咨询与建议

限定检索结果

文献类型

  • 32,372 篇 会议
  • 24,624 篇 期刊文献
  • 436 册 图书

馆藏范围

  • 57,432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,802 篇 工学
    • 20,876 篇 计算机科学与技术...
    • 16,758 篇 软件工程
    • 6,847 篇 信息与通信工程
    • 5,502 篇 电气工程
    • 5,289 篇 电子科学与技术(可...
    • 4,594 篇 控制科学与工程
    • 3,309 篇 生物工程
    • 3,287 篇 光学工程
    • 2,488 篇 生物医学工程(可授...
    • 2,344 篇 机械工程
    • 2,268 篇 化学工程与技术
    • 2,235 篇 材料科学与工程(可...
    • 1,879 篇 仪器科学与技术
    • 1,569 篇 动力工程及工程热...
    • 955 篇 力学(可授工学、理...
    • 920 篇 安全科学与工程
    • 915 篇 交通运输工程
  • 21,316 篇 理学
    • 9,112 篇 数学
    • 8,973 篇 物理学
    • 3,883 篇 生物学
    • 2,829 篇 统计学(可授理学、...
    • 2,540 篇 化学
    • 2,053 篇 系统科学
  • 7,815 篇 管理学
    • 4,894 篇 管理科学与工程(可...
    • 3,175 篇 图书情报与档案管...
    • 2,150 篇 工商管理
  • 2,315 篇 医学
    • 1,936 篇 临床医学
    • 1,580 篇 基础医学(可授医学...
    • 1,005 篇 药学(可授医学、理...
  • 1,140 篇 法学
    • 925 篇 社会学
  • 757 篇 经济学
  • 564 篇 教育学
  • 544 篇 农学
  • 196 篇 文学
  • 133 篇 军事学
  • 97 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,310 篇 computer science
  • 1,659 篇 laboratories
  • 1,182 篇 software enginee...
  • 978 篇 computational mo...
  • 696 篇 feature extracti...
  • 681 篇 machine learning
  • 656 篇 application soft...
  • 646 篇 deep learning
  • 607 篇 training
  • 575 篇 testing
  • 555 篇 computer archite...
  • 538 篇 accuracy
  • 536 篇 semantics
  • 523 篇 data mining
  • 512 篇 costs
  • 477 篇 artificial intel...
  • 436 篇 software
  • 433 篇 bandwidth
  • 426 篇 optimization
  • 391 篇 algorithm design...

机构

  • 1,105 篇 cavendish labora...
  • 1,031 篇 department of ph...
  • 986 篇 physikalisches i...
  • 971 篇 oliver lodge lab...
  • 833 篇 university of ch...
  • 644 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 607 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 587 篇 infn sezione di ...
  • 563 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 525 篇 department of ph...
  • 524 篇 iccub universita...
  • 520 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 507 篇 stfc rutherford ...
  • 507 篇 nikhef national ...
  • 500 篇 physik-institut ...

作者

  • 276 篇 barter w.
  • 258 篇 a. gomes
  • 245 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 239 篇 bellee v.
  • 237 篇 blake t.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 231 篇 g. spigo
  • 231 篇 brundu d.
  • 229 篇 s. chen
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 betancourt c.
  • 223 篇 bencivenni g.
  • 222 篇 borsato m.
  • 221 篇 boettcher t.

语言

  • 49,855 篇 英文
  • 6,895 篇 其他
  • 727 篇 中文
  • 25 篇 德文
  • 16 篇 法文
  • 7 篇 日文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 芬兰文
检索条件"机构=Software Engineering Laboratory Computer Science Department"
57432 条 记 录,以下是1071-1080 订阅
排序:
Phase Re-Service in Reinforcement Learning Traffic Signal Control  27
Phase Re-Service in Reinforcement Learning Traffic Signal Co...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Zhang, Zhiyao Gunter, George Quinones-Grueiro, Marcos Zhang, Yuhang Barbour, William Biswas, Gautam Work, Daniel Institute for Software Integrated Systems Vanderbilt University Department of Civil and Environmental Engineering United States Institute for Software Integrated Systems Vanderbilt University United States Institute for Software Integrated Systems Vanderbilt University Department of Computer Science United States
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen... 详细信息
来源: 评论
P3DC:Reducing DRAM Cache Hit Latency by Hybrid Mappings
收藏 引用
Journal of computer science & Technology 2024年 第6期39卷 1341-1360页
作者: Ye Chi Ren-Tong Guo Xiao-Fei Liao Hai-Kun Liu Jianhui Yue National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Laboratory Wuhan 430074China Cluster and Grid Computing Laboratory Wuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Big Data and Internet Shenzhen Technology UniversityShenzhen 518118China Department of Computer Science Michigan Technological UniversityHoughton 49931-1295U.S.A.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca... 详细信息
来源: 评论
Online Self-distillation and Self-modeling for 3D Brain Tumor Segmentation
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4290-4302页
作者: Pang, Yan Li, Yunhao Huang, Teng Liang, Jiaming Wang, Zhen Dong, Changyu Kuang, Dongyang Hu, Ying Chen, Hao Lei, Tim Wang, Qiong The Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China The School of Artificial Intelligence Guangzhou University China The Zhejiang Lab Hangzhou China Sun Yat-sen University China The Department of Computer Science and Engineering The Department of Chemical and Biological Engineering Hong Kong University of Science and Technology China The Department of Electrical Engineering University of Colorado Denver United States
In the specialized domain of brain tumor segmentation, supervised segmentation approaches are hindered by the limited availability of high-quality labeled data, a condition arising from data privacy concerns, signific... 详细信息
来源: 评论
Counterfactual discriminative micro-expression recognition
收藏 引用
Visual Intelligence 2024年 第1期2卷 350-359页
作者: Yong Li Menglin Liu Lingjie Lao Yuanzhi Wang Zhen Cui Department of Computer Science City University of Hong KongHong Kong999077China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of EducationSchool of Computer Science and EngineeringNanjing University of Science and TechnologyNanjing210094China
Micro-expressions are spontaneous,rapid and subtle facial movements that can hardly be suppressed or ***-expression recognition(MER)is one of the most challenging topics in affective *** aims to recognize subtle facia... 详细信息
来源: 评论
Recoverable Facial Identity Protection via Adaptive Makeup Transfer Adversarial Attacks  39
Recoverable Facial Identity Protection via Adaptive Makeup T...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Xiyao Ma, Junxing Wang, Xinda Lin, Qianyu Zhang, Jian Schaefer, Gerald Turkay, Cagatay Fang, Hui School of Computer Science and Engineering Central South University China School of Software and Microelectronics Peking University China Department of Computer Science Loughborough University United Kingdom Centre for Interdisciplinary Methodologies University of Warwick United Kingdom
Unauthorised face recognition (FR) systems have posed significant threats to digital identity and privacy protection. To alleviate the risk of compromised identities, recent makeup transfer-based attack methods embed ... 详细信息
来源: 评论
Dynamics-incorporated Modeling Framework for Stability Constrained Scheduling under High-penetration of Renewable Energy
收藏 引用
IEEE Transactions on Sustainable Energy 2025年 第3期16卷 1673-1685页
作者: Wang, Jinning Li, Fangxing Fang, Xin Cui, Hantao She, Buxin Shuai, Hang Zhang, Qiwei Tomsovic, Kevin University of Tennessee Department of Electrical Engineering and Computer Science KnoxvilleTN37996 United States Mississippi State University Department of Electrical and Computer Engineering StarkvilleMS39762 United States NC State University Department of Electrical and Computer Engineering RaleighNC27606 United States Pacific Northwest National Laboratory RichlandWA99352 United States Johns Hopkins University Department of Environmental Health and Eng. BaltimoreMD21205 United States
In this paper, a modularized modeling framework is designed to enable a dynamics-incorporated power system scheduling under high-penetration of renewable energy. This unique framework incorporates an adapted hybrid sy... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
Student Perceptions of Authentic Learning to Learn White-box Testing  2024
Student Perceptions of Authentic Learning to Learn White-box...
收藏 引用
55th ACM Technical Symposium on computer science Education, SIGCSE 2024
作者: Rahman, Akond Zhang, Yue Wu, Fan Shahriar, Hossain Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Computer Science Tuskegee University TuskegeeAL United States Center for Cybersecurity University of West Florida PensacolaFL United States
The pivotal role of white-box testing with respect to software quality assurance, necessitates dissemination of education materials related to white-box testing in the course curriculum. In this poster, we describe ou... 详细信息
来源: 评论
Blockchain-Based Forensic Investigation Metamodel (BBFIM) for Investigating IoT Cybercrimes  4
Blockchain-Based Forensic Investigation Metamodel (BBFIM) fo...
收藏 引用
4th International Conference on Computing and Information Technology, ICCIT 2025
作者: Alotaibe, Daifallah Zaid College of Computer Science and Engineering Department of Software Engineering University of Hafr Al Batin Hafr Al Batin Saudi Arabia
As smart devices are rapidly being developed, and people trust data transfer mechanisms such as Wi-Fi and the way they use them, as well as the fact that they rely heavily on data transfer mechanics, there has been an... 详细信息
来源: 评论
Computational Approaches for Traditional Chinese Painting: From the “Six Principles of Painting” Perspective
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 269-285页
作者: 张玮 张建伟 黄锦畦 王懿芳 封颖超杰 王璐玮 陈为 State Key Laboratory of CAD&CG Zhejiang UniversityHangzhou 310058China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong 999077China Kellogg School of Management Northwestern UniversityEvanston 60208U.S.A Laboratory of Art and Archaeology Image Zhejiang UniversityHangzhou 310058China
Traditional Chinese painting(TCP)is an invaluable cultural heritage resource and a unique visual art *** recent years,there has been a growing emphasis on the digitalization of TCP for cultural preservation and *** re... 详细信息
来源: 评论