咨询与建议

限定检索结果

文献类型

  • 10,269 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,582 篇 工学
    • 8,259 篇 计算机科学与技术...
    • 6,818 篇 软件工程
    • 2,174 篇 信息与通信工程
    • 1,288 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 850 篇 电气工程
    • 730 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 613 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,800 篇 理学
    • 2,807 篇 数学
    • 1,232 篇 生物学
    • 951 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,066 篇 管理学
    • 1,855 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 330 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 486 篇 software enginee...
  • 338 篇 semantics
  • 326 篇 feature extracti...
  • 325 篇 computational mo...
  • 305 篇 deep learning
  • 262 篇 training
  • 224 篇 data mining
  • 212 篇 educational inst...
  • 211 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 159 篇 machine learning
  • 156 篇 internet of thin...
  • 156 篇 computer archite...
  • 142 篇 authentication
  • 139 篇 servers
  • 137 篇 accuracy

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 106 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,497 篇 英文
  • 1,646 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16379 条 记 录,以下是1351-1360 订阅
排序:
Design of Multimedia Database Online Integration System Based on Artificial Intelligence  2
Design of Multimedia Database Online Integration System Base...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Li, Jiaqi Xiong, Gaojie Wu, Xing Harbin Institute of Technology Computer Sciense and Technology Guangdong Shenzhen China University of Electronic Science and Technology School of Information and Software Engineering Sichuan Chengdu China Zhejiang Vocational Academy of Art Zhejiang Hangzhou China
Multimedia database online integration system plays an important role in today's information age. However, the performance of the integrated system is limited by the problems of low accuracy, insufficient recall r... 详细信息
来源: 评论
KANOCLIP: ZERO-SHOT ANOMALY DETECTION THROUGH KNOWLEDGE-DRIVEN PROMPT LEARNING AND ENHANCED CROSS-MODAL INTEGRATION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Chengyuan Zhou, Suyang Kong, Jieping Qi, Lei Xue, Hui College of Software Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
Zero-shot anomaly detection (ZSAD) identifies anomalies without needing training samples from the target dataset, essential for scenarios with privacy concerns or limited data. Vision-language models like CLIP show po... 详细信息
来源: 评论
LogMT: A Self-supervised Log Anomaly Detection Method Based on Multi-Tasks
LogMT: A Self-supervised Log Anomaly Detection Method Based ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wenhui Xie Qingjian Ni College of Software Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
With the rapid development of software systems, logs have become essential data for monitoring the security and stability of computer systems. Current log anomaly detection methods usually rely on large volumes of lab... 详细信息
来源: 评论
Large Point-to-Gaussian Model for Image-to-3D Generation  24
Large Point-to-Gaussian Model for Image-to-3D Generation
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Lu, Longfei Gao, Huachen Dai, Tao Zha, Yaohua Hou, Zhi Wu, Junta Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China Tencent Shenzhen Hunyuan China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Peng Cheng Laboratory Shenzhen China
Recently, image-to-3D approaches have significantly advanced the generation quality and speed of 3D assets based on large reconstruction models, particularly 3D Gaussian reconstruction models. Existing large 3D Gaussi... 详细信息
来源: 评论
Optimizing Generative AI Applications: A Comparative Study of Effective Prompting Techniques
Optimizing Generative AI Applications: A Comparative Study o...
收藏 引用
Pervasive Computing and Social Networking (ICPCSN), International Conference on
作者: Shivya Jyoti Moulik Tejpal Jothi K R Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Computational Intelligence School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Generative Artificial Intelligence (GenAI) has emerged as a pivotal technology across various industries, driving advancements in automation, decision-making, and content generation. This paper investigates the effica... 详细信息
来源: 评论
Learning to Schedule Job-Shop Problems via Hierarchical Reinforcement Learning
Learning to Schedule Job-Shop Problems via Hierarchical Rein...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Liao, Zijun Li, Qiwen Dai, Yuanzhi Zhang, Zizhen Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Brown University Department of Computer Science ProvidenceRI United States Sun Yat-sen University School of Software Engineering Zhuhai China
The job-shop scheduling problem (JSSP) is a classic combinatorial optimization problem in the areas of computer science and operations research. It is closely associated with many industrial scenarios. In today's ... 详细信息
来源: 评论
Deep Hierarchies and Invariant Disease-Indicative Feature Learning for computer Aided Diagnosis of Multiple Fundus Diseases  39
Deep Hierarchies and Invariant Disease-Indicative Feature Le...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lin, Yuxin Wang, Wei Luo, Xiaoling Wu, Zhihao Liu, Chengliang Wen, Jie Xu, Yong School of Computer Science and Technology Harbin Institute of Technology Shenzhen China College of Computer Science and Software Engineering Shenzhen University China Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
With the advancement of computer vision, numerous models have been proposed for screening of fundus diseases. However, the recognition of multiple fundus diseases is often hampered by the simultaneous presence of mult... 详细信息
来源: 评论
Empowering visible-infrared person re-identification with large foundation models  24
Empowering visible-infrared person re-identification with la...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Zhangyi Hu Bin Yang Mang Ye National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
来源: 评论
Study on the Performance of Amorphous IGZO TFT Thin-Film Transistor with Ti/Au Stacking as the Source/Drain  8
Study on the Performance of Amorphous IGZO TFT Thin-Film Tra...
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Lu, Qingru Li, Bing Chen, Rui Huang, Xiaodong Southeast University Cheng Xian College School of Electron and Computer Nanjing China Southeast University School of Cyber Science and Engineering Nanjing China Nanjing Vocational University of Industry Technology School of Computer and Software Engineering Nanjing China Southeast University Key Laboratory of MEMS of the Ministry of Education Nanjing China
Through magnetron sputtering, a Ti/Au stack was adopted as the source/drain of the transistor, and Amorphous indium-gallium-zinc-oxide (α-IGZO or IGZO) was utilized as the active layer (150μm×150μm) to fabrica... 详细信息
来源: 评论
An efficient and balanced feature pyramid network: shared-FPN
收藏 引用
Optoelectronics Letters 2025年
作者: Tian Sulong Qin Longfei Pang Wenchao Gao Ying Zhao Dexin School of Computer Science and Engineering, Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology
In the field of object detection, it is challenging to achieve a balance between neck complexity and accuracy. To address this issue, we propose an efficient and decoupled neck module called Shared-FPN(Shared Featur...
来源: 评论