咨询与建议

限定检索结果

文献类型

  • 10,269 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,582 篇 工学
    • 8,259 篇 计算机科学与技术...
    • 6,818 篇 软件工程
    • 2,174 篇 信息与通信工程
    • 1,288 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 850 篇 电气工程
    • 730 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 613 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,800 篇 理学
    • 2,807 篇 数学
    • 1,232 篇 生物学
    • 951 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,066 篇 管理学
    • 1,855 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 330 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 486 篇 software enginee...
  • 338 篇 semantics
  • 326 篇 feature extracti...
  • 325 篇 computational mo...
  • 305 篇 deep learning
  • 262 篇 training
  • 224 篇 data mining
  • 212 篇 educational inst...
  • 211 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 159 篇 machine learning
  • 156 篇 internet of thin...
  • 156 篇 computer archite...
  • 142 篇 authentication
  • 139 篇 servers
  • 137 篇 accuracy

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 106 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,497 篇 英文
  • 1,646 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16379 条 记 录,以下是1671-1680 订阅
排序:
Towards combating frequency simplicity-biased learning for domain generalization  24
Towards combating frequency simplicity-biased learning for d...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xilin He Jingyu Hu Qinliang Lin Cheng Luo Weicheng Xie Siyang Song Muhammad Haris Khan Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University and Shenzhen Institute of Artificial Intelligence and Robotics for Society and Guangdong Provincial Key Laboratory of Intelligent Information Processing University of Exeter Mohamed bin Zayed University of Artificial Intelligence
Domain generalization methods aim to learn transferable knowledge from source domains that can generalize well to unseen target domains. Recent studies show that neural networks frequently suffer from a simplicity-bia...
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
Application of Data Analysis to Medical Manpower Adjustment  2021
Application of Data Analysis to Medical Manpower Adjustment
收藏 引用
5th International Conference on E-Society, E-Education and E-Technology, ICSET 2021
作者: Peng, Shih Jung School of Computer Science and Software Engineering Zhaoqing University 86-*** China
In today's environment of longer human life and higher average age, the general family does not have enough ability and economic conditions to apply for professional nursing staff to assist in the patient of the e... 详细信息
来源: 评论
Popular route planning with travel cost estimation from trajectories
收藏 引用
Frontiers of computer science 2020年 第1期14卷 191-207页
作者: Huiping LIU Cheqing JIN Aoying ZHOU School of Data Science and Engineering School of Computer Science and Software EngineeringEast China Normal UniversityShanghai 200062China
With the increasing number of GPS-equipped vehicles,more and more trajectories are generated continuously,based on which some urban applications become feasible,such as route *** general,popular route that has been tr... 详细信息
来源: 评论
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem  7
Towards Understanding Third-party Library Dependency in C/C+...
收藏 引用
37th IEEE/ACM International Conference on Automated software engineering, ASE 2022
作者: Tang, Wei Xu, Zhengzi Liu, Chengwei Wu, Jiahui Yang, Shouguo Li, Yi Luo, Ping Liu, Yang School of Software Tsinghua University Beijing China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Institute of Information Engineering Chinese Academy of Sciences Beijing China
Third-party libraries (TPLs) are frequently reused in software to reduce development cost and the time to market. However, external library dependencies may introduce vulnerabilities into host applications. The issue ... 详细信息
来源: 评论
Seismic multiple attenuation based on improved U-Net
收藏 引用
Applied Geophysics 2024年 第4期21卷 680-696,879页
作者: Quan Zhang Xiao-yu Lv Qin Lei Bo Peng Yan Li Yao-wen Zhang State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation(Southwest Petroleum University) Chengdu 610500China School of Computer Science and Software Engineering Southwest Petroleum UniversityChengdu 610500China
Eff ective attenuation of seismic multiples is a crucial step in the seismic data processing workfl *** the existence of various methods for multiple attenuation,challenges persist,such as incomplete attenuation and h... 详细信息
来源: 评论
A Comprehensive Review of Protein Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lei Li, Xudong Zhang, Han Wang, Jinyi Jiang, Dingkang Xue, Zhidong Wang, Yan School of Software Engineering Huazhong University of Science and Technology China School of Life Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
At the intersection of the rapidly growing biological data landscape and advancements in Natural Language Processing (NLP), protein language models (PLMs) have emerged as a transformative force in modern research. The...
来源: 评论
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network  24
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom N...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Li, Dengshi Zeng, Lu Hu, Ruimin Huang, Zijun Liang, Xiaocong Zang, Yilong School of Artificial Intelligence Jianghan University Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
In telecom network fraud, the fraud method of the fraudsters varies significantly in different periods. However, the traditional method of telecom fraud is to train the telecom fraud mining model through the user'... 详细信息
来源: 评论
A Method Based on Genetic Programming to Automatically Construct Factors for Annual Report Scenarios
A Method Based on Genetic Programming to Automatically Const...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yan Ma Changsheng Zhang Yan Gao Ying Guo School of Computer Science and Engineering Northeastern University Shenyang China Software College Northeastern University Shenyang China College of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan China
Factors have always played an important role in stock analysis, but they are only effective for specific problems in specific scenarios. Therefore, constructing factors timely and quickly for different scenarios is an... 详细信息
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars  24
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Nie, Hejing Wen, Yiping Li, Tiancai Ouyang, Sipeng Tian, Muyang School of Computer Science and Engineering Hunan University of Science and Technology China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论