咨询与建议

限定检索结果

文献类型

  • 375 篇 期刊文献
  • 304 篇 会议

馆藏范围

  • 679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 491 篇 工学
    • 367 篇 计算机科学与技术...
    • 277 篇 软件工程
    • 100 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 44 篇 生物工程
    • 40 篇 电子科学与技术(可...
    • 35 篇 机械工程
    • 32 篇 电气工程
    • 22 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 18 篇 仪器科学与技术
    • 16 篇 生物医学工程(可授...
    • 12 篇 建筑学
    • 11 篇 土木工程
    • 11 篇 网络空间安全
  • 229 篇 理学
    • 126 篇 数学
    • 57 篇 物理学
    • 49 篇 生物学
    • 34 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 133 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 20 篇 法学
    • 10 篇 法学
    • 10 篇 社会学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 19 篇 semantics
  • 17 篇 data mining
  • 15 篇 computer science
  • 15 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 cloud computing
  • 11 篇 data privacy
  • 11 篇 software testing
  • 11 篇 steganography
  • 11 篇 training
  • 10 篇 federated learni...
  • 9 篇 reinforcement le...
  • 9 篇 computational mo...
  • 9 篇 blockchain
  • 8 篇 internet of thin...
  • 8 篇 optimization
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 software quality
  • 8 篇 clustering algor...

机构

  • 127 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 53 篇 state key labora...
  • 30 篇 school of comput...
  • 28 篇 jiangsu collabor...
  • 23 篇 jiangsu institut...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 jiangsu engineer...
  • 15 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 school of softwa...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 collaborative in...
  • 10 篇 school of comput...

作者

  • 35 篇 wang jin
  • 23 篇 sun xingming
  • 19 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xu xiaolong
  • 17 篇 xingming sun
  • 16 篇 baowen xu
  • 16 篇 shen jian
  • 15 篇 xu baowen
  • 12 篇 xiaolong xu
  • 12 篇 liu wenjie
  • 11 篇 yongjun ren
  • 10 篇 ma tinghuai
  • 10 篇 xia zhihua
  • 10 篇 wenjie liu
  • 10 篇 sunil kumar jha
  • 9 篇 qi lianyong
  • 9 篇 wei fang
  • 9 篇 ma li
  • 8 篇 liu qi

语言

  • 641 篇 英文
  • 24 篇 其他
  • 14 篇 中文
检索条件"机构=School of Computer and Software and Jiangsu Engineering"
679 条 记 录,以下是21-30 订阅
排序:
Alternating refinement relations for fuzzy concurrent game structures
收藏 引用
Theoretical computer Science 2025年 1044卷
作者: Zhang, Shasha Zhou, Jie Ma, Yanfang Pan, Haiyu Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Mathematics and Science College Shanghai Normal University Shanghai200234 China School of Computer Science and Information Engineering Changzhou Institute of Technology Jiangsu Changzhou213032 China
Fuzzy concurrent game structures (FCGSs), an extension of concurrent game structures in the fuzzy setting, combine both fuzzy and nondeterministic choices. They are therefore a powerful semantic foundation for modelin... 详细信息
来源: 评论
WeakMedSAM: Weakly-Supervised Medical Image Segmentation via SAM with Sub-Class Exploration and Prompt Affinity Mining
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Haoran Huai, Lian Li, Wenbin Qi, Lei Jiang, Xingqun Shi, Yinghuan National Key Laboratory for Novel Software Technology The National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing China National Key Laboratory for Novel Software Technology National Institute of Healthcare Data Science Nanjing University Nanjing Drum Tower Hospital Jiangsu Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China Lab School of Computer Science and Engineering Southeast University Jiangsu Nanjing China BOE Technology Group Co. Ltd. Beijing China
We have witnessed remarkable progress in foundation models in vision tasks. Currently, several recent works have utilized the segmenting anything model (SAM) to boost the segmentation performance in medical images, wh... 详细信息
来源: 评论
2M3DF: Advancing 3D Industrial Defect Detection with Multi Perspective Multimodal Fusion Network
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Asad, Mujtaba Azeem, Waqar Jiang, He Mustafa, Hafiz Tayyab Yang, Jie Liu, Wei Shanghai Jiao Tong University Institute of Image Processing and Pattern Recognition Department of Automation Shanghai200240 China Lahore Garrison University Department of Software Engineering Lahore54000 Pakistan China University of Mining and Technology School of Information and Control Engineering Jiangsu Xuzhou221116 China Zhejiang Normal University School of Computer Science and Technology Jinhua321004 China
In the context of Industrial Anomaly Detection (IAD), ensuring the quality of manufactured products is critical. Traditional 2D based methods often fail to capture anomalies present in complex 3D shapes. For effective... 详细信息
来源: 评论
Embedded System Security Protocols: Latest Trends and Issues
收藏 引用
International Journal of High Speed Electronics and Systems 2025年 第3期34卷
作者: Han, Huimin Gulzar, Yonis Nizamani, Ahsan Ahmed Nizamani, Abdul Haseeb Ali, Sijjad Aslam Bhatti, Mughair Mechanical and Electrical Engineering College Hainan Vocational University of Science and Technology Haikou571126 China Department of Management Information Systems King Faisal University P.O. Box 380 Al-Ahsa31982 Saudi Arabia School of Computer Science and Engineering Central South University Changsha410083 China College of Computer Science and Software Engineering Shenzhen University Guandong Shenzhen China School of Geography Nanjing Normal University Jiangsu Nanjing China
Given the increasingly serious security threats faced by embedded systems, an analysis has been conducted on the characteristics and vulnerabilities of embedded systems. Detailed discussions are provided on security t... 详细信息
来源: 评论
Quality Scores Compression of Genomic Sequencing Data: A Comprehensive Review and Performance Evaluation
IEEE Transactions on Computational Biology and Bioinformatic...
收藏 引用
IEEE Transactions on Computational Biology and Bioinformatics 2025年 第2期22卷 817-831页
作者: Yuansheng Liu Tao Tang Zexuan Zhu Xiangxiang Zeng Quan Zou Keqin Li College of Information Science and Engineering Hunan University Changsha Hunan China School of Mordern Posts Nanjing University of Posts and Telecommunications Nanjing Jiangsu China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu China National Supercomputing Center Changsha Hunan China Department of Computer Science State University of NY New Paltz NY USA
Advanced sequencing technologies have profoundly revolutionized biology and produced vast amounts of raw sequencing data during the past decades. The enormous amount of sequencing data proposed significant challenges ... 详细信息
来源: 评论
A spectrum-enhanced attention model for semantic segmentation of remote sensing images
A spectrum-enhanced attention model for semantic segmentatio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xin Li Feng Xu Feifei Tao Yao Tong Xin Lyu Jianyi Zhong André Kaup College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer Engineering Jiangsu Ocean University Lianyungang China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China Chair of Multimedia Communications and Signal Processing Friedrich-Alexander University Erlangen-Nuremberg Erlangen Germany
Semantic segmentation of remote sensing images (RSIs) is essential for applications such as environmental monitoring, urban planning, and disaster management. Convolutional Neural Networks (CNNs) and their variants st... 详细信息
来源: 评论
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Quanjun Fang, Chunrong Zheng, Yi Zhang, Yaxin Zhao, Yuan Huang, Rubing Zhou, Jianyi Yang, Yun Zheng, Tao Chen, Zhenyu Department of Computing Technologies Swinburne University of Technology Melbourne Australia State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China School of Computer Science and Engineering Macau University of Science and Technology Jiangsu Nanjing China Huawei Cloud Computing Technologies Co. Ltd. Beijing China Shenzhen Research Institute of Nanjing University Guangdong Shenzhen China
Unit testing validates the correctness of the units of the software system under test and serves as the cornerstone in improving software quality and reliability. To reduce manual efforts in writing unit tests, some t... 详细信息
来源: 评论
MMST-LSTM: Leveraging Radar Echo Prediction for Emerging Consumer Applications in Edge Computing
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wu, Mengjia Xiao, Bo Yang, Zhiyun Sun, Jiawei Liu, Qi Zhang, Yonghong Liu, Xiaodong Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology School of Chemistry and Materials Science Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China Nanjing University of Information Science and Technology School of Automation Nanjing210044 China Edinburgh Napier University School of Computing EdinburghEH10 5DT United Kingdom
With the increasing frequency of extreme weather events, there is a growing demand from the public for rapid and accurate short-term heavy precipitation forecasts. This study proposes a lightweight deep learning model... 详细信息
来源: 评论
Hybrid CNN-transformer network with frequency-aware fusion for efficient single image super-resolution
收藏 引用
Expert Systems with Applications 2025年 288卷
作者: Ying Zhou Zhichao Zheng Quansen Sun Rui Chen Li Wang Linghui Ge School of Computer and Software Nanjing Vocational University of Industry Technology Nanjing 210023 Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 Jiangsu China School of Computer and Electronic Information/ School of Artificial Intelligence Nanjing Normal University Nanjing 210023 Jiangsu China
Convolutional Neural Networks (CNN) are highly effective at capturing local details, whereas Transformers is effective for modeling long-range dependencies and global patterns in Single Image Super-Resolution (SISR) t...
来源: 评论
Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 429-441页
作者: Jinfu Chen Huanhuan Wang Dave Towey Chengying Mao Rubing Huang Yongzhao Zhan School of Computer Science and Communication Engineering Jiangsu University School of Computer Science The University of Nottingham Ningbo China School of Software and Communication Engineering Jiangxi University of Financeand Economics
The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services. Vulnerability testing examines the trustworthiness and reduces th... 详细信息
来源: 评论