咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是4851-4860 订阅
排序:
The Good, The Bad, and Why: Unveiling Emotions in Generative AI
arXiv
收藏 引用
arXiv 2023年
作者: Li, Cheng Wang, Jindong Zhang, Yixuan Zhu, Kaijie Wang, Xinyi Hou, Wenxin Lian, Jianxun Luo, Fang Yang, Qiang Xie, Xing Microsoft Research Beijing China CAS Institute of Software Beijing China Department of Computer Science William & Mary Williamsburg WilliamsburgVA United States School of Psychology Beijing Normal University Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Emotion significantly affects our daily behaviors and interactions. Although recent generative AI models, such as large language models, have shown impressive performance in various tasks, it remains unclear whether t... 详细信息
来源: 评论
Heterogeneous software Effort Estimation via Cascaded Adversarial Auto-Encoder  1
收藏 引用
21st International Conference on Parallel and Distributed Computing, Applications, and Technologies, PDCAT 2020
作者: Qi, Fumin Jing, Xiao-Yuan Zhu, Xiaoke Jia, Xiaodong Cheng, Li Dong, Yichuan Fang, Ziseng Ma, Fei Feng, Shengzhong College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Wuhan University Wuhan China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China National Supercomputing Center in Shenzhen Guangzhou Guangdong China School of Computer Science Qufu Normal University Rizhao China
In software Effort Estimation (SEE) practice, the data drought problem has been plaguing researchers and practitioners. Leveraging heterogeneous SEE data collected by other companies is a feasible solution to relieve ... 详细信息
来源: 评论
VRVideos: A flexible pipeline for Virtual Reality Video Creation
VRVideos: A flexible pipeline for Virtual Reality Video Crea...
收藏 引用
IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)
作者: Anthony Dickson Jeremy Shanks Jonathan Ventura Alistair Knott Stefanie Zollmann Depart. of Computer Science University of Otago Dunedin New Zealand Depart. of Computer Science and Software Engineering California Polytechnic State University San Luis Obispo USA School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
Recent advances in Neural Radiance Field (NeRF)-based methods have enabled high-fidelity novel view synthesis for video with dynamic elements. However, these methods often require expensive hardware, take days to proc... 详细信息
来源: 评论
SIBW: A Swarm Intelligence-Based Network Flow Watermarking Approach for Privacy Leakage Detection in Digital Healthcare Systems
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Qiao, Sibo Guo, Qiang Shi, Fengdong Wang, Min Zhu, Haohao Khan, Fazlullah Rodrigues, Joel J.P.C. Lyu, Zhihan School of Software Tiangong University Tianjin300387 China School of Artificial Intelligence Tiangong University Tianjin300387 China National Demonstration Center for Experimental Engineering Training Education Tiangong University Tianjin300387 China School of Life Sciences Tiangong University Tianjin300387 China School of Control Sciences and Engineering Tiangong University Tianjin300387 China School of Computer Science Faculty of Science and Engineering University of Nottingham Ningbo China Zhejiang Ningbo315104 China Higher School of Technology Amazonas State University Amazonas Manaus69050-010 Brazil Department of Game Design Faculty of Arts Uppsala University Uppsala Sweden
The exponential growth of sensitive patient information and diagnostic records in digital healthcare systems has increased the complexity of data protection, while frequent medical data breaches severely compromise sy... 详细信息
来源: 评论
A Real-Time Approach to Recognition of Kazakh Sign Language
A Real-Time Approach to Recognition of Kazakh Sign Language
收藏 引用
2022 International Conference on Smart Information Systems and Technologies, SIST 2022
作者: Zholshiyeva, Lazzat Zhukabayeva, Tamara Turaev, Sherzod Berdiyeva, Meruyert Kuanysbaevna, Sengirbaeva Raykhan High School Of Information Technology And Engineering Astana International University Nur-Sultan Kazakhstan College Of Information Technology United Arab Emirates University Department Of Computer Science & Software Engineering Al Ain United Arab Emirates South Kazakhstan Medical Academy Department Of Medical Biophysics And It Shymkent Kazakhstan Special Boarding School №1 For Children With Hearing Impairment Shymkent Kazakhstan
The interaction between man and computer is expanded with computer technology development. Hand gesture recognition is an essential technology for human-computer interaction, and it allows the recording and interpreta... 详细信息
来源: 评论
Light-YOLOv8-Flame: A Lightweight High-Performance Flame Detection Algorithm
arXiv
收藏 引用
arXiv 2025年
作者: Lan, Jiawei Tao, Ye Wang, Zhibiao Yu, Haoyang Cui, Wenhua School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China
Fire detection algorithms, particularly those based on computer vision, encounter significant challenges such as high computational costs and delayed response times, which hinder their application in real-time systems... 详细信息
来源: 评论
User and Interaction Both Matter: Social Relationship Mining Via Interaction Graph Propagating
User and Interaction Both Matter: Social Relationship Mining...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yilong Zang Ruimin Hu Xixi Li Zheng Wang Dengshi Li National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Cyber Engineering Xidian University Xi'an China School of Artificial Intelligence Jianghan University Wuhan China
Social relationship mining benefits many applications such as leadership analysis and advisor recommendation. Existing methods focus on mining user relationships only from the perspective of user-level. To our knowled...
来源: 评论
CSL: A Large-scale Chinese Scientific Literature Dataset
arXiv
收藏 引用
arXiv 2022年
作者: Li, Yudong Zhang, Yuqing Zhao, Zhe Shen, Linlin Liu, Weijie Mao, Weiquan Zhang, Hui School of Information Engineering China Shenzhen University School of Computer Science and Software Engineering China Tencent AI Lab United States Information Technology Center for National Science and Technology Infrastructure Beijing China
Scientific literature serves as a high-quality corpus, supporting a lot of Natural Language Processing (NLP) research. However, existing datasets are centered around the English language, which restricts the developme... 详细信息
来源: 评论
Adversarial Purification by Consistency-aware Latent Space Optimization on Data Manifolds
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Shuhai Yang, Jiahao Luo, Hui Chen, Jie Wang, Li Liu, Feng Han, Bo Tan, Mingkui The School of Software Engineering South China University of Technology China the Pazhou Laboratory Guangzhou China The National Key Laboratory of Optical Field Manipulation Science and Technology CAS China the Institute of Optics and Electronics CAS Chengdu China the School of Electronic and Computer Engineering Peking University Beijing100871 China Peng Cheng Laboratory Shenzhen518066 China The Department of Mathematics The Department of Computer Science and Engineering University of Texas at Arlington ArlingtonTX76019 United States University of Melbourne Australia Department of Computer Science Hong Kong Baptist University Hong Kong
Deep neural networks (DNNs) are vulnerable to adversarial samples crafted by adding imperceptible perturbations to clean data, potentially leading to incorrect and dangerous predictions. Adversarial purification has b... 详细信息
来源: 评论
DeltaFS: Pursuing Zero Update Overhead via Metadata-Enabled Delta Compression for Log-structured File System on Mobile Devices
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Chao Ji, Cheng Yuan, Geng Pan, Riwei Guo, Weichao Yu, Chao Zhu, Zongwei Wang, Yanzhi Department of Electrical and Computer Engineering Northeastern University United States School of Computer Science Nanjing University of Science and Technology China Department of Computer Science City University of Hong Kong Hong Kong Guangdong Oppo Mobile Telecommunications Corp. Ltd China School of Software Engineering University of Science and Technology of Chinese China
Data compression has been widely adopted to release mobile devices from intensive write pressure. Delta compression is particularly promising for its high compression efficacy over conventional compression methods. Ho... 详细信息
来源: 评论