咨询与建议

限定检索结果

文献类型

  • 10,269 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,582 篇 工学
    • 8,259 篇 计算机科学与技术...
    • 6,818 篇 软件工程
    • 2,174 篇 信息与通信工程
    • 1,288 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 850 篇 电气工程
    • 730 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 613 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,800 篇 理学
    • 2,807 篇 数学
    • 1,232 篇 生物学
    • 951 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,066 篇 管理学
    • 1,855 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 330 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 486 篇 software enginee...
  • 338 篇 semantics
  • 326 篇 feature extracti...
  • 325 篇 computational mo...
  • 305 篇 deep learning
  • 262 篇 training
  • 224 篇 data mining
  • 212 篇 educational inst...
  • 211 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 159 篇 machine learning
  • 156 篇 internet of thin...
  • 156 篇 computer archite...
  • 142 篇 authentication
  • 139 篇 servers
  • 137 篇 accuracy

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 106 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,497 篇 英文
  • 1,646 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16379 条 记 录,以下是1581-1590 订阅
排序:
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
Distributed Hierarchical Multi-Agent Reinforcement Learning for Real-World Adversarial Team Games
Distributed Hierarchical Multi-Agent Reinforcement Learning ...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Li Wei Hui Bei Lu Ke School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Real-world applications often require teams of agents to coordinate strategies against adversaries. However, existing MARL models overlook resource constraints and task complexity, limiting their practical use. To add... 详细信息
来源: 评论
Bandwidth-Effective DRAM Cache for GPUs with Storage-Class Memory
arXiv
收藏 引用
arXiv 2024年
作者: Hong, Jeongmin Cho, Sungjun Park, Geonwoo Yang, Wonhyuk Gong, Young-Ho Kim, Gwangsun POSTECH Department of Computer Science and Engineering Korea Republic of Soongsil University School of Software Korea Republic of
We propose overcoming the memory capacity limitation of GPUs with high-capacity Storage-Class Memory (SCM) and DRAM cache. By significantly increasing the memory capacity with SCM, the GPU can capture a larger fractio... 详细信息
来源: 评论
A Systematic Review of Fitts' Law in 3D Extended Reality  25
A Systematic Review of Fitts' Law in 3D Extended Reality
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Amini, Mohammadreza Stuerzlinger, Wolfgang Teather, Robert J Batmaz, Anil Ufuk Department of Computer Science & Software Engineering Concordia University MontrealQC Canada Simon Fraser University VancouverBC Canada School of Information Technology Carleton University OttawaON Canada
Fitts' law is widely used as an evaluation tool for pointing or selection tasks, evolving into diverse applications, including 3D extended reality (XR) environments like virtual, augmented, and mixed reality. Desp... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zeng, Peigen He, Ying Yu, F. Richard Du, Jianbo Shenzhen University College of Computer Science and Software Engineering Shenzhen China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Carleton University School of Information Technology Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论
SFR: Semantic-Aware Feature Rendering of Point Cloud  48
SFR: Semantic-Aware Feature Rendering of Point Cloud
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Zha, Yaohua Li, Rongsheng Dai, Tao Xiong, Jianyu Wang, Xin Xia, Shu-Tao Shenzhen University College of Computer Science and Software Engineering China Tsinghua University Tsinghua Shenzhen International Graduate School China Research Center of Artificial Intelligence Peng Cheng Laboratory China
Multi-view projection methods have demonstrated their ability to reach state-of-the-art performance in point cloud downstream tasks(e.g., classification and retrieval). These methods first require rendering the point ... 详细信息
来源: 评论
Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks
Query Provenance Analysis: Efficient and Robust Defense Agai...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Shaofei Li Ziqi Zhang Haomin Jia Yao Guo Xiangqun Chen Ding Li Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University University of Illinois Urbana-Champaign School of Electronics Engineering and Computer Science Peking University
Query-based black-box attacks have emerged as a significant threat to machine learning systems, where adversaries can manipulate the input queries to generate adversarial examples that can cause misclassification of t... 详细信息
来源: 评论
Extracting Minimum Cohesive Subgraphs from Large Graphs
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Yiping Liu, Jiamou Zhang, Mengxiao Zhou, Yi School of Computer Science University of Auckland 262 Khyber Pass Road Newmarket Auckland1023 New Zealand School of Computer Science and Engineering UESTC Chengdu611731 China Department of Electrical Computer and Software Engineering
Exploring cohesive subgraphs is a fundamental task in graph analysis. However, most existing works concentrated on identifying maximal cohesive subgraphs, which are often impractically large to be *** this paper, we c... 详细信息
来源: 评论
Challenges of Processing Data Clumps within Plugin Architectures of Integrated Development Environment
Challenges of Processing Data Clumps within Plugin Architect...
收藏 引用
IDE Workshop (IDE), IEEE/ACM
作者: Nils Baumgartner Elke Pulvermüller Software Engineering Research Group School of Mathematics/Computer Science/Physics Osnabrück University Germany
In this study, we explore advanced strategies for enhancing software quality by detecting and refactoring data clumps, special types of code smells. Our approach transcends the capabilities of integrated development e... 详细信息
来源: 评论
Research on Malware software Detection Technology Based on SVM on Cloud Platform for Mobile Terminal  2
Research on Malware Software Detection Technology Based on S...
收藏 引用
2nd International Conference on Artificial Intelligence and computer Information Technology, AICIT 2023
作者: Lin, Liming Yao, Ye Li, JiaYu Yao, Jia Chen, Wending Huang, Siyang School of Software Northwestern Polytechnical University Xi'an City China School of Computer Science Northwestern Polytechnical University Xi'an City China Queen Mary University of London Engineering School Npu Northwestern Polytechnical University Xi'an City China
In recent years, the number of new malware samples has shown a trend of rapid growth. The increasing number of malware has resulted in a huge number of signature databases that the host needs to save, which is difficu... 详细信息
来源: 评论