咨询与建议

限定检索结果

文献类型

  • 10,362 篇 会议
  • 6,775 篇 期刊文献
  • 181 册 图书

馆藏范围

  • 17,318 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 11,103 篇 工学
    • 8,501 篇 计算机科学与技术...
    • 7,054 篇 软件工程
    • 2,275 篇 信息与通信工程
    • 1,342 篇 控制科学与工程
    • 1,185 篇 生物工程
    • 916 篇 电气工程
    • 749 篇 机械工程
    • 697 篇 电子科学与技术(可...
    • 662 篇 光学工程
    • 647 篇 生物医学工程(可授...
    • 458 篇 化学工程与技术
    • 373 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 342 篇 动力工程及工程热...
    • 323 篇 交通运输工程
    • 296 篇 网络空间安全
    • 292 篇 建筑学
  • 5,426 篇 理学
    • 2,968 篇 数学
    • 1,344 篇 物理学
    • 1,304 篇 生物学
    • 876 篇 统计学(可授理学、...
    • 545 篇 系统科学
    • 497 篇 化学
  • 3,165 篇 管理学
    • 1,896 篇 管理科学与工程(可...
    • 1,382 篇 图书情报与档案管...
    • 778 篇 工商管理
  • 559 篇 医学
    • 481 篇 临床医学
    • 414 篇 基础医学(可授医学...
  • 455 篇 法学
    • 342 篇 社会学
  • 286 篇 经济学
    • 285 篇 应用经济学
  • 244 篇 教育学
  • 156 篇 农学
  • 45 篇 军事学
  • 42 篇 艺术学
  • 36 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 641 篇 computer science
  • 503 篇 software enginee...
  • 341 篇 semantics
  • 314 篇 feature extracti...
  • 309 篇 deep learning
  • 306 篇 computational mo...
  • 275 篇 training
  • 229 篇 data mining
  • 208 篇 educational inst...
  • 206 篇 optimization
  • 179 篇 image segmentati...
  • 177 篇 application soft...
  • 176 篇 neural networks
  • 167 篇 predictive model...
  • 159 篇 computer archite...
  • 153 篇 machine learning
  • 150 篇 internet of thin...
  • 138 篇 convolution
  • 138 篇 authentication
  • 136 篇 task analysis

机构

  • 412 篇 college of compu...
  • 374 篇 iccub universita...
  • 368 篇 department of ph...
  • 361 篇 infn sezione di ...
  • 344 篇 universiteit maa...
  • 334 篇 horia hulubei na...
  • 333 篇 h.h. wills physi...
  • 319 篇 university of ch...
  • 317 篇 school of comput...
  • 305 篇 infn sezione di ...
  • 279 篇 van swinderen in...
  • 277 篇 massachusetts in...
  • 260 篇 infn laboratori ...
  • 257 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 252 篇 infn sezione di ...
  • 239 篇 university of ma...
  • 239 篇 school of physic...

作者

  • 241 篇 barter w.
  • 234 篇 brundu d.
  • 205 篇 blake t.
  • 204 篇 bowcock t.j.v.
  • 203 篇 bellee v.
  • 202 篇 betancourt c.
  • 202 篇 belin s.
  • 201 篇 borsato m.
  • 187 篇 beiter a.
  • 185 篇 aliouche z.
  • 178 篇 cali s.
  • 162 篇 boelhauve j.a.
  • 161 篇 amato s.
  • 147 篇 bobulska d.
  • 135 篇 boettcher t.
  • 133 篇 atzeni m.
  • 126 篇 bencivenni g.
  • 126 篇 bay a.
  • 126 篇 bhom j.
  • 126 篇 boldyrev a.

语言

  • 16,085 篇 英文
  • 969 篇 其他
  • 281 篇 中文
  • 2 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Engineering Monash University"
17318 条 记 录,以下是311-320 订阅
排序:
A Method Based on Genetic Programming to Automatically Construct Factors for Annual Report Scenarios  20
A Method Based on Genetic Programming to Automatically Const...
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Ma, Yan Zhang, Changsheng Gao, Yan Guo, Ying School of Computer Science and Engineering Northeastern University Shenyang China Software College Northeastern University Shenyang China College of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan China
Factors have always played an important role in stock analysis, but they are only effective for specific problems in specific scenarios. Therefore, constructing factors timely and quickly for different scenarios is an... 详细信息
来源: 评论
CRAYM: Neural Field Optimization via Camera RAY Matching  38
CRAYM: Neural Field Optimization via Camera RAY Matching
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lin, Liqiang Wu, Wenpeng Fu, Chi-Wing Zhang, Hao Huang, Hui College of Computer Science and Software Engineering Shenzhen University China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong School of Computing Science Simon Fraser University Canada
We introduce camera ray matching (CRAYM) into the joint optimization of camera poses and neural fields from multi-view images. The optimized field, referred to as a feature volume, can be "probed" by the cam...
来源: 评论
MA-MFIF: When misaligned multi-focus Image fusion meets deep homography estimation
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10877-10898页
作者: Zhao, Baojun Luo, Fei Fuentes, Joel Ding, Weichao Gu, Chunhua School of Information Science and Engineering East China University of Science and Technology Shanghai200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Department of Computer Science and Information Technologies Universidad del Bio-Bio Chillán3780000 Chile
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning... 详细信息
来源: 评论
M-GhostNet: A Lightweight CNN Model Combined with Coordinate Attention Mechanism for Identifying Pests and Diseases  12
M-GhostNet: A Lightweight CNN Model Combined with Coordinate...
收藏 引用
12th International Conference on Computing and Pattern Recognition, ICCPR 2023
作者: Ma, Chi Xiao, Yu Hu, Hui Li, Jingyan Wu, Jie The School of Computer Science and Engineering Huizhou University Huizhou516007 China The School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Plant pests and diseases have always been an important factor affecting agricultural production, and how to automatically identify them is one of the current research hotspots. Although traditional deep learning model... 详细信息
来源: 评论
Knowledge Graph Driven Inference Testing for Question Answering software  24
Knowledge Graph Driven Inference Testing for Question Answer...
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Wang, Jun Li, Yanhui Chen, Zhifei Chen, Lin Zhang, Xiaofang Zhou, Yuming Nanjing University State Key Laboratory for Novel Software Technology China School of Computer Science and Engineering Nanjing University of Science and Technology China School of Computer Science and Technology Soochow University China
In the wake of developments in the field of Natural Language Processing, Question Answering (QA) software has penetrated our daily lives. Due to the data-driven programming paradigm, QA software inevitably contains bu... 详细信息
来源: 评论
A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing
收藏 引用
computer Modeling in engineering & sciences 2024年 第7期140卷 907-927页
作者: Yong Ma Han Zhao Kunyin Guo Yunni Xia Xu Wang Xianhua Niu Dongge Zhu Yumin Dong School of Computer Information Engineering Jiangxi Normal UniversityNanchang330000China School of Digital Industry Jiangxi Normal UniversityShangrao334000China The College of Computer Science Chongqing UniversityChongqing400044China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer and Software Engineering Xihua UniversityChengdu610039China Electric Power Research Institute of State Grid Ningxia Electric Power Company Ltd. Yinchuan750002China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to *** the MEC environment,frequently accessed content can be deployed... 详细信息
来源: 评论
Similar Locality Based Transfer Evolutionary Optimization for Minimalistic Attacks  13
Similar Locality Based Transfer Evolutionary Optimization fo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ma, Wenqiang Hau, Yaqing Yu, Hua Tong, Xiangrong Zhu, Zexuan Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China School of Computer and Control Engineering Yantai University Yantai264005 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Deep neural networks are powerful and popular learning models;however, recent studies have shown that deep neural network-based policies are susceptible to deception by adversarial attacks. A minimalistic attack is a ... 详细信息
来源: 评论
Efficiently Detecting Anomalies in IoT: A Novel Multi-Task Federated Learning Method  19th
Efficiently Detecting Anomalies in IoT: A Novel Multi-Task ...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Hao, Junfeng Chen, Juan Chen, Peng Wang, Yang Niu, Xianhua Xu, Lei Xia, Yunni School of Computer and Software Engineering Xihua University Chengdu China School of Emergency Management Xihua University Chengdu China School of Computer Science Chongqing University Chongqing China
With the development of IoT technology, a significant amount of time series data is continuously generated, and anomaly detection of this data is crucial. However, time series data in IoT is dynamic and heterogeneous,... 详细信息
来源: 评论
Crop Pest Image Classification Based on Multi-Scale Convolutional Neural Network  9
Crop Pest Image Classification Based on Multi-Scale Convolut...
收藏 引用
9th International Conference on Fuzzy Systems and Data Mining, FSDM 2023
作者: Ma, Chi Li, Huikai Hu, Hui Li, Jingyan Wu, Jie School of Computer Science and Engineering Huizhou University Huizhou516007 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Crop diseases and pests are major threats to crop yield and quality, as well as global food security and agricultural livelihoods. Therefore, it is essential to identify crop pests and diseases in a timely, efficient ... 详细信息
来源: 评论
Empowering Cross-Device Data Security Verification for IoT Sensor Nodes  7
Empowering Cross-Device Data Security Verification for IoT S...
收藏 引用
7th International Conference on Machine Learning and Natural Language Processing, MLNLP 2024
作者: Shi, Xin He, Sheng Wang, Ting Zhang, Chong Wang, Yang Zhang, Xiao School of Computer Science and Software Engineering Southwest Petroleum University Chengdu China School of Computer Science Chengdu University of Information Technology Chengdu China School of Information Engineering Mianyang Teachers College Mianyang China
In the process of realizing the Internet of Everything through the Internet of Things (IoT), the massive deployment of sensor nodes poses significant security challenges. This paper introduces a novel approach to anom... 详细信息
来源: 评论