咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,025 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,662 篇 工学
    • 8,333 篇 计算机科学与技术...
    • 6,828 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,367 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 733 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,826 篇 理学
    • 2,816 篇 数学
    • 1,234 篇 生物学
    • 955 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,062 篇 管理学
    • 1,852 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 305 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 142 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,154 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and software Engineering"
16387 条 记 录,以下是231-240 订阅
排序:
DTA-Net: Dual-Task Attention Network for Medical Image Segmentation and Classification
DTA-Net: Dual-Task Attention Network for Medical Image Segme...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Qi, Haifeng Shen, Siyuan Huang, Zhijian Deng, Lei Xinjiang University School of Software Urumqi China Central South University School of Computer Science and Engineering Changsha China
Medical image segmentation and classification are fundamental tasks in computer-aided diagnosis, where accurate segmentation plays a key role in identifying disease-related features and regions of interest, thus aidin... 详细信息
来源: 评论
Empowering Visible-Infrared Person Re-Identification with Large Foundation Models  38
Empowering Visible-Infrared Person Re-Identification with La...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Zhangyi Yang, Bin Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
来源: 评论
Container-Aware Service Function Chains Placement and Optimization in Vehicular Edge Computing  22
Container-Aware Service Function Chains Placement and Optimi...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhang, Kaixin Hu, Shihong Qu, Zhihao Ye, Baoliu Hohai University School of Computer Science and Software Engineering China Nanjing University National Key Laboratory for Novel Software Technology China
In the domain of Vehicular Edge Computing (VEC), this paper addresses the complex problem of Service Function Chain (SFC) placement, which is crucial for the efficient deployment of cloud applications in vehicular env... 详细信息
来源: 评论
LSNSCDA: Unraveling CircRNA-Drug Sensitivity via Local Smoothing Graph Neural Network and Credible Negative Samples
LSNSCDA: Unraveling CircRNA-Drug Sensitivity via Local Smoot...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Fan, Ziyu Zhang, Yuanpeng Li, Yahan Zhong, Zeyu Deng, Lei Central South University School of Computer Science and Engineering Changsha China Xinjiang University School of Software Wulumuqi China
This study investigates the role of circular RNAs (circRNAs) in drug sensitivity, with a focus on their potential to inform personalized medicine. While current methods for identifying circRNA-drug sensitivity associa... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
FCA-based θ-iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Computer Science and Engineering Soonchunhyang University Asan31538 Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos... 详细信息
来源: 评论
PathActMarker:an R package for inferring pathway activity of complex diseases
收藏 引用
Frontiers of computer science 2025年 第3期19卷 123-124页
作者: Xingyi LI Jun HAO Zhelin ZHAO Junming LI Xingyu LIAO Min LI Xuequn SHANG School of Computer Science Northwestern Polytechnical UniversityXi’an 710072China Research&Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen 518063China School of Software Northwestern Polytechnical UniversityXi’an 710072China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and EngineeringCentral South UniversityChangsha 410083China
1 Introduction The process of complex diseases is closely linked to the disruption of key biological pathways,it is crucial to identify the dysfunctional pathways and quantify the degree of dysregulation at the indivi... 详细信息
来源: 评论
Optimizing Monitoring Utility of Unmanned Aerial Vehicles Considering Adverse Effects
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5996-6013页
作者: Zhang, Haihan Dai, Haipeng Qiu, Yu Yu, Enze Zhou, Ruiben Wang, Weijun Wang, Jingwu Chen, Guihai Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China South China University of Technology School of Computer Science and Engineering Guangzhou China Beijing China
For Unmanned Aerial Vehicles (UAVs) monitoring tasks, capturing high quality images of target objects is important for subsequent recognition. Concerning the problem, many prior works study placement/trajectory planni... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论