咨询与建议

限定检索结果

文献类型

  • 10,238 篇 会议
  • 5,950 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,576 篇 工学
    • 8,255 篇 计算机科学与技术...
    • 6,815 篇 软件工程
    • 2,171 篇 信息与通信工程
    • 1,287 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 848 篇 电气工程
    • 728 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 611 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 316 篇 交通运输工程
    • 299 篇 网络空间安全
    • 280 篇 建筑学
  • 4,799 篇 理学
    • 2,808 篇 数学
    • 1,230 篇 生物学
    • 952 篇 物理学
    • 827 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,062 篇 管理学
    • 1,851 篇 管理科学与工程(可...
    • 1,330 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 439 篇 法学
    • 329 篇 社会学
  • 279 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 484 篇 software enginee...
  • 339 篇 semantics
  • 322 篇 computational mo...
  • 322 篇 feature extracti...
  • 302 篇 deep learning
  • 263 篇 training
  • 231 篇 data mining
  • 215 篇 optimization
  • 212 篇 educational inst...
  • 173 篇 neural networks
  • 173 篇 predictive model...
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 161 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 150 篇 authentication
  • 135 篇 quality of servi...
  • 134 篇 convolution

机构

  • 428 篇 college of compu...
  • 360 篇 school of comput...
  • 272 篇 school of inform...
  • 266 篇 school of comput...
  • 222 篇 school of comput...
  • 219 篇 school of comput...
  • 187 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 134 篇 school of electr...
  • 125 篇 national enginee...
  • 119 篇 school of softwa...
  • 112 篇 school of comput...
  • 102 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...
  • 95 篇 college of compu...
  • 93 篇 school of softwa...

作者

  • 65 篇 tao dacheng
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 33 篇 limin xiao
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 32 篇 huang di
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 30 篇 jun zhang
  • 30 篇 mian ajmal
  • 30 篇 qi lianyong
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen
  • 27 篇 zhang lei

语言

  • 14,455 篇 英文
  • 1,639 篇 其他
  • 264 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16329 条 记 录,以下是4531-4540 订阅
排序:
Solving Math Word Problems Following Logically Consistent Template
Solving Math Word Problems Following Logically Consistent Te...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Zeyu Huang Xiaofeng Zhang Jun Bai Wenge Rong Yuanxin Ouyang Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Sino-French Engineer School Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Solving math word problems (MWPs) is a challenging task. Some existing solvers retrieve textually similar problems and draw on their solutions to solve the given problem. However, textually similar questions are not g...
来源: 评论
Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation  28th
Towards Time-Series Key Points Detection Through Self-superv...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yuan, Mingxu Bi, Xin Huang, Xuechun Zhang, Wei Hu, Lei Yuan, George Y. Zhao, Xiangguo Sun, Yongjiao Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern University Shenyang110819 China Key Laboratory of Liaoning Province on Deep Engineering and Intelligent Technology Northeastern University Shenyang110819 China School of Computer Science and Engineering Northeastern University Shenyang China Thinvent Digital Technology Co. Ltd. Nanchang India College of Software Northeastern University Shenyang China
Key points detection is crucial for signal analysis by marking the identification points of specific events. Deep learning methods have been introduced into key points detection tasks due to their significant represen... 详细信息
来源: 评论
Exploit your Latents: Coarse-Grained Protein Backmapping with Latent Diffusion Models  39
Exploit your Latents: Coarse-Grained Protein Backmapping wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Rongchao Huang, Yu Lou, Yiwei Xin, Yi Chen, Haixu Cao, Yongzhi Wang, Hanpin Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education School of Computer Science Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute of Geriatrics National Clinical Research Center of Geriatrics Disease Chinese PLA General Hospital Beijing China
Coarse-grained (CG) molecular dynamics of proteins is a preferred approach to studying large molecules on extended time scales by condensing the entire atomic model into a limited number of pseudo-atoms and preserving... 详细信息
来源: 评论
Bc-Sse: A Blockchain-Aided, Secure and Practical Multi-Keyword Ranked Searchable Encryption Scheme
SSRN
收藏 引用
SSRN 2023年
作者: Zheng, Lixiang Zhang, Hanlin Lin, Jie Ge, Xinrui Kong, Fanyu College of Computer Science and Technology Qingdao University Qingdao266071 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China School of Software Shandong University Jinan250100 China
Searchable encryption facilitates the retrieval of encrypted data by cloud servers, ensuring both user privacy and data usability. While several techniques exist that integrate blockchain with searchable encryption to... 详细信息
来源: 评论
Deep Learning-Based Approach for Identification of Potato Leaf Diseases Using Wrapper Feature Selection and Feature Concatenation
arXiv
收藏 引用
arXiv 2025年
作者: Naeem, Muhammad Ahtsam Saleem, Muhammad Asim Sharif, Muhammad Imran Akber, Shahzad Saleem, Sajjad Akhtar, Zahid Siddique, Kamran School of Information and Software Engineering University of Electronic Science and Technology of China China Faculty of Computing Riphah International University Faisalabad Campus Pakistan Department of Computer Science COMSATS University Islamabad Wah Campus Pakistan Department of Information and Technology Washington University of Science and Technology AlexandriaVA United States Department of Network and Computer Security State University of New York Polytechnic Institute United States Department of Computer Science and Engineering University of Alaska Anchorage Anchorage United States
The potato is a widely grown crop in many regions of the world. In recent decades, potato farming has gained incredible traction in the world. Potatoes are susceptible to several illnesses that stunt their development... 详细信息
来源: 评论
E2S2: Encoding-Enhanced Sequence-to-Sequence Pretraining for Language Understanding and Generation
arXiv
收藏 引用
arXiv 2022年
作者: Zhong, Qihuang Ding, Liang Liu, Juhua Du, Bo Tao, Dacheng The School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China The School of Computer Science Faculty of Engineering The University of Sydney Australia
Sequence-to-sequence (seq2seq) learning is a popular fashion for large-scale pretraining language models. However, the previous seq2seq pretraining models generally focus on reconstructive objectives on the decoder si... 详细信息
来源: 评论
Dual-View Interaction-Aware Lane Change Prediction for Autonomous Driving  39
Dual-View Interaction-Aware Lane Change Prediction for Auton...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lu, Yuhuan Zhang, Zhen Bai, Rufan Liu, Han Wang, Wei Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University China Department of Computer and Information Science University of Macau China Department of Computer Science and Engineering Southeast University China School of Software Dalian University of Technology China School of Medical Technology Beijing Institute of Technology China
As artificial intelligence techniques evolve, we are approaching a critical moment for the widespread deployment of autonomous vehicles. Subsequently, the emergence of mixed-autonomy traffic environments presents form...
来源: 评论
A Machine Learning Approach for Predicting Air Quality Index in Smart Cities
A Machine Learning Approach for Predicting Air Quality Index...
收藏 引用
IoT Based Control Networks and Intelligent Systems (ICICNIS), International Conference on
作者: S. Swamynathan N. Sneha S. P. Ramesh R. Niranjana D. David Neels Ponkumar R. Saravanakumar Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Science and Engineering School of Computer Science & Engineering Galgotias University Greater Noida Uttar Pradesh India Department of Electronics and Communication Engineering Sri Krishna College of Engineering and Technology Coimbatore Tamil Nadu India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
One essential natural resource, the air quality index has been deteriorated by economic activities. Many studies have been conducted about the forecasting of periods of unsafe atmospheric conditions; however, the majo... 详细信息
来源: 评论
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论
An Unsupervised Convolutional Adversarial Anomaly Detection Model for IoT Data Infrastructure
An Unsupervised Convolutional Adversarial Anomaly Detection ...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Peian Wen Zhenyu Yang Lei Wu Sibo Qi Juan Chen School of Computer and Software Engineering Xihua University Chengdu China School of Mathematical Sciences University of Electronic Science and Technology of China Chengdu China
Anomaly detection is critical to ensure the IoT (Internet of Things) data infrastructures' Quality of Service. However, due to the complexity of incon-spicuous(indistinct) anomalies, high dynamicity, and lack of a... 详细信息
来源: 评论