咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 451 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 496 篇 软件工程
    • 178 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 90 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 28 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 school of comput...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,221 篇 英文
  • 54 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1298 条 记 录,以下是231-240 订阅
排序:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing  22
Effectively Generating Vulnerable Transaction Sequences in S...
收藏 引用
Proceedings of the 37th IEEE/ACM International Conference on Automated software engineering
作者: Jianzhong Su Hong-Ning Dai Lingjun Zhao Zibin Zheng Xiapu Luo School of Software Engineering Sun Yat-sen University China and Ant Group China Department of Computer Science Hong Kong Baptist University China School of Software Engineering Sun Yat-sen University China The Hong Kong Polytechnic University China
As computer programs run on top of blockchain, smart contracts have proliferated a myriad of decentralized applications while bringing security vulnerabilities, which may cause huge financial losses. Thus, it is cruci... 详细信息
来源: 评论
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Hongjian Zhao Yunting Tao Fanyu Kong Guoyan Zhang Hanlin Zhang Jia Yu School of Software Shandong University Jinan China College of Information Engineering Binzhou Polytechnic Binzhou China School of Software Shandong University Shandong Sansec Information Technology Co. Ltd Jinan China School of Cyber Science and Technology Shandong University Qingdao China College of Computer Science and Technology Qingdao University Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论
mRS-DBFT: An improved consensus mechanism suitable for end-edge-cloud hybrid trust models
mRS-DBFT: An improved consensus mechanism suitable for end-e...
收藏 引用
Frontiers Technology of Information and computer (ICFTIC), IEEE International Conference on
作者: Xue Zhai Shanchen Pang Sibo Qiao Shihang Yu Qingdao institute of software college computer science and technology China University of Petroleum (East China) Qingdao China School of Mechanical Engineering Tiangong University Tianjin China
As a three-terminal collaborative architecture of terminal, edge and cloud, end-edge-cloud is jointly participated by multiple institutions or organizations, and has the characteristics of a hybrid trust architecture ...
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yi Tian Guangping Xu Hongzhang Yang Yue Ni JiaXin Cao Lei Yang School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Roycom (Tianjin) Information Technology Co. Ltd.
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi...
来源: 评论
Fine-grained Spatio-Temporal Distribution Prediction of Mobile Content Delivery in 5G Ultra-Dense Networks
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Shaoyuan Zhang, Heng Wang, Xiaofei Chen, Min Li, Jianxin Leung, Victor C.M. Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin University Tianjin300350 China The School of Computer Science and Technology Huazhong University of Science and Technology Hubei Wuhan430074 China The School of Information Technology Deakin University BurwoodVIC3220 Australia The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
The 5G networks have extensively promoted the growth of mobile users and novel applications, and with the skyrocketing user requests for a large amount of popular content, the consequent content delivery services (CDS... 详细信息
来源: 评论
An Exploratory Study on Automatic Identification of Assumptions in the Development of Deep Learning Frameworks
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Chen Liang, Peng Ma, Zinan School of Artificial Intelligence Shenzhen Polytechnic University Shenzhen518055 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science Wuhan University Wuhan430072 China Department of Computer Science and Engineering Chalmers University of Technology GothenburgS-412 96 Sweden
Context: Stakeholders constantly make assumptions in the development of deep learning (DL) frameworks. These assumptions are related to various types of software artifacts (e.g., requirements, design decisions, and te... 详细信息
来源: 评论
An exploratory study on automatic identification of assumptions in the development of deep learning frameworks
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Chen Liang, Peng Ma, Zinan School of Artificial Intelligence Shenzhen Polytechnic University Shenzhen518055 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science Wuhan University Wuhan430072 China Department of Computer Science and Engineering Chalmers University of Technology GothenburgS-412 96 Sweden
Context: Stakeholders constantly make assumptions in the development of deep learning (DL) frameworks. These assumptions are related to various types of software artifacts (e.g., requirements, design decisions, and te... 详细信息
来源: 评论
Robust DNA Image Storage Decoding with Residual CNN
Robust DNA Image Storage Decoding with Residual CNN
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Cihan Ruan Liang Yang Rongduo Han Shan Gao Haoyu Wu Nam Ling Department of Computer Science and Engineering Santa Clara University Santa Clara CA USA College of Software Nankai University Tianjin China School of Mathematical Sciences Nankai University Tianjin China College of Life Sciences Nankai University Tianjin China Roku Inc. San Jose CA USA
DNA storage is a promising data storage method with high density, durability, and easy maintenance, ideal for data archiving. However, wide-scale adoption is hindered by challenges like high synthesis costs, data loss... 详细信息
来源: 评论
Algorithm selection for software verification based on adversarial LSTM  7
Algorithm selection for software verification based on adver...
收藏 引用
7th IEEE International Conference on Big Data Security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021
作者: Wang, Qiang Jiang, Jiawei Zhao, Yongxin Cao, Weipeng Wang, Chunjiang Li, Shengdong Institute of System Engineering Chinese Academy of Military Science Beijing China School of Software Engineering East China Normal University Shanghai China School of Computer Science and Engineering Shenzhen University Shenzhen China Technology Tianjin China
As a prevalent technique for checking the correctness of software, software verification has achieved a significant progress in the past decades, reaching a point where a large number of verification algorithms and to... 详细信息
来源: 评论