咨询与建议

限定检索结果

文献类型

  • 2,531 篇 会议
  • 1,906 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,777 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,332 篇 软件工程
    • 554 篇 信息与通信工程
    • 434 篇 控制科学与工程
    • 401 篇 电子科学与技术(可...
    • 399 篇 电气工程
    • 305 篇 生物工程
    • 288 篇 光学工程
    • 242 篇 机械工程
    • 209 篇 生物医学工程(可授...
    • 196 篇 仪器科学与技术
    • 151 篇 化学工程与技术
    • 146 篇 动力工程及工程热...
    • 126 篇 交通运输工程
    • 109 篇 材料科学与工程(可...
    • 98 篇 土木工程
    • 91 篇 建筑学
  • 1,496 篇 理学
    • 689 篇 数学
    • 461 篇 物理学
    • 355 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 148 篇 系统科学
  • 709 篇 管理学
    • 468 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 227 篇 医学
    • 189 篇 临床医学
    • 135 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 101 篇 法学
    • 84 篇 社会学
  • 81 篇 经济学
  • 52 篇 农学
  • 40 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 91 篇 feature extracti...
  • 85 篇 deep learning
  • 71 篇 computer science
  • 71 篇 data mining
  • 71 篇 training
  • 68 篇 computational mo...
  • 67 篇 accuracy
  • 65 篇 semantics
  • 65 篇 machine learning
  • 63 篇 optimization
  • 44 篇 object detection
  • 42 篇 protocols
  • 41 篇 reliability
  • 41 篇 mathematical mod...
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 39 篇 data models
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 37 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 49 篇 national enginee...
  • 47 篇 school of comput...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 41 篇 school of optica...
  • 37 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 28 篇 hubei province k...
  • 27 篇 huazhong univers...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 24 篇 department of co...
  • 24 篇 school of comput...
  • 24 篇 state key labora...
  • 23 篇 college of compu...

作者

  • 112 篇 hai jin
  • 97 篇 jin hai
  • 31 篇 xiaofei liao
  • 27 篇 yang yang
  • 27 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 22 篇 liao xiaofei
  • 21 篇 chen shu-ching
  • 18 篇 deqing zou
  • 17 篇 wang xingjun
  • 17 篇 shyu mei-ling
  • 17 篇 zhang zhigang
  • 17 篇 zhigang zhang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 xin xin
  • 15 篇 niyato dusit
  • 15 篇 long zheng

语言

  • 3,708 篇 英文
  • 623 篇 其他
  • 117 篇 中文
  • 12 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4453 条 记 录,以下是1231-1240 订阅
排序:
Distributed Nash Equilibrium Seeking in Coalition Games for Uncertain Euler-Lagrange systems With Application to USV Swarm Confrontation
arXiv
收藏 引用
arXiv 2025年
作者: Yuwen, Cheng Wen, Guanghui Zhou, Jialing Luan, Meng Huang, Tingwen School of Automation Southeast University Nanjing210096 China State Key Laboratory of CNS/ATM Beijing Institute of Technology Beijing519088 China Department of System Science School of Mathematics Southeast University Nanjing211189 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen218055 China
In this paper, a coalition game with local and coupling constraints is studied for uncertain Euler-Lagrange (EL) systems subject to disturbances with unknown bounds. In the coalition game, each agent collaborates with... 详细信息
来源: 评论
Cross-Covariate Gait Recognition: A Benchmark
arXiv
收藏 引用
arXiv 2023年
作者: Zou, Shinan Fan, Chao Xiong, Jianbo Shen, Chuanfu Yu, Shiqi Tang, Jin School of Automation Central South University China Department of Computer Science and Engineering Southern University of Science and Technology China Research Institute of Trustworthy Autonomous System Southern University of Science and Technology China The University of Hong Kong Hong Kong
Gait datasets are essential for gait research. However, this paper observes that present benchmarks, whether conventional constrained or emerging real-world datasets, fall short regarding covariate diversity. To bridg... 详细信息
来源: 评论
Bmt-Enas: Branched Multi-Task Evolutionary Neural Architecture Search
SSRN
收藏 引用
SSRN 2024年
作者: Huang, Jianzun Zou, Juan Xia, Yizhang Hou, Zhanglu Liu, Yuan Ye, Songtao Lu, Qifeng Hunan Province ChinaHunan Engineering Research Center of Intelligent System Optimization and Security Xiangtan University Hunan Province Xiangtan411105 China Faculty of School of Computer Science School of Cyberspace Science of Xiangtan University Xiangtan411105 China Xi’an Jiaotong-Liverpool University Taicang Jiangsu Suzhou215400 China
Multi-task neural networks have achieved significant success in various field. However, developing a high-performance multi-task neural network typically necessitates a profound comprehension of multi-task learning pr... 详细信息
来源: 评论
Write-Optimized B^(+) Tree Index Technology for Persistent Memory
收藏 引用
Journal of computer science & Technology 2021年 第5期36卷 1037-1050页
作者: Rui-Xiang Ma Fei Wu Bu-Rong Dong Meng Zhang Wei-Jun Li Chang-Sheng Xie Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430070China Key Laboratory of Information Storage System Ministry of Education of ChinaWuhan 430070China Engineering Research Center of Data Storage Systems and Technology Huazhong University of Science and Technology Wuhan 430070China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430070China Shenzhen DAPU Microelectronics Co. LtdShenzhen 518116China
Due to its low latency,byte-addressable,non-volatile,and high density,persistent memory(PM)is expected to be used to design a high-performance storage ***,PM also has disadvantages such as limited endurance,thereby pr... 详细信息
来源: 评论
Stock Prediction Using Optimized LightGBM Based on Cost Awareness  5
Stock Prediction Using Optimized LightGBM Based on Cost Awar...
收藏 引用
5th IEEE International Conference on Cybernetics, CYBCONF 2021
作者: Zhao, Xiaosong Zhao, Qiangfu University of Aizu System Intelligence Laboratory Aizu Fukushima965-8580 Japan University of Aizu Graduate School of Computer Science and Engineering Aizu Fukushima965-8580 Japan
The application of machine learning in stock market prediction has generated widespread attention. This paper proposes a new method for short-term stock investment using optimized LightGBM based on cost awareness. By ... 详细信息
来源: 评论
Weakly-Supervised Log-Based Anomaly Detection with Inexact Labels via Multi-Instance Learning
Weakly-Supervised Log-Based Anomaly Detection with Inexact L...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Minghua He Tong Jia Chiming Duan Huaqian Cai Ying Li Gang Huang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China School of Computer Science Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
Log-based anomaly detection is essential for maintaining software availability. However, existing log-based anomaly detection approaches heavily rely on fine-grained exact labels of log entries which are very hard to ... 详细信息
来源: 评论
Enhancing Acceptance of Automated Vehicles Through Gamification: Insights from a Driving Simulator Study
SSRN
收藏 引用
SSRN 2025年
作者: Li, Chenchang Yin, Rao Yang, Bo Guan, Muhua Xie, Kun Nakano, Kimihiko Institute of Industrial Science University of Tokyo Tokyo153-8505 Japan School of Design & Innovation China Academy of Art Hangzhou311100 China School of Computer Science & System Engineering Kyushu Institute of Technology Fukuoka820-8502 Japan Department of Civil and Environmental Engineering Transportation Informatics Lab Old Dominion University NorfolkVA23529 United States
Automated vehicles hold great potential to revolutionize transportation, but subjective user acceptance remains a major obstacle to their widespread adoption and the realization of anticipated safety benefits. Recogni... 详细信息
来源: 评论
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on Big Data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论
Layered Stiffness Detection of Ballastless Track Based on Loading Force and Multiple Sinking Values
SSRN
收藏 引用
SSRN 2024年
作者: Miao, Shuaijie Gao, Liang Xin, Tao Yin, Hui Huang, Yonggui Xiao, Hong Cai, Xiaopei School of Civil Engineering Beijing Jiaotong University Beijing100044 China Frontiers Science Center for Smart High-speed Railway System Beijing Jiaotong University Beijing100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China
Detecting the distribution of ballastless track layered stiffness and the stiffness anomalies caused by sublayer defects is attractive and challenging. Firstly, a data collection method for the ballastless track stiff... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs  23
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
Proceedings of the 2023 7th International Conference on computer science and Artificial Intelligence
作者: Abdulrahman Hamman Adama Chukkol Senlin Luo Haruna Yunusa Abdulganiyu Abdu Yusuf Abulfatahi Mohammed Information and Electronics Department of Information and Electronics. Beijing Institute of Technology Beijing China China Information and Electronics Information System and Security & Countermeasures Experimental Center Beijing Institute of Technology Beijing China China Automation Science and Electrical Engineering School of Automation Science and Electrical Engineering Beihang University Beijing China China Computer Science School of Computer Science and Technology Beijing Institute of Technology Beijing China China Information Technology School of Management and Information Technology Modibbo Adama University Yola Nigeria Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论