咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是351-360 订阅
排序:
Evolutionary Optimization with a Simplified Helper Task for High-Dimensional Expensive Multiobjective Problems
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-32页
作者: Wu, Xunfeng Lin, Qiuzhen Zhou, Junwei Liu, Songbai Coello Coello, Carlos A. Leung, Victor C. M. College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430070 China Mexico City07300 Mexico Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
In recent years, surrogate-Assisted evolutionary algorithms (SAEAs) have been sufficiently studied for tackling computationally expensive multiobjective optimization problems (EMOPs), as they can quickly estimate the ... 详细信息
来源: 评论
Challenges of Using Pre-trained Models: The Practitioners' Perspective  31
Challenges of Using Pre-trained Models: The Practitioners' P...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Tan, Xin Li, Taichuan Chen, Ruohe Liu, Fang Zhang, Li School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Economics and Management Beihang University Beijing China
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ... 详细信息
来源: 评论
Fair and Communication-Efficient Personalized Federated Learning  18th
Fair and Communication-Efficient Personalized Federated Lea...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zheng, Yifu Zheng, Xu Wang, Tingqi Mu, Chong Zhakiyev, Nurkhat School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Science and Innovation Astana IT University Astana Kazakhstan
Personalized Federated Learning (pFL) is among the most popular tasks in distributed deep learning, which compensates for mutual knowledge and enables device-specific model personalization. However, the effectiveness ... 详细信息
来源: 评论
Multi-Task Vehicle Surface Damage Analysis Model Based on YOLOv8
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第6期52卷 1921-1929页
作者: Tan, Xu Zhao, Ji School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
The rapid evolution of intelligent automotive systems has driven the urgent need for advanced damage assessment methodologies, revealing critical limitations in conventional visual inspection techniques. This study po... 详细信息
来源: 评论
Fairness with adaptive weight in network attack detection  29
Fairness with adaptive weight in network attack detection
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wen, Xuezhi Wang, Nan Sun, Yuanlin Xu, Fan Zhang, Dalin Zhao, Xibin Beijing Jiaotong University School of Software Engineering Beijing China University of Science and Technology of China School of Computer Science and Technology Anhui China Tsinghua University School of Software Engineering Beijing China
Network attacks aim to exploit vulnerabilities inherent in network protocols, which is widely used in many real-world applications. In the process of network anomaly detection, most methods train the model by minimizi... 详细信息
来源: 评论
HTDcr:a job execution framework for high-throughput computing on supercomputers
收藏 引用
science China(Information sciences) 2024年 第1期67卷 69-85页
作者: Jiazhi JIANG Dan HUANG Hu CHEN Yutong LU Xiangke LIAO School of Computer Science and Engineering Sun Yat-sen University School of Software Engineering South China University of Technology
High-throughput computing(HTC) is a computing paradigm that aims to accomplish jobs by easily breaking them into smaller,independent ***,it requires a large amount of computing power for a long *** existing HTC framew... 详细信息
来源: 评论
Faster AMEDA-A Hybrid Mesoscale Eddy Detection Algorithm
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1827-1846页
作者: Xinchang Zhang Xiaokang Pan Rongjie Zhu Runda Guan Zhongfeng Qiu Biao Song Organization Department Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Teacher Education Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics&Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ... 详细信息
来源: 评论
Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection  29
Few-shot Message-Enhanced Contrastive Learning for Graph Ano...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Xu, Fan Wang, Nan Wen, Xuezhi Gao, Meiqi Guo, Chaoqun Zhao, Xibin University of Science and Technology of China School of Computer Science and Technology Anhui China Beijing Jiaotong University School of Software Engineering Beijing China Tsinghua University School of Software Engineering Beijing China
Graph anomaly detection plays a crucial role in identifying exceptional instances in graph data that deviate significantly from the majority. It has gained substantial attention in various domains of information secur... 详细信息
来源: 评论
Robust Multi-Graph Contrastive Network for Incomplete Multi-View Clustering
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2747-2759页
作者: Xue, Zhe Li, Yawen Guan, Zhongchao Li, Wenling Liang, Meiyu Zhou, Hai Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing100876 China Beijing University of Posts and Telecommunications School of Economics and Management Beijing100876 China Beihang University School of Automation Science and Electrical Engineering Beijing100191 China
Food categorization is pivotal in numerous aspects of everyday life, assisting in the selection of food, managing diets, and addressing essential survival requirements. By leveraging the complementary information of v... 详细信息
来源: 评论
Multi-Aspect Interest Neighbor-Augmented Network for Next-Basket Recommendation  48
Multi-Aspect Interest Neighbor-Augmented Network for Next-Ba...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Deng, Zhiying Li, Jianjun Guo, Zhiqiang Li, Guohui Huazhong University of Science and Technology School of Computer Science and Technology China Huazhong University of Science and Technology School of Software Engineering China
Next-basket recommendation (NBR) is a type of recommendation task that focuses on mining user interests based on the sequential basket records in which users purchase multiple items at a time. Limited by the sparsity ... 详细信息
来源: 评论