咨询与建议

限定检索结果

文献类型

  • 2,370 篇 会议
  • 1,960 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,847 篇 工学
    • 1,942 篇 计算机科学与技术...
    • 1,522 篇 软件工程
    • 588 篇 信息与通信工程
    • 353 篇 电气工程
    • 351 篇 控制科学与工程
    • 312 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 219 篇 机械工程
    • 208 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 网络空间安全
    • 88 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 81 篇 安全科学与工程
    • 77 篇 建筑学
  • 1,446 篇 理学
    • 714 篇 数学
    • 384 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 152 篇 化学
    • 146 篇 系统科学
  • 758 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 116 篇 法学
  • 73 篇 经济学
  • 57 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 99 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 69 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 54 篇 optimization
  • 54 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 48 篇 accuracy
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 101 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 42 篇 school of cyber ...
  • 38 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 33 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 22 篇 li peng
  • 21 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,944 篇 英文
  • 268 篇 其他
  • 141 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4346 条 记 录,以下是611-620 订阅
排序:
Vulnerability Detection Based on Adapter Tuning and Enhanced Feature Learning  36
Vulnerability Detection Based on Adapter Tuning and Enhanced...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Luo, Hui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China PengCheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
Pre-trained code models have achieved promising results in the vulnerability detection field. The prevailing approach is to adapt these models with vulnerability datasets using inefficient full-model fine-tuning. Thes... 详细信息
来源: 评论
A practical conflicting role-based cloud security risk evaluation method
Recent Advances in Computer Science and Communications
收藏 引用
Recent Advances in computer science and Communications 2021年 第3期14卷 874-886页
作者: Han, Jin Zhan, Jing Xia, Xiaoqing Fan, Xue School of Computer Science Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Faculty of Information Technology Beijing University of Technology Beijing100124 China
Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but to accept them. However, since cloud ... 详细信息
来源: 评论
Coverage Probability of Distributed CoMP UAV-Assisted Cellular Networks
Coverage Probability of Distributed CoMP UAV-Assisted Cellul...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Yan Li Qingmin Long Qiang Tang Shiming He Bing Xiong School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China Science and Technology on Information System Engineering Laboratory National University of Defense Technology Changsha China
It is well-established that terrestrial communication systems may fail during emergencies such as earthquakes, tsunamis, and floods. Fortunately, with the rapid advancement of unmanned aerial vehicle (UAV) network tec... 详细信息
来源: 评论
FULLY POLARIZED RADAR TARGET DETECTION AND WAVEFORM OPTIMIZATION UNDER RAINY CONDITION
FULLY POLARIZED RADAR TARGET DETECTION AND WAVEFORM OPTIMIZA...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Li, Xinda Cheng, Xu Ju, Xinjie Wang, Xuesong Li, Jianbing College of Electronic Science and Technology National University of Defense Technology Hunan Changsha410073 China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Hunan Changsha410073 China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan430205 China Hubei Key Laboratory of Intelligent Robot Wuhan430205 China
Polarization and waveform optimization can significantly improve the detection ability of fully polarized radar. However, in practical scenarios, atmospheric particles frequently induce depolarization effects on radar... 详细信息
来源: 评论
Research on Real-Time Linux Task Scheduling Algorithm for Multiprocessors Based on Particle Swarm Optimisation  9
Research on Real-Time Linux Task Scheduling Algorithm for Mu...
收藏 引用
9th International Conference on computer and Communications, ICCC 2023
作者: Qiu, Tong Yin, Zhenyu Wang, Jun Wang, Zisong School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang China Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic HardwareSoftware Shenyang China Liaoning Provincial Key Laboratory of Industrial Intelligent Technology for Chemical Processes Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Shenyang China University of Chinese Academy of Sciences Shenyang China
Schedulability analysis in real-time operating systems is one of the hot research topics in the field. While Linux has become the preferred choice for industrial systems due to its excellent portability, it cannot mee... 详细信息
来源: 评论
A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation Method
A One-Dimensional Residual Network and Physical Fitness-Base...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Runqing Fan Zhenlian Peng Buqing Cao Jianxun Liu Peng Che Tieping Chen School of Computer Science and Engineering Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Hunan University of Science and Technology Xiangtan China School of Physical Education Hunan University of Science and Technology Xiangtan China
In the context of the national big data strategy, physical fitness test data has become one of the main influencing factors in guiding and promoting the participation of the population in sports and fitness. Recommend...
来源: 评论
A missing physical fitness test data classification method based on MLP
A missing physical fitness test data classification method b...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Peng Che Zhenlian Peng Buqing Cao Jianxun Liu Tieping Chen Runqing Fan School of Computer Science and Engineering Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Hunan University of Science and Technology Xiangtan China School of Physical Education Hunan University of Science and Technology Xiangtan China
In recent years, the physical health status of college students have been attached by the country and all universities. Much effort is spent every year to conduct physical health tests, generating a large amount of ph...
来源: 评论
MG6D: A Deep Fusion Approach for 6D Pose Estimation with Mamba and Graph Convolution Network
收藏 引用
IEEE Access 2025年 13卷 100433-100445页
作者: Zhu, Jiaqi Li, Bin Zhao, Xinhua Tianjin University of Technology School of Computer Science and Engineering Tianjin 300384 China Tianjin University of Technology Tianjin Key Laboratory for Advanced Mechatronic System Design and Intelligent Control School of Mechanical Engineering Tianjin 300384 China
Accurate and efficient 6D pose estimation is a fundamental technology in many industrial applications. While existing dense correspondence methods have shown progress, they face challenges in multimodal feature fusion... 详细信息
来源: 评论
A third-party platoon coordination service: Pricing under government subsidies
A third-party platoon coordination service: Pricing under go...
收藏 引用
作者: Bai, Ting Johansson, Alexander Li, Shaoyuan Johansson, Karl Henrik Mårtensson, Jonas School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden KTH Royal Institute of Technology Stockholm Sweden Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China Digital Futures Stockholm Sweden
This paper models a platooning system consisting of trucks and a third-party service provider (TPSP), which performs platoon coordination, distributes the platooning profit in platoons, and charges trucks in exchange ... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Yanlu Li Yufeng Xiao Yinyan Gong Ronglin Zhang Yingzi Huo Yanbing Wu Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论