咨询与建议

限定检索结果

文献类型

  • 2,284 篇 会议
  • 1,452 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,374 篇 工学
    • 1,862 篇 计算机科学与技术...
    • 1,532 篇 软件工程
    • 507 篇 信息与通信工程
    • 304 篇 控制科学与工程
    • 289 篇 生物工程
    • 240 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 154 篇 电子科学与技术(可...
    • 144 篇 机械工程
    • 141 篇 光学工程
    • 92 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 84 篇 安全科学与工程
    • 83 篇 网络空间安全
    • 77 篇 交通运输工程
  • 1,092 篇 理学
    • 606 篇 数学
    • 310 篇 生物学
    • 244 篇 物理学
    • 193 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 100 篇 化学
  • 726 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 161 篇 医学
    • 144 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
  • 95 篇 法学
  • 74 篇 教育学
    • 71 篇 教育学
  • 73 篇 经济学
    • 72 篇 应用经济学
  • 29 篇 农学
  • 12 篇 艺术学
  • 11 篇 军事学
  • 7 篇 文学
  • 1 篇 哲学

主题

  • 121 篇 software enginee...
  • 101 篇 training
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 computational mo...
  • 77 篇 deep learning
  • 67 篇 machine learning
  • 65 篇 data models
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 data mining
  • 55 篇 cloud computing
  • 52 篇 predictive model...
  • 51 篇 computer science
  • 49 篇 optimization
  • 48 篇 security
  • 46 篇 computer archite...
  • 46 篇 visualization
  • 45 篇 internet of thin...
  • 43 篇 federated learni...

机构

  • 99 篇 college of compu...
  • 53 篇 department of co...
  • 53 篇 school of inform...
  • 52 篇 institute of com...
  • 50 篇 school of softwa...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 42 篇 national enginee...
  • 40 篇 state key labora...
  • 38 篇 school of comput...
  • 38 篇 school of softwa...
  • 35 篇 college of intel...
  • 35 篇 school of softwa...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of softwa...
  • 31 篇 school of softwa...
  • 31 篇 school of softwa...
  • 30 篇 state key labora...

作者

  • 33 篇 hung chih-cheng
  • 30 篇 xu yuanping
  • 29 篇 shen linlin
  • 24 篇 yuanping xu
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 21 篇 chaolong zhang
  • 21 篇 xiaofei wang
  • 21 篇 buyya rajkumar
  • 20 篇 chih-cheng hung
  • 19 篇 qi liu
  • 19 篇 xiaodong liu
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong
  • 18 篇 zhijie xu
  • 18 篇 liu jianxun
  • 18 篇 zhang chaolong
  • 17 篇 tao dacheng
  • 17 篇 li tukun
  • 17 篇 muhammad adnan k...

语言

  • 3,619 篇 英文
  • 142 篇 其他
  • 34 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Software Engineering"
3790 条 记 录,以下是181-190 订阅
排序:
Fine-Grained Features-based Code Search for Precise Query-Code Matching  31
Fine-Grained Features-based Code Search for Precise Query-Co...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Xinting Cheng, Mengqiu Wang, Mengzhen Gong, Songwen Cai, Yi Xie, Jiayuan Li, Qing Department of Computing The Hong Kong Polytechnic University Hong Kong School of Software Engineering South China University of Technology China Department of Mathematics The University of Hong Kong Hong Kong Guangdong Neusoft University China
Code search aims to quickly locate target code snippets from databases using natural language queries, which promotes code reusability. Existing methods can effectively obtain aligned token-level and query word-level ... 详细信息
来源: 评论
Adjusting Logit in Gaussian Form for Long-Tailed Visual Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第10期5卷 5026-5039页
作者: Li, Mengke Cheung, Yiu-Ming Lu, Yang Hu, Zhikai Lan, Weichao Huang, Hui Shenzhen518132 China Hong Kong Baptist University Department of Computer Science 999077 Hong Kong Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen361005 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
It is not uncommon that real-world data are distributed with a long tail. For such data, the learning of deep neural networks becomes challenging because it is hard to classify tail classes correctly. In the literatur... 详细信息
来源: 评论
FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement Learning  26
FedWNS: Data Distribution-Wise Node Selection in Federated L...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Tu, Chengwu Zhao, Shengjie Deng, Hao Tongji University School of Software Engineering Shanghai201800 China Key Laboratory of Embedded System and Service Computing Shanghai201800 China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai201800 China
To deal with the discrepancy between global and local objectives in the federated learning invoked by the non-independent, identically distributed (non-IID) data and mitigate the impact of catastrophic forgetting in t... 详细信息
来源: 评论
Towards Attention-Aware Interactive 360-Degree Video Streaming on Smartphones
收藏 引用
IEEE Network 2025年
作者: Zhang, Lei Zhou, Haobin Shen, Linfeng Liu, Jiangchuan Cui, Laizhong Shenzhen University College of Computer Science and Software Engineering China Simon Fraser University School of Computing Science Canada
Browsing 360-degree videos on smartphones is becoming increasingly popular, which is challenging due to heavy user interactions, limited hardware capabilities, and constrained batteries. To improve resource efficiency... 详细信息
来源: 评论
Security Equivalence Assessment between Cloud Standards by Mapping of Control Items
Security Equivalence Assessment between Cloud Standards by M...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yuchen Wong Chen Yan Shengfang Zhai Cong Li Qingni Shen School of Software and Microelectronics & National Engineering Research Center for Software Engineering & PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University
The rise of new industries, such as the Internet of Things and Smart Healthcare, has brought many cross-cloud business opportunities for cloud computing and posed new challenges to the cloud security. Traditionally, s...
来源: 评论
LOPE: A Low-Overhead Payment Verification Method for Blockchains
收藏 引用
Chinese Journal of Electronics 2021年 第2期30卷 349-358页
作者: ZHANG Ying HE Zhengyuan JIA Linpeng DING Donghui ZHANG Hanwen SUN Yi School of Software Engineering Tongji University Blockchain Lab Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is... 详细信息
来源: 评论
XRL-SHAP-Cache:an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 46-71页
作者: Xiaolong XU Fan WU Muhammad BILAL Xiaoyu XIA Wanchun DOU Lina YAO Weiyi ZHONG School of Software Nanjing University of Information Science and Technology School of Computing and Communications Lancaster University School of Computing Technologies Royal Melbourne Institute of Technology State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering University of New South Wales Data 61 Commonwealth Scientific and Industrial Research Organization School of Computer Science Qufu Normal University
Content delivery networks(CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edge caching... 详细信息
来源: 评论
Introducing on-chain graph data to consortium blockchain for commercial transactions
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 255-257页
作者: Pengyi ZHANG Yuchen YUAN Jie SONG Yu GU Qiang QU Yongjie BAI Software College Northeastern UniversityShenyang 110819China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Blockchain Lab Huawei Cloud Computing Technologies Co.Ltd.Shenzhen 518101China
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algor... 详细信息
来源: 评论
A Reduced State Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia Engineering Laboratory for Big Data Analysis Technology College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri Nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
Multi-authority (t,n) Threshold Identity-based Matchmaking Encryption  3
Multi-authority (t,n) Threshold Identity-based Matchmaking E...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Ding, Xiangyu Shanghai Key Laboratory of Trustworthy Computing School of Software Engineering East China Normal University 3663 N. Zhongshan Rd. Shanghai200062 China
In this work, we propose a Multi-authority (t, n) Threshold Identity-based Matchmaking Encryption (MAT-IBME) scheme under the standard assumptions in the standard model, in which multiple authorities share the secrets... 详细信息
来源: 评论