咨询与建议

限定检索结果

文献类型

  • 138,594 篇 会议
  • 69,079 篇 期刊文献
  • 1,415 册 图书
  • 1 篇 学位论文

馆藏范围

  • 209,088 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 126,679 篇 工学
    • 84,406 篇 计算机科学与技术...
    • 69,386 篇 软件工程
    • 30,638 篇 信息与通信工程
    • 19,888 篇 控制科学与工程
    • 15,933 篇 电气工程
    • 15,768 篇 电子科学与技术(可...
    • 14,732 篇 生物工程
    • 10,292 篇 生物医学工程(可授...
    • 10,194 篇 光学工程
    • 9,551 篇 机械工程
    • 6,998 篇 化学工程与技术
    • 6,851 篇 仪器科学与技术
    • 6,333 篇 动力工程及工程热...
    • 4,878 篇 材料科学与工程(可...
    • 4,544 篇 交通运输工程
    • 4,461 篇 安全科学与工程
    • 4,284 篇 网络空间安全
  • 69,842 篇 理学
    • 35,516 篇 数学
    • 21,266 篇 物理学
    • 16,492 篇 生物学
    • 11,679 篇 统计学(可授理学、...
    • 7,731 篇 系统科学
    • 7,464 篇 化学
  • 32,920 篇 管理学
    • 20,482 篇 管理科学与工程(可...
    • 13,670 篇 图书情报与档案管...
    • 8,985 篇 工商管理
  • 9,697 篇 医学
    • 7,940 篇 临床医学
    • 7,148 篇 基础医学(可授医学...
    • 4,432 篇 药学(可授医学、理...
  • 5,596 篇 法学
    • 4,658 篇 社会学
  • 3,452 篇 经济学
  • 2,478 篇 农学
  • 2,142 篇 教育学
  • 951 篇 文学
  • 458 篇 军事学
  • 350 篇 艺术学
  • 33 篇 哲学
  • 22 篇 历史学

主题

  • 6,139 篇 computer science
  • 5,135 篇 accuracy
  • 5,051 篇 feature extracti...
  • 4,568 篇 computational mo...
  • 4,532 篇 training
  • 4,481 篇 deep learning
  • 3,684 篇 machine learning
  • 2,896 篇 optimization
  • 2,835 篇 predictive model...
  • 2,799 篇 semantics
  • 2,532 篇 data models
  • 2,315 篇 neural networks
  • 2,309 篇 real-time system...
  • 2,293 篇 support vector m...
  • 2,283 篇 data mining
  • 2,155 篇 convolutional ne...
  • 2,044 篇 internet of thin...
  • 1,933 篇 artificial intel...
  • 1,896 篇 educational inst...
  • 1,825 篇 image segmentati...

机构

  • 2,437 篇 school of comput...
  • 2,210 篇 school of comput...
  • 2,032 篇 school of comput...
  • 1,801 篇 school of comput...
  • 1,503 篇 school of comput...
  • 1,458 篇 school of comput...
  • 1,359 篇 school of electr...
  • 1,316 篇 school of comput...
  • 1,196 篇 school of comput...
  • 1,072 篇 cavendish labora...
  • 982 篇 school of comput...
  • 969 篇 department of ph...
  • 949 篇 school of comput...
  • 907 篇 school of comput...
  • 883 篇 oliver lodge lab...
  • 876 篇 physikalisches i...
  • 864 篇 university of ch...
  • 533 篇 school of comput...
  • 516 篇 school of comput...
  • 511 篇 horia hulubei na...

作者

  • 393 篇 niyato dusit
  • 271 篇 a. gomes
  • 256 篇 barter w.
  • 246 篇 c. alexa
  • 239 篇 j. m. izen
  • 238 篇 s. chen
  • 227 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 214 篇 g. bella
  • 213 篇 j. strandberg
  • 213 篇 beiter a.
  • 210 篇 d. calvet
  • 210 篇 c. amelung
  • 210 篇 bencivenni g.

语言

  • 198,107 篇 英文
  • 7,837 篇 其他
  • 3,067 篇 中文
  • 182 篇 日文
  • 38 篇 朝鲜文
  • 20 篇 法文
  • 18 篇 德文
  • 7 篇 荷兰文
  • 5 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=School Computer Engineering and Science"
209089 条 记 录,以下是31-40 订阅
排序:
Weakly-supervised instance co-segmentation via tensor-based salient co-peak search
收藏 引用
Frontiers of computer science 2024年 第2期18卷 83-92页
作者: Wuxiu QUAN Yu HU Tingting DAN Junyu LI Yue ZHANG Hongmin CAI School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhou 510665China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c... 详细信息
来源: 评论
Deep learning for code generation: a survey
收藏 引用
science China(Information sciences) 2024年 第9期67卷 5-40页
作者: Huangzhao ZHANG Kechi ZHANG Zhuo LI Jia LI Jia LI Yongmin LI Yunfei ZHAO Yuqi ZHU Fang LIU Ge LI Zhi JIN Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education School of Computer Science Peking University School of Computer Science and Engineering Beihang University
In the past decade, thanks to the powerfulness of deep-learning techniques, we have witnessed a whole new era of automated code generation. To sort out developments, we have conducted a comprehensive review of solutio... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
On large language models safety,security,and privacy:A survey
收藏 引用
Journal of Electronic science and Technology 2025年 第1期23卷 1-21页
作者: Ran Zhang Hong-Wei Li Xin-Yuan Qian Wen-Bo Jiang Han-Xiao Chen School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation *** their trans... 详细信息
来源: 评论
Multi-Scale Feature Optimization Point Cloud Completion Network Integrating SoftPool
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 233-243页
作者: Zhang, Wanpeng Zhou, Ziwei School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan114051 China
Point cloud completion is crucial in point cloud processing, as it can repair and refine incomplete 3D data, ensuring more accurate models. However, current point cloud completion methods commonly face a challenge: th... 详细信息
来源: 评论
A secure double spectrum auction scheme
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1415-1427页
作者: Jiaqi Wang Ning Lu Ziyang Gong Wenbo Shi Chang Choi School of Computer Science and Engineering Northeastern UniversityShenyang110004China School of Computer Science and Technology Xidian UniversityXi©anChina Dept.of Computer Engineering Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120G School of Computer and Communication Engineering Northeastern UniversityQinhuangdao066004China
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ... 详细信息
来源: 评论
Improving UAV Image Target Detection: A Novel Approach Using OptiDETR with Swin Transformer
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 771-780页
作者: Ma, Wenlong Liu, Weisheng School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
In the analysis of drone aerial images, object detection tasks are particularly challenging, especially in the presence of complex terrain structures, extreme differences in target sizes, suboptimal shooting angles, a... 详细信息
来源: 评论
NeurDB: an AI-powered autonomous data system
收藏 引用
science China(Information sciences) 2024年 第10期67卷 129-150页
作者: Beng Chin OOI Shaofeng CAI Gang CHEN Yanyan SHEN Kian-Lee TAN Yuncheng WU Xiaokui XIAO Naili XING Cong YUE Lingze ZENG Meihui ZHANG Zhanhao ZHAO School of Computing National University of Singapore College of Computer Science and Technology Zhejiang University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Information Renmin University of China School of Computer Science and Technology Beijing Institute of Technology
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,... 详细信息
来源: 评论
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4129-4152页
作者: Xia Li Zhanyou Ma Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He School of Computer Science and Engineering North Minzu UniversityYinchuan750000China School of Computer Science FoSEThe University of HullHullUK
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property *** there is an extensive literature on qualitative properties such as safety and liveness,t... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论