咨询与建议

限定检索结果

文献类型

  • 10,238 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,577 篇 工学
    • 8,255 篇 计算机科学与技术...
    • 6,815 篇 软件工程
    • 2,172 篇 信息与通信工程
    • 1,289 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 848 篇 电气工程
    • 728 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 612 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 280 篇 建筑学
  • 4,801 篇 理学
    • 2,808 篇 数学
    • 1,230 篇 生物学
    • 952 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,063 篇 管理学
    • 1,852 篇 管理科学与工程(可...
    • 1,330 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 439 篇 法学
    • 329 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 485 篇 software enginee...
  • 339 篇 semantics
  • 324 篇 computational mo...
  • 322 篇 feature extracti...
  • 305 篇 deep learning
  • 260 篇 training
  • 223 篇 data mining
  • 212 篇 educational inst...
  • 209 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 160 篇 machine learning
  • 155 篇 internet of thin...
  • 155 篇 computer archite...
  • 143 篇 authentication
  • 137 篇 servers
  • 133 篇 support vector m...

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 107 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,471 篇 英文
  • 1,641 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16348 条 记 录,以下是4481-4490 订阅
排序:
OpenLS-DGF: An Adaptive Open-Source Dataset Generation Framework for Machine Learning Tasks in Logic Synthesis
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Ni, Liwei Wang, Rui Liu, Miao Meng, Xingyu Lin, Xiaoze Liu, Junfeng Luo, Guojie Chu, Zhufei Qian, Weikang Yang, Xiaoyan Xie, Biwei Li, Xingquan Li, Huawei Chinese Academy of Sciences State Key Lab of Processors Institute of Computing Technology Beijing100190 China Pengcheng Laboratory Shenzhen518055 China University of Chinese Academy of Sciences Beijing101408 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing100049 China Peking University School of Computer Science Center for Energy-Efficient Computing and Applications Beijing100871 China Ninbo University Faculty of Electrical Engineering and Computer Science Ninbo315211 China Shanghai Jiao Tong University University of Michigan-Shanghai Jiao Tong University Joint Institute MoE Key Laboratory of Artificial Intelligence Shanghai200240 China Hangzhou Dianzi University School of Electronics and Information Engineering Hangzhou311121 China
This paper introduces OpenLS-DGF, an adaptive logic synthesis dataset generation framework, to enhance machine learning (ML) applications within the logic synthesis process. Previous dataset generation flows were tail... 详细信息
来源: 评论
Top-Down Target Object Detection Through Context
Top-Down Target Object Detection Through Context
收藏 引用
International Conference on Image and Vision Computing New Zealand, IVCNZ
作者: Ibrahim M. H. Rahman Christopher Hollitt Mengjie Zhang Osama Rehman Aisha Ajmal Simon Jigwan Park Information Technology The Open Polytechnic of New Zealand Wellington New Zealand School of Engg. and Computer Science Victoria University of Wellington Wellington New Zealand Department of Software Engineering Bahria University Karachi Pakistan
Visual attention is crucial for identifying the most salient regions in an image. However, when the objective involves higher-level visual tasks, such as target object detection, it becomes necessary to incorporate hi... 详细信息
来源: 评论
Shape-intensity knowledge distillation for robust medical image segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Wenhui Du, Bo Xu, Yongchao National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan430072 China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China Medical Artificial Intelligence Research Institute of Renmin Hospital Wuhan University Wuhan430072 China
Many medical image segmentation methods have achieved impressive results. Yet, most existing methods do not take into account the shape-intensity prior information. This may lead to implausible segmentation results, i... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 评论
Virtual Target Based Multi-agent Surrounding Approach
Virtual Target Based Multi-agent Surrounding Approach
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Weiping Zhu Haoyang Li Ning Ding Yukang Chen Yufei Sun Chao Ma Wei Li School of Computer Science Wuhan University P. R. China School of Cyber Science and Engineering Wuhan University P. R. China School of Artificial Intelligence and Computer Science Jiangsu Key Laboratory of Media Design and Software Technology Science Center for Future Foods Jiangnan University P. R. China
Multi-agent surrounding is a collaborative task that uses multiple agents to surround a stationary or moving target. Multi-agent surrounding has a wide range of applications, such as area monitoring of unmanned ships,... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
zsLLMCode: An Effective Approach for Code Embedding via LLM with Zero-Shot Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xian, Zixiang Huang, Rubing Cui, Chenhui Fang, Chunrong Chen, Zhenyu School of Computer Science and Engineering Macau University of Science and Technology Macau Taipa999078 China Macau University of Science and Technology Zhuhai MUST Science and Technology Research Institute Guangdong Zhuhai519099 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China
The advent of large language models (LLMs) has greatly advanced artificial intelligence (AI) in software engineering (SE), with code embeddings playing a critical role in tasks like code-clone detection and code clust... 详细信息
来源: 评论
High Efficiency Quantum Image Steganography Protocol Based on ZZW Framework  7th
High Efficiency Quantum Image Steganography Protocol Based o...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Sun, Hanrong Qu, Zhiguo School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
This paper proposes an efficient quantum image steganography protocol based on Zhang Weiming, Zhang Xinpeng and Wang Shuozhong’s steganography framework (ZZW). Based on the high embedding efficiency of the classical ... 详细信息
来源: 评论
Lane marking detection algorithm based on high-precision map and multisensor fusion
Lane marking detection algorithm based on high-precision map...
收藏 引用
作者: Yao, Haichang Chen, Chen Liu, Shangdong Li, Kui Ji, Yimu Huang, Guangyan Wang, Ruchuan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer and Software Nanjing Institute of Industry Technology Nanjing China Industrial Software Engineering Technology Research and Development Center of Jiangsu Education Department Nanjing Institute of Industry Technology Nanjing China Jiangsu HPC and Intelligent Processing Engineer Research Center Nanjing China Institute of High Performance Computing and Bigdata Nanjing University of Posts and Telecommunications Nanjing China School of Information Technology Deakin University Melbourne Australia
In case of sharp road illumination changes, bad weather such as rain, snow or fog, wear or missing of the lane marking, the reflective water stain on the road surface, the shadow obstruction of the tree, and mixed lan... 详细信息
来源: 评论
Research on Resource Scheduling and Optimization Strategies of Edge Computing-based 5G Networks in Smart City Applications  4
Research on Resource Scheduling and Optimization Strategies ...
收藏 引用
4th International Symposium on computer engineering and Intelligent Communications, ISCEIC 2023
作者: Wang, Yongzhe Wang, Dongxu Lin, Guofei Zheng, Bowen Luo, Lanxi Li, Shuai Sichuan University College of Water Resource and Hydropower Sichuan Chengdu China Tongji University No.4800 Caoan Road Jiading Shanghai China Xiamen University Longhai School of Accounting and Finance Jiageng College Fujian Zhangzhou China Hong Kong University of Science and Technology School of Engineering Clear water bay New Territories Sai Kung Hong Kong Minzu University of China Haidian Department of Software Engineering Beijing China Minzu University of China Haidian Department of Computer Science and Technology Beijing China
In this paper, we explore in detail resource scheduling strategies in cloud computing environments. First, we introduce the basic concepts and background of cloud computing, and then delve into the importance and chal... 详细信息
来源: 评论