咨询与建议

限定检索结果

文献类型

  • 2,482 篇 会议
  • 1,909 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,407 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,764 篇 工学
    • 1,668 篇 计算机科学与技术...
    • 1,337 篇 软件工程
    • 547 篇 信息与通信工程
    • 425 篇 控制科学与工程
    • 401 篇 电气工程
    • 401 篇 电子科学与技术(可...
    • 305 篇 生物工程
    • 286 篇 光学工程
    • 246 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 198 篇 仪器科学与技术
    • 150 篇 化学工程与技术
    • 144 篇 动力工程及工程热...
    • 130 篇 交通运输工程
    • 107 篇 材料科学与工程(可...
    • 95 篇 土木工程
    • 89 篇 建筑学
  • 1,497 篇 理学
    • 703 篇 数学
    • 452 篇 物理学
    • 350 篇 生物学
    • 232 篇 统计学(可授理学、...
    • 165 篇 化学
    • 151 篇 系统科学
  • 715 篇 管理学
    • 474 篇 管理科学与工程(可...
    • 254 篇 图书情报与档案管...
    • 194 篇 工商管理
  • 217 篇 医学
    • 181 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 81 篇 社会学
  • 81 篇 经济学
  • 52 篇 农学
  • 35 篇 教育学
  • 13 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 86 篇 feature extracti...
  • 82 篇 deep learning
  • 71 篇 computer science
  • 68 篇 data mining
  • 68 篇 computational mo...
  • 67 篇 training
  • 64 篇 optimization
  • 63 篇 semantics
  • 62 篇 machine learning
  • 62 篇 accuracy
  • 43 篇 object detection
  • 43 篇 protocols
  • 41 篇 mathematical mod...
  • 39 篇 reliability
  • 39 篇 wireless sensor ...
  • 38 篇 neural networks
  • 38 篇 analytical model...
  • 37 篇 computer archite...
  • 37 篇 data models
  • 36 篇 predictive model...

机构

  • 102 篇 national enginee...
  • 77 篇 school of comput...
  • 47 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 school of inform...
  • 38 篇 school of optica...
  • 37 篇 school of comput...
  • 28 篇 huazhong univers...
  • 28 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 26 篇 department of co...
  • 26 篇 hubei province k...
  • 25 篇 state key labora...
  • 24 篇 school of comput...
  • 23 篇 hubei key labora...
  • 23 篇 department of el...
  • 23 篇 school of electr...

作者

  • 114 篇 hai jin
  • 99 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 yang yang
  • 26 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 23 篇 liao xiaofei
  • 21 篇 chen shu-ching
  • 19 篇 hu shengshan
  • 18 篇 zhigang zhang
  • 17 篇 long zheng
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 陈景标
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 zhang zhigang
  • 15 篇 li peng
  • 15 篇 wang wei

语言

  • 4,119 篇 英文
  • 161 篇 其他
  • 114 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of Computer Science and System Engineering"
4407 条 记 录,以下是1-10 订阅
排序:
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
Orbit-Orbit Interaction in Spatiotemporal Optical Vortex
收藏 引用
engineering 2025年 第2期45卷 44-51页
作者: Jian Chen Jie Zhao Xi Shen Dewei Mo Cheng-Wei Qiu Qiwen Zhan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China Shanghai Key Laboratory of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5298-5311页
作者: Han, Xinhui Pan, Haoyuan Wang, Zhaorui Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Future Network of Intelligence Institute School of Science and Engineering Shenzhen518172 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology College of Computer Science and Software Engineering Shenzhen518060 China
We investigate the timely status update in linear multi-hop wireless networks, where a source tries to deliver status update packets to a destination through a sequence of half-duplex relays. Timeliness is measured by... 详细信息
来源: 评论
Unsupervised Outlier Detection with Reinforced Noise Discriminator
收藏 引用
ACM Transactions on Intelligent systems and Technology 2025年 第2期16卷 1-26页
作者: Zhang, Zhongping Liu, Daoheng Zhu, Jinwei Wu, Youxi Hebei Key Laboratory of Computer Virtual Technology and System Integration School of Information Science and Engineering Yanshan University Qinhuangdao China School of Information Science and Engineering Yanshan University Qinhuangdao China School of Artificial Intelligence Hebei University of Technology Tianjin China
Outlier detection is one of the hot topics in the field of machine learning and data mining. At present, there are many kinds of outlier detection algorithms. The accuracies of traditional outlier detection algorithms... 详细信息
来源: 评论
Enhancement Methods for Chiral Optical Signals by Tailoring Optical Fields and Nanostructures
收藏 引用
engineering 2025年 第2期45卷 25-43页
作者: Hanqing Cai Liangliang Gu Haifeng Hu Qiwen Zhan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China Zhangjiang Laboratory Shanghai 201204China Shanghai Key Laboratory of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China
The unique property of chirality is widely used in various *** the past few decades,a great deal of research has been conducted on the interactions between light and matter,resulting in significant technical advanceme... 详细信息
来源: 评论
MPTrack: Visual Tracking with Reliable Motion Prompts  24
MPTrack: Visual Tracking with Reliable Motion Prompts
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024
作者: Sun, Songtao Li, Lunbo Aerospace System Engineering of Shanghai Shanghai China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing China
Recently, the attention mechanism has been introduced into object tracking, making significant improvements in tracking performance. However, the tracking target often undergoes deformation during tracking, which can ... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
UDI-3DVT: A Novel Network for 3-D Reconstruction via Uncertainty-Driven Sampling and Incremental Visual-Tactile Fusion
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10358-10369页
作者: Zhang, Chenyang Zhang, Shaohua Li, Yao Chen, Wenbai Gao, Guowei Wu, Peiliang Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Qinhuangdao066004 China Beijing Information Science and Technology University School of Automation Beijing100192 China
The fusion of visual and tactile senses allows robots to reconstruct and understand objects, aiding in downstream tasks such as object recognition and object grasping. However, most existing visual-tactile reconstruct... 详细信息
来源: 评论
Cost-Effective Edge Data Caching With Failure Tolerance and Popularity Awareness
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5357-5369页
作者: Luo, Ruikun Zhang, Zujia He, Qiang Xu, Mengxi Chen, Feifei Dai, Xiaohai Wu, Song Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of  Computer Science and Technology Wuhan430074 China Deakin University School of Information Technology GeelongVIC3125 Australia
In the mobile edge computing environment, caching data in edge storage systems can significantly reduce data retrieval latency for users while saving the costs incurred by cloud-edge data transmissions for app vendors... 详细信息
来源: 评论