咨询与建议

限定检索结果

文献类型

  • 32,262 篇 会议
  • 24,470 篇 期刊文献
  • 436 册 图书

馆藏范围

  • 57,168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,870 篇 工学
    • 20,672 篇 计算机科学与技术...
    • 16,647 篇 软件工程
    • 6,708 篇 信息与通信工程
    • 5,498 篇 电气工程
    • 5,356 篇 电子科学与技术(可...
    • 4,469 篇 控制科学与工程
    • 3,295 篇 生物工程
    • 3,193 篇 光学工程
    • 2,475 篇 生物医学工程(可授...
    • 2,392 篇 材料科学与工程(可...
    • 2,308 篇 机械工程
    • 2,254 篇 化学工程与技术
    • 1,852 篇 仪器科学与技术
    • 1,548 篇 动力工程及工程热...
    • 942 篇 力学(可授工学、理...
    • 889 篇 安全科学与工程
    • 883 篇 交通运输工程
  • 21,166 篇 理学
    • 9,109 篇 数学
    • 8,912 篇 物理学
    • 3,865 篇 生物学
    • 2,865 篇 统计学(可授理学、...
    • 2,509 篇 化学
    • 2,050 篇 系统科学
  • 7,723 篇 管理学
    • 4,831 篇 管理科学与工程(可...
    • 3,133 篇 图书情报与档案管...
    • 2,135 篇 工商管理
  • 2,267 篇 医学
    • 1,907 篇 临床医学
    • 1,568 篇 基础医学(可授医学...
    • 1,004 篇 药学(可授医学、理...
  • 1,121 篇 法学
    • 908 篇 社会学
  • 747 篇 经济学
  • 554 篇 教育学
  • 536 篇 农学
  • 193 篇 文学
  • 133 篇 军事学
  • 97 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,311 篇 computer science
  • 1,660 篇 laboratories
  • 1,177 篇 software enginee...
  • 973 篇 computational mo...
  • 681 篇 feature extracti...
  • 666 篇 machine learning
  • 662 篇 application soft...
  • 626 篇 deep learning
  • 599 篇 training
  • 578 篇 testing
  • 559 篇 computer archite...
  • 534 篇 semantics
  • 530 篇 accuracy
  • 519 篇 data mining
  • 515 篇 costs
  • 475 篇 artificial intel...
  • 435 篇 software
  • 431 篇 bandwidth
  • 416 篇 optimization
  • 391 篇 algorithm design...

机构

  • 1,105 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 985 篇 physikalisches i...
  • 971 篇 oliver lodge lab...
  • 832 篇 university of ch...
  • 644 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 607 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 589 篇 infn sezione di ...
  • 563 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 525 篇 department of ph...
  • 524 篇 iccub universita...
  • 520 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 507 篇 stfc rutherford ...
  • 507 篇 nikhef national ...
  • 500 篇 physik-institut ...

作者

  • 276 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 239 篇 bellee v.
  • 237 篇 blake t.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 231 篇 g. spigo
  • 231 篇 brundu d.
  • 229 篇 s. chen
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 betancourt c.
  • 223 篇 bencivenni g.
  • 222 篇 borsato m.
  • 221 篇 boettcher t.

语言

  • 51,317 篇 英文
  • 5,163 篇 其他
  • 714 篇 中文
  • 20 篇 德文
  • 11 篇 法文
  • 7 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Computer Science Department"
57168 条 记 录,以下是1051-1060 订阅
排序:
Local-Tetra-Patterns for Face Recognition Encoded on Spatial Pyramid Matching
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5039-5058页
作者: Khuram Nawaz Khayam Zahid Mehmood Hassan Nazeer Chaudhry Muhammad Usman Ashraf Usman Tariq Mohammed Nawaf Altouri Khalid Alsubhi Department of Software Engineering University of Engineering and TechnologyTaxila47050Pakistan Department of Computer Engineering University of Engineering and TechnologyTaxila47050Pakistan Department of Electronics Information and BioengineeringPolitecnico di MilanoMilano20122Italy Department of Computer Science University of Management and TechnologySialkotPakistan College of Computer Engineering and Science Prince Sattam bin Abdulaziz UniversityAlkharj16278Saudi Arabia Department of Computer Science Imam Mohammad Ibn Saud Islamic UniversityRiyadh13318Saudi Arabia Department of Computer Science King Abdulaziz UniversityJeddah21589Saudi Arabia
Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and *** a single solution to solve all these problems at a time is a ch... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning  27
Video2Reward: Generating Reward Function from Videos for Leg...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论
BiCSA-PUL: binary crow search algorithm for enhancing positive and unlabeled learning
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1729-1743页
作者: Azizi, Nabil Ben Othmane, Mohamed Hamouma, Moumen Siam, Abderrahim Haouassi, Hichem Ledmi, Makhlouf Hamdi-Cherif, Aboubekeur Department of Computer Science Mostefa Ben Boulaid University Batna 2 Batna 05001 Algeria Department of Computer Science Abbes Laghrour University Khenchela 40004 Algeria Knowledge Engineering and IT Security Laboratory (ICOSI) Abbes Laghrour University Khenchela 40004 Algeria Department of Computer Science Ferhat Abbas University of Setif 1 Setif 19137 Algeria
This paper presents a novel metaheuristic binary crow search algorithm (CSA) designed for positive-unlabeled (PU) learning, a paradigm where only positive and unlabeled data are available, with applications in many di... 详细信息
来源: 评论
Robust graph‐based localization for industrial Internet of things in the presence of flipping ambiguities
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1140-1149页
作者: Mian Imtiaz ul Haq Ruhul Amin Khalil Muhannad Almutiry Ahmad Sawalmeh Tanveer Ahmad Nasir Saeed Faculty of Electrical Engineering Swedish College of Engineering and TechnologyWah CanttPakistan Department of Electrical Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawarPakistan Department of Electrical Engineering Remote Sensing UnitNorthern Border UniversityArarSaudi Arabia Data Science and Artificial Intelligence Department‐College of Science and Information Technology Irbid National UniversityIrbadJordan Innovation Education and Research Center for On‐Device AI Software(Bk21) Department of Computer Science and EngineeringChungnam National UniversityDaejeonRepublic of Korea Department of Electrical and Communication Engineering United Arab Emirates University(UAEU)Al AinUnited Arab Emirates
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ... 详细信息
来源: 评论
Person Re-Identification Based on Instance Segmentation and Pose Estimation  6
Person Re-Identification Based on Instance Segmentation and ...
收藏 引用
6th IEEE International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2023
作者: Zhou, Yao Qin, Yusong Wang, Song Huang, Zengxi Zhang, Dazhi Xihua University School of Computer Science and Software Engineering Chengdu China Xihua University School of Computer and Software Engineering and the Sichuan Xihua Jiaotong Forensics Center Chengdu China Sichuan Police College Criminal Science and Technology Department Luzhou China
Person Re-Identification (ReID) is a crucial task in computer vision that aims to match persons captured from non-overlapping camera views. In this paper, to alleviate the impacts of background and occlusion, we propo... 详细信息
来源: 评论
HPC Application Parameter Autotuning on Edge Devices: A Bandit Learning Approach  31
HPC Application Parameter Autotuning on Edge Devices: A Band...
收藏 引用
31st Annual IEEE International Conference on High Performance Computing, Data, and Analytics, HiPC 2024
作者: Hossain, Abrar Badawy, Abdel-Hameed A. Islam, Mohammad A. Patki, Tapasya Ahmed, Kishwar Department of Electrical Engineering and Computer Science The University of Toledo United States Department of Electrical and Computer Engineering New Mexico State University United States Department of Computer Science and Engineering The University of Texas Arlington United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory United States
The growing necessity for enhanced processing capabilities in edge devices with limited resources has led us to develop effective methods for improving high-performance computing (HPC) applications. In this paper, we ... 详细信息
来源: 评论
Ciphertext-only fault analysis of GIFT lightweight cryptosystem
收藏 引用
science China(Information sciences) 2022年 第3期65卷 263-265页
作者: Wei LI Shan CAO Dawu GU Jiayao LI Tianpei CAI Menglin WANG Li SUN Zhiqiang LIU Ya LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Computing and Systems Shanghai Jiao Tong University Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t... 详细信息
来源: 评论
CA-FedRC: Codebook Adaptation Via Federated Reservoir Computing in 5G NR
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第6期74卷 9995-9999页
作者: Ye, Ziqiang Liao, Sikai Gao, Yulan Fang, Shu Xiao, Yue Xiao, Ming Zammit, Saviour University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China KTH Royal Institute of Technology Division of Information Science and Engineering Stockholm10044 Sweden University of Malta Department of Communications and Computer Engineering Msida2080 Malta
With the burgeon deployment of the fifth-generation new radio (5 G NR) networks, the codebook plays a crucial role in enabling the base station (BS) to acquire the channel state information (CSI). Different 5 G NR cod... 详细信息
来源: 评论
EMARec: a sequential recommendation with exponential moving average
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12917-12933页
作者: Chen, Rui Wang, Zonglin Tang, Cundong Zhang, Jianwei Li, Pu Kong, Xiangjie Huang, Min College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450001 China Henan Joint International Research Laboratory of Computer Animation Implementation Technologies Zhengzhou450001 China School of Information Science and Technology Northwest University Xi’an710127 China Faculty of Information and Engineering Xuchang Vocational Technical College Xuchang461000 China College of Computer Science and Technology Zhejiang University of Technology Hangzhou310023 China
Capturing dynamic preference features from user historical behavioral data is widely applied to improve the accuracy of recommendations in sequential recommendation tasks. However, existing deep neural network-based s... 详细信息
来源: 评论