咨询与建议

限定检索结果

文献类型

  • 4,861 篇 会议
  • 3,580 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 8,530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,429 篇 工学
    • 3,832 篇 计算机科学与技术...
    • 3,137 篇 软件工程
    • 1,253 篇 信息与通信工程
    • 796 篇 控制科学与工程
    • 666 篇 电气工程
    • 517 篇 电子科学与技术(可...
    • 508 篇 生物工程
    • 402 篇 机械工程
    • 342 篇 光学工程
    • 317 篇 生物医学工程(可授...
    • 221 篇 动力工程及工程热...
    • 195 篇 仪器科学与技术
    • 194 篇 化学工程与技术
    • 157 篇 网络空间安全
    • 150 篇 交通运输工程
    • 143 篇 建筑学
    • 143 篇 安全科学与工程
  • 2,699 篇 理学
    • 1,464 篇 数学
    • 674 篇 物理学
    • 578 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 211 篇 化学
  • 1,505 篇 管理学
    • 950 篇 管理科学与工程(可...
    • 634 篇 图书情报与档案管...
    • 441 篇 工商管理
  • 309 篇 医学
    • 272 篇 临床医学
    • 221 篇 基础医学(可授医学...
  • 245 篇 法学
    • 195 篇 社会学
  • 134 篇 经济学
    • 134 篇 应用经济学
  • 121 篇 教育学
  • 86 篇 农学
  • 34 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 282 篇 laboratories
  • 192 篇 computer science
  • 176 篇 software enginee...
  • 159 篇 computational mo...
  • 146 篇 feature extracti...
  • 135 篇 data mining
  • 134 篇 information syst...
  • 134 篇 semantics
  • 133 篇 deep learning
  • 122 篇 quality of servi...
  • 110 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 90 篇 software
  • 89 篇 resource managem...
  • 88 篇 computer archite...
  • 88 篇 optimization
  • 88 篇 cloud computing
  • 87 篇 accuracy
  • 85 篇 training

机构

  • 146 篇 state key labora...
  • 124 篇 college of compu...
  • 82 篇 school of inform...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 47 篇 state key labora...
  • 45 篇 university of ch...
  • 42 篇 state key labora...
  • 42 篇 shandong provinc...
  • 40 篇 state key labora...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 department of co...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 guangdong key la...
  • 33 篇 school of inform...
  • 31 篇 department of el...
  • 31 篇 beijing key labo...

作者

  • 79 篇 xi zhang
  • 59 篇 rajkumar buyya
  • 45 篇 shen linlin
  • 39 篇 guo hong
  • 37 篇 junping du
  • 34 篇 niyato dusit
  • 29 篇 tao dacheng
  • 24 篇 zhang zhao
  • 21 篇 wang lei
  • 21 篇 ismail leila
  • 21 篇 xiong zehui
  • 20 篇 lu dianjie
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 hong liu
  • 18 篇 wang wei
  • 18 篇 choo kim-kwang r...
  • 17 篇 yu huiqun

语言

  • 7,335 篇 英文
  • 1,080 篇 其他
  • 124 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8530 条 记 录,以下是861-870 订阅
排序:
MSAF: A Multi-Scale Attention-Fusion Model for Long-Term Cell-Level Network Traffic Prediction  6
MSAF: A Multi-Scale Attention-Fusion Model for Long-Term Cel...
收藏 引用
6th International Conference on Electrical, Control and Instrumentation engineering, ICECIE 2024
作者: Ma, Xuesen Li, Jingqi Li, Dacheng Li, Yangyu Qiao, Yan School of Computer Science and Information Engineering Hefei University of Technology Hefei China Hefei University of Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China Hefei Institutes of Physical Science Chinese Academy of Sciences Hefei China Hefei University of Technology Hefei China
Implementing precise network traffic prediction is essential for optimizing base station strategies, allocating network resources effectively, reducing costs, and ensuring service quality in network management. Curren... 详细信息
来源: 评论
Crowdsourced Requirements engineering Challenges and Solutions:A software Industry Perspective
收藏 引用
computer systems Science & engineering 2021年 第11期39卷 221-236页
作者: Huma Hayat Khan Muhammad Noman Malik Youseef Alotaibi Abdulmajeed Alsufyani Saleh Alghamdi Department of Software Engineering National University of Modern LanguagesIslamabadPakistan Department of Computer Science National University of Modern LanguagesIslamabadPakistan Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityPO Box 11099TaifSaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
software crowdsourcing(SW CS)is an evolving software development paradigm,in which crowds of people are asked to solve various problems through an open call(with the encouragement of prizes for the top solutions).Beca... 详细信息
来源: 评论
Self-representation-based Generative Graph Neural Networks for End-to-End Link Prediction
收藏 引用
IEEE Transactions on Big Data 2025年
作者: Xian, Xingping Wu, Tao Qiao, Shaojie Wang, Chao Yuan, Lin Liu, Yanbing School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computer and Information Science Chongqing Normal University Chongqing China Chongqing Engineering Laboratory of Internet and Information Security Chongqing University of Posts and Telecommunications Chongqing400065 China
Recently, deep neural networks have revolutionized the field of link prediction, and the state-of-the-art works are typically subgraph-based discriminative methods, which construct features of local subgraphs firstly ... 详细信息
来源: 评论
A Generalized Binary Tree Mechanism for Differentially Private Approximation of All-Pair Distances
arXiv
收藏 引用
arXiv 2025年
作者: Dinitz, Michael Fan, Chenglin Liu, Jingcheng Upadhyay, Jalaj Zou, Zongrui Department of Computer Science Johns Hopkins University United States Department of Computer Science and Engineering Seoul National University Korea Republic of State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University China Management Science & Information Systems Department Rutgers University United States
We study the problem of approximating all-pair distances in a weighted undirected graph with differential privacy, introduced by Sealfon [Sea16]. Given a publicly known undirected graph, we treat the weights of edges ... 详细信息
来源: 评论
Keep It Simple: Towards Accurate Vulnerability Detection for Large Code Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Peng, Xin Wang, Shangwen Qin, Yihao Lin, Bo Chen, Liqian Mao, Xiaoguang Cheng, Jieren The Key Laboratory of Software Engineering for Complex Systems College of Computer Science and Technology National University of Defense Technology Changsha China The Hainan University Haikou China
software vulnerability detection is crucial for high-quality software development. Recently, some studies utilizing Graph Neural Networks (GNNs) to learn the graph representation of code in vulnerability detection tas... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论
Brain-Conditional Multimodal Synthesis: A Survey and Taxonomy
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1080-1099页
作者: Mai, Weijian Zhang, Jian Fang, Pengfei Zhang, Zhijun South China University of Technology School of Automation Science and Engineering Guangzhou510640 China Southeast University School of Computer Science and Engineering Nanjing210096 China South China University of Technology Key Library of Autonomous Systems and Network Control Ministry of Education The School of Automation Science and Engineering Guangzhou510640 China Institute for Super Robotics Huangpu Guangzhou510555 China Nanchang University Jiangxi Thousand Talents Plan Nanchang330031 China Jishou University College of Computer Science and Engineering Jishou416000 China Guangdong Artificial Intelligence and Digital Economy Laboratory Pazhou Lab Guangzhou510335 China Shaanxi University of Technology Shaanxi Provincial Key Laboratory of Industrial Automation School of Mechanical Engineering Hanzhong723001 China Changsha Normal University School of Information Science and Engineering Changsha410100 China Guangdong University of Petrochemical Technology School of Automation Science and Engineering Institute of Artificial Intelligence and Automation Maoming525000 China
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re... 详细信息
来源: 评论
Analysis of converting -circuit into -circuit
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-14页
作者: Luo, Qing-bin Ding, Lang Yang, Guo-wu Li, Xiao-yu College of Intelligent Systems Science and Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
A $\mathfrak{C^{*}}$ -circuit, which was proposed in Asiacypt 2022 by Huang and Sun (Advances in cryptology – ASIACRYPT 2022, pp. 614–644, 2022), can directly perform calculations with the existing quantum ...
来源: 评论
Time series classification based on Unet with 2D transformation
Time series classification based on Unet with 2D transformat...
收藏 引用
International Conference on Identification, information and Knowledge in the Internet of Things (IIKI)
作者: Mingsen Du Yunxia Wang Yanxuan Wei Xiaona Wu Cun Ji School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Time series classification has gained significant attention in the data mining field in recent years. Despite the proposal of numerous methods over the past decades, most of these approaches focus on feature extractio... 详细信息
来源: 评论
Control of Multipath Transmissions in the Nodes of Switching Segments of Reserved Paths  6
Control of Multipath Transmissions in the Nodes of Switching...
收藏 引用
6th International Scientific Conference on information, Control, and Communication Technologies, ICCT 2022
作者: Bogatyrev, Vladimir A. Bogatyrev, Stanislav V. Bogatyrev, Anatoly V. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia Yadro Cloud Storage Development Center Saint Petersburg Russia
The options for ensuring timely delivery of packages to the addressee in networks with duplication of communication paths with the addressee for some subscribers are analyzed. Connecting subscribers to two communicati... 详细信息
来源: 评论