咨询与建议

限定检索结果

文献类型

  • 844 篇 会议
  • 461 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,311 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 907 篇 工学
    • 614 篇 计算机科学与技术...
    • 499 篇 软件工程
    • 177 篇 信息与通信工程
    • 151 篇 控制科学与工程
    • 92 篇 机械工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 78 篇 生物工程
    • 54 篇 光学工程
    • 46 篇 化学工程与技术
    • 44 篇 生物医学工程(可授...
    • 38 篇 仪器科学与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 23 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 18 篇 冶金工程
  • 437 篇 理学
    • 250 篇 数学
    • 84 篇 生物学
    • 83 篇 物理学
    • 78 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 41 篇 化学
  • 216 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 34 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 21 篇 法学
  • 17 篇 经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 27 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 neural networks
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 robustness

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 56 篇 school of comput...
  • 52 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 40 篇 school of comput...
  • 35 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 20 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 tianjin key labo...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 15 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 yongzhen ke
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,172 篇 英文
  • 104 篇 其他
  • 34 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1311 条 记 录,以下是581-590 订阅
排序:
A Null-Space-Based Verification Scheme for Coded Edge Computing against Pollution Attacks
A Null-Space-Based Verification Scheme for Coded Edge Comput...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Mingjia Fu Jin Wang Jingya Zhou Jianping Wang Kejie Lu Xiaobo Zhou School of Computer Science and Technology Soochow University P.R. China Collaborative Innovation Center of Novel Software Technology and Industrialization Department of Computer Science Georgia Institue of Technology USA Department of Computer Science City University of Hong Kong Department of Computer Science and Engineering University of Puerto Rico at Mayagüez Department of Computer Science and Technology Tianjin University P. R. China
Edge computing is attracting more and more attention in recent years to fulfill the requirements of latency-critical and computation-intensive applications. By using the coding redundancy, coded edge computing has eme... 详细信息
来源: 评论
Adaptive Locality Preserving Regression
arXiv
收藏 引用
arXiv 2019年
作者: Wen, Jie Zhong, Zuofeng Zhang, Zheng Fei, Lunke Lai, Zhihui Chen, Runze School of Computer Science and Technology Guangdong University of Technology GuangzhouGuangdong510006 China Institute of Textiles and Clothing Hong Kong Polytechnic University Hong Kong School of Information Technology & Electrical Engineering University of Queensland BrisbaneQLD4072 Australia College of Computer Science and Software Engineering Shenzhen University ShenzhenGuangdong518055 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Shenzhen518055 China
This paper proposes a novel discriminative regression method, called adaptive locality preserving regression (ALPR) for classification. In particular, ALPR aims to learn a more flexible and discriminative projection t... 详细信息
来源: 评论
A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge Computing
A Game Theoretical Pricing Scheme for Vehicles in Vehicular ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Chaogang Tang Chunsheng Zhu Huaming Wu Xianglin Wei Qing Li Joel J. P. C. Rodrigues School of Computer Science and Technology China University of Mining and Technology Xuzhou China Mine Digitization Engineering Research Center of the Ministry of Education China University of Mining and Technology Xuzhou China SUSTech Institute of Future Networks Southern University of Science and Technology Shenzhen China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen China Center for Applied Mathematics Tianjin University Tianjin China The 63rd Research Institute National University of Defense Technology Changsha China The Hong Kong Polytechnic University Hong Kong Federal University of Piauí Teresina - Pi Brazil Instituto de Telecomunicações Portugal
Vehicular edge computing (VEC) brings the computing resources to the edge of the networks and thus provisions better computing services to the vehicles in terms of response latency. Meanwhile, the edge server can earn... 详细信息
来源: 评论
Bilinear supervised hashing based on 2D image features
arXiv
收藏 引用
arXiv 2019年
作者: Ding, Yujuan Wong, Wai Kueng Lai, Zhihui Zhang, Zheng Institute of Textiles and Clothing Hong Kong Polytechnic University Hong Kong College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Textiles and Clothing Hong Kong Polytechnic University Hong Kong School of Information Technology & Electrical Engineering University of Queensland BrisbaneQLD4072 Australia
Hashing has been recognized as an efficient representation learning method to effectively handle big data due to its low computational complexity and memory cost. Most of the existing hashing methods focus on learning... 详细信息
来源: 评论
Deep CNNs meet global covariance pooling: Better representation and generalization
arXiv
收藏 引用
arXiv 2019年
作者: Wang, Qilong Xie, Jiangtao Zuo, Wangmeng Zhang, Lei Li, Peihua School of Information and Communication Engineering Dalian University of Technology Liaoning116024 China College of Intelligence and Computing Tianjin University Tianjin300350 China School of Computer Science and Technology Harbin Institute of Technology Harbin150001 China Department of Computing Hong Kong Polytechnic University Hung Hom Hong Kong
Compared with global average pooling in existing deep convolutional neural networks (CNNs), global covariance pooling can capture richer statistics of deep features, having potential for improving representation and g... 详细信息
来源: 评论
Assessing Mental Stress Based on Smartphone Sensing Data: An Empirical Study
Assessing Mental Stress Based on Smartphone Sensing Data: An...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Feng Wang Yasha Wang Jiangtao Wang Haoyi Xiong Junfeng Zhao Daqing Zhang Key Laboratory of High Confdence Software Technologies Ministry of Education Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Peking University Information Technology Institute Tianjin Binhai China National Engineering Research Center of Software Engineering Beijing China Big Data Lab Baidu Research Beijing
Mental stress is a critical factor affecting one's physical and mental well-being. At the early stage, the effect of stress is often underestimated, while it usually leads to serious issue Lateran. Therefore, it i... 详细信息
来源: 评论
Towards cost effective privacy provision for typed resources in iot environment  30
Towards cost effective privacy provision for typed resources...
收藏 引用
30th International Conference on software engineering and Knowledge engineering, SEKE 2018
作者: Duan, Yucong Song, Zhengyang Yang, Xiaoxian Zou, Quan Sun, Xiaobing Zhang, Xinyue State Key Laboratory of Marine Resource Utilization in the South China Sea College of Information Science and Technology Hainan University Haikou570228 China School of Computer and Information Engineering Shanghai Polytechnic University Shanghai201209 China College of Computer Science Tianjin University China School of Information Engineering Yangzhou University China
We present privacy resources in IoT as data, information, and knowledge. We construct a privacy protection architecture on our previously proposed DIKW graphs: Data Graph, Information Graph, and Knowledge Graph. On th... 详细信息
来源: 评论
Variational Autoencoder based Latent Factor Decoding of Multichannel EEG for Emotion Recognition
Variational Autoencoder based Latent Factor Decoding of Mult...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiang Li Zhigang Zhao Dawei Song Yazhou Zhang Chunyang Niu Junwei Zhang Jidong Huo Jing Li Key Laboratory of Medical Artificial Intelligence Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China School of Computer Science and Technology Beijing Institute of Technology China Software Engineering College Zhengzhou University of Light Industry China School of Computer Science and Technology Tianjin University China Jiuquan Satellite Launch Center China
Robust cross-subject emotion recognition based on multichannel EEG has always been a hard work. In this work, we hypothesize there exists default brain variables across subjects in emotional processes. Hence, the stat...
来源: 评论
Strict pattern matching under non-overlapping condition
收藏 引用
science China(Information sciences) 2017年 第1期60卷 5-20页
作者: Youxi WU Cong SHEN He JIANG Xindong WU School of Computer Science and Engineering Hebei University of Technology Hebei Province Key Laboratory of Big Data Calculation School of Computer Science and Technology Tianjin University School of Software Dalian University of Technology School of Computer Science and Information Engineering Hefei University of Technology School of Computing and Informatics University of Louisiana at Lafayette
Pattern matching(or string matching) is an essential task in computer science, especially in sequential pattern mining, since pattern matching methods can be used to calculate the support(or the number of occurrences)... 详细信息
来源: 评论
Effectiveness of exploring historical commits for developer recommendation: an empirical study
收藏 引用
Frontiers of computer science 2018年 第3期12卷 528-544页
作者: Xiaobing SUN Hui YANG Hareton LEUNG Bin LI Hanchao (Jerry) LI Lingzhi LIAO School of Information Engineering Yangzhou University Yangzhou 225127 China Information Technology Research Base of Civil Aviation Administration of China Civil Aviation University of China Tianjin 300300 China Department of Computing The Hong Kong Polytechnic University Hong Kong China Coventry University Coventry CVI 5FB UK State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Nanjing University of Information Science and Technology Nanjing 210044 China
Developer recommendation is an essential task for resolving incoming issues in the evolution of software. Many developer recommendation techniques have been developed in the literature; among these studies, most techn... 详细信息
来源: 评论