咨询与建议

限定检索结果

文献类型

  • 10,362 篇 会议
  • 6,775 篇 期刊文献
  • 181 册 图书

馆藏范围

  • 17,318 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 11,103 篇 工学
    • 8,501 篇 计算机科学与技术...
    • 7,054 篇 软件工程
    • 2,275 篇 信息与通信工程
    • 1,342 篇 控制科学与工程
    • 1,185 篇 生物工程
    • 916 篇 电气工程
    • 749 篇 机械工程
    • 697 篇 电子科学与技术(可...
    • 662 篇 光学工程
    • 647 篇 生物医学工程(可授...
    • 458 篇 化学工程与技术
    • 373 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 342 篇 动力工程及工程热...
    • 323 篇 交通运输工程
    • 296 篇 网络空间安全
    • 292 篇 建筑学
  • 5,426 篇 理学
    • 2,968 篇 数学
    • 1,344 篇 物理学
    • 1,304 篇 生物学
    • 876 篇 统计学(可授理学、...
    • 545 篇 系统科学
    • 497 篇 化学
  • 3,165 篇 管理学
    • 1,896 篇 管理科学与工程(可...
    • 1,382 篇 图书情报与档案管...
    • 778 篇 工商管理
  • 559 篇 医学
    • 481 篇 临床医学
    • 414 篇 基础医学(可授医学...
  • 455 篇 法学
    • 342 篇 社会学
  • 286 篇 经济学
    • 285 篇 应用经济学
  • 244 篇 教育学
  • 156 篇 农学
  • 45 篇 军事学
  • 42 篇 艺术学
  • 36 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 641 篇 computer science
  • 503 篇 software enginee...
  • 341 篇 semantics
  • 314 篇 feature extracti...
  • 309 篇 deep learning
  • 306 篇 computational mo...
  • 275 篇 training
  • 229 篇 data mining
  • 208 篇 educational inst...
  • 206 篇 optimization
  • 179 篇 image segmentati...
  • 177 篇 application soft...
  • 176 篇 neural networks
  • 167 篇 predictive model...
  • 159 篇 computer archite...
  • 153 篇 machine learning
  • 150 篇 internet of thin...
  • 138 篇 convolution
  • 138 篇 authentication
  • 136 篇 task analysis

机构

  • 412 篇 college of compu...
  • 374 篇 iccub universita...
  • 368 篇 department of ph...
  • 361 篇 infn sezione di ...
  • 344 篇 universiteit maa...
  • 334 篇 horia hulubei na...
  • 333 篇 h.h. wills physi...
  • 319 篇 university of ch...
  • 317 篇 school of comput...
  • 305 篇 infn sezione di ...
  • 279 篇 van swinderen in...
  • 277 篇 massachusetts in...
  • 260 篇 infn laboratori ...
  • 257 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 255 篇 infn sezione di ...
  • 252 篇 infn sezione di ...
  • 239 篇 university of ma...
  • 239 篇 school of physic...

作者

  • 241 篇 barter w.
  • 234 篇 brundu d.
  • 205 篇 blake t.
  • 204 篇 bowcock t.j.v.
  • 203 篇 bellee v.
  • 202 篇 betancourt c.
  • 202 篇 belin s.
  • 201 篇 borsato m.
  • 187 篇 beiter a.
  • 185 篇 aliouche z.
  • 178 篇 cali s.
  • 162 篇 boelhauve j.a.
  • 161 篇 amato s.
  • 147 篇 bobulska d.
  • 135 篇 boettcher t.
  • 133 篇 atzeni m.
  • 126 篇 bencivenni g.
  • 126 篇 bay a.
  • 126 篇 bhom j.
  • 126 篇 boldyrev a.

语言

  • 16,085 篇 英文
  • 969 篇 其他
  • 281 篇 中文
  • 2 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Engineering Monash University"
17318 条 记 录,以下是321-330 订阅
排序:
Pre-trained SAM as data augmentation for image segmentation
收藏 引用
CAAI Transactions on Intelligence Technology 2025年 第1期10卷 268-282页
作者: Junjun Wu Yunbo Rao Shaoning Zeng Bob Zhang Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhouChina School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengduChina Pattern Analysis and Machine Intelligence Research Group Department of Computer and Information ScienceUniversity of MacaoMacaoChina
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the ***,data augmentation mainly involved some simple transformations of ***,in order to increase the dive... 详细信息
来源: 评论
Overbooking-Enabled Task Scheduling and Resource Allocation in Mobile Edge Computing Environments
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 1-16页
作者: Jixun Gao Bingyi Hu Jialei Liu Huaichen Wang Quanzhen Huang Yuanyuan Zhao School of Computer Henan University of EngineeringZhengzhou451191China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China School of Computer Hubei University of Arts and ScienceXiangyang441053China School of Software Engineering Anyang Normal UniversityAnyang455000China School of Computer and Information Engineering Henan Normal UniversityXinxiang453003China The Publicity Department Zhengzhou University of TechnologyZhengzhou450044China
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its prima... 详细信息
来源: 评论
Internet of Things (IoT) applications security trends and challenges
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-22页
作者: Laghari, Asif Ali Li, Hang Khan, Abdullah Ayub Shoulin, Yin Karim, Shahid Khani, Muhammad Adnan Kaim Software College Shenyang Normal University Shenyang China Department of Computer Science Bahria University Karachi Campus Karachi75000 Pakistan School of Information Engineering Xi’an Eurasia University Shaanxi Xian710065 China Department of Computer Science Ilma University Karachi Pakistan
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie... 详细信息
来源: 评论
Diverse Co-saliency Feature Learning for Text-Based Person Retrieval
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5465-5477页
作者: You, Shuai Chen, Cuiqun Feng, Yujian Liu, Hai Ji, Yimu Ye, Mang School of Internet of Things Nanjing China Anhui University School of Computer Science and Technology Hefei China South China Normal University school of computer Guangdong China NJUPT School of Computer Science Nanjing China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan430072 China
Text-based Person Retrieval (TPR) plays a pivotal role in video surveillance systems for safeguarding public safety. As a fine-grained retrieval task, TPR faces the significant challenge of precisely capturing highly ... 详细信息
来源: 评论
Robust Car-Following Control of Connected and Autonomous Vehicles: A Stochastic Model Predictive Control Approach
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-14页
作者: Zhang, Peiyu Tian, Daxin Zhou, Jianshan Chang, Mai Duan, Xuting Zhao, Dezong Cao, Dongpu Leung, Vicor C.M. Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University Beijing China James Watt School of Engineering University of Glasgow Glasgow U.K Department of Mechanical and Mechatronics Engineering University of Waterloo Waterloo ON Canada Computer Science and Software Engineering Shenzhen University Shenzhen China
Vehicle platooning has attracted growing attention for its potential to enhance traffic capacity and road safety. This paper proposes an innovative distributed Stochastic Model Predictive Control (SMPC) for a vehicle ... 详细信息
来源: 评论
Underwater Image Enhancement Method Based on CGAN and Parallel Attention Mechanism  3
Underwater Image Enhancement Method Based on CGAN and Parall...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication engineering, NNICE 2023
作者: Ma, Chi Yang, Le Hu, Hui Chen, Yuenai Bu, Anxu The School of Computer Science and Engineering Huizhou University Huizhou516007 China The School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Due to the absorption and scattering of light in water, the underwater image has some problems such as colour distortion, serious colour difference and ambiguity, which seriously affects the detection of underwater re... 详细信息
来源: 评论
Multi-Optimiser Training for GANs Based on Evolutionary Computation  13
Multi-Optimiser Training for GANs Based on Evolutionary Comp...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Zhang, Yixia Xue, Yu Neri, Ferrante School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom
Generative adversarial networks (GANs) are widely recognized for their impressive ability to generate realistic data. Despite the popularity of GANs, training them poses challenges such as mode collapse and instabilit... 详细信息
来源: 评论
Minimizing the cost of periodically replicated systems via model and quantitative analysis
收藏 引用
Frontiers of computer science 2024年 第5期18卷 11-24页
作者: Chenhao ZHANG Liang WANG Limin XIAO Shixuan JIANG Meng HAN Jinquan WANG Bing WEI Guangjun QIN State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China Smart City College Beijing Union UniversityBeijing 100101China
Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage *** consistent replicas comes with high synchronization costs,as it faces more expensive WAN tr... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(Information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
A Reputation Layered Coding Based Storage Strategy for Consortium Blockchain  22
A Reputation Layered Coding Based Storage Strategy for Conso...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Li, Ziqian Pan, Maolin Yu, Yang Sun Yat-Sen University School of Computer Science and Engineering Guangzhou China Sun Yat-Sen University School of Software Engineering Zhuhai China
The improvement of consensus algorithms has greatly enhanced the performance of consortium blockchain, making it possible to be applied in large-scale network scenarios such as finance, healthcare and supply chain man... 详细信息
来源: 评论