咨询与建议

限定检索结果

文献类型

  • 10,129 篇 会议
  • 5,919 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,459 篇 工学
    • 8,172 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 2,170 篇 信息与通信工程
    • 1,250 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 839 篇 电气工程
    • 723 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 598 篇 光学工程
    • 386 篇 化学工程与技术
    • 356 篇 仪器科学与技术
    • 349 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 312 篇 交通运输工程
    • 293 篇 网络空间安全
    • 265 篇 建筑学
  • 4,792 篇 理学
    • 2,794 篇 数学
    • 1,232 篇 生物学
    • 947 篇 物理学
    • 813 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 409 篇 化学
  • 3,044 篇 管理学
    • 1,846 篇 管理科学与工程(可...
    • 1,321 篇 图书情报与档案管...
    • 745 篇 工商管理
  • 516 篇 医学
    • 444 篇 临床医学
    • 386 篇 基础医学(可授医学...
  • 438 篇 法学
    • 329 篇 社会学
  • 277 篇 经济学
    • 276 篇 应用经济学
  • 234 篇 教育学
  • 153 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 623 篇 computer science
  • 479 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 feature extracti...
  • 317 篇 computational mo...
  • 298 篇 deep learning
  • 262 篇 training
  • 220 篇 data mining
  • 216 篇 educational inst...
  • 216 篇 optimization
  • 172 篇 predictive model...
  • 171 篇 neural networks
  • 170 篇 application soft...
  • 165 篇 image segmentati...
  • 158 篇 machine learning
  • 156 篇 computer archite...
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 138 篇 servers
  • 136 篇 convolution

机构

  • 409 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 259 篇 school of inform...
  • 218 篇 school of comput...
  • 215 篇 school of comput...
  • 187 篇 state key labora...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 111 篇 school of softwa...
  • 110 篇 school of comput...
  • 104 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 87 篇 school of softwa...

作者

  • 67 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 47 篇 zheng zibin
  • 39 篇 wang ping
  • 36 篇 hu ruimin
  • 35 篇 gao yang
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 32 篇 wang yasha
  • 32 篇 mian ajmal
  • 31 篇 wang lei
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 bo du
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 28 篇 xiao limin

语言

  • 15,355 篇 英文
  • 580 篇 其他
  • 263 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16188 条 记 录,以下是321-330 订阅
排序:
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 250-263页
作者: Yilong Yang Yibo Liu Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin School of Software Beihang UniversityBeijingChina College of Computer Science and Technology Guizhou UniversityGuiyangGuizhouChina Faculty of Information Technology Beijing University of TechnologyBeijingChina Department of Electrical Engineering and Computer Sciences University of CincinnatiCincinnatiOhioUSA
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn... 详细信息
来源: 评论
A Hypergraph Transformer With Adaptive EdgeConv for Skeleton-based Action Recognition  7
A Hypergraph Transformer With Adaptive EdgeConv for Skeleton...
收藏 引用
7th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2024
作者: Zhou, Fengyu Liu, Jun Zhang, Dazhi Huang, Zengxi School of Computer Science and Software Engineering Xihua University Chengdu China Sichuan Police College Criminal Science and Technolog Department Luzhou China
Skeleton-based action recognition is a crucial task in computer vision, aiming to perform pattern recognition on a skeleton sequence to identify the actions represented by the skeleton's semantics. However, curren... 详细信息
来源: 评论
A Multi-feature Co-distillation Algorithm Based on Human Skeletal Point Behavior Recognition  24
A Multi-feature Co-distillation Algorithm Based on Human Ske...
收藏 引用
2nd International Conference on Advances in Artificial Intelligence and Applications, AAIA 2024
作者: Pan, Xuefeng Tian, Zhiqiang School of Computer Wuhan Qingchuan University Wuhan China School of Information Wuhan Software Engineering Vocational College Wuhan Open University Wuhan China School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig... 详细信息
来源: 评论
Message Passing on Semantic-Anchor-Graphs for Fine-grained Emotion Representation Learning and Classification
Message Passing on Semantic-Anchor-Graphs for Fine-grained E...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Pinyi Chen, Jingyang Shen, Junchen Zhai, Zijie Li, Ping Zhang, Jie Zhang, Kai School of Computer Science and Technology East China Normal University China Institute of Science and Technology for Brain-inspired intelligence Fudan University China School of Computer Science and Software Engineering Southwest Petroleum University China
Emotion classification has wide applications in education, robotics, virtual reality, etc. However, identifying subtle differences between fine-grained emotion categories remains challenging. Current methods typically... 详细信息
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network  10
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Liu, Jingnian Liang, Wei Chen, Yuxiang Jin, Kai Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
An Air Quality Oriented Convolutional and Interaction Network for Traffic Flow Prediction in VANET  16
An Air Quality Oriented Convolutional and Interaction Networ...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Cheng, Hanlin Li, Xuan Zhou, Tianqing Yao, Yu Wang, Kan Zhou, Momiao School of Information and software Engineering East China Jiaotong University Nanchang China School of Information and Communication Engineering Hainan University Haikou China School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
To accurately predict traffic flow, it is necessary to take into account not only the volume of road traffic, but also external urban factors. Particularly, the correlations between urban air quality and traffic flow ... 详细信息
来源: 评论
DPD-Net: A Dual-domain Progressive Diffusion Network for Joint Limited-Angle and Metal Artifact Removal  14
DPD-Net: A Dual-domain Progressive Diffusion Network for Joi...
收藏 引用
Optics in Health Care and Biomedical Optics XIV 2024
作者: Shi, Yijie Lyu, Tianling Zhang, Xusheng Zhong, Xinyun Yang, Yang Zhang, Pinzheng Wu, Zhan Chen, Yang The School of Software Southeast University Nanjing China Zhejiang Lab Hangzhou China The School of Computer Science and Engineering Southeast University Nanjing China
Computed Tomography (CT) is a high-precision medical imaging technique that utilizes X-rays and computer reconstruction to provide detailed three-dimensional images of human anatomy. It is used for clinical diagnosis ... 详细信息
来源: 评论
Memristor-Based Genetic Algorithm for Image Restoration
收藏 引用
Journal of Electronic science and Technology 2022年 第2期20卷 149-158页
作者: Yong-Bin Yu Chen Zhou Quan-Xin Deng Yuan-Jing-Yang Zhong Man Cheng Zheng-Fei Kang the School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054 the School of Computer Science Chengdu College of University of Electronic Science and Technology of ChinaChengdu 611731
This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provid... 详细信息
来源: 评论
Defense Mechanisms Against Audio Adversarial Attacks: Recent Advances and Future Directions  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Li, Routing Xue, Meng School of Software Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science Wuhan University Wuhan China
With the popularity of speech and speaker recognition systems in recent years, voice interfaces are increasingly integrated into various Internet of Things (IoT) devices. However, studies have demonstrated that such s... 详细信息
来源: 评论
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of computer science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG Xingming SUN Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 评论