咨询与建议

限定检索结果

文献类型

  • 10,312 篇 会议
  • 6,032 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,681 篇 工学
    • 8,347 篇 计算机科学与技术...
    • 6,864 篇 软件工程
    • 2,221 篇 信息与通信工程
    • 1,343 篇 控制科学与工程
    • 1,131 篇 生物工程
    • 906 篇 电气工程
    • 736 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 617 篇 光学工程
    • 612 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 371 篇 安全科学与工程
    • 365 篇 仪器科学与技术
    • 339 篇 交通运输工程
    • 325 篇 动力工程及工程热...
    • 322 篇 网络空间安全
    • 281 篇 建筑学
  • 4,833 篇 理学
    • 2,813 篇 数学
    • 1,234 篇 生物学
    • 960 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 522 篇 系统科学
    • 418 篇 化学
  • 3,115 篇 管理学
    • 1,888 篇 管理科学与工程(可...
    • 1,358 篇 图书情报与档案管...
    • 754 篇 工商管理
  • 529 篇 医学
    • 453 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 445 篇 法学
    • 334 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 239 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 488 篇 software enginee...
  • 338 篇 semantics
  • 327 篇 computational mo...
  • 326 篇 feature extracti...
  • 310 篇 deep learning
  • 264 篇 training
  • 224 篇 data mining
  • 214 篇 optimization
  • 211 篇 educational inst...
  • 177 篇 neural networks
  • 176 篇 predictive model...
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 164 篇 machine learning
  • 160 篇 computer archite...
  • 156 篇 internet of thin...
  • 141 篇 authentication
  • 140 篇 accuracy
  • 139 篇 servers

机构

  • 435 篇 college of compu...
  • 359 篇 school of comput...
  • 271 篇 school of inform...
  • 264 篇 school of comput...
  • 222 篇 school of comput...
  • 219 篇 school of comput...
  • 186 篇 state key labora...
  • 155 篇 school of softwa...
  • 135 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 107 篇 school of softwa...
  • 106 篇 school of comput...
  • 102 篇 school of softwa...
  • 101 篇 state key labora...
  • 100 篇 college of compu...
  • 98 篇 school of softwa...
  • 98 篇 college of compu...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 gao yang
  • 34 篇 wang yasha
  • 33 篇 huang di
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 28 篇 niyato dusit
  • 28 篇 cui lizhen
  • 28 篇 shen furao

语言

  • 14,042 篇 英文
  • 2,208 篇 其他
  • 270 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16485 条 记 录,以下是121-130 订阅
Network Traffic Anomaly Detection Based on DGBi-SA Model
收藏 引用
engineering Letters 2025年 第3期33卷 612-619页
作者: Wang, Xin Dai, Hong Huang, Zheng Han, Yue University of Science and Technology Liaoning Liaoning CO Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning CO Anshan114051 China
Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu... 详细信息
来源: 评论
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model Contrastive Detection
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Gan, Xiaoyun Lu, Peng Gan, Shanyu Xian, Youqian Peng, Kaichen Liu, Peng Li, Dongcheng School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China
Federated Learning (FL) is a distributed privacy-protecting machine learning paradigm that enables collaborative training among multiple parties without the need to share raw data. This mode of training renders FL par... 详细信息
来源: 评论
CBBFT - A Byzantine Fault Tolerance Mechanism for Education Credit Banks  7
CBBFT - A Byzantine Fault Tolerance Mechanism for Education ...
收藏 引用
7th International Conference on computer Information science and Application Technology, CISAT 2024
作者: Li, Xin Zhou, Lianghaojie Chen, Ningtian Jiang, Jianyong Liu, Peng GuangXi Normal University School of Computer Science and Engineering School of Software Guilin China
In the education sector, an increasing amount of research is beginning to explore the application of blockchain technology to credit banks. This paper proposes a consortium blockchain consensus mechanism tailored for ... 详细信息
来源: 评论
A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment
收藏 引用
computer Modeling in engineering & sciences 2024年 第9期140卷 3001-3016页
作者: Weijian Song Xi Li Peng Chen Juan Chen Jianhua Ren Yunni Xia School of Computer and Software Engineering Xihua UniversityChengdu610039China West China Second University Hospital Sichuan UniversityChengdu610065China School of Computer Science Chongqing UniversityChongqing400044China
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexit... 详细信息
来源: 评论
Controllable chaos in the coupled waveguide-optomechanical system with phase shifter
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第4期68卷 26-34页
作者: Deng-Wei Zhang Pei-Qi Qin Li-Li Zheng Zhi-Ming Zhan Xin-You Lü Department of Mathematics and Physics Luoyang Institute of Science and TechnologyLuoyang 471023China School of Computer and Information Engineering School of SoftwareLuoyang Institute of Science and TechnologyLuoyang 471023China School of Artificial Intelligence Jianghan UniversityWuhan 430056China School of Physics Huazhong University of Science and TechnologyWuhan 430074China
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c... 详细信息
来源: 评论
On UAV Serving Node Deployment for Temporary Coverage in Forest Environment:A Hierarchical Deep Reinforcement Learning Approach
收藏 引用
Chinese Journal of Electronics 2023年 第4期32卷 760-772页
作者: WANG Li WU Xuewei WANG Yanhui XIAO Zhe LI Liang FEI Aiguo School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing University of Posts and Telecommunications
Unmanned aerial vehicles(UAVs) can be effectively used as serving stations in emergency communications because of their free movements, strong flexibility, and dynamic coverage. In this paper, we propose a coordinated... 详细信息
来源: 评论
Stroke Disease Prediction Based on Multi-Model Ensemble Learning  5
Stroke Disease Prediction Based on Multi-Model Ensemble Lear...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information Technology, AINIT 2024
作者: Cui, Xiaojian School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China
Stroke is a kind of acute cerebrovascular disease, which is caused by the sudden rupture of blood vessels in the brain or the blockage of blood vessels that can not flow into the brain and cause brain tissue damage. S... 详细信息
来源: 评论
swSpAMM:optimizing large-scale sparse approximate matrix multiplication on Sunway Taihulight
收藏 引用
Frontiers of computer science 2023年 第4期17卷 29-41页
作者: Xiaoyan LIU Yi LIU Bohong YIN Hailong YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
Although matrix multiplication plays an essential role in a wide range of applications,previous works only focus on optimizing dense or sparse matrix *** Sparse Approximate Matrix Multiply(SpAMM)is an algorithm to acc... 详细信息
来源: 评论
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
收藏 引用
Frontiers of computer science 2023年 第3期17卷 161-175页
作者: Xiaoling HUANG Youxia DONG Guodong YE Yang SHI Faculty of Mathematics and Computer Science Guangdong Ocean UniversityZhanjiang 524088China School of Software Engineering Tongji UniversityShanghai 200092China
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and... 详细信息
来源: 评论
Cardinality estimation for property graph queries with gated learning approach on the graph database
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9159-9183页
作者: He, Zhenzhen Yu, Jiong Du, Xusheng Guo, Binglei Li, Ziyang Li, Zhe School of Information Science and Engineering Xinjiang University Urumqi China School of Computer Engineering Hubei University of Arts and Science Xiangyang China School of Software Xinjiang University Urumqi China Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia... 详细信息
来源: 评论