咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 453 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,300 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 493 篇 软件工程
    • 178 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 91 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 29 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 deep learning
  • 17 篇 image segmentati...
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,219 篇 英文
  • 58 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1300 条 记 录,以下是211-220 订阅
排序:
DearLLM: Enhancing Personalized Healthcare via Large Language Models-Deduced Feature Correlations  39
DearLLM: Enhancing Personalized Healthcare via Large Languag...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Yongxin Jiang, Xinke Chu, Xu Qiu, Rihong Feng, Yujie Ding, Hongxin Zhao, Junfeng Wang, Yasha Xie, Bing School of Computer Science School of Software & Microelectronics Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China National Engineering Research Center For Software Engineering Peking University Beijing China Center on Frontiers of Computing Studies Peking University Beijing China Peking University Information Technology Institute Binhai Tianjin China Nanhu Laboratory Jiaxing China Department of Computing The Hong Kong Polytechnic University Hong Kong
Exploring the correlations between medical features is essential for extracting patient health patterns from electronic health records (EHR) data, and strengthening medical predictions and decision-making. To constrai... 详细信息
来源: 评论
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Docu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zeshi Zhang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Ministry of Education Key Laboratory of Computer Vision and System China Faculty of Engineering University of Bristol Bristol U.K.
Due to cloud security concerns, there is an increasing interest in information retrieval systems that can support private queries over public documents. It is desirable for oblivious document ranking and retrieval in ... 详细信息
来源: 评论
Towards Survivable In-Memory Stores with Parity Coded NVRAM
Towards Survivable In-Memory Stores with Parity Coded NVRAM
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhixuan Wang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Engineering University of Bristol Bristol U.K.
Erasure codes have been widely applied to in-memory key-value storage systems for high reliability and low redundancy. In distributed in-memory key-value storage systems, update operations are relatively frequent, esp... 详细信息
来源: 评论
Debiasing Graph Representation Learning based on Information Bottleneck
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ziyi Ouyang, Mingxuan Lin, Wanyu Lan, Hao Yang, Lei The School of Software Engineering South China University of Technology Guangzhou China The Hong Kong Polytechnic University Hong Kong The Department of Computing The Hong Kong Polytechnic University Hong Kong The Department of Computer Science and Technology Tsinghua University Beijing China
—Graph representation learning has shown superior performance in numerous real-world applications, such as finance and social networks. Nevertheless, most existing works might make discriminatory predictions due to i... 详细信息
来源: 评论
Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System
Modeling and Analysis for the Propagation of DDoS Attacks in...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Lei Xiong Qichao Xu Dongfeng Fang Hui Zeng School of Mechatronic Engineering and Automation Shanghai University Shanghai China Department of Computer Science and Software Engineering California Polytechnic State University San Luis Obispo CA USA
With the development and progress of electric power technology and information technology, microgrid has become an important and indispensable part of smart grid. The cyber-security of microgrids has a significant imp...
来源: 评论
Distilling Cross-Temporal Contexts for Continuous Sign Language Recognition
Distilling Cross-Temporal Contexts for Continuous Sign Langu...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Leming Guo Wanli Xue Qing Guo Bo Liu Kaihua Zhang Tiantian Yuan Shengyong Chen School of Computer Science and Engineering Tianjin University of Technology Centre for Frontier AI Research (CFAR) A*STAR Singapore Walmart Global Tech Sunnyvale CA USA School of Computer and Software Nanjing University of Information Science and Technology Technical College for the Deaf Tianjin University of Technology
Continuous sign language recognition (CSLR) aims to recognize glosses in a sign language video. State-of-the-art methods typically have two modules, a spatial perception module and a temporal aggregation module, which...
来源: 评论
A survey of Intel SGX and its applications
收藏 引用
Frontiers of computer science 2021年 第3期15卷 191-205页
作者: Wei ZHENG Ying WU Xiaoxue WU Chen FENG Yulei SUI Xiapu LUO Yajin ZHOU School of Software and Microelectronics Northwestern Polytechnical UniversityXi'an 710129China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China College of Computer Science and Technology Zhejiang UniversityHangzhou 310027China
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are... 详细信息
来源: 评论
Conflict-Free Genetic Algorithm with Nash Equilibrium Seeking for Game-Based Battery Swapping Station Recommendation
Conflict-Free Genetic Algorithm with Nash Equilibrium Seekin...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Chang-Long Sun Xin-Xin Xu Chun-Hua Chen Jun Hong Zhenan He Dengxiu Yu Sam Kwong Zhi-Hui Zhan School of Computer Science and Engineering South China University of Technology Guangzhou China School of Computer Science and Technology Ocean University of China Qingdao China School of Software Engineering South China University of Technology Guangzhou China College of Computer Science Sichuan University Chengdu China School of Artificial Intelligence Northwestern Polytechnical University Xi'an China Department of Computing and Decision Science Lingnan University Hong Kong SAR College of Artificial Intelligence Nankai University Tianjin China
The rapid growth of electric vehicles (EVs) has led to significant challenges in providing efficient and sustainable charging solutions. This paper addresses the battery swapping station (BSS) recommendation problem b... 详细信息
来源: 评论
Toward Automated Algorithm Design: A Survey and Practical Guide to Meta-Black-Box-Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Zeyuan Guo, Hongshu Gong, Yue-Jiao Zhang, Jun Tan, Kay Chen The School of Computer Science and Engineering South China University of Technology Guangzhou510006 China Nankai University Tianjin China Hanyang University Seoul Korea Republic of Hong Kong Polytechnic University Hong Kong
In this survey, we introduce Meta-Black-Box-Optimization (MetaBBO) as an emerging avenue within the Evolutionary Computation (EC) community, which incorporates Meta-learning approaches to assist automated algorithm de... 详细信息
来源: 评论
Deep Reinforcement Learning for Joint Service Placement and Request Scheduling in Mobile Edge Computing Networks
Deep Reinforcement Learning for Joint Service Placement and ...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Yuxuan Deng Xiuhua Li Chuan Sun Jinlong Hao Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China Chongqing Changan Automobile Software Technology Co. Ltd Chongqing China TKLAN College of Intelligence & Computing Tianjin University Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Electrical & Computer Engineering The University of British Columbia Vancouver Canada
Mobile edge computing aims to provide cloud-like services on edge servers located near Mobile Devices (MDs) with higher Quality of Service (QoS). However, the mobility of MDs makes it difficult to find a global optima...
来源: 评论