咨询与建议

限定检索结果

文献类型

  • 10,253 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,673 篇 工学
    • 8,341 篇 计算机科学与技术...
    • 6,834 篇 软件工程
    • 2,207 篇 信息与通信工程
    • 1,368 篇 控制科学与工程
    • 1,127 篇 生物工程
    • 877 篇 电气工程
    • 736 篇 机械工程
    • 659 篇 电子科学与技术(可...
    • 606 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,828 篇 理学
    • 2,816 篇 数学
    • 1,236 篇 生物学
    • 956 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,067 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,332 篇 图书情报与档案管...
    • 750 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 443 篇 法学
    • 330 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 624 篇 computer science
  • 481 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 computational mo...
  • 315 篇 feature extracti...
  • 306 篇 deep learning
  • 272 篇 training
  • 224 篇 data mining
  • 218 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 157 篇 computer archite...
  • 156 篇 machine learning
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 187 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 106 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,189 篇 英文
  • 978 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16424 条 记 录,以下是801-810 订阅
排序:
Deep Semi-Supervised Learning with Fine-Grained Dynamic Weights and Pseudo-Label Constraints
Deep Semi-Supervised Learning with Fine-Grained Dynamic Weig...
收藏 引用
2023 International Conference on Communications, Computing and Artificial Intelligence, CCCAI 2023
作者: Li, Kuan Lian, Qianzhi Gao, Can Dongguan University of Technology School of Cyberspace Security Dongguan China Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Semi-supervised learning is comonly trained using a large amount of unlabeled data and a small amount of labeled data. Existing works have achieved excellent results through consistent regularization methods. However,... 详细信息
来源: 评论
Detached and Interactive Multimodal Learning  24
Detached and Interactive Multimodal Learning
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Fan, Yunfeng Xu, Wenchao Wang, Haozhao Liu, Junhong Guo, Song Department of Computing The Hong Kong Polytechnic University Hong Kong Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Hubei China School of Software Beihang University Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Recently, Multimodal Learning (MML) has gained significant interest as it compensates for single-modality limitations through comprehensive complementary information within multimodal data. However, traditional MML me... 详细信息
来源: 评论
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
收藏 引用
China Communications 2024年 第3期21卷 149-159页
作者: Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China College of Information Engineering Yangzhou UniversityYangzhou 225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou 362000China Computer Science Department City University of Hong KongHong Kong 999077China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21004China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou 325035China Guangzhou University Library Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of Sciences MIREA-Russian Technological University Moscow RegionRussia
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ... 详细信息
来源: 评论
Advancing Efficient Large-Scale Constraint Optimization Problem Solving by Integrating Machine Learning and Automated Reasoning  2
Advancing Efficient Large-Scale Constraint Optimization Prob...
收藏 引用
2nd International Workshop on Spatio-Temporal Reasoning and Learning, STRL 2023
作者: Kong, Shufeng School of Software Engineering Sun Yat-sen University Guangzhou China Department of Computer Science Cornell University Ithaca United States
来源: 评论
Category-Prompt Refined Feature Learning for Long-Tailed Multi-Label Image Classification  24
Category-Prompt Refined Feature Learning for Long-Tailed Mul...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Yan, Jiexuan Huang, Sheng Mu, Nankun Huangfu, Luwen Liu, Bo School of Big Data & Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China Fowler College of Business San Diego State University San DiegoCA United States School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Real-world data consistently exhibits a long-tailed distribution, often spanning multiple categories. This complexity underscores the challenge of content comprehension, particularly in scenarios requiring Long-Tailed... 详细信息
来源: 评论
Enrich Code Search Query Semantics with Raw Descriptions  19th
Enrich Code Search Query Semantics with Raw Descriptions
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Liu, Xiangzheng Liu, Jianxun Hu, Haize Liu, Yi School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan Xiangtan China
Code search can recommend relevant source code according to the development intention (query statement) of the demander, thereby improving the efficiency of software development. In the research of deep code search mo... 详细信息
来源: 评论
Accurate Reliability Analysis Methods for Approximate Computing Circuits
收藏 引用
Tsinghua science and Technology 2022年 第4期27卷 729-740页
作者: Zhen Wang Guofa Zhang Jing Ye Jianhui Jiang Fengyong Li Yong Wang School of the Computer Science and Technology Shanghai University of Electric PowerShanghai 200090China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China School of Software Engineering Tongji UniversityShanghai 200092China
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis met... 详细信息
来源: 评论
Intelligent Blockchain System Based on Differential Privacy
Intelligent Blockchain System Based on Differential Privacy
收藏 引用
2021 International Conference on Intelligent Power and Systems, ICIPS 2021
作者: Wu, Z.J. Dai, H. Yuan, Y.K. Meng, D. School of Computer and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Due to the advantages of decentralization, traceability and non deletion, blockchain technology can be well combined with differential privacy algorithm to protect data privacy. Therefore, it effectively ensures the p... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of computer science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
Enhancing Feature Selection in IoT Intrusion Detection Using the Ensemble Stacking  22
Enhancing Feature Selection in IoT Intrusion Detection Using...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zheng, Zhijian Gai, Weilin Zhang, Peng Zhou, Ming Nanjing University of Science and Technology School of Cyber Science and Engineering Nanjing210094 China Tca Institute of Software Cas Beijing102200 China CNCERT/CC Beijing102200 China School of Computer Science and Technology Ucas Beijing102200 China
The Internet of Things (IoT) is increasingly vulnerable to security risks due to new network attacks. Deep learning-based intrusion detection systems (DL-IDS) have emerged as a key solution, but they face challenges l... 详细信息
来源: 评论