咨询与建议

限定检索结果

文献类型

  • 10,362 篇 会议
  • 6,775 篇 期刊文献
  • 181 册 图书

馆藏范围

  • 17,318 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 11,103 篇 工学
    • 8,501 篇 计算机科学与技术...
    • 7,054 篇 软件工程
    • 2,275 篇 信息与通信工程
    • 1,342 篇 控制科学与工程
    • 1,185 篇 生物工程
    • 916 篇 电气工程
    • 749 篇 机械工程
    • 697 篇 电子科学与技术(可...
    • 662 篇 光学工程
    • 647 篇 生物医学工程(可授...
    • 458 篇 化学工程与技术
    • 373 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 342 篇 动力工程及工程热...
    • 323 篇 交通运输工程
    • 296 篇 网络空间安全
    • 292 篇 建筑学
  • 5,426 篇 理学
    • 2,968 篇 数学
    • 1,344 篇 物理学
    • 1,304 篇 生物学
    • 876 篇 统计学(可授理学、...
    • 545 篇 系统科学
    • 497 篇 化学
  • 3,165 篇 管理学
    • 1,896 篇 管理科学与工程(可...
    • 1,382 篇 图书情报与档案管...
    • 778 篇 工商管理
  • 559 篇 医学
    • 481 篇 临床医学
    • 414 篇 基础医学(可授医学...
  • 455 篇 法学
    • 342 篇 社会学
  • 286 篇 经济学
    • 285 篇 应用经济学
  • 244 篇 教育学
  • 156 篇 农学
  • 45 篇 军事学
  • 42 篇 艺术学
  • 36 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 641 篇 computer science
  • 503 篇 software enginee...
  • 341 篇 semantics
  • 314 篇 feature extracti...
  • 309 篇 deep learning
  • 306 篇 computational mo...
  • 275 篇 training
  • 229 篇 data mining
  • 208 篇 educational inst...
  • 206 篇 optimization
  • 179 篇 image segmentati...
  • 177 篇 application soft...
  • 176 篇 neural networks
  • 167 篇 predictive model...
  • 159 篇 computer archite...
  • 153 篇 machine learning
  • 150 篇 internet of thin...
  • 138 篇 convolution
  • 138 篇 authentication
  • 136 篇 task analysis

机构

  • 412 篇 college of compu...
  • 374 篇 iccub universita...
  • 368 篇 department of ph...
  • 361 篇 infn sezione di ...
  • 344 篇 universiteit maa...
  • 334 篇 horia hulubei na...
  • 333 篇 h.h. wills physi...
  • 319 篇 university of ch...
  • 317 篇 school of comput...
  • 305 篇 infn sezione di ...
  • 279 篇 van swinderen in...
  • 277 篇 massachusetts in...
  • 260 篇 infn laboratori ...
  • 257 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 252 篇 infn sezione di ...
  • 239 篇 university of ma...
  • 239 篇 school of physic...

作者

  • 241 篇 barter w.
  • 234 篇 brundu d.
  • 205 篇 blake t.
  • 204 篇 bowcock t.j.v.
  • 203 篇 bellee v.
  • 202 篇 betancourt c.
  • 202 篇 belin s.
  • 201 篇 borsato m.
  • 187 篇 beiter a.
  • 185 篇 aliouche z.
  • 178 篇 cali s.
  • 162 篇 boelhauve j.a.
  • 161 篇 amato s.
  • 147 篇 bobulska d.
  • 135 篇 boettcher t.
  • 133 篇 atzeni m.
  • 126 篇 bencivenni g.
  • 126 篇 bay a.
  • 126 篇 bhom j.
  • 126 篇 boldyrev a.

语言

  • 16,085 篇 英文
  • 969 篇 其他
  • 281 篇 中文
  • 2 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Engineering Monash University"
17318 条 记 录,以下是211-220 订阅
排序:
Prompting Large Language Models with Knowledge-Injection for Knowledge-Based Visual Question Answering
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 843-857页
作者: Zhongjian Hu Peng Yang Fengyuan Liu Yuan Meng Xingyu Liu School of Computer Science and Engineering Southeast University the Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education of the People’s Republic of ChinaNanjing 211189China Southeast University-Monash University Joint Graduate School(Suzhou) Southeast UniversitySuzhou 215125China
Previous works employ the Large Language Model(LLM)like GPT-3 for knowledge-based Visual Question Answering(VQA).We argue that the inferential capacity of LLM can be enhanced through knowledge *** methods that utilize... 详细信息
来源: 评论
Robust copy-move detection and localization of digital audio based CFCC feature
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9573-9589页
作者: Wang, Dongyu Li, Xiaojie Shi, Canghong Niu, Xianhua Xiong, Ling Wu, Hanzhou Qian, Qing Qi, Chao School of Computer and Software Engineering Xihua University Chengdu610039 China The College of Computer Science Chengdu University of Information Technology Chengdu610225 China School of Information Shanghai University Shanghai200444 China School of Information Guizhou University of Finance and Economics Guiyang550000 China
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema... 详细信息
来源: 评论
Image Representations of Numerical Simulations for Training Neural Networks
收藏 引用
computer Modeling in engineering & sciences 2023年 第2期134卷 821-833页
作者: Yiming Zhang Zhiran Gao Xueya Wang Qi Liu School of Civil and Transportation Engineering Hebei University of TechnologyTianjin300401China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China
A large amount of data can partly assure good fitting quality for the trained neural *** the quantity of experimental or on-site monitoring data is commonly insufficient and the quality is difficult to control in engi... 详细信息
来源: 评论
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1837-1850页
作者: Uchechukwu Awada Jiankang Zhang Sheng Chen Shuangzhi Li Shouyi Yang School of Software Henan Institute of Science and TechnologyXinxiang 453003China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou 450001China Department of Computing and Informatics Bournemouth UniversityPoole BH125BBUK School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3573-3581页
作者: Mahmood, Khalid Tariq, Tayyaba Sangaiah, Arun Kumar Ghaffar, Zahid Saleem, Muhammad Asad Shamshad, Salman National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China The University of Lahore Department of Software Engineering Lahore54590 Pakistan
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra... 详细信息
来源: 评论
Pairwise tagging framework for end-to-end emotion-cause pair extraction
收藏 引用
Frontiers of computer science 2023年 第2期17卷 111-120页
作者: Zhen WU Xinyu DAI Rui XIA National Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 210023China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210023China
Emotion-cause pair extraction(ECPE)aims to extract all the pairs of emotions and corresponding causes in a *** generally contains three subtasks,emotions extraction,causes extraction,and causal relations detection bet... 详细信息
来源: 评论
Classification and Segmentation of Gastroenterology Images Using Saliency Mapping in Convolutional Neural Network  21
Classification and Segmentation of Gastroenterology Images U...
收藏 引用
21st International Bhurban Conference on Applied sciences and Technology, IBCAST 2024
作者: Khan, Yusra Shaukat, Arslan Riaz, Farhan Department of Computer and Software Engineering Islamabad Pakistan School of Computer Science University of Lincoln Lincoln United Kingdom
This research work has been done towards the treatment of Gastrointestinal (GI) Cancer by experimenting as to how a computer aided design can help oncologists classify and segment GI Cancer using Gastroenterology (GE)... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
Anomaly Detection in Spatial Information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论