咨询与建议

限定检索结果

文献类型

  • 10,238 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,577 篇 工学
    • 8,255 篇 计算机科学与技术...
    • 6,815 篇 软件工程
    • 2,172 篇 信息与通信工程
    • 1,289 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 848 篇 电气工程
    • 728 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 612 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 280 篇 建筑学
  • 4,801 篇 理学
    • 2,808 篇 数学
    • 1,230 篇 生物学
    • 952 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,063 篇 管理学
    • 1,852 篇 管理科学与工程(可...
    • 1,330 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 439 篇 法学
    • 329 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 485 篇 software enginee...
  • 339 篇 semantics
  • 324 篇 computational mo...
  • 322 篇 feature extracti...
  • 305 篇 deep learning
  • 260 篇 training
  • 223 篇 data mining
  • 212 篇 educational inst...
  • 209 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 160 篇 machine learning
  • 155 篇 internet of thin...
  • 155 篇 computer archite...
  • 143 篇 authentication
  • 137 篇 servers
  • 133 篇 support vector m...

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 107 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,471 篇 英文
  • 1,641 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16348 条 记 录,以下是1141-1150 订阅
排序:
Context-Aware Model for Mining User Intentions from App Reviews  34
Context-Aware Model for Mining User Intentions from App Revi...
收藏 引用
34th International Conference on software engineering and Knowledge engineering, SEKE 2022
作者: Lu, Jinwei Wu, Yimin Pei, Jiayan Qin, Zishan Huang, Shizhao Deng, Chao School of Computer Science and Engineering South China University of Technology Guangzhou China School of Software Engineering South China University of Technology Guangzhou China School of Computer Science and Engineering Guangdong Ocean University at Yangjiang Yangjiang China
Due to the highly competitive and dynamic mobile application (app) market, app developers need to release new versions regularly to improve existing features and provide new features for users. To accomplish the maint... 详细信息
来源: 评论
HC-MAE: Hierarchical Cross-attention Masked Autoencoder Integrating Histopathological Images and Multi-omics for Cancer Survival Prediction
HC-MAE: Hierarchical Cross-attention Masked Autoencoder Inte...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Suixue Hu, Xiangjun Zhang, Qingchen Hainan University School of Information and Communication Engineering Haikou China School of Computer Science and Technology Hainan University Haikou China Software College Shenyang Normal University Shenyang China
Accurate cancer survival prediction enables clinicians to tailor treatment regimens based on individual patient prognoses, effectively mitigating over-treatment and inefficient medical resource allocation. Recently, t... 详细信息
来源: 评论
Concrete Structural Crack Damage Classification Using Nonlinear Dimension Reduction and Broad Learning System
Concrete Structural Crack Damage Classification Using Nonlin...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Bingshu Lin, Jia Zhuang, Xiaodong Zhang, Guanghui Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi'an China Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen China School of Computer Science and Technology Shandong University Qingdao China School of Computer Science and Engineering South China University of Technology Guangzhou China
Concrete structural crack damage classification is of importance for road safety. This paper proposes a new method based on broad neural network for crack damage classification in concrete structures. It includes thre... 详细信息
来源: 评论
mm-Fall: Practical and Robust Fall Detection via mmWave Signals
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zhao, Cui Luo, Qiumin Ding, Han Wang, Ge Zhao, Kun Wang, Zhi Xi, Wei Zhao, Jizhong Xi'an Jiaotong University School of Computer Science and Engineering Xi'an710049 China Xi'an Jiaotong University School of Software Engineering Xi'an710049 China
Falls pose a significant risk to the health and wellbeing of older adults, driving the development of various fall detection systems. Existing solutions have explored wearable and vision sensors, while non-invasive RF... 详细信息
来源: 评论
Accurate Prediction of Workloads and Resources with Multi-Head Attention and Hybrid LSTM for Cloud Data Centers
Accurate Prediction of Workloads and Resources with Multi-He...
收藏 引用
作者: Bi, Jing Ma, Haisen Yuan, Haitao Zhang, Jia Beijing University of Technology School of Software Engineering Faculty of Information Technology Beijing100124 China Beihang University School of Automation Science and Electrical Engineering Beijing100191 China Southern Methodist University Department of Computer Science Lyle School of Engineering DallasTX75205 United States
Currently, cloud computing service providers face big challenges in predicting large-scale workload and resource usage time series. Due to the difficulty in capturing nonlinear features, traditional forecasting method... 详细信息
来源: 评论
Adaptive Occlusion Face Recognition Feature Fusion Network Based on Precise Guidance Mask Extraction
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-12页
作者: Ye, Jihua Zhang, Lei Wang, Chao Tu, Qixuan Zheng, Rehua Huang, Huiyuan Jiang, Aiwen School of Computer and Information Engineering Jiangxi Normal University Nanchang330022 China Jiangxi Provincial Key Laboratory for High Performance Computing Jiangxi Normal University Nanchang330022 China State International Science & Technology Cooperation Base of Networked Supporting Software Jiangxi Normal University Nanchang330022 China
The uncertainty in the position and size of occluding objects greatly affects the extraction of identity features in facial recognition, which is a challenge that existing methods fail to effectively address. To tackl... 详细信息
来源: 评论
Optimal Illumination Distance Metrics for Person Re-identification  21st
Optimal Illumination Distance Metrics for Person Re-identif...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Wang, Chao Wang, Zhongyuan Hu, Ruimin Wang, Xiaochen Zhou, Wen National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China College of Information Engineering Nanjing University of Finance Economics Nanjing China
Person re-identification (Re-ID) has been widely used in public security and surveillance. Due to the influence of different shooting times and locations, can lead to lighting variations in the images captured by the ... 详细信息
来源: 评论
Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System
Modeling and Analysis for the Propagation of DDoS Attacks in...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Xiong, Lei Xu, Qichao Fang, Dongfeng Zeng, Hui School of Mechatronic Engineering and Automation Shanghai University Shanghai China California Polytechnic State University Department of Computer Science and Software Engineering San Luis ObispoCA United States
With the development and progress of electric power technology and information technology, microgrid has become an important and indispensable part of smart grid. The cyber-security of microgrids has a significant imp... 详细信息
来源: 评论
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 142-149页
作者: Kui Zhu Yongjun Ren Jian Shen Pandi Vijayakumar Pradip Kumar Sharma School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Peng Cheng Laboratory Shenzhen518000China Department of Computer Science and Engineering University College of Engineering TindivanamTamil Nadu604001India Department of Computing Science University of AberdeenAberdeenAB243UEUK
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep *** Deep Learning(FDL)is a novel distributed machine learning tec... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论