咨询与建议

限定检索结果

文献类型

  • 1,841 篇 会议
  • 1,541 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,255 篇 工学
    • 1,736 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 520 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 244 篇 生物工程
    • 222 篇 电气工程
    • 172 篇 光学工程
    • 159 篇 机械工程
    • 159 篇 生物医学工程(可授...
    • 145 篇 电子科学与技术(可...
    • 94 篇 化学工程与技术
    • 88 篇 安全科学与工程
    • 80 篇 动力工程及工程热...
    • 78 篇 仪器科学与技术
    • 78 篇 网络空间安全
    • 73 篇 交通运输工程
    • 67 篇 建筑学
  • 1,024 篇 理学
    • 581 篇 数学
    • 275 篇 生物学
    • 252 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 95 篇 化学
  • 678 篇 管理学
    • 437 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 143 篇 医学
    • 130 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 94 篇 法学
    • 63 篇 社会学
  • 59 篇 教育学
  • 54 篇 经济学
  • 33 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 104 篇 feature extracti...
  • 93 篇 deep learning
  • 92 篇 training
  • 75 篇 computational mo...
  • 74 篇 semantics
  • 69 篇 software enginee...
  • 62 篇 computer science
  • 61 篇 machine learning
  • 60 篇 accuracy
  • 58 篇 data mining
  • 48 篇 software
  • 47 篇 predictive model...
  • 43 篇 convolution
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 42 篇 educational inst...
  • 42 篇 optimization
  • 41 篇 internet of thin...
  • 41 篇 image segmentati...
  • 41 篇 cloud computing

机构

  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 55 篇 state key labora...
  • 44 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 41 篇 school of comput...
  • 41 篇 university of ch...
  • 39 篇 software enginee...
  • 39 篇 faculty of compu...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...

作者

  • 27 篇 quanyin zhu
  • 26 篇 shen linlin
  • 23 篇 shi yinghuan
  • 21 篇 gao yang
  • 20 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 15 篇 wang zheng
  • 15 篇 zhang jian
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yunhao liu

语言

  • 3,069 篇 英文
  • 286 篇 其他
  • 68 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3419 条 记 录,以下是261-270 订阅
排序:
SLAM: Towards Efficient Multilingual Reasoning via Selective Language Alignment  31
SLAM: Towards Efficient Multilingual Reasoning via Selective...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Fan, Yuchun Mu, Yongyu Wang, Yilin Huang, Lei Ruan, Junhao Li, Bei Xiao, Tong Huang, Shujian Feng, Xiaocheng Zhu, Jingbo NLP Lab School of Computer Science and Engineering Northeastern University Shenyang China NiuTrans Research Shenyang China Harbin Institute of Technology Harbin China Meituan Inc. National Key Laboratory for Novel Software Technology Nanjing University China
Despite the significant improvements achieved by large language models (LLMs) in English reasoning tasks, these models continue to struggle with multilingual reasoning. Recent studies leverage a full-parameter and two... 详细信息
来源: 评论
Model LEGO: Creating Models Like Disassembling and Assembling Building Blocks  38
Model LEGO: Creating Models Like Disassembling and Assemblin...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Jiacong Gao, Jing Ye, Jingwen Gao, Yang Wang, Xingen Feng, Zunlei Song, Mingli College of Computer Science and Technology Zhejiang University China Robotics Institute School of Computer Science Carnegie Mellon University United States Electrical and Computer Engineering National University of Singapore Singapore School of Software Technology Zhejiang University China State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Bangsheng Technology Co. Ltd. China
With the rapid development of deep learning, the increasing complexity and scale of parameters make training a new model increasingly resource-intensive. In this paper, we start from the classic convolutional neural n...
来源: 评论
Designing Data Permissions in the Enterprise Application Environment  4
Designing Data Permissions in the Enterprise Application Env...
收藏 引用
4th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2023
作者: Yuan, Ying Yi, Xin Shangguan, Junbin School of Computer and Information Engineering Xiamen University of Technology Xiamen China Institute of Space Information Technology Xiamen University of Technology Xiamen China Information Technology Co. Ltd Software Department Xiamen China
With the continuous improvement of social informationization, the digitalization of corporate construction is also developing comprehensively. Data, as a crucial source for creating wealth and competitive advantage, i... 详细信息
来源: 评论
FewFine: Few-shot Malware Traffic Classification Via Transfer Learning based on Fine-tuning Strategy  19
FewFine: Few-shot Malware Traffic Classification Via Transfe...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Liu, Xingtong Shen, Meng Cui, Laizhong Ye, Ke Jia, Jizhe Yue, Guangchun School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Shenzhen University College of Computer Science and Software Engineering Shenzhen China School of Computer Science Beijing Institute of Technology Beijing China
Malware traffic is constantly evolving and remains destructive. The detection and classification of malware traffic is crucial for maintaining cyberspace security. Only by swiftly and accurately detecting and classify... 详细信息
来源: 评论
DRRS-BC:Decentralized Routing Registration System Based on Blockchain
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第12期8卷 1868-1876页
作者: Huimin Lu Yu Tang Yi Sun College of Computer Science and Technology Qingdao UniversityQingdao 266071China School of Engineering Kyushu Institute of TechnologyKitakyushu 804-8550Japan School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China
The border gateway protocol(BGP)has become the indispensible infrastructure of the Internet as a typical inter-domain routing ***,it is vulnerable to misconfigurations and malicious attacks since BGP does not provide ... 详细信息
来源: 评论
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro Processors  8
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro P...
收藏 引用
8th International Conference on computer and Communication Systems, ICCCS 2023
作者: Qian, Hong Wu, Wei Zhu, Qi Wang, Fei Zhao, Jinwei Zheng, Yan School of Computer Science and Technology University of Science and Technology of China Hefei China Jiangnan Institute of Computing Technology System Software Research Department Wuxi China Tsinghua University Department of Computer Science and Technology Beijing China National Research Center of Parallel Computer Engineering and Technology Beijing China
The Sunway family supercomputers have achieved a series of remarkable achievements. However, the toolchains provided by them are not perfect, which has brought great challenges to the development of high-performance a... 详细信息
来源: 评论
An Approach for Performance Calculation of AVS/RS in Multi-floor Workshop  3rd
An Approach for Performance Calculation of AVS/RS in Multi-f...
收藏 引用
3rd International Conference on Smart Manufacturing, Industrial and Logistics engineering, SMILE 2023 and the 7th Asian Conference of Management Science and Applications, ACMSA 2023
作者: Liu, Xiaopeng Wu, Cuiying Zhang, Baolin Xi, An Chen, Xuanrui Ministry of Industry and Information Technology Key Laboratory of Industrial Software Engineering Application Technology China Electronic Product Reliability and Environmental Testing Research Institute Guangzhou510619 China School of Computer and Information Engineering Hanshan Normal University Guangdong Chaozhou521041 China
Warehouse management is an important part of the production process. As a result of the development of technology, more and more companies tend to use automated logistics technologies such as AVS/RS to handle the inte... 详细信息
来源: 评论
A Privacy Preserving Method for IoT Forensics
A Privacy Preserving Method for IoT Forensics
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Wenzheng Chen, Boxi Fu, Xiao Gu, Qing Shi, Jin Du, Xiaojiang Zhou, Xiaoyang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University School of Information Management Nanjing China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ United States Innovation Research Institute Nanjing China
The diversity of the Internet of Things (IoT) poses challenges to privacy protection, especially in the field of digital forensics. How to ensure that only the private information of the suspect is provided, and not t... 详细信息
来源: 评论
3D Gaze Estimation via Binocular Disparity and Feature Refinement  10
3D Gaze Estimation via Binocular Disparity and Feature Refin...
收藏 引用
10th International Conference on Big Data Computing and Communications, BIGCOM 2024
作者: Wang, Chengxin Chen, Qiuxia Tian, Ying Yang, Jinfeng School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen China
The eyes are the windows to the soul and are crucial for studying human behavior. Therefore, gaze estimation has attracted much attention in the field of computer vision. In recent years, convolutional neural networks... 详细信息
来源: 评论
IPL Data Analysis by Web Scraping and Using PowerBI
IPL Data Analysis by Web Scraping and Using PowerBI
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Mogith P Mothiswar T B G Mohammad Abubak J. Jagannathan N. Balaganesh Software Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Cricket fans throughout the world avidly follow the Indian Premier League (IPL), a competition of great fame. The IPL data is examined in this using Exploratory Data Analysis (EDA) approaches to find hidden trends, pa... 详细信息
来源: 评论