咨询与建议

限定检索结果

文献类型

  • 7,928 篇 会议
  • 5,360 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 13,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,825 篇 工学
    • 6,870 篇 计算机科学与技术...
    • 5,648 篇 软件工程
    • 1,805 篇 信息与通信工程
    • 1,082 篇 控制科学与工程
    • 926 篇 生物工程
    • 698 篇 电气工程
    • 628 篇 机械工程
    • 552 篇 电子科学与技术(可...
    • 512 篇 光学工程
    • 499 篇 生物医学工程(可授...
    • 344 篇 化学工程与技术
    • 298 篇 仪器科学与技术
    • 295 篇 安全科学与工程
    • 280 篇 动力工程及工程热...
    • 267 篇 网络空间安全
    • 260 篇 交通运输工程
    • 245 篇 建筑学
  • 4,172 篇 理学
    • 2,482 篇 数学
    • 1,003 篇 生物学
    • 826 篇 物理学
    • 718 篇 统计学(可授理学、...
    • 454 篇 系统科学
    • 374 篇 化学
  • 2,698 篇 管理学
    • 1,647 篇 管理科学与工程(可...
    • 1,178 篇 图书情报与档案管...
    • 595 篇 工商管理
  • 424 篇 医学
    • 365 篇 临床医学
    • 312 篇 基础医学(可授医学...
  • 380 篇 法学
    • 284 篇 社会学
  • 221 篇 经济学
    • 220 篇 应用经济学
  • 181 篇 教育学
  • 134 篇 农学
  • 56 篇 文学
  • 40 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 353 篇 computer science
  • 321 篇 feature extracti...
  • 318 篇 semantics
  • 289 篇 computational mo...
  • 279 篇 deep learning
  • 218 篇 data mining
  • 196 篇 optimization
  • 184 篇 educational inst...
  • 181 篇 software enginee...
  • 178 篇 training
  • 166 篇 machine learning
  • 158 篇 predictive model...
  • 156 篇 image segmentati...
  • 151 篇 neural networks
  • 135 篇 wireless sensor ...
  • 135 篇 accuracy
  • 132 篇 servers
  • 129 篇 internet of thin...
  • 128 篇 support vector m...
  • 126 篇 convolution

机构

  • 474 篇 school of comput...
  • 373 篇 state key labora...
  • 295 篇 school of softwa...
  • 275 篇 school of softwa...
  • 265 篇 school of softwa...
  • 262 篇 department of co...
  • 260 篇 school of inform...
  • 218 篇 school of comput...
  • 210 篇 college of compu...
  • 176 篇 school of softwa...
  • 161 篇 school of comput...
  • 160 篇 college of compu...
  • 139 篇 school of comput...
  • 138 篇 school of comput...
  • 127 篇 school of comput...
  • 127 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of softwa...
  • 116 篇 school of comput...
  • 101 篇 school of comput...

作者

  • 50 篇 gao yang
  • 43 篇 jin wang
  • 41 篇 liu yang
  • 41 篇 qi lianyong
  • 38 篇 wang lei
  • 38 篇 wang wei
  • 34 篇 chen huajun
  • 33 篇 qi liu
  • 33 篇 zhang wen
  • 33 篇 tao dacheng
  • 31 篇 zhao jian
  • 30 篇 li li
  • 30 篇 liu qi
  • 29 篇 junping du
  • 28 篇 sun xingming
  • 28 篇 shen furao
  • 27 篇 xiang-yang li
  • 27 篇 zhang zhao
  • 27 篇 zhang qiang
  • 26 篇 lei wang

语言

  • 12,593 篇 英文
  • 545 篇 其他
  • 257 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Technology"
13379 条 记 录,以下是241-250 订阅
排序:
Tag-Aware Weakly-Supervised Online Hashing with Enhanced Joint Representation
Tag-Aware Weakly-Supervised Online Hashing with Enhanced Joi...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Na Zhan, Yu-Wei Chen, Zhen-Duo Wang, Yongxin Luo, Xin Xu, Xin-Shun School of Software Shandong University Jinan China Department of Computer Science and Technology Tsinghua University Beijing China School of Computer Science and Technology Shandong Jianzhu University Jinan China
Weakly-supervised online hashing has garnered significant attention recently, yet several challenges remain unresolved, such as how to effectively denoise tags, and how to efficiently learn hash functions in dynamic o... 详细信息
来源: 评论
Improved GMM High-Resolution Remote Sensing Image Land Cover Classification  4
Improved GMM High-Resolution Remote Sensing Image Land Cover...
收藏 引用
4th International Signal Processing, Communications and Engineering Management Conference, ISPCEM 2024
作者: Chunyan, Wang Kaixin, Fu Xiang, Wang School of Software Liaoning Technical University Huludao China Department of Computer Science and Technology Dalian University of Technology Dalian China
To address the increased complexity of surface cover, increased heterogeneity within homogeneous regions, and increased similarity between different regions in high-resolution remote sensing images, which lead to incr... 详细信息
来源: 评论
Unleashing the Power of LLMs in Court View Generation by Stimulating Internal Knowledge and Incorporating External Knowledge
Unleashing the Power of LLMs in Court View Generation by Sti...
收藏 引用
2024 Findings of the Association for Computational Linguistics: NAACL 2024
作者: Liu, Yifei Wu, Yiquan Li, Ang Zhang, Yating Sun, Changlong Lu, Weiming Wu, Fei Kuang, Kun School of Software Technology Zhejiang University China College of Computer Science and Technology Zhejiang University China Alibaba Group China
Court View Generation (CVG) plays a vital role in the realm of legal artificial intelligence, which aims to support judges in crafting legal judgment documents. The court view consists of three essential judgment part... 详细信息
来源: 评论
CATC: A task scheduling based on computing-aware and task classification in Pervasive Edge Computing  22
CATC: A task scheduling based on computing-aware and task cl...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Yang, JiaHui Zhang, Yang Zhang, ShuKui Zhu, Mingyu Wang, YingYing Soochow University School of Computer Science and Technology Suzhou215006 China Global Institute of Software Technology Suzhou215163 China
With no infrastructure, the battlefield environment has characteristics such as device heterogeneity, uneven resource distribution, and dynamic node movement. Additionally, the sensing tasks produced by devices are co... 详细信息
来源: 评论
Machine Learning Model for Recipe Optimization of College Students Based on Simulated Annealing  3
Machine Learning Model for Recipe Optimization of College St...
收藏 引用
3rd International Conference on Data Analytics, Computing and Artificial Intelligence, ICDACAI 2024
作者: Sheng, Peizhi Chen, Xuhao School of Computer and Information Science Software Southwest University Chongqing China School of Engineering and Technology Southwest University Chongqing China
This paper first made a comprehensive dietary nutrition evaluation of the two recipes provided, and conducted a visual analysis of the differences of various nutrient components by querying the "Table of Chinese ... 详细信息
来源: 评论
Towards Location- and Orientation-Independent RFID Authentication with COTS Devices
Towards Location- and Orientation-Independent RFID Authentic...
收藏 引用
2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023
作者: Zhu, Yinan Duan, Chunhui Ding, Xuan School of Software and BNRist Tsinghua University China School of Computer Science and Technology Beijing Institute of Technology China
To authenticate tags against counterfeiting, RF fin-gerprinting technique is widely exploited. However, the status of tagged item is always changed by movement, rotation and other operations. When the item's locat... 详细信息
来源: 评论
COLARE: Commit Classification via Fine-grained Context-aware Representation of Code Changes  31
COLARE: Commit Classification via Fine-grained Context-aware...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Zeng, Qunhong Zhang, Yuxia Sun, Zeyu Guo, Yujie Liu, Hui School of Computer Science & Technology Beijing Institute of Technology Beijing China Institute of Software Chinese Academy of Sciences Beijing China
Commit classification for maintenance activities is of critical importance for both industry and academia. State-of-the-art approaches either treat code changes as plain text or rely on manually identified features. D... 详细信息
来源: 评论
DDA-NG: Fusing Non-negative Matrix Factorization and Graph Tranformer to Enhance Potential Dmg-Disease Associations  5
DDA-NG: Fusing Non-negative Matrix Factorization and Graph T...
收藏 引用
5th International Conference on computer Engineering and Intelligent Control, ICCEIC 2024
作者: Shi, Jie Su, Ying Lv, Xiaoyi Tian, Xuecong School of Software Xinjiang University Xinjiang Urumqi China School of Computer Science and Technology Xinjiang University Xinjiang Urumqi China
Predicting drug-disease relationships is crucial in the biomedical field, but traditional laboratory experiments are time-consuming and costly, often lacking predictive accuracy and efficiency. This paper presents the... 详细信息
来源: 评论
Analysis and Improvement of an Authentication Scheme for Fog Computing Services
收藏 引用
Wuhan University Journal of Natural sciences 2024年 第3期29卷 209-218页
作者: HUO Yuyan KANG Baoyuan NIU Shufang LI Anqian ZUO Xinyu School of Software Tiangong UniversityTianjin 300387China School of Computer Science and Technology Tiangong UniversityTianjin 300387China
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility. However, fog computing inherits security and privacy problems from cloud computing. Therefore, vari... 详细信息
来源: 评论
Boosting Adversarial Training with Learnable Distribution
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3247-3265页
作者: Kai Chen Jinwei Wang James Msughter Adeke Guangjie Liu Yuewei Dai School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Nanjing Center for Applied Mathematics Nanjing211135China
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe... 详细信息
来源: 评论