 85 篇 school of inform...
  • 53 篇 shandong provinc...
  • 49 篇 state key labora...
  • 48 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 state key labora...
  • 42 篇 state key labora...
  • 40 篇 shandong provinc...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 35 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 guangdong key la...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 84 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 18 篇 choo kim-kwang r...
  • 18 篇 buyya rajkumar
  • 17 篇 xu xiaolong

语言

  • 7,951 篇 英文
  • 313 篇 其他
  • 122 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8387 条 记 录,以下是311-320 订阅
排序:
IRS/UAV-Based Edge-Computing and Traffic-Offioading Over 6G THz Mobile Wireless Networks
IRS/UAV-Based Edge-Computing and Traffic-Offioading Over 6G ...
收藏 引用
2023 IEEE International Conference on Communications, ICC 2023
作者: Wang, Fei Zhang, Xi Chongqing Key Laboratory of Non-linear Circuit and Intelligent Information Processing College of Electronic and Information Engineering Southwest University Chongqing400715 China Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A&m University College StationTX77843 United States
Intelligent reflecting surface (IRS), unmanned aerial vehicle (UAV), and Terahertz (THz) communications, which are recognized as 6G promising techniques, have attracted significant attentions. We propose UAV energy mi... 详细信息
来源: 评论
A Spatio-Temporal Transformer for Enhancing the Coherence on 3D Human Motion Prediction  18th
A Spatio-Temporal Transformer for Enhancing the Coherence ...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Xie, Miner Wang, Lei Liu, Feng College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
Human motion prediction is of great importance for artificial intelligence systems, particularly in fields like autonomous driving and human-computer interaction. Existing methods have achieved good results in simple ... 详细信息
来源: 评论
A Hybrid Marine Predator Algorithm for Thermal-aware Routing Scheme in Wireless Body Area Networks
收藏 引用
Journal of Bionic engineering 2023年 第1期20卷 81-104页
作者: Tao Hai Jincheng Zhou Mohammad Masdari Haydar Abdulameer Marhoon School of Computer and Information Qiannan Normal University for NationalitiesDuyun558000GuizhouChina Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Duyun558000GuizhouChina Institute for Big Data Analytics and Artificial Intelligence(IBDAAI) Universiti Teknologi MARA40450Shah AlamSelangorMalaysia Department of Computer Engineering Islamic Azad UniversityUrmia BranchUrmiaIran Information and Communication Technology Research Group Scientific Research CenterAl-Ayen UniversityThi-QarIraq College of Computer Sciences and Information Technology University of KerbalaKarbalaIraq
Thermal-aware routing protocols in WBANs consider temperature factors in the routing process for preventing overheating of the tissues surrounding the sensor ***,providing an energy-efficient and thermal-aware routing... 详细信息
来源: 评论
Content-decoupled Contrastive Learning-based Implicit Degradation Modeling for Blind Image Super-Resolution Supplementary Material
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 3013-3024页
作者: Yuan, Jiang Ma, Ji Wang, Bo Hu, Weiming North China Electric Power University School of Control and Computer Engineering Beijing102206 China CASIA State Key Laboratory of Multimodal Artificial Intelligence Systems Beijing100190 China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing100049 China ShanghaiTech University School of Information Science and Technology Shanghai201210 China
Implicit degradation modeling-based blind super-resolution (SR) has attracted more increasing attention in the community due to its excellent generalization to complex degradation scenarios and wide application range.... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Sentiment Analysis of Covid-19 Twitter Data using Deep Learning Algorithm  2
Sentiment Analysis of Covid-19 Twitter Data using Deep Learn...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Valarmathi, B. Gupta, N. Srinivasa Karthick, V. Chellatamilan, T. Santhi, K. Chalicheemala, Dhanush Department of Software and Systems Engineering School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Assistant Systems Engineer Tata Consultancy Services Chennai India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
A key method used in the study of Natural Language Processing (NLP) is sentiment analysis, or emotion analysis, plays a pivotal role in text analysis. Its primary function is to discern and categorize the underlying e... 详细信息
来源: 评论
An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals  9th
An Abstract Domain of Linear Templates with Disjunctive Ri...
收藏 引用
9th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2023
作者: Xu, Han Chen, Liqian Fan, Guangsheng Yin, Banghu Wang, Ji College of Computer National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Software Engineering for Complex Systems Changsha410073 China HPCL National University of Defense Technology Changsha410073 China College of Systems Engineering National University of Defense Technology Changsha410073 China
Abstract interpretation provides a general framework for analyzing the value ranges of program variables while ensuring soundness. Abstract domains are at the core of the abstract interpretation framework, and the num... 详细信息
来源: 评论
DeepGCN based on variable multi‐graph and multimodal data for ASD diagnosis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 879-893页
作者: Shuaiqi Liu Siqi Wang Chaolei Sun Bing Li Shuihua Wang Fei Li College of Electronic and Information Engineering Hebei UniversityBaodingChina Machine Vision Technology Innovation Center of Hebei Province BaodingChina The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijingChina School of Computer Science and Technology Henan Polytechnic UniversityJiaozuoChina
Diagnosing individuals with autism spectrum disorder(ASD)accurately faces great chal-lenges in clinical practice,primarily due to the data's high heterogeneity and limited sample *** tackle this issue,the authors ... 详细信息
来源: 评论