咨询与建议

限定检索结果

文献类型

  • 375 篇 期刊文献
  • 304 篇 会议

馆藏范围

  • 679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 491 篇 工学
    • 367 篇 计算机科学与技术...
    • 277 篇 软件工程
    • 100 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 44 篇 生物工程
    • 40 篇 电子科学与技术(可...
    • 35 篇 机械工程
    • 32 篇 电气工程
    • 22 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 18 篇 仪器科学与技术
    • 16 篇 生物医学工程(可授...
    • 12 篇 建筑学
    • 11 篇 土木工程
    • 11 篇 网络空间安全
  • 229 篇 理学
    • 126 篇 数学
    • 57 篇 物理学
    • 49 篇 生物学
    • 34 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 133 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 20 篇 法学
    • 10 篇 法学
    • 10 篇 社会学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 19 篇 semantics
  • 17 篇 data mining
  • 15 篇 computer science
  • 15 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 cloud computing
  • 11 篇 data privacy
  • 11 篇 software testing
  • 11 篇 steganography
  • 11 篇 training
  • 10 篇 federated learni...
  • 9 篇 reinforcement le...
  • 9 篇 computational mo...
  • 9 篇 blockchain
  • 8 篇 internet of thin...
  • 8 篇 optimization
  • 8 篇 servers
  • 8 篇 wireless sensor ...
  • 8 篇 software quality
  • 8 篇 clustering algor...

机构

  • 127 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 53 篇 state key labora...
  • 30 篇 school of comput...
  • 28 篇 jiangsu collabor...
  • 23 篇 jiangsu institut...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 jiangsu engineer...
  • 15 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 school of softwa...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 college of compu...
  • 10 篇 school of inform...
  • 10 篇 collaborative in...
  • 10 篇 school of comput...

作者

  • 35 篇 wang jin
  • 23 篇 sun xingming
  • 19 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xu xiaolong
  • 17 篇 xingming sun
  • 16 篇 baowen xu
  • 16 篇 shen jian
  • 15 篇 xu baowen
  • 12 篇 xiaolong xu
  • 12 篇 liu wenjie
  • 11 篇 yongjun ren
  • 10 篇 ma tinghuai
  • 10 篇 xia zhihua
  • 10 篇 wenjie liu
  • 10 篇 sunil kumar jha
  • 9 篇 qi lianyong
  • 9 篇 wei fang
  • 9 篇 ma li
  • 8 篇 liu qi

语言

  • 641 篇 英文
  • 24 篇 其他
  • 14 篇 中文
检索条件"机构=School of Computer and Software and Jiangsu Engineering"
679 条 记 录,以下是61-70 订阅
排序:
Improved locality-sensitive hashing method for the approximate nearest neighbor problem
收藏 引用
Chinese Physics B 2014年 第8期23卷 217-225页
作者: 陆颖华 马廷淮 钟水明 曹杰 王新 Abdullah Al-Dhelaane Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer & Software Nanjing University of Information Science & Technology School of Economic & Management Nanjing University of Information Science & Technology Huafeng Meteorological Media Group Computer Science Department College of Computer and Information Science King Saud University
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl... 详细信息
来源: 评论
CADEC: A Combinatorial Auction for Dynamic Distributed DNN Inference Scheduling in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Xu, Xiaolong Hu, Yuhao Cui, Guangming Qi, Lianyong Dou, Wanchun Nanjing University of Information Science and Technology School of Software Nanjing 210044 China Nanjing University of Information Science and Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China China University of Petroleum (East China) College of Computer science and technology Qingdao China Georgia State University Department of Computer Science United States
Deep Neural Network (DNN) Inference, as a key enabler of intelligent applications, is often computation-intensive and latency-sensitive. Combining the advantages of cloud computing (abundant computing resources) and e... 详细信息
来源: 评论
Precipitable water vapor retrieved from FY-3G/MWRI-RM observations using machine learning models
收藏 引用
Advances in Space Research 2025年
作者: Yuxin Liu Xinzhi Wang Yi Zhou Atta ur Rahman School of Remote Sensing and Geomatics Engineering Nanjing University of Information Science and Technology Nanjing 210044 China Jiangsu Province Engineering Research Center of Collaborative Navigation/Positioning and Smart Applications Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Water vapor is an essential component of the Earth’s atmosphere, and accurate retrieval of precipitable water vapor (PWV) is critical to understanding the Earth’s climate and hydrological cycle. In this study, we us...
来源: 评论
A Novel Association Rule Mining Method for Streaming Temporal Data
收藏 引用
Annals of Data Science 2022年 第4期9卷 863-883页
作者: Zheng, Hui Li, Peng He, Jing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Jiangsu Nanjing China School of Software and Electrical Engineering Swinburne University of Technology Melbourne Australia
Streaming temporal data contains time stamps and values, challenging to quantify relationships of time stamps and corresponding values. Moreover, the characteristics and relationships of streaming temporal data are no... 详细信息
来源: 评论
Research on Bayesian Network Based User's Interest Model
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第5期12卷 809-813页
作者: ZHANG Weifeng XU Baowen CUI Zifeng XU Lei Department of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 JiangsuChina School of Computer Science and Engineering Southeast University Nanjing 210096 Jiangsu China Jiangsu Institute of Software Quality Nanjing 210096 Jiangsu China
It has very realistic significance for improving the quality of users' accessing information to filter and selectively retrieve the large number of information on the Internet. On the basis of analyzing the existing ... 详细信息
来源: 评论
Thread-sensitive pointer analysis for. inter-thread dataflow detection
Thread-sensitive pointer analysis for. inter-thread dataflow...
收藏 引用
11th IEEE International Workshop on Future Trends of Distributed Computing Systems
作者: Qian, Ju Xu, Baowen School of Computer Science and Engineering Southeast University Nanjing 210096 China Jiangsu Institution of Software Quality Nanjing 210096 China
Inter-thread dataflows are of great importance in analyzing concurrent programs. Suffering from the complexity of currency, it is still difficult to identify them from Java programs precisely and efficiently. A fundam... 详细信息
来源: 评论
Research on C5.0 algorithm improvement and the test in lightning disaster statistics
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 181-190页
作者: Hou, Shuonan Hou, Rongtao Shi, Xinming Wang, Jun Yuan, Chengshang College of Information Science and Engineering Northeastern University ShenYang 110819 Liaoning China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 Jiangsu China
After analysis the importance of continuous attributes in the C5.0 algorithm processing, and consider the shortcomings of discretization method of C5 algorithm, this paper proposes a new method based on Rough set theo... 详细信息
来源: 评论
An effective scheme for biometric cryptosystems  2
An effective scheme for biometric cryptosystems
收藏 引用
2nd IEEE International Conference on computer and Communications, ICCC 2016
作者: Zhou, Yu Zhao, Bo Han, Jin Jun, Zheng School of Computer Science and Software Engineering East China Normal University Shanghai China School of Software and Microelectronics Peking University Beijing China Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p... 详细信息
来源: 评论
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
收藏 引用
China Communications 2016年 第7期13卷 92-99页
作者: Zhihua Xia Liangao Zhang Dandan Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu... 详细信息
来源: 评论
A Survey of Image Super Resolution Based on CNN  9th
A Survey of Image Super Resolution Based on CNN
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Qianxiong Zheng, Yu School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NanjingJiangsu210044 China
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m... 详细信息
来源: 评论