咨询与建议

限定检索结果

文献类型

  • 10,238 篇 会议
  • 5,950 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,576 篇 工学
    • 8,255 篇 计算机科学与技术...
    • 6,815 篇 软件工程
    • 2,171 篇 信息与通信工程
    • 1,287 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 848 篇 电气工程
    • 728 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 611 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 316 篇 交通运输工程
    • 299 篇 网络空间安全
    • 280 篇 建筑学
  • 4,799 篇 理学
    • 2,808 篇 数学
    • 1,230 篇 生物学
    • 952 篇 物理学
    • 827 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,062 篇 管理学
    • 1,851 篇 管理科学与工程(可...
    • 1,330 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 439 篇 法学
    • 329 篇 社会学
  • 279 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 484 篇 software enginee...
  • 339 篇 semantics
  • 322 篇 computational mo...
  • 322 篇 feature extracti...
  • 302 篇 deep learning
  • 263 篇 training
  • 231 篇 data mining
  • 215 篇 optimization
  • 212 篇 educational inst...
  • 173 篇 neural networks
  • 173 篇 predictive model...
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 161 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 150 篇 authentication
  • 135 篇 quality of servi...
  • 134 篇 convolution

机构

  • 428 篇 college of compu...
  • 360 篇 school of comput...
  • 272 篇 school of inform...
  • 266 篇 school of comput...
  • 222 篇 school of comput...
  • 219 篇 school of comput...
  • 187 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 134 篇 school of electr...
  • 125 篇 national enginee...
  • 119 篇 school of softwa...
  • 112 篇 school of comput...
  • 102 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...
  • 95 篇 college of compu...
  • 93 篇 school of softwa...

作者

  • 65 篇 tao dacheng
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 33 篇 limin xiao
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 32 篇 huang di
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 30 篇 jun zhang
  • 30 篇 mian ajmal
  • 30 篇 qi lianyong
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen
  • 27 篇 zhang lei

语言

  • 14,455 篇 英文
  • 1,639 篇 其他
  • 264 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16329 条 记 录,以下是4551-4560 订阅
排序:
Probabilistic Graph Modeling based Safety Classifier Algorithm for Smart Transportation
收藏 引用
Procedia computer science 2024年 236卷 502-507页
作者: Najib El Karkouri Smail Tigani Rachid Saadane Abdelah Chehri Samuel Pierre Noureddine Neya Mathematics and Informatics Lab Faculty of Sciences University Ibno Toufial Kenitra Morocco Research and Development Unit Accsellium LLC Fez Morocco SIRC-LaGeS Hassania School of Public Labors 20250 Casablanca Morocco Department of Mathematics and Computer Science Royal Military College of Canada Kingston Canada Department of Computer and Software Engineering Polytechnique Montreal Canada
This research introduces a novel Probabilistic Graph Modeling-based Safety Classifier Algorithm designed for the purpose of classifying road safety in smart transportation systems. Leveraging a combination of numerica... 详细信息
来源: 评论
RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Changan Chen, Yaxing Zhang, Yao Cui, Helei Yu, Zhiwen Guo, Bin Yan, Zheng Yang, Zijiang School of Software Northwestern Polytechnical University Xi’an China School of Computer Science Northwestern Polytechnical University Xi’an China School of Cyber Engineering Xidian University Xi’an China Turing Research Center for Interdisciplinary Information Science Xi'an Jiaotong University Xi’an China
Vehicular crowd intelligence (VCI) is an emerging research field. Facilitated by state-of-the-art vehicular ad-hoc networks and artificial intelligence, various VCI applications come to place, e.g., collaborative sens... 详细信息
来源: 评论
Detecting Memory-Related Bugs by Tracking Heap Memory Management of C++ Smart Pointers  36
Detecting Memory-Related Bugs by Tracking Heap Memory Manage...
收藏 引用
36th IEEE/ACM International Conference on Automated software engineering, ASE 2021
作者: Ma, Xutong Yan, Jiwei Wang, Wei Yan, Jun Zhang, Jian Qiu, Zongyan Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences China University of Chinese Academy of Sciences China Peking University School of Mathematical Sciences China
The smart pointer mechanism, which is improved in the continuous versions of the C++ standards over the last decade, is designed to prevent memory-leak bugs by automatically deallocating the managed memory blocks. How... 详细信息
来源: 评论
Styles Energy Consumption Analysis of Lane-Changing Maneuvers in Autonomous Vehicles: The Role of Driving Styles
SSRN
收藏 引用
SSRN 2024年
作者: Guo, Yu Nie, Guigen Zou, Xiaowei Zhu, Dongliang Gao, Wenliang Liao, Mi GNSS Research Center Wuhan University Wuhan China Hubei Luojia Laboratory Wuhan China National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China
HIGHLIGHTS·Optimized lane-change trajectories considering safety, comfort, and time efficiency.·Developed a model for identifying different lane changing styles to meet personalized driving preferences.·... 详细信息
来源: 评论
Assessing the Robustness of LLM-based NLP software via Automated Testing
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Mingxuan Xiao, Yan Ji, Shunhui Cai, Hanbo Xue, Lei Zhang, Pengcheng Key Laboratory of Water Big Data Technology Ministry of Water Resources College of Computer Science and Software Engineering Hohai University Nanjing211100 China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen518107 China
Benefiting from the advancements in LLMs, NLP software has undergone rapid development. Such software is widely employed in various safety-critical tasks, such as financial sentiment analysis, toxic content moderation... 详细信息
来源: 评论
Composite Virtual Spatial Modulation and Its Diversity Enhancement
Composite Virtual Spatial Modulation and Its Diversity Enhan...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Zahid Iqbal Fei Ji Jun Li Qiang Li Adil Nawaz Xue-Qin Jiang Jia Hou School of Electronic and Information Engineering South China University of Technology Guangzhou China School of Electronics and Communication Engineering Guangzhou University Guangzhou China College of Information Science and Technology Jinan University Guangzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Information Science and Technology Donghua University Shanghai China School of Electronic and Information Engineering Soochow University Suzhou China
Virtual spatial modulation (VSM) has arisen as a promising technique for improving the energy efficiency (EE) of multiple-input multiple-output (MIMO) systems. However, due to utilizing only a subset of virtual parall...
来源: 评论
DISTDET: a cost-effective distributed cyber threat detection system  23
DISTDET: a cost-effective distributed cyber threat detection...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Feng Dong Liu Wang Xu Nie Fei Shao Haoyu Wang Ding Li Xiapu Luo Xusheng Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology and Sangfor Technologies Inc Beijing University of Posts and Telecommunications Case Western Reserve University School of Cyber Science and Engineering Huazhong University of Science and Technology Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University The Hong Kong Polytechnic University Arizona State University
Building provenance graph that considers causal relationships among software behaviors can better provide contextual information of cyber attacks, especially for advanced attacks such as Advanced Persistent Threat (AP...
来源: 评论
FedCST: Federated Learning on Heterogeneous Resource-constrained Devices Using Clustering and Split Training
FedCST: Federated Learning on Heterogeneous Resource-constra...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Zhilu Wang Haiyang Lin Qi Liu Yonghong Zhang Xiaodong Liu Nanjing University of Information Science and Technology School of Computer Science Nanjing Jiangsu China Nanjing University of Information Science and Technology School of Software Nanjing Jiangsu China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing Jiangsu China Nanjing University of Information Science and Technology School of Automation Nanjing Jiangsu China Edinburgh Napier University School of Computing Edinburgh UK
With the rapid development of 5G and Internet of Things (IoT) technologies, edge devices such as sensors, smartphones, and wearable devices have become increasingly prevalent. The massive amount of distributed data ge... 详细信息
来源: 评论
Analysis and Verification of Bisimulation Relationship for Learning Time-Behavior Sequence  9
Analysis and Verification of Bisimulation Relationship for L...
收藏 引用
9th International Conference on Dependable Systems and Their Applications, DSA 2022
作者: Feng, Shu Zhu, Yi Song, Mei Gao, Yuxiang School of Computer Science and Technology Jiangsu Normal University Xuzhou China Jiangsu Education Information Engineering Technology Research Center Xuzhou China Nanjing University of Aeronautics and Astronautics Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing China
Similar learner determination has become a research hotspot in the field of personalized recommendation due to its lightweight method. At present, similar learner determination mainly adopts algorithms such as collabo... 详细信息
来源: 评论
WMAJL: Watcher-Mediated Attention Joint Learning Model for Multimodal Relation Extraction
WMAJL: Watcher-Mediated Attention Joint Learning Model for M...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yunrui Dong Guiduo Duan Tianxi Huang Yunhao Li School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu China Chengdu Textile College College of Humanities and General Education Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
In the domain of Multimodal Relation Extraction (MRE), we present the $\color{Red}{\text{W}}$atcher-$\color{Red}{\text{M}}$ediated $\color{Red}{\text{A}}$ttention $\color{Red}{\text{J}}$oint $\color{Red}{\text{L}}$ear... 详细信息
来源: 评论