咨询与建议

限定检索结果

文献类型

  • 113,202 篇 会议
  • 60,683 篇 期刊文献
  • 1,126 册 图书
  • 1 篇 学位论文

馆藏范围

  • 175,012 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 107,955 篇 工学
    • 75,292 篇 计算机科学与技术...
    • 61,736 篇 软件工程
    • 25,409 篇 信息与通信工程
    • 16,033 篇 控制科学与工程
    • 12,032 篇 生物工程
    • 11,788 篇 电气工程
    • 11,395 篇 电子科学与技术(可...
    • 8,493 篇 机械工程
    • 7,975 篇 光学工程
    • 7,973 篇 生物医学工程(可授...
    • 5,714 篇 化学工程与技术
    • 5,461 篇 仪器科学与技术
    • 4,783 篇 动力工程及工程热...
    • 3,908 篇 网络空间安全
    • 3,710 篇 交通运输工程
    • 3,604 篇 安全科学与工程
    • 3,468 篇 材料科学与工程(可...
  • 58,829 篇 理学
    • 31,342 篇 数学
    • 16,631 篇 物理学
    • 13,368 篇 生物学
    • 9,951 篇 统计学(可授理学、...
    • 6,084 篇 化学
    • 5,999 篇 系统科学
  • 30,229 篇 管理学
    • 18,474 篇 管理科学与工程(可...
    • 13,052 篇 图书情报与档案管...
    • 7,348 篇 工商管理
  • 7,336 篇 医学
    • 6,024 篇 临床医学
    • 5,324 篇 基础医学(可授医学...
    • 3,287 篇 药学(可授医学、理...
  • 4,627 篇 法学
    • 3,767 篇 社会学
  • 2,840 篇 经济学
  • 2,229 篇 农学
  • 1,975 篇 教育学
  • 784 篇 文学
  • 402 篇 艺术学
  • 400 篇 军事学
  • 28 篇 历史学
  • 27 篇 哲学

主题

  • 4,994 篇 computer science
  • 4,930 篇 feature extracti...
  • 4,226 篇 accuracy
  • 4,020 篇 training
  • 3,938 篇 computational mo...
  • 3,722 篇 deep learning
  • 2,961 篇 semantics
  • 2,911 篇 machine learning
  • 2,472 篇 optimization
  • 2,419 篇 data mining
  • 2,292 篇 predictive model...
  • 2,175 篇 data models
  • 1,957 篇 neural networks
  • 1,910 篇 support vector m...
  • 1,748 篇 image segmentati...
  • 1,699 篇 educational inst...
  • 1,696 篇 real-time system...
  • 1,665 篇 convolutional ne...
  • 1,644 篇 internet of thin...
  • 1,603 篇 algorithm design...

机构

  • 2,878 篇 school of comput...
  • 2,437 篇 school of comput...
  • 1,585 篇 school of comput...
  • 1,499 篇 school of comput...
  • 1,346 篇 school of comput...
  • 1,307 篇 school of comput...
  • 1,289 篇 school of comput...
  • 1,254 篇 school of comput...
  • 1,111 篇 school of comput...
  • 1,081 篇 department of co...
  • 1,071 篇 cavendish labora...
  • 1,010 篇 university of ch...
  • 976 篇 department of ph...
  • 948 篇 school of comput...
  • 884 篇 oliver lodge lab...
  • 881 篇 physikalisches i...
  • 824 篇 school of comput...
  • 764 篇 school of comput...
  • 705 篇 school of comput...
  • 679 篇 school of comput...

作者

  • 264 篇 niyato dusit
  • 256 篇 barter w.
  • 255 篇 a. gomes
  • 232 篇 c. alexa
  • 231 篇 blake t.
  • 230 篇 s. chen
  • 226 篇 bowcock t.j.v.
  • 225 篇 j. m. izen
  • 223 篇 bellee v.
  • 223 篇 amato s.
  • 221 篇 betancourt c.
  • 219 篇 brundu d.
  • 217 篇 borsato m.
  • 215 篇 boettcher t.
  • 214 篇 beiter a.
  • 211 篇 g. bella
  • 210 篇 bencivenni g.
  • 209 篇 j. strandberg
  • 208 篇 bay a.
  • 206 篇 d. calvet

语言

  • 164,932 篇 英文
  • 6,537 篇 其他
  • 3,510 篇 中文
  • 176 篇 日文
  • 18 篇 法文
  • 15 篇 德文
  • 10 篇 朝鲜文
  • 6 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer Science and Technology and"
175012 条 记 录,以下是71-80 订阅
排序:
Federated Meta Reinforcement Learning for Personalized Tasks
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 911-926页
作者: Wentao Liu Xiaolong Xu Jintao Wu Jielin Jiang School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China
As an emerging privacy-preservation machine learning framework,Federated Learning(FL)facilitates different clients to train a shared model collaboratively through exchanging and aggregating model parameters while raw ... 详细信息
来源: 评论
VPM-Net:Person Re-ID Network Based on Visual Prompt technology and Multi-Instance Negative Pooling
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3389-3410页
作者: Haitao Xie Yuliang Chen Yunjie Zeng Lingyu Yan Zhizhi Wang Zhiwei Ye School of Computer Science Hubei University of TechnologyWuhan430068China
With the rapid development of intelligent video surveillance technology,pedestrian re-identification has become increasingly important inmulti-camera surveillance *** technology plays a critical role in enhancing publ... 详细信息
来源: 评论
Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1109-1128页
作者: Hailong Wang Junchao Shi School of Computer Science Zhongyuan University of TechnologyZhengzhou450007China
A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can ... 详细信息
来源: 评论
Enhanced Differentiable Architecture Search Based on Asymptotic Regularization
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1547-1568页
作者: Cong Jin Jinjie Huang Yuanjian Chen Yuqing Gong School of Computer Science and Technology Harbin University of Science and TechnologyHarbin150006China School of Automation Harbin University of Science and TechnologyHarbin150006China
In differentiable search architecture search methods,a more efficient search space design can significantly improve the performance of the searched architecture,thus requiring people to carefully define the search spa... 详细信息
来源: 评论
A Dual Discriminator Method for Generalized Zero-Shot Learning
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1599-1612页
作者: Tianshu Wei Jinjie Huang School of Computer Science and Technology Harbin University of Science and TechnologyHarbin150006China School of Automation Harbin University of Science and TechnologyHarbin150006China
Zero-shot learning enables the recognition of new class samples by migrating models learned from semanticfeatures and existing sample features to things that have never been seen before. The problems of consistencyof ... 详细信息
来源: 评论
Quantized Control for Input-to-State Stabilization of Discrete-Time Markov Jump Systems with Coding and Decoding Procedures
收藏 引用
IAENG International Journal of Applied Mathematics 2025年 第1期55卷 26-33页
作者: Gao, Xiaohui Su, Yue Han, Chengyi Han, Jing Chen, Yebin School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Electrical and Information Engineering Wanjiang University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in... 详细信息
来源: 评论
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 116-125页
作者: Xuedan Jia Liangmin Wang Ke Cheng Pujie Jing Xiangmei Song School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China School of Cyber Science and Engineering Southeast UniversityNanjing 211102China School of Computer Science and Technology Xidian UniversityXi’an 710071China
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **... 详细信息
来源: 评论
State space representation and phase analysis of gradient descent optimizers
收藏 引用
science China(Information sciences) 2023年 第4期66卷 140-154页
作者: Biyuan YAO Guiqing LI Wei WU School of Computer Science and Engineering South China University of Technology School of Computer Wuhan University
Deep learning has achieved good results in the field of image recognition due to the key role of the optimizer in a deep learning network. In this work, the optimizers of dynamical system models are established,and th... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Feature-Grounded Single-Stage Text-to-Image Generation
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 469-480页
作者: Yuan Zhou Peng Wang Lei Xiang Haofeng Zhang School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache... 详细信息
来源: 评论