咨询与建议

限定检索结果

文献类型

  • 3,445 篇 会议
  • 3,325 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,774 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 508 篇 电气工程
    • 491 篇 电子科学与技术(可...
    • 457 篇 光学工程
    • 336 篇 机械工程
    • 277 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 202 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,735 篇 理学
    • 1,302 篇 数学
    • 796 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 305 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 86 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 36 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,517 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6835 条 记 录,以下是501-510 订阅
排序:
Pricing Policy with the Effect of Fairness Concern, Imprecise Greenness, and Prices in Imprecise Market for a Dual Channel
Pricing Policy with the Effect of Fairness Concern, Imprecis...
收藏 引用
International Conference on Nonlinear Applied Analysis and Optimization, ICNAAO-2021
作者: Ganguly, Sanchari Das, Pritha Maiti, Manoranjan Department of Mathematics Indian Institute of Engineering Science and Technology Shibpur WB Howrah711103 India Department of Applied Mathematics Oceanology and Computer Programming Vidyasagar University WB Midnapore721102 India
Fairness concern behavior, a well-known cognitive bias, refers to a person’s attitude of dissatisfaction for unequal pay-offs in someone’s favor. Against environmental pollution, many firms are focused on green manu... 详细信息
来源: 评论
Research of colorde image digital watermark
Research of colorde image digital watermark
收藏 引用
computer science and Information Engineering, CSIE 2012
作者: Shang, Cun Yang, Peng Service Computer Technology and Graphics Lab. Department of Computer Science and Technology Xinyang Agricultural College Xinyang Henan 464000 China
Digital watermarking is one of the effective technology which can protect the copyright of digital product and data security. For the encoding technology of color image, this paper proposed a method for embedding the ... 详细信息
来源: 评论
AsyReC: A Multimodal Graph-based Framework for Spatio-Temporal Asymmetric Dyadic Relationship Classification
arXiv
收藏 引用
arXiv 2025年
作者: Tang, Wang Dogan, Fethiye Irmak Qing, Linbo Gunes, Hatice AFAR Lab Department of Computer Science and Technology University of Cambridge CambridgeCB3 0FT United Kingdom College of Electronics and Information Engineering Sichuan University Chengdu610065 China
Dyadic social relationships, which refer to relationships between two individuals who know each other through repeated interactions (or not), are shaped by shared spatial and temporal experiences. Current computationa... 详细信息
来源: 评论
Research on buffer overflow test based on invariant
Research on buffer overflow test based on invariant
收藏 引用
IEEE 9th International Conference on computer and Information technology, CIT 2009
作者: Zeng, Fanping Chen, Minghui Yin, Kaitao Wang, Xufa Department of Computer University of Science and Technology of China Anhui Province Key Lab. of Software in Computer and Communication Hefei Anhui China Department of Computer University of Science and Technology of China Hefei Anhui China
Buffer overflow (BOF) is one of the major vulnerabilities that lead to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. Th... 详细信息
来源: 评论
Study on the unified and formalized description of the component using the category theory
Study on the unified and formalized description of the compo...
收藏 引用
International Forum on Information technology and Applications
作者: Haitao, Wang Xing, Chen Ying, Jiang Computer Technology Application Key Lab. of Yunnan Province Kunming University of Science and Technology Kunming 650051 China Department of Computer Science Kunming University of Science and Technology Kunming 650051 China
The focus of the software development technology based on components is the identification and assembly of components. The formalized descriptions of the component, including data and computing descriptions, are studi... 详细信息
来源: 评论
Adaptive difference method and singular treatment approach for fast parameters extraction of interconnects in MEI system
Adaptive difference method and singular treatment approach f...
收藏 引用
2005 International Conference on Communications, Circuits and Systems
作者: Zhang, Ying Wang, Janet M. Xiao, Liang Wu, Huizhong 603 Lab Department of Computer Science and Technology Nanjing University of Science and Technology China University of Arizona College of Engineering and Mines Department of Electrical and Computer Engineering Tucson AZ 85721
At present accurate evaluation of the capacitances of transmission lines is desired. Most TEM mode transmission lines have cross-sections with reentrant corners where the potential gradient is singular. In this paper ... 详细信息
来源: 评论
Novel Ransomware Hiding Model Using HEVC Steganography Approach
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1209-1228页
作者: Iman Almomani Aala AlKhayer Walid El-Shafai Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School for Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Ransomware is considered one of the most threatening *** solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and... 详细信息
来源: 评论
Improved Bayesian logistic supervised topic models with data augmentation
Improved Bayesian logistic supervised topic models with data...
收藏 引用
51st Annual Meeting of the Association for Computational Linguistics, ACL 2013
作者: Zhu, Jun Zheng, Xun Zhang, Bo Department of Computer Science and Technology TNLIST Lab and State Key Lab of Intelligent Technology and Systems Tsinghua University Beijing China
Supervised topic models with a logistic likelihood have two issues that potentially limit their practical use: 1) response variables are usually over-weighted by document word counts;and 2) existing variational infere... 详细信息
来源: 评论
DROPEDGE: TOWARDS DEEP GRAPH CONVOLUTIONAL NETWORKS ON NODE CLASSIFICATION  8
DROPEDGE: TOWARDS DEEP GRAPH CONVOLUTIONAL NETWORKS ON NODE ...
收藏 引用
8th International Conference on Learning Representations, ICLR 2020
作者: Rong, Yu Huang, Wenbing Xu, Tingyang Huang, Junzhou Tencent AI Lab State Key Lab on Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University China
Over-fitting and over-smoothing are two main obstacles of developing deep Graph Convolutional Networks (GCNs) for node classification. In particular, over-fitting weakens the generalization ability on small dataset, w... 详细信息
来源: 评论
An Efficient Detection Approach of Content Aware Image Resizing
收藏 引用
computers, Materials & Continua 2020年 第8期64卷 887-907页
作者: Ming Lu Shaozhang Niu Zhenguang Gao Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and TelecommunicationsBeijing100876China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China Department of Computer Science Framingham State UniversityMassachusettsMA 01772USA
Content aware image resizing(CAIR)is an excellent technology used widely for image *** can also be used to tamper with images and bring the trust crisis of image content to the *** an image is processed by CAIR,the co... 详细信息
来源: 评论