咨询与建议

限定检索结果

文献类型

  • 10,269 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,582 篇 工学
    • 8,259 篇 计算机科学与技术...
    • 6,818 篇 软件工程
    • 2,174 篇 信息与通信工程
    • 1,288 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 850 篇 电气工程
    • 730 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 613 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,800 篇 理学
    • 2,807 篇 数学
    • 1,232 篇 生物学
    • 951 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,066 篇 管理学
    • 1,855 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 330 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 486 篇 software enginee...
  • 338 篇 semantics
  • 326 篇 feature extracti...
  • 325 篇 computational mo...
  • 305 篇 deep learning
  • 262 篇 training
  • 224 篇 data mining
  • 212 篇 educational inst...
  • 211 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 159 篇 machine learning
  • 156 篇 internet of thin...
  • 156 篇 computer archite...
  • 142 篇 authentication
  • 139 篇 servers
  • 137 篇 accuracy

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 106 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,497 篇 英文
  • 1,646 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16379 条 记 录,以下是1661-1670 订阅
排序:
Researches on Resource Allocation With Reinforcement Learning in Cell-Free Networks
Researches on Resource Allocation With Reinforcement Learnin...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Yunseong Lee Donghyun Lee Junsuk Oh Chihyun Song Wonjong Noh Sungrae Cho School of Computer Science and Engineering Chung-Ang University Seoul Republic of Korea School of Software Hallym University Chuncheon Republic of Korea
This paper explores reinforcement learning (RL) based on resource allocation in cell-free networks, a promising alternative to traditional cellular architectures. Cell-free networks eliminate cell boundaries by using ... 详细信息
来源: 评论
Decentralized Federated Graph Learning with Lightweight Zero Trust Architecture for Next-Generation Networking Security
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 1908-1922页
作者: Zhou, Xiaokang Liang, Wei Wang, Kevin I-Kai Yada, Katsutoshi Yang, Laurence T. Ma, Jianhua Jin, Qun Kansai University Faculty of Business Data Science Osaka565-0823 Japan RIKEN Center for Advanced Intelligence Project RIKEN Tokyo103-0027 Japan Hunan University of Technology and Business School of Computer Science Changsha410205 China Xiangjiang Laboratory Changsha410205 China The University of Auckland Department of Electrical Computer and Software Engineering Auckland1010 New Zealand St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada Hosei University Faculty of Computer and Information Sciences Chiyoda-ku102-8160 Japan Waseda University Faculty of Human Sciences Tokorozawa359-1192 Japan
The rapid development and usage of digital technologies in modern intelligent systems and applications bring critical challenges on data security and privacy. It is essential to allow cross-organizational data sharing... 详细信息
来源: 评论
Spatiotemporal Feature Extraction and Fusion for Longitudinal Alzheimer’s Disease Diagnosis  17th
Spatiotemporal Feature Extraction and Fusion for Longitudina...
收藏 引用
17th International Conference on Brain Informatics, BI 2024
作者: Guan, Zhenghua Yang, Peng Lei, Haijun Yang, Bao Song, Xuegang Dong, Lei Yan, Xueqin Wei, Cuimei Liang, Chunhua Xiao, Xiaohua Wang, Tianfu Lei, Baiying School of Biomedical Engineering Guangdong Key Laboratory for Biomedical Measurements and Ultrasound Imaging National-Regional Key Technology Engineering Laboratory for Medical Ultrasound Shenzhen University Medical schoo1 Shenzhen518060 China Affiliated Hospital of Shenzhen University Health Science Center Shenzhen University Shenzhen Second People’s Hospital Shenzhen China School of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder characterized by a gradual decline in cognitive function. The brain structure of AD patients progressively atrophies over time. Longitudinal data c... 详细信息
来源: 评论
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Video Editing
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Vid...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yan Luo Zhichao Zuo Zhao Zhang Zhongqiu Zhao Haijun Zhang Richang Hong School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China School of Computer Science Harbin Institute of Technology Shenzhen China
Text-guided image generative diffusion models achieve fast development on the generation and editing of high-quality images. To extend such success to video editing, some efforts combining image generation with video ... 详细信息
来源: 评论
Blended Learning Application in the Principle of computer Composition  2021
Blended Learning Application in the Principle of Computer Co...
收藏 引用
5th International Conference on E-Society, E-Education and E-Technology, ICSET 2021
作者: Peng, Shih Jung School of Computer Science and Software Engineering Zhaoqing University 86-*** China
Blended learning is always a significant method of learning and teaching in education. This method combines the advantages of online and face-to-face learning models to improve students' interest in learning and t... 详细信息
来源: 评论
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyuan Zheng Xiaojie Li Canghong Shi Jia He Zhan Ao Huang Xian Zhang Imran Mumtaz School of Computer Science Chengdu University of Information Technology China School of Computer and Software Engineering Xihua University China Faculty of Engineering and Mathematical Sciences The University of Western Australia Australia Department of Computer Science University of Agriculture Faisalabad Pakistan
Balancing the consistency of style and the integrity of content is the main challenge in arbitrary style transfer domain. Currently, local style details can be effectively captured by attention mechanism but easily pr... 详细信息
来源: 评论
Researches on Resource Allocation With Reinforcement Learning in Cell-Free Networks
Researches on Resource Allocation With Reinforcement Learnin...
收藏 引用
7th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2025
作者: Lee, Yunseong Lee, Donghyun Oh, Junsuk Song, Chihyun Noh, Wonjong Cho, Sungrae School of Computer Science and Engineering Chung-Ang University Seoul Korea Republic of School of Software Hallym University Chuncheon Korea Republic of
This paper explores reinforcement learning (RL) based on resource allocation in cell-free networks, a promising alternative to traditional cellular architectures. Cell-free networks eliminate cell boundaries by using ... 详细信息
来源: 评论
CBLA: Empowering Virtual Sensor Nodes with Zero Deployment Costs for SHM Systems
CBLA: Empowering Virtual Sensor Nodes with Zero Deployment C...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yang Wang Ke Lei Chong Zhang Xin Wang Xin Shi Aihua Deng School of Computer Science and Software Engineering Southwest Petroleum University Chengdu China School of Mechanical Engineering Southwest Petroleum University Chengdu China
Structural Health Monitoring (SHM) monitors the working states of building structures to ensure their reliable operation, but the high cost of SHM sensor nodes limits its largescale deployment. In this paper, we propo... 详细信息
来源: 评论
NUWADYNAMICS: DISCOVERING AND UPDATING IN CAUSAL SPATIO-TEMPORAL MODELING  12
NUWADYNAMICS: DISCOVERING AND UPDATING IN CAUSAL SPATIO-TEMP...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Wang, Kun Wu, Hao Duan, Yifan Zhang, Guibin Wang, Kai Peng, Xiaojiang Zheng, Yu Liang, Yuxuan Wang, Yang China Suzhou Institute for Advanced Research USTC China School of Software Engineering USTC China School of Computer Science USTC China Hong Kong Tongji University China Shenzhen Technology University China National University of Singapore Singapore JD iCity JD Technology
Spatio-temporal (ST) prediction plays a pivotal role in earth sciences, such as meteorological prediction, urban computing. Adequate high-quality data, coupled with deep models capable of inference, are both indispens... 详细信息
来源: 评论
AI-Enhanced threat analysis and risk assessment for connected and autonomous vehicles
收藏 引用
software Quality Journal 2025年 第3期33卷 1-19页
作者: Ahmad, Usman Han, Mu Mahmood, Shahid School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China The University of Faisalabad Faisalabad Pakistan Intelligent Mobility and Software FEV Iberia Barcelona Spain
Threat Analysis and Risk Assessment (TARA) methodologies aid in the early detection of potential threats during the concept and design phases of automotive security engineering process. Their importance is underscored...
来源: 评论