咨询与建议

限定检索结果

文献类型

  • 10,099 篇 会议
  • 5,955 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,194 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,484 篇 工学
    • 8,188 篇 计算机科学与技术...
    • 6,784 篇 软件工程
    • 2,173 篇 信息与通信工程
    • 1,252 篇 控制科学与工程
    • 1,120 篇 生物工程
    • 853 篇 电气工程
    • 722 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 602 篇 生物医学工程(可授...
    • 600 篇 光学工程
    • 386 篇 化学工程与技术
    • 356 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 312 篇 交通运输工程
    • 293 篇 网络空间安全
    • 268 篇 建筑学
  • 4,801 篇 理学
    • 2,800 篇 数学
    • 1,233 篇 生物学
    • 949 篇 物理学
    • 817 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 411 篇 化学
  • 3,044 篇 管理学
    • 1,845 篇 管理科学与工程(可...
    • 1,321 篇 图书情报与档案管...
    • 747 篇 工商管理
  • 518 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 329 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 236 篇 教育学
  • 153 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 619 篇 computer science
  • 478 篇 software enginee...
  • 337 篇 semantics
  • 316 篇 feature extracti...
  • 315 篇 computational mo...
  • 298 篇 deep learning
  • 257 篇 training
  • 220 篇 data mining
  • 216 篇 educational inst...
  • 214 篇 optimization
  • 173 篇 predictive model...
  • 171 篇 neural networks
  • 170 篇 application soft...
  • 165 篇 image segmentati...
  • 158 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 410 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 262 篇 school of inform...
  • 219 篇 school of comput...
  • 214 篇 school of comput...
  • 188 篇 state key labora...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 111 篇 school of comput...
  • 111 篇 school of softwa...
  • 104 篇 state key labora...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 97 篇 college of compu...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 87 篇 school of big da...

作者

  • 66 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 47 篇 zheng zibin
  • 39 篇 wang ping
  • 36 篇 hu ruimin
  • 35 篇 gao yang
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 33 篇 mian ajmal
  • 32 篇 wang yasha
  • 31 篇 wang lei
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 zhang lei
  • 28 篇 wang wei

语言

  • 15,356 篇 英文
  • 586 篇 其他
  • 262 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and software Engineering"
16194 条 记 录,以下是201-210 订阅
排序:
Temperature-Constrained Computation Time Minimization for Integrated Tasks in UAV-Assisted MEC Networks  24
Temperature-Constrained Computation Time Minimization for In...
收藏 引用
24th IEEE International Conference on Communication Technology, ICCT 2024
作者: Hao, Yuyu Bao, Lingyan Li, Hai Zhao, Mingxiong Macau University of Science and Technology School of Computer Science and Engineering Macau China Yunnan University National Pilot School of Software Kunming China
Unmanned Aerial Vehicle (UAV)-assisted mobile edge computing (MEC) leverages UAVs' mobility and cost-effectiveness to handle computation-intensive tasks at the network edge. However, limited energy supply and hard... 详细信息
来源: 评论
M-GhostNet: A Lightweight CNN Model Combined with Coordinate Attention Mechanism for Identifying Pests and Diseases  12
M-GhostNet: A Lightweight CNN Model Combined with Coordinate...
收藏 引用
12th International Conference on Computing and Pattern Recognition, ICCPR 2023
作者: Ma, Chi Xiao, Yu Hu, Hui Li, Jingyan Wu, Jie The School of Computer Science and Engineering Huizhou University Huizhou516007 China The School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Plant pests and diseases have always been an important factor affecting agricultural production, and how to automatically identify them is one of the current research hotspots. Although traditional deep learning model... 详细信息
来源: 评论
Robust copy-move detection and localization of digital audio based CFCC feature
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9573-9589页
作者: Wang, Dongyu Li, Xiaojie Shi, Canghong Niu, Xianhua Xiong, Ling Wu, Hanzhou Qian, Qing Qi, Chao School of Computer and Software Engineering Xihua University Chengdu610039 China The College of Computer Science Chengdu University of Information Technology Chengdu610225 China School of Information Shanghai University Shanghai200444 China School of Information Guizhou University of Finance and Economics Guiyang550000 China
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema... 详细信息
来源: 评论
SparseCoder: Identifier-Aware Sparse Transformer for File-Level Code Summarization  31
SparseCoder: Identifier-Aware Sparse Transformer for File-Le...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Wang, Yanlin Huang, Yanxian Guo, Daya Zhang, Hongyu Zheng, Zibin School of Software Engineering Sun Yat-sen University China School of Computer Science and Technology Sun Yat-sen University China School of Big Data and Software Engineering Chongqing University China
Code summarization aims to generate natural language descriptions of source code, facilitating programmers to understand and maintain it rapidly. While previous code summarization efforts have predominantly focused on... 详细信息
来源: 评论
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Video Editing  24
High-Fidelity Diffusion Editor for Zero-Shot Text-Guided Vid...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Luo, Yan Zuo, Zhichao Zhang, Zhao Zhao, Zhongqiu Zhang, Haijun Hong, Richang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China School of Computer Science Harbin Institute of Technology Shenzhen China
Text-guided image generative diffusion models achieve fast development on the generation and editing of high-quality images. To extend such success to video editing, some efforts combining image generation with video ... 详细信息
来源: 评论
Local Optimisation Based Detection of Weak Targets in Isolated Forests  24
Local Optimisation Based Detection of Weak Targets in Isolat...
收藏 引用
8th International Conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Hu, Jurong Xing, Yanxiao Li, Yuxiao School of Information Science and Engineering Hohai University Jiangsu Nanjing China School of Computer and Software Hohai University Jiangsu Nanjing China
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ... 详细信息
来源: 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui Liu Weiling Li Xianhua Niu Lei Xu Yumin Dong College of Computer Science Chongqing UniversityChongqing400044China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100083China School of Computer Science and Technology Dongguan University of TechnologyDongguan523808China School of Emergency Management Xihua UniversityChengdu610039China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 评论
Crop Pest Image Classification Based on Multi-Scale Convolutional Neural Network  9
Crop Pest Image Classification Based on Multi-Scale Convolut...
收藏 引用
9th International Conference on Fuzzy Systems and Data Mining, FSDM 2023
作者: Ma, Chi Li, Huikai Hu, Hui Li, Jingyan Wu, Jie School of Computer Science and Engineering Huizhou University Huizhou516007 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Crop diseases and pests are major threats to crop yield and quality, as well as global food security and agricultural livelihoods. Therefore, it is essential to identify crop pests and diseases in a timely, efficient ... 详细信息
来源: 评论
Empowering Cross-Device Data Security Verification for IoT Sensor Nodes  7
Empowering Cross-Device Data Security Verification for IoT S...
收藏 引用
7th International Conference on Machine Learning and Natural Language Processing, MLNLP 2024
作者: Shi, Xin He, Sheng Wang, Ting Zhang, Chong Wang, Yang Zhang, Xiao School of Computer Science and Software Engineering Southwest Petroleum University Chengdu China School of Computer Science Chengdu University of Information Technology Chengdu China School of Information Engineering Mianyang Teachers College Mianyang China
In the process of realizing the Internet of Everything through the Internet of Things (IoT), the massive deployment of sensor nodes poses significant security challenges. This paper introduces a novel approach to anom... 详细信息
来源: 评论
Research advances on blockchain-as-a-service:architectures,applications and challenges
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 466-475页
作者: Jie Song Pengyi Zhang Mohammed Alkubati Yubin Bao Ge Yu Software College Northeastern University Shenyang110819China School of Computer Science and Engineering Northeastern UniversityShenyang110819China
Due to the complexity of blockchain technology,it usually costs too much effort to build,maintain and monitor a blockchain system that supports a targeted *** this end,the emerging“Blockchain as a Service”(BaaS)make... 详细信息
来源: 评论