咨询与建议

限定检索结果

文献类型

  • 10,098 篇 会议
  • 5,919 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,157 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,454 篇 工学
    • 8,168 篇 计算机科学与技术...
    • 6,772 篇 软件工程
    • 2,168 篇 信息与通信工程
    • 1,251 篇 控制科学与工程
    • 1,120 篇 生物工程
    • 837 篇 电气工程
    • 721 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 597 篇 光学工程
    • 386 篇 化学工程与技术
    • 356 篇 仪器科学与技术
    • 349 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 312 篇 交通运输工程
    • 293 篇 网络空间安全
    • 266 篇 建筑学
  • 4,793 篇 理学
    • 2,795 篇 数学
    • 1,230 篇 生物学
    • 948 篇 物理学
    • 813 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 409 篇 化学
  • 3,041 篇 管理学
    • 1,843 篇 管理科学与工程(可...
    • 1,320 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 516 篇 医学
    • 444 篇 临床医学
    • 386 篇 基础医学(可授医学...
  • 437 篇 法学
    • 328 篇 社会学
  • 277 篇 经济学
    • 276 篇 应用经济学
  • 234 篇 教育学
  • 153 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 619 篇 computer science
  • 478 篇 software enginee...
  • 338 篇 semantics
  • 316 篇 computational mo...
  • 314 篇 feature extracti...
  • 298 篇 deep learning
  • 260 篇 training
  • 219 篇 data mining
  • 216 篇 educational inst...
  • 214 篇 optimization
  • 172 篇 predictive model...
  • 171 篇 neural networks
  • 170 篇 application soft...
  • 165 篇 image segmentati...
  • 158 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 136 篇 servers

机构

  • 409 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 259 篇 school of inform...
  • 218 篇 school of comput...
  • 215 篇 school of comput...
  • 188 篇 state key labora...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 111 篇 school of comput...
  • 111 篇 school of softwa...
  • 104 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 87 篇 school of softwa...

作者

  • 67 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 47 篇 zheng zibin
  • 39 篇 wang ping
  • 36 篇 hu ruimin
  • 35 篇 gao yang
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 32 篇 wang yasha
  • 32 篇 mian ajmal
  • 31 篇 wang lei
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 bo du
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 28 篇 xiao limin

语言

  • 15,325 篇 英文
  • 579 篇 其他
  • 263 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16157 条 记 录,以下是191-200 订阅
排序:
LSNSCDA: Unraveling CircRNA-Drug Sensitivity via Local Smoothing Graph Neural Network and Credible Negative Samples
LSNSCDA: Unraveling CircRNA-Drug Sensitivity via Local Smoot...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Fan, Ziyu Zhang, Yuanpeng Li, Yahan Zhong, Zeyu Deng, Lei Central South University School of Computer Science and Engineering Changsha China Xinjiang University School of Software Wulumuqi China
This study investigates the role of circular RNAs (circRNAs) in drug sensitivity, with a focus on their potential to inform personalized medicine. While current methods for identifying circRNA-drug sensitivity associa... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
FCA-based θ-iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Computer Science and Engineering Soonchunhyang University Asan31538 Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos... 详细信息
来源: 评论
PathActMarker:an R package for inferring pathway activity of complex diseases
收藏 引用
Frontiers of computer science 2025年 第3期19卷 123-124页
作者: Xingyi LI Jun HAO Zhelin ZHAO Junming LI Xingyu LIAO Min LI Xuequn SHANG School of Computer Science Northwestern Polytechnical UniversityXi’an 710072China Research&Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen 518063China School of Software Northwestern Polytechnical UniversityXi’an 710072China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and EngineeringCentral South UniversityChangsha 410083China
1 Introduction The process of complex diseases is closely linked to the disruption of key biological pathways,it is crucial to identify the dysfunctional pathways and quantify the degree of dysregulation at the indivi... 详细信息
来源: 评论
Optimizing Monitoring Utility of Unmanned Aerial Vehicles Considering Adverse Effects
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 5996-6013页
作者: Zhang, Haihan Dai, Haipeng Qiu, Yu Yu, Enze Zhou, Ruiben Wang, Weijun Wang, Jingwu Chen, Guihai Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China South China University of Technology School of Computer Science and Engineering Guangzhou China Beijing China
For Unmanned Aerial Vehicles (UAVs) monitoring tasks, capturing high quality images of target objects is important for subsequent recognition. Concerning the problem, many prior works study placement/trajectory planni... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论
Intelligent Segment Routing: Toward Load Balancing with Limited Control Overheads
收藏 引用
Big Data Mining and Analytics 2023年 第1期6卷 55-71页
作者: Shu Yang Ruiyu Chen Laizhong Cui Xiaolei Chang College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518000China Tsinghua Shenzhen International Graduate School Tsinghua UniversityShenzhen 518071China
Segment routing has been a novel architecture for traffic engineering in recent ***,segment routing brings control overheads,i.e.,additional packets headers should be *** overheads can greatly reduce the forwarding ef... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and Technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1837-1850页
作者: Uchechukwu Awada Jiankang Zhang Sheng Chen Shuangzhi Li Shouyi Yang School of Software Henan Institute of Science and TechnologyXinxiang 453003China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou 450001China Department of Computing and Informatics Bournemouth UniversityPoole BH125BBUK School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl... 详细信息
来源: 评论