咨询与建议

限定检索结果

文献类型

  • 115,771 篇 会议
  • 61,892 篇 期刊文献
  • 1,129 册 图书

馆藏范围

  • 178,792 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 110,268 篇 工学
    • 76,932 篇 计算机科学与技术...
    • 62,537 篇 软件工程
    • 26,154 篇 信息与通信工程
    • 16,984 篇 控制科学与工程
    • 12,391 篇 电气工程
    • 12,076 篇 生物工程
    • 11,719 篇 电子科学与技术(可...
    • 8,702 篇 机械工程
    • 8,121 篇 光学工程
    • 8,082 篇 生物医学工程(可授...
    • 5,807 篇 化学工程与技术
    • 5,600 篇 仪器科学与技术
    • 4,919 篇 动力工程及工程热...
    • 4,293 篇 网络空间安全
    • 3,885 篇 交通运输工程
    • 3,765 篇 安全科学与工程
    • 3,592 篇 材料科学与工程(可...
  • 59,618 篇 理学
    • 31,631 篇 数学
    • 16,972 篇 物理学
    • 13,455 篇 生物学
    • 10,039 篇 统计学(可授理学、...
    • 6,296 篇 化学
    • 6,006 篇 系统科学
  • 30,790 篇 管理学
    • 18,862 篇 管理科学与工程(可...
    • 13,287 篇 图书情报与档案管...
    • 7,437 篇 工商管理
  • 7,656 篇 医学
    • 6,205 篇 临床医学
    • 5,392 篇 基础医学(可授医学...
    • 3,293 篇 药学(可授医学、理...
  • 4,726 篇 法学
    • 3,856 篇 社会学
  • 2,882 篇 经济学
  • 2,270 篇 农学
  • 2,040 篇 教育学
  • 817 篇 文学
  • 406 篇 艺术学
  • 403 篇 军事学
  • 29 篇 历史学
  • 26 篇 哲学

主题

  • 5,109 篇 feature extracti...
  • 4,996 篇 computer science
  • 4,485 篇 accuracy
  • 4,144 篇 training
  • 4,076 篇 computational mo...
  • 4,000 篇 deep learning
  • 3,021 篇 machine learning
  • 2,989 篇 semantics
  • 2,603 篇 optimization
  • 2,460 篇 data mining
  • 2,378 篇 predictive model...
  • 2,288 篇 data models
  • 1,992 篇 neural networks
  • 1,943 篇 support vector m...
  • 1,854 篇 real-time system...
  • 1,808 篇 image segmentati...
  • 1,792 篇 convolutional ne...
  • 1,712 篇 internet of thin...
  • 1,695 篇 educational inst...
  • 1,597 篇 artificial intel...

机构

  • 2,877 篇 school of comput...
  • 2,488 篇 school of comput...
  • 1,594 篇 school of comput...
  • 1,519 篇 school of comput...
  • 1,364 篇 school of comput...
  • 1,362 篇 school of comput...
  • 1,327 篇 school of comput...
  • 1,278 篇 school of comput...
  • 1,130 篇 school of comput...
  • 1,104 篇 department of co...
  • 1,072 篇 cavendish labora...
  • 1,051 篇 university of ch...
  • 981 篇 department of ph...
  • 978 篇 school of comput...
  • 879 篇 physikalisches i...
  • 877 篇 oliver lodge lab...
  • 843 篇 school of comput...
  • 822 篇 school of comput...
  • 699 篇 school of comput...
  • 688 篇 college of compu...

作者

  • 269 篇 niyato dusit
  • 262 篇 barter w.
  • 252 篇 a. gomes
  • 237 篇 blake t.
  • 228 篇 c. alexa
  • 226 篇 bellee v.
  • 226 篇 bowcock t.j.v.
  • 226 篇 betancourt c.
  • 226 篇 amato s.
  • 225 篇 j. m. izen
  • 225 篇 s. chen
  • 222 篇 brundu d.
  • 222 篇 borsato m.
  • 218 篇 boettcher t.
  • 215 篇 bencivenni g.
  • 213 篇 bay a.
  • 210 篇 beiter a.
  • 205 篇 g. bella
  • 205 篇 j. strandberg
  • 204 篇 c. amelung

语言

  • 146,410 篇 英文
  • 29,013 篇 其他
  • 3,667 篇 中文
  • 177 篇 日文
  • 27 篇 德文
  • 25 篇 法文
  • 21 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 4 篇 西班牙文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer and Technology Science and Technology"
178792 条 记 录,以下是771-780 订阅
排序:
X-ray Security Inspection Prohibited Items Detection Model based on Improved YOLOv7-tiny
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第7期54卷 1279-1287页
作者: Teng, Wenzhao Zhang, Haigang Zhang, Yujun School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Shenzhen Polytechnic University Shenzhen China Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp... 详细信息
来源: 评论
Query-Efficient Textual Adversarial Example Generation for Black-Box Attacks
Query-Efficient Textual Adversarial Example Generation for B...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Yu, Zhen Chen, Zhenhua He, Kun School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep neural networks for Natural Language Processing (NLP) have been demonstrated to be vulnerable to textual adversarial examples. Existing black-box attacks typically require thousands of queries on the target model... 详细信息
来源: 评论
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
收藏 引用
Tsinghua science and technology 2024年 第5期29卷 1615-1632页
作者: Abdul Basit Dogar Sami Ullah Yiran Zhang Hisham Alasmary Muhammad Waqas Sheng Chen Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China and also with Department of Informatics and SystemsUniversity of Management and TechnologyLahore 54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper Dir 18050Pakistan School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha 61421Saudi Arabia Department of Computer Engineering Faculty of Information TechnologyUniversity of BahrainSakheer 32038Bahrainand also with School of EngineeringEdith Cowan UniversityPerth WA 6027Australia School of Electronics and Computer Science University of SouthamptonSouthamptonSO171BJUK
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
Breaking the Boundaries: A Unified Framework for Chinese Named Entity Recognition Across Text and Speech
Breaking the Boundaries: A Unified Framework for Chinese Nam...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Ning, Jinzhong Sun, Yuanyuan Xu, Bo Yang, Zhihao Luo, Ling Lin, Hongfei School of Computer Science and Technology Dalian University of Technology China
In recent years, with the vast and rapidly increasing amounts of spoken and textual data, Named Entity Recognition (NER) tasks have evolved into three distinct categories, i.e., text-based NER (TNER), Speech NER (SNER... 详细信息
来源: 评论
JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3729-3743页
作者: Li, Fengyong Wang, Qiankuan Cheng, Hang Zhang, Xinpeng Qin, Chuan Shanghai University of Electric Power College of Computer Science and Technology Shanghai201306 China Fuzhou University School of Mathematics and Statistics Fujian Fuzhou350108 China Fudan University School of Computer Science Shanghai200433 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu... 详细信息
来源: 评论
Overlapping community‐based particle swarm optimization algorithm for influence maximization in social networks
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 893-913页
作者: Lei Zhang Yutong Liu Haipeng Yang Fan Cheng Qi Liu Xingyi Zhang Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of EducationSchool of Computer Science and TechnologyAnhui UniversityHefeiChina School of Computer Science and Technology University of Science and Technology of ChinaHefeiChina
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour *... 详细信息
来源: 评论
Student Performance Prediction Using Stacking Ensemble Learning  4
Student Performance Prediction Using Stacking Ensemble Learn...
收藏 引用
4th International Conference on Electronic Information Engineering and computer Communication, EIECC 2024
作者: Tao, Yibo Yang, Yong Qu, Fuheng Liu, Yuyao Changchun University of Science and Technology School of Computer Science and Technology Changchun China
Student grade prediction is an important research topic in educational data mining. To address the issues of low prediction accuracy and poor generalization encountered by single models in predicting student grades, t... 详细信息
来源: 评论
ResilioMate: A Resilient Multi-Agent Task Executing Framework for Enhancing Small Language Models
收藏 引用
IEEE Access 2025年 13卷 86892-86911页
作者: Xiong, Yubing Huang, Mingrui Liang, Xuechen Tao, Meiling East China Jiaotong University School of Transportation Engineering Jiangxi Nanchang330013 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China
Recent advances in large language models (LLMs) have been limited by their processing requirements and vulnerability to adversarial assaults, whilst short language models (SLMs) struggle with performance consistency i... 详细信息
来源: 评论
Neighborhood Combination Search for Single-Machine Scheduling with Sequence-Dependent Setup Time
收藏 引用
Journal of computer science & technology 2024年 第3期39卷 737-752页
作者: 刘晓路 徐宏云 陈嘉铭 苏宙行 吕志鹏 丁俊文 College of System Engineering National University of Defense TechnologyChangsha 410015China School of Artificial Intelligence Jianghan UniversityWuhan 430056China Xi’an Satellite Control Center Xi’an 710043China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China CCF
In a local search algorithm,one of its most important features is the definition of its neighborhood which is crucial to the algorithm's *** this paper,we present an analysis of neighborhood combination search for... 详细信息
来源: 评论