咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 3,560 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 8,437 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,386 篇 工学
    • 3,809 篇 计算机科学与技术...
    • 3,145 篇 软件工程
    • 1,238 篇 信息与通信工程
    • 768 篇 控制科学与工程
    • 671 篇 电气工程
    • 515 篇 电子科学与技术(可...
    • 501 篇 生物工程
    • 389 篇 机械工程
    • 333 篇 光学工程
    • 311 篇 生物医学工程(可授...
    • 219 篇 动力工程及工程热...
    • 196 篇 仪器科学与技术
    • 187 篇 化学工程与技术
    • 148 篇 网络空间安全
    • 141 篇 交通运输工程
    • 136 篇 安全科学与工程
    • 134 篇 建筑学
  • 2,686 篇 理学
    • 1,463 篇 数学
    • 667 篇 物理学
    • 576 篇 生物学
    • 469 篇 统计学(可授理学、...
    • 364 篇 系统科学
    • 208 篇 化学
  • 1,486 篇 管理学
    • 934 篇 管理科学与工程(可...
    • 627 篇 图书情报与档案管...
    • 437 篇 工商管理
  • 303 篇 医学
    • 267 篇 临床医学
    • 221 篇 基础医学(可授医学...
  • 242 篇 法学
    • 189 篇 社会学
  • 135 篇 经济学
    • 135 篇 应用经济学
  • 120 篇 教育学
  • 88 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 152 篇 computational mo...
  • 149 篇 feature extracti...
  • 134 篇 information syst...
  • 134 篇 data mining
  • 134 篇 semantics
  • 122 篇 deep learning
  • 122 篇 quality of servi...
  • 115 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 88 篇 computer archite...
  • 88 篇 resource managem...
  • 88 篇 software
  • 88 篇 training
  • 87 篇 cloud computing
  • 84 篇 artificial intel...
  • 81 篇 protocols

机构

  • 150 篇 state key labora...
  • 114 篇 college of compu...
  • 82 篇 school of inform...
  • 52 篇 shandong provinc...
  • 50 篇 state key labora...
  • 47 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 shandong provinc...
  • 42 篇 state key labora...
  • 41 篇 state key labora...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 33 篇 department of el...
  • 33 篇 guangdong key la...
  • 32 篇 school of comput...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 82 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 41 篇 shen linlin
  • 39 篇 guo hong
  • 37 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 ismail leila
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 20 篇 lu dianjie
  • 19 篇 wei li
  • 19 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 17 篇 zhang lei
  • 17 篇 xu xiaolong

语言

  • 7,985 篇 英文
  • 331 篇 其他
  • 121 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8437 条 记 录,以下是51-60 订阅
排序:
An Empirical Comparison of Machine and Deep Learning Algorithms for Predicting Maternal Health Risk  5th
An Empirical Comparison of Machine and Deep Learning Algorit...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical systems, IC4S 2024
作者: N, Srinivasa Gupta Valarmathi, B. Kavitha, A. Gopini, Sai Bhuvan Seela, Hari Kumar Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Mathematics School of Advanced of Sciences Vellore Institute of Technology Tamil Nadu Vellore India
Maternal health is among the greatest challenges in the world, especially in rural areas as there lack medical practitioners, they do not have easily accessible publics clinics and transport is difficult. Therefore, h... 详细信息
来源: 评论
Adaptive Occlusion Face Recognition Feature Fusion Network Based on Precise Guidance Mask Extraction
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2025年 1-12页
作者: Ye, Jihua Zhang, Lei Wang, Chao Tu, Qixuan Zheng, Rehua Huang, Huiyuan Jiang, Aiwen School of Computer and Information Engineering Jiangxi Normal University Nanchang330022 China Jiangxi Provincial Key Laboratory for High Performance Computing Jiangxi Normal University Nanchang330022 China State International Science & Technology Cooperation Base of Networked Supporting Software Jiangxi Normal University Nanchang330022 China
The uncertainty in the position and size of occluding objects greatly affects the extraction of identity features in facial recognition, which is a challenge that existing methods fail to effectively address. To tackl... 详细信息
来源: 评论
Multi-scale convolutional fusion network embedded with improved attention mechanism for polarimetric synthetic aperture radar image classification
收藏 引用
Journal of Applied Remote Sensing 2025年 第1期19卷
作者: Li, Jiewen Zhu, Yanan Ai, Jiaqiu Zhao, Zhicheng Shi, Jun Hefei University of Technology School of Computer Science and Information Engineering Hefei China Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Hefei China Hefei University of Technology School of Artificial Intelligence Hefei China Hefei University of Technology School of Software Hefei China
Convolutional neural networks (CNNs) have been widely applied in the field of polarimetric synthetic aperture radar (PolSAR) image classification and have achieved good classification results. However, due to the comp... 详细信息
来源: 评论
Mask-guided Multi-scale Spatial-Spectral Transformer for Snapshot Compressive Imaging
Mask-guided Multi-scale Spatial-Spectral Transformer for Sna...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yin, Heyuan Yang, Jingxiang Liu, Jia Xiao, Liang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Key Laboratory of Analysis of Mathematical Theory and Modeling of Complex Systems Ministry of Industry and Information Technology China
Effectively reconstructing 3D hyperspectral images (HSIs) from 2D measurements presents a significant challenge in Coded Aperture Snapshot Spectral Imaging (CASSI) systems. While recent transformers exhibit potential ... 详细信息
来源: 评论
Disentangling Spatio-Temporal Knowledge for Weakly Supervised Object Detection and Segmentation in Surgical Video
Disentangling Spatio-Temporal Knowledge for Weakly Supervise...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Liao, Guiqiu Jogan, Matjaz Koushik, Sai Eaton, Eric Hashimoto, Daniel A. University of Pennsylvania Pcaso Laboratory Department of Surgery United States University of Pennsylvania Department of Electrical and Systems Engineering United States University of Pennsylvania Department of Computer and Information Science United States
Weakly supervised video object segmentation (WSVOS) enables the identification of segmentation maps without requiring extensive annotations of object masks, relying instead on coarse video labels indicating object pre... 详细信息
来源: 评论
Sensitivity of DC Network Representation for GIC Analysis
Sensitivity of DC Network Representation for GIC Analysis
收藏 引用
2025 IEEE Texas Power and Energy Conference, TPEC 2025
作者: Mishra, Aniruddh Barnes, Arthur K. Tabarez, Jose E. Mate, Adam University of Texas at Austin Department of Electrical and Computer Engineering AustinTX United States Information Systems and Modeling Group Los Alamos National Laboratory Los AlamosNM United States
Geomagnetic disturbances are a threat to the reliability and security of our national critical energy infrastructures. These events specifically result in geomagnetically induced currents, which can cause damage to tr... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
LightGBM-Based Audio Watermarking Robust to Recapturing and Hybrid Attacks
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4212-4227页
作者: Su, Zhaopin Weng, Zhaofang Zhang, Guofu Lian, Chensi Wang, Niansong Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei230601 China Joint Laboratory of Intelligent Prevention and Recognition of Audio and Video Anhui Provincial Public Security Department Hefei230000 China
Digital audio watermarking is a critical technology widely used for copyright protection, content authentication, and broadcast monitoring. However, its robustness is significantly challenged by recapturing and hybrid... 详细信息
来源: 评论
On Shaping Gain of Multidimensional Constellations in Linear and Nonlinear Optical Fiber Channel
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1455-1468页
作者: Chen, Bin Liang, Zhiwei Lei, Yi Deng, JingXin Li, Shen Liga, Gabriele Hefei University of Technology School of Computer Science and Information Engineering Hefei230002 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230002 China Chalmers University of Technology Department of Electrical Engineering Gothenburg412 96 Sweden Department of Electrical and Computer Engineering QC Québec CityG1V 0A6 Canada Eindhoven University of Technology Department of Electrical Engineering Eindhoven5612 AZ Netherlands
Utilizing the multi-dimensional (MD) space for constellation shaping has been proven to be an effective approach for achieving shaping gains. Despite there exists a variety of MD modulation formats tailored for specif... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论