咨询与建议

限定检索结果

文献类型

  • 162,250 篇 会议
  • 89,591 篇 期刊文献
  • 1,640 册 图书
  • 1 篇 学位论文

馆藏范围

  • 253,482 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 157,292 篇 工学
    • 97,681 篇 计算机科学与技术...
    • 79,481 篇 软件工程
    • 38,322 篇 信息与通信工程
    • 24,996 篇 控制科学与工程
    • 22,254 篇 电子科学与技术(可...
    • 21,278 篇 电气工程
    • 15,977 篇 生物工程
    • 13,279 篇 机械工程
    • 13,176 篇 光学工程
    • 11,520 篇 生物医学工程(可授...
    • 10,817 篇 化学工程与技术
    • 10,074 篇 仪器科学与技术
    • 8,531 篇 动力工程及工程热...
    • 8,295 篇 材料科学与工程(可...
    • 5,473 篇 交通运输工程
    • 5,282 篇 安全科学与工程
    • 5,265 篇 网络空间安全
  • 89,342 篇 理学
    • 43,605 篇 数学
    • 30,455 篇 物理学
    • 18,079 篇 生物学
    • 13,930 篇 统计学(可授理学、...
    • 10,918 篇 化学
    • 9,450 篇 系统科学
  • 39,088 篇 管理学
    • 24,729 篇 管理科学与工程(可...
    • 15,855 篇 图书情报与档案管...
    • 10,163 篇 工商管理
  • 10,995 篇 医学
    • 9,105 篇 临床医学
    • 7,959 篇 基础医学(可授医学...
    • 4,875 篇 药学(可授医学、理...
  • 6,064 篇 法学
    • 4,900 篇 社会学
  • 4,068 篇 经济学
  • 3,355 篇 农学
  • 2,626 篇 教育学
  • 1,054 篇 文学
  • 721 篇 军事学
  • 483 篇 艺术学
  • 32 篇 哲学
  • 25 篇 历史学

主题

  • 6,327 篇 feature extracti...
  • 5,677 篇 accuracy
  • 5,029 篇 deep learning
  • 4,969 篇 training
  • 4,722 篇 computational mo...
  • 4,681 篇 computer science
  • 3,923 篇 machine learning
  • 3,372 篇 optimization
  • 3,073 篇 data mining
  • 3,004 篇 predictive model...
  • 2,878 篇 semantics
  • 2,685 篇 data models
  • 2,668 篇 support vector m...
  • 2,658 篇 neural networks
  • 2,507 篇 educational inst...
  • 2,493 篇 real-time system...
  • 2,464 篇 internet of thin...
  • 2,423 篇 convolutional ne...
  • 2,189 篇 artificial intel...
  • 2,167 篇 wireless sensor ...

机构

  • 2,477 篇 school of comput...
  • 1,858 篇 school of inform...
  • 1,549 篇 university of ch...
  • 1,507 篇 school of comput...
  • 1,333 篇 school of comput...
  • 1,052 篇 cavendish labora...
  • 1,032 篇 physikalisches i...
  • 973 篇 department of ph...
  • 943 篇 school of comput...
  • 851 篇 oliver lodge lab...
  • 774 篇 school of comput...
  • 617 篇 department of co...
  • 595 篇 school of inform...
  • 560 篇 school of comput...
  • 559 篇 chitkara univers...
  • 534 篇 school of inform...
  • 523 篇 infn laboratori ...
  • 521 篇 university of sc...
  • 511 篇 nikhef national ...
  • 497 篇 school of comput...

作者

  • 325 篇 niyato dusit
  • 303 篇 yang yang
  • 248 篇 barter w.
  • 235 篇 wang wei
  • 221 篇 s. chen
  • 217 篇 blake t.
  • 217 篇 a. gomes
  • 214 篇 bellee v.
  • 213 篇 bowcock t.j.v.
  • 209 篇 betancourt c.
  • 207 篇 borsato m.
  • 205 篇 brundu d.
  • 203 篇 liu yang
  • 199 篇 beiter a.
  • 198 篇 amato s.
  • 195 篇 y. li
  • 194 篇 c. alexa
  • 190 篇 boettcher t.
  • 188 篇 j. m. izen
  • 184 篇 c. amelung

语言

  • 234,393 篇 英文
  • 13,289 篇 其他
  • 5,457 篇 中文
  • 490 篇 日文
  • 42 篇 德文
  • 38 篇 法文
  • 21 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253482 条 记 录,以下是4971-4980 订阅
排序:
Hierarchical Retrieval of High-Resolution Fingerprints Based on Pore Feature
Hierarchical Retrieval of High-Resolution Fingerprints Based...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Ma, Jing Xu, Yuanrong Dong, Suyu Wang, Wei Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Harbin Institute of Technology School of Computer Science and Technology Weihai China Northeast Forestry University College of Computer and Control Engineering Harbin China
Faced with an escalating number of fingerprint images, most existing retrieval approachs suffer from a common problem: diminishing computational efficiency. This paper presents a hierarchical retrieval system tailored... 详细信息
来源: 评论
IndoCL: Benchmarking Indonesian Language Development Assessment
IndoCL: Benchmarking Indonesian Language Development Assessm...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Lin, Nankai Wu, Hongyan Zheng, Weixiong Liao, Xingming Jiang, Shengyi Yang, Aimin Xiao, Lixian School of Computer Science and Technology Guangdong University of Technology China College of Computer National University of Defense Technology China School of Information Technology and Engineering Guangzhou College of Commerce China School of Computer Science and Intelligence Education Lingnan Normal University China Faculty of Asian Languages and Cultures Guangdong University of Foreign Studies China
Recently, the field of language acquisition (LA) has significantly benefited from natural language processing technologies. A crucial task in LA involves tracking the evolution of language learners' competence, na... 详细信息
来源: 评论
An Exploration of Data Augmentation Techniques in Ensemble Learning for Medical Image Segmentation with Transfer Learning
An Exploration of Data Augmentation Techniques in Ensemble L...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Singh, Swati Gupta, Namit Prakash, Febin Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
this paper examines using data augmentation strategies in the ensemble, getting to know medical photo segmentation with transfer learning. Various transfer-gaining knowledge of techniques, namely pretrained models, un... 详细信息
来源: 评论
Deep Learning for Cross-Domain Few-Shot Visual Recognition: A Survey
收藏 引用
ACM Computing Surveys 2025年 第8期57卷 1-37页
作者: Xu, Huali Zhi, Shuaifeng Sun, Shuzhou Patel, Vishal Liu, Li College of Computer Science Nankai University Tianjin China College of Electronic Science and Technology National University of Defense Technology Changsha China Faculty of Information Technology and Electrical Engineering University of Oulu Oulu Finland Johns Hopkins University Baltimore United States
While deep learning excels in computer vision tasks with abundant labeled data, its performance diminishes significantly in scenarios with limited labeled samples. To address this, Few-shot learning (FSL) enables mode... 详细信息
来源: 评论
Cross-modal image text retrieval based on Cross-optimization and Joint strategy
Cross-modal image text retrieval based on Cross-optimization...
收藏 引用
2024 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2024
作者: Zheng, Wei Han, Na Hu, Yan Kang, Peipei Zhang, Yue Yang, Aqing Zhang, Lei School of Computer Science Guangdong Polytechnic Normal University China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data China School of Computer Science and Technology Guangdong University of Technology China School of Information Engineering East University of Heilongjiang China
In the fields of computer vision and natural language processing, cross-modal retrieval is of great importance that cannot be ignored. In existing multi-granularity alignment methods, significant progress has been mad... 详细信息
来源: 评论
A fault recognition method based on clustering linear regression
收藏 引用
High technology Letters 2023年 第4期29卷 406-415页
作者: 陈雷 SHI Jiaqi ZHANG Ting Computer School Beijing Information Science and Technology UniversityBeijing 100101P.R.China Faculty of Information Technology Beijing University of TechnologyBeijing 100124P.R.China
Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clus... 详细信息
来源: 评论
Generating Markov Logic Networks Rulebase Based on Probabilistic Latent Semantics Analysis
收藏 引用
Tsinghua science and technology 2023年 第5期28卷 952-964页
作者: Shan Cui Tao Zhu Xiao Zhang Liming Chen Lingfeng Mao Huansheng Ning School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Computer School University of South ChinaHengyang 421001China School of Computing Ulster UniversityBelfastBT151APUK
Human Activity Recognition(HAR)has become a subject of concern and plays an important role in daily *** uses sensor devices to collect user behavior data,obtain human activity information and identify *** Logic Networ... 详细信息
来源: 评论
Web Threat Recognition Model Based on Anomaly Detection and Attention Mechanism Seq2Seq Network
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1742-1759页
作者: Zhang, Guang-Hua Zhang, Kai-Di Yan, Jia School of Information Science and Engineering Hebei University of Science Technology Shijiazhuang050018 China Finance Department Hebei Youth Management Cadre College Shijiazhuang050031 China
With the rapid development of the Internet, Web threat identification is crucial. However, the existing Web threat recognition models have the following problems: inability to identify untrained attacks, poor overall ... 详细信息
来源: 评论
Universal Adversarial Attack for Trustworthy LiDAR based Object Detection in Embedded Applications  4
Universal Adversarial Attack for Trustworthy LiDAR based Obj...
收藏 引用
4th International Conference on Intelligent technology and Embedded Systems, ICITES 2024
作者: Cai, Mumuxin Wang, Xupeng Sohel, Ferdous Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Information Technology Murdoch University Murdoch Australia
3D object detection based on deep neural networks (DNNs) has widely been adopted in the field of embedded applications, such as autonomous driving. Nonetheless, recent studies have demonstrated that LiDAR data tends t... 详细信息
来源: 评论
PillarTsAE: A High-Performance Pillar-based 3D Object Detection Network in LIDAR Point Clouds  8
PillarTsAE: A High-Performance Pillar-based 3D Object Detect...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical sciences, ICIIBMS 2023
作者: Liu, Xinzhe Li, Wenju Cui, Liu He, Liuqin Shanghai Institute of Technology Shanghai of Computer Science and Information Engineering Shanghai China Shanghai Institute of Technology Shanghai of Computer Science and Information Shanghai China
3D object detection plays a crucial role in many fields such as autonomous driving, robot perception and other fields. Current methods encounter limitations when dealing with intricate point cloud data, such as poor p... 详细信息
来源: 评论