咨询与建议

限定检索结果

文献类型

  • 2,399 篇 会议
  • 1,989 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,404 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,880 篇 工学
    • 1,964 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 601 篇 信息与通信工程
    • 386 篇 电气工程
    • 369 篇 控制科学与工程
    • 327 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 222 篇 机械工程
    • 206 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 155 篇 仪器科学与技术
    • 145 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 103 篇 交通运输工程
    • 101 篇 网络空间安全
    • 90 篇 材料科学与工程(可...
    • 84 篇 土木工程
    • 84 篇 安全科学与工程
    • 80 篇 建筑学
  • 1,447 篇 理学
    • 708 篇 数学
    • 395 篇 物理学
    • 310 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 156 篇 化学
    • 144 篇 系统科学
  • 764 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 179 篇 医学
    • 148 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 117 篇 法学
  • 73 篇 经济学
  • 53 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 104 篇 feature extracti...
  • 92 篇 semantics
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 72 篇 computer science
  • 67 篇 training
  • 65 篇 computer archite...
  • 59 篇 optimization
  • 59 篇 cloud computing
  • 57 篇 servers
  • 56 篇 laboratories
  • 55 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 48 篇 machine learning
  • 45 篇 data models
  • 43 篇 resource managem...

机构

  • 131 篇 school of comput...
  • 101 篇 national enginee...
  • 95 篇 hubei province k...
  • 90 篇 school of comput...
  • 79 篇 department of co...
  • 53 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 38 篇 university of ch...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 33 篇 key laboratory o...

作者

  • 234 篇 hai jin
  • 188 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,641 篇 英文
  • 629 篇 其他
  • 149 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4404 条 记 录,以下是1071-1080 订阅
排序:
Gender Prediction Using Real-time Convolutional Neural Network
收藏 引用
Procedia computer science 2025年 258卷 497-506页
作者: Emmanuel O. Balogun Sunday Adeola Ajagbe Abidemi E. Adeniyi Temitope O. Olayinka Elijah Adetoyese Adeogun Gbadegesin Adetayo Taiwo Ogheneruona Maria Esegbona-Isikeh Pragasen Mudali ICT Unit Ajayi Crowther University Oyo Oyo Nigeria Department of Computer Engineering Abiola Ajimobi Technical University 200255 Nigeria Department of Computer Science Bowen University Iwo Nigeria Department of Computer Science University of Maine Orono United State Department of Computer Science Ladoke Akintola University of Technology Ogbomoso Nigeria School of Computing Science & Engineering University of Salford Manchester United Kingdom Amey Services Limited United Kingdom
This work presents real time gender prediction using Convolutional Neural Network. Automatic classification of gender has become an area that has garnered importance due to the emergence of breakthroughs in the world ... 详细信息
来源: 评论
An Instance-Level Motion-Aware Graph Model for Multi-target Multi-camera Tracking
An Instance-Level Motion-Aware Graph Model for Multi-target ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaotong Fan Huicheng Zheng School of Computer Science and Engineering Sun Yat-sen University China Guangdong Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Multi-target multi-camera tracking (MTMCT), focusing on inferring trajectory across multiple surveillance videos, is holding significant practical utility. While numerous studies aim to learn visual features robust to... 详细信息
来源: 评论
Solving Constrained Multi-objective Optimization Problems with Passive Archiving Mechanism  1
收藏 引用
17th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2022
作者: Jia, Huijuan Zhang, Kai Shen, Chaonan School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan430065 China
During these years, many advanced constrained multi-objective evolutionary algorithms (CMOEAs) have been developed to solve constrained multi-objective optimization problems (CMOPs). However, some existing constrained... 详细信息
来源: 评论
FAGC: Free Space Fragmentation Aware GC Scheme based on Observations of Energy Consumption
FAGC: Free Space Fragmentation Aware GC Scheme based on Obse...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lihua Yang Zhipeng Tan Fang Wang Yang Xiao Wei Zhang Biao He Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology College of Science and Technology National University of Defense Technology China Huawei Technology Co. Ltd China
Smartphones are everyday necessities with limited power supply. Charging a smartphone twice a day or more affects user experience. Flash friendly file system (F2FS) is a widely-used log-structured file system for smar...
来源: 评论
Tree-IDS: An Incremental Intrusion Detection system for Connected Vehicles
Tree-IDS: An Incremental Intrusion Detection System for Conn...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Yuxin Zhao Zixiang Bi Guosheng Xu Chenyu Wang Guoai Xu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Shenzhen China
The rapid development of Internet of Vehicles technology has led to the continuous upgrading of the functions of connected vehicles. While connected vehicles bring convenience to people’s life, there are also many se...
来源: 评论
Towards Expanding Precise Timing for Collaborative Its with Deterministic Communications in 6G
Towards Expanding Precise Timing for Collaborative Its with ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Hongxing Li Haotian Li Qianhan Gao Guochu Shou Yaqiong Liu Zhigang Guo Yihong Hu State Key Laboratory of Networking and Switching Technology School of Computer Science (National Pilot Software Engineering School) Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
The demand for precise timing continues to grow with the rapid development of smart cities, where intelligent transportation emerges as a critical application heavily dependent on accurate time distribution. Determini... 详细信息
来源: 评论
BCPPAS : Blockchain-Based Cross-Domain Identity Authentication Scheme for IoT with Privacy Protection
BCPPAS : Blockchain-Based Cross-Domain Identity Authenticati...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Qianqian Li Yubing Han Qi Liu Guijuan Wang Hao Yu Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
In Internet of Things(IoT) systems, ensuring the secure exchange of information between devices from different domains is crucial. Current cross-domain authentication schemes based on a single blockchain struggle to m... 详细信息
来源: 评论
Select Informative Samples for Night-Time Vehicle Detection Benchmark in Urban Scenes
收藏 引用
Remote Sensing 2023年 第17期15卷 4310-4310页
作者: Wang, Xiao Tu, Xingyue Al-Hassani, Baraa Lin, Chia-Wen Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan430081 China School of Computer Science Wuhan University Wuhan430081 China Department of Electrical Engineering Industrial Technology Research Institute National Tsing Hua University Hsinchu30013 Taiwan
Night-time vehicle detection plays a vital role due to the high incidence of abnormal events in our daily security field. However, existing studies mainly focus on vehicle detection in autonomous driving and traffic i... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Short-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
收藏 引用
Neural computing and Applications 2024年 1-20页
作者: Zhang, Ying Xu, Shimin Zhang, Linghui Jiang, Weiwei Alam, Sameer Xue, Dabin College of General Aviation and Flight Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Air Traffic Management System Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Air Traffic Management Research Institute School of Mechanical & ampAerospace Engineering Nanyang Technological University Singapore Singapore Department of Land Surveying and Geo-Informatics The Hong Kong Polytechnic University Hong Kong
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencies of air... 详细信息
来源: 评论