咨询与建议

限定检索结果

文献类型

  • 140,299 篇 会议
  • 69,624 篇 期刊文献
  • 1,416 册 图书

馆藏范围

  • 211,338 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,848 篇 工学
    • 84,948 篇 计算机科学与技术...
    • 69,646 篇 软件工程
    • 30,736 篇 信息与通信工程
    • 20,137 篇 控制科学与工程
    • 15,999 篇 电气工程
    • 15,899 篇 电子科学与技术(可...
    • 14,758 篇 生物工程
    • 10,351 篇 生物医学工程(可授...
    • 10,159 篇 光学工程
    • 9,603 篇 机械工程
    • 7,032 篇 化学工程与技术
    • 6,872 篇 仪器科学与技术
    • 6,356 篇 动力工程及工程热...
    • 5,045 篇 材料科学与工程(可...
    • 4,559 篇 交通运输工程
    • 4,483 篇 安全科学与工程
    • 4,324 篇 网络空间安全
  • 70,035 篇 理学
    • 35,606 篇 数学
    • 21,355 篇 物理学
    • 16,520 篇 生物学
    • 11,776 篇 统计学(可授理学、...
    • 7,731 篇 系统科学
    • 7,502 篇 化学
  • 33,010 篇 管理学
    • 20,532 篇 管理科学与工程(可...
    • 13,721 篇 图书情报与档案管...
    • 9,011 篇 工商管理
  • 9,766 篇 医学
    • 8,015 篇 临床医学
    • 7,174 篇 基础医学(可授医学...
    • 4,439 篇 药学(可授医学、理...
  • 5,613 篇 法学
    • 4,675 篇 社会学
  • 3,452 篇 经济学
  • 2,492 篇 农学
  • 2,177 篇 教育学
  • 948 篇 文学
  • 458 篇 军事学
  • 355 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,146 篇 computer science
  • 5,326 篇 accuracy
  • 5,173 篇 feature extracti...
  • 4,678 篇 computational mo...
  • 4,635 篇 deep learning
  • 4,624 篇 training
  • 3,736 篇 machine learning
  • 2,966 篇 optimization
  • 2,912 篇 predictive model...
  • 2,826 篇 semantics
  • 2,599 篇 data models
  • 2,448 篇 real-time system...
  • 2,334 篇 neural networks
  • 2,319 篇 support vector m...
  • 2,319 篇 data mining
  • 2,250 篇 convolutional ne...
  • 2,083 篇 internet of thin...
  • 1,989 篇 artificial intel...
  • 1,881 篇 educational inst...
  • 1,860 篇 image segmentati...

机构

  • 2,473 篇 school of comput...
  • 2,223 篇 school of comput...
  • 2,083 篇 school of comput...
  • 1,827 篇 school of comput...
  • 1,516 篇 school of comput...
  • 1,493 篇 school of comput...
  • 1,355 篇 school of comput...
  • 1,347 篇 school of electr...
  • 1,250 篇 school of comput...
  • 1,077 篇 cavendish labora...
  • 1,021 篇 school of comput...
  • 976 篇 department of ph...
  • 973 篇 school of comput...
  • 907 篇 school of comput...
  • 886 篇 physikalisches i...
  • 878 篇 oliver lodge lab...
  • 870 篇 university of ch...
  • 540 篇 school of comput...
  • 535 篇 school of comput...
  • 527 篇 school of electr...

作者

  • 397 篇 niyato dusit
  • 268 篇 a. gomes
  • 262 篇 barter w.
  • 241 篇 c. alexa
  • 236 篇 j. m. izen
  • 235 篇 blake t.
  • 233 篇 s. chen
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 223 篇 bellee v.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 220 篇 brundu d.
  • 215 篇 bencivenni g.
  • 213 篇 bay a.
  • 212 篇 g. bella
  • 212 篇 j. strandberg
  • 212 篇 beiter a.
  • 210 篇 d. calvet

语言

  • 183,191 篇 英文
  • 25,077 篇 其他
  • 3,176 篇 中文
  • 181 篇 日文
  • 38 篇 朝鲜文
  • 29 篇 德文
  • 24 篇 法文
  • 12 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Computer Engineering"
211339 条 记 录,以下是511-520 订阅
排序:
An End-to-End Two-Branch Network Towards Robust Video Fingerprinting
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2371-2384页
作者: Xu, Yingying Zhou, Yuanding Li, Xinran Zhao, Gejian Qin, Chuan University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
With the increasing number of edited videos, many robust video fingerprinting schemes have been proposed to solve the problem of video content authentication. However, most of them either deal with the temporal and sp... 详细信息
来源: 评论
Diluie: constructing diverse demonstrations of in-context learning with large language model for unified information extraction
收藏 引用
Neural Computing and Applications 2024年 第22期36卷 13491-13512页
作者: Guo, Qian Guo, Yi Zhao, Jin Department of Computer Science and Engineering East China University of Science and Technology Shanghai200237 China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai200433 China
Large language models (LLMs) have demonstrated promising in-context learning capabilities, especially with instructive prompts. However, recent studies have shown that existing large models still face challenges in sp... 详细信息
来源: 评论
Deep Learning Based Face Detection and Identification of Criminal Suspects
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2331-2343页
作者: S.Sandhya A.Balasundaram Ayesha Shaik School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)Chennai600127India
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most ... 详细信息
来源: 评论
Circular super-Gaussian Airy beams
收藏 引用
Optics Letters 2025年 第10期50卷 3401-3404页
作者: Geng, Tao Wang, Lihui School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China
By replacing the exponential decay function in the circular Airy beam (CAB) with a super-Gaussian function, we propose a novel abruptly autofocusing beam, the circular super-Gaussian Airy beam (CSGAB). Similar to CAB,... 详细信息
来源: 评论
A multi-projection recurrent model for hypernym detection and discovery
收藏 引用
Frontiers of computer science 2025年 第4期19卷 29-42页
作者: Xuefeng ZHANG Junfan CHEN Zheyan LUO Yuhang BAI Chunming HU Richong ZHANG School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Software Beihang UniversityBeijing 100191China Zhongguancun Laboratory Beijing 100094China
Hypernym detection and discovery are fundamental tasks in natural language *** former task aims to identify all possible hypernyms of a given hyponym term,whereas the latter attempts to determine whether the given two... 详细信息
来源: 评论
Visual creativity through concept combination using quantum cognitive models
收藏 引用
Scientia Iranica 2024年 第2期31卷 118-135页
作者: Tabriz, M. Ahrabi Atani, T. Rafiei Ashtiani, M. Jahed-Motlagh, M.R. Laboratory School of Computer Engineering Iran University of Science and Technology Tehran16846-13114 Iran
Computational creativity modeling, including concept combination, enables us to foster deeper abilities of Artificial Intelligence (Al) agents. All hough concept combination lias been addressed in a lot of computation... 详细信息
来源: 评论
Optimization enabled LeNet for big data classification using MapReduce framework on COVID-19 data
收藏 引用
Australian Journal of Electrical and Electronics engineering 2024年 第4期21卷 409-424页
作者: Patle, Bhagyashree R. Vijayarajan, V. VIT Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
The big data clustering is a requisite for generating the data in the digitalised globe. The old-fashioned clustering approaches are not large sized and highly unorganised big data. Thus, to obtain the efficiency of b... 详细信息
来源: 评论
HSALC: hard sample aware label correction for medical image classification
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Wang, Yangtao Ye, Yicheng Xie, Yanzhao Tang, Maobin Fan, Lisheng Metaverse Research Institute School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Medical image automatic classification has always been a research hotspot, but the existing methods suffer from the label noise problem, which either discards those samples with noisy labels or produces wrong label co... 详细信息
来源: 评论
A Construction of Object Detection Model for Acute Myeloid Leukemia
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 543-560页
作者: K.Venkatesh S.Pasupathy S.P.Raja Department of Computer Science and Engineering Annamalai UniversityChidambaram608002India School of Computer Science and Engineering Vellore Institute of TechnologyVellore632014India
The evolution of bone marrow morphology is necessary in Acute Mye-loid Leukemia(AML)*** takes an enormous number of times to ana-lyze with the standardization and inter-observer ***,we proposed a novel AML detection m... 详细信息
来源: 评论
JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3729-3743页
作者: Li, Fengyong Wang, Qiankuan Cheng, Hang Zhang, Xinpeng Qin, Chuan Shanghai University of Electric Power College of Computer Science and Technology Shanghai201306 China Fuzhou University School of Mathematics and Statistics Fuzhou Fujian350108 China Fudan University School of Computer Science Shanghai200433 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu... 详细信息
来源: 评论