咨询与建议

限定检索结果

文献类型

  • 10,388 篇 会议
  • 6,745 篇 期刊文献
  • 181 册 图书

馆藏范围

  • 17,314 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 11,067 篇 工学
    • 8,463 篇 计算机科学与技术...
    • 7,006 篇 软件工程
    • 2,257 篇 信息与通信工程
    • 1,332 篇 控制科学与工程
    • 1,182 篇 生物工程
    • 892 篇 电气工程
    • 745 篇 机械工程
    • 688 篇 电子科学与技术(可...
    • 663 篇 光学工程
    • 645 篇 生物医学工程(可授...
    • 457 篇 化学工程与技术
    • 373 篇 仪器科学与技术
    • 351 篇 安全科学与工程
    • 342 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 295 篇 网络空间安全
    • 292 篇 建筑学
  • 5,400 篇 理学
    • 2,961 篇 数学
    • 1,337 篇 物理学
    • 1,300 篇 生物学
    • 882 篇 统计学(可授理学、...
    • 545 篇 系统科学
    • 496 篇 化学
  • 3,153 篇 管理学
    • 1,891 篇 管理科学与工程(可...
    • 1,374 篇 图书情报与档案管...
    • 771 篇 工商管理
  • 558 篇 医学
    • 480 篇 临床医学
    • 413 篇 基础医学(可授医学...
  • 451 篇 法学
    • 340 篇 社会学
  • 288 篇 经济学
    • 286 篇 应用经济学
  • 241 篇 教育学
  • 155 篇 农学
  • 45 篇 军事学
  • 43 篇 艺术学
  • 35 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 642 篇 computer science
  • 508 篇 software enginee...
  • 343 篇 semantics
  • 320 篇 feature extracti...
  • 312 篇 deep learning
  • 310 篇 computational mo...
  • 269 篇 training
  • 225 篇 data mining
  • 207 篇 educational inst...
  • 204 篇 optimization
  • 179 篇 image segmentati...
  • 177 篇 application soft...
  • 176 篇 neural networks
  • 165 篇 predictive model...
  • 158 篇 computer archite...
  • 156 篇 machine learning
  • 152 篇 internet of thin...
  • 139 篇 authentication
  • 136 篇 task analysis
  • 134 篇 convolution

机构

  • 413 篇 college of compu...
  • 376 篇 iccub universita...
  • 369 篇 department of ph...
  • 362 篇 infn sezione di ...
  • 346 篇 universiteit maa...
  • 337 篇 horia hulubei na...
  • 334 篇 h.h. wills physi...
  • 324 篇 university of ch...
  • 318 篇 school of comput...
  • 310 篇 infn sezione di ...
  • 282 篇 van swinderen in...
  • 276 篇 massachusetts in...
  • 265 篇 infn laboratori ...
  • 263 篇 infn sezione di ...
  • 262 篇 infn sezione di ...
  • 261 篇 infn sezione di ...
  • 260 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 245 篇 school of physic...
  • 242 篇 institute of par...

作者

  • 244 篇 barter w.
  • 240 篇 brundu d.
  • 208 篇 blake t.
  • 206 篇 bellee v.
  • 205 篇 borsato m.
  • 205 篇 betancourt c.
  • 205 篇 belin s.
  • 201 篇 bowcock t.j.v.
  • 188 篇 aliouche z.
  • 187 篇 beiter a.
  • 179 篇 cali s.
  • 163 篇 amato s.
  • 157 篇 boelhauve j.a.
  • 147 篇 bobulska d.
  • 139 篇 boettcher t.
  • 138 篇 atzeni m.
  • 131 篇 bencivenni g.
  • 131 篇 bay a.
  • 131 篇 bhom j.
  • 131 篇 boldyrev a.

语言

  • 15,270 篇 英文
  • 1,800 篇 其他
  • 272 篇 中文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Engineering Monash University"
17314 条 记 录,以下是541-550 订阅
排序:
Dual-branch Complementary Multimodal Interaction Mechanism for Joint Video Moment Retrieval and Highlight Detection
Dual-branch Complementary Multimodal Interaction Mechanism f...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Liang, Xuehui Wang, Ruomei Lin, Ge Feng, Jiawei Luo, Yuanmao School of Computer Science and Engineering Sun Yat-sen University National Engineering Research Center of Digital Life Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China
Joint video moment retrieval and highlight detection is a video understanding task that requires the model to construct multimodal interaction between heterogeneous features. Recent Transformer-based models mainly foc... 详细信息
来源: 评论
An Empirical Analysis on Spatial Reasoning Capabilities of Large Multimodal Models
An Empirical Analysis on Spatial Reasoning Capabilities of L...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Shiri, Fatemeh Guo, Xiao-Yu Far, Mona Golestan Yu, Xin Haffari, Gholamreza Li, Yuan-Fang Department of Data Science & AI Monash University Australia Australian Institute for Machine Learning University of Adelaide Australia School of Electrical Engineering and Computer Science University of Queensland Australia
Large Multimodal Models (LMMs) have achieved strong performance across a range of vision and language tasks. However, their spatial reasoning capabilities are under-investigated. In this paper, we construct a novel VQ... 详细信息
来源: 评论
Tropical Cyclone Intensity Prediction Using Deep Learning Techniques- A Survey  4
Tropical Cyclone Intensity Prediction Using Deep Learning Te...
收藏 引用
4th IEEE International Conference on Applied Electromagnetics, Signal Processing, and Communication, AESPC 2024
作者: Ilayaraja, V. Rajamohana, S.P. Jagadeesan, S. Aishwarya, V. Rakesh, M. School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632 014 India School of Engineering & Technology Pondicherry University Department of Computer Science Puducherry Karaikal India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Tamil Nadu Vellore632 014 India
Tropical cyclones, characterized by strong winds and heavy rainfall, threaten human life in coastal regions crucial to the economy, including fisheries, agriculture, tourism, and infrastructure. Their frequent occurre... 详细信息
来源: 评论
Adaptive Evolutionary Reinforcement Learning Algorithm with Early Termination Strategy  23
Adaptive Evolutionary Reinforcement Learning Algorithm with ...
收藏 引用
23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024
作者: Wu, Xiaoqiang Zhu, Qingling Lin, Qiuzhen Chen, Weineng Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science and Engineering South China University of Technology Guangzhou China
Evolutionary reinforcement learning algorithms (ERLs), which combine evolutionary algorithms (EAs) with reinforcement learning (RL), have demonstrated significant success in enhancing RL performance. However, most ERL... 详细信息
来源: 评论
Image Compression and Stable Reconstruction Based on Multi-Level Hybrid Feature Guidance  2
Image Compression and Stable Reconstruction Based on Multi-L...
收藏 引用
2nd International Conference on Machine Learning, Cloud Computing, and Intelligent Mining, MLCCIM 2023
作者: Zeng, Heng Gong, Nanxu College of Software Engineering Sichuan University Chengdu China School of Computer Science Sichuan University Chengdu China
Image compression is a technique that reduces storage space and transmission bandwidth requirements by reducing the amount of image data, aiming to improve storage and transmission efficiency while maintaining accepta... 详细信息
来源: 评论
Modeling and Discovering Data Race with Concurrent Code Property Graphs  23
Modeling and Discovering Data Race with Concurrent Code Prop...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security Companion, QRS-C 2023
作者: Cao, Yang Dong, Yunwei School of Software Northwestern Polytechnical University Xi'an China School of Computer Science and Engineering Northwestern Polytechnical University Xi'an China
Concurrent programs have brought about higher resource utilization and faster response times. However, the non-determinism in concurrent programs introduces concurrency bugs that are harder to detect than traditional ... 详细信息
来源: 评论
LogCAE: An Approach for Log-based Anomaly Detection with Active Learning and Contrastive Learning  35
LogCAE: An Approach for Log-based Anomaly Detection with Act...
收藏 引用
35th IEEE International Symposium on software Reliability engineering, ISSRE 2024
作者: Xiao, Pei Jia, Tong Duan, Chiming Cai, Huaqian Li, Ying Huang, Gang Peking University School of Software and Microelectronics Beijing China Peking University Institute for Artificial Intelligence Beijing China Peking University School of Computer Science Beijing China Peking University National Engineering Research Center for Software Engineering Beijing China
Log-based anomaly detection plays a crucial role in maintaining the reliability of software systems. Unsupervised models are more suitable for real-world usage because they do not rely on huge data labeling efforts. H... 详细信息
来源: 评论
SA-ResNet:An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3335-3350页
作者: Zengyu Cai Yuming Dai Jianwei Zhang Yuan Feng School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450066China College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450066China Faculty of Information Engineering Xuchang Vocational Technical CollegeXuchang461000China School of Electronic Information Zhengzhou University of Light IndustryZhengzhou450066China
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguardin... 详细信息
来源: 评论
CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale software  35
CAPS: An Efficient Whole-Program Critical Paths Search Frame...
收藏 引用
35th International Conference on software engineering and Knowledge engineering, SEKE 2023
作者: Li, Peiyang Liu, Zixin Su, Yuening Wang, Hao Jiang, Bo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University China
Tracking the flow of external inputs in a program with taint-analysis techniques can help developers better identify potential security vulnerabilities in the software. However, directly using the static taint analysi... 详细信息
来源: 评论
Fast Verification of Network Configuration Updates
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 293-311页
作者: Jiangyuan Yao Zheng Jiang Kaiwen Zou Shuhua Weng Yaxin Li Deshun Li Yahui Li Xingcan Cao Scool of Computer Science and Technology Hainan UniversityHaikou570228China School of Cyberspace Security Hainan UniversityHaikou570228China School of Software Engineering Jilin UniversityChangchun130012China School of Software Beijing Jiaotong UniversityBeijing100091China University of British Columbia VancouverV5K1K5Canada
With the expansion of network services,large-scale networks have progressively become *** network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are als... 详细信息
来源: 评论