咨询与建议

限定检索结果

文献类型

  • 30,879 篇 会议
  • 23,811 篇 期刊文献
  • 429 册 图书

馆藏范围

  • 55,119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,246 篇 工学
    • 19,676 篇 计算机科学与技术...
    • 15,935 篇 软件工程
    • 6,511 篇 信息与通信工程
    • 5,296 篇 电气工程
    • 5,148 篇 电子科学与技术(可...
    • 4,268 篇 控制科学与工程
    • 3,217 篇 生物工程
    • 3,216 篇 光学工程
    • 2,432 篇 生物医学工程(可授...
    • 2,230 篇 机械工程
    • 2,215 篇 化学工程与技术
    • 2,170 篇 材料科学与工程(可...
    • 1,813 篇 仪器科学与技术
    • 1,522 篇 动力工程及工程热...
    • 931 篇 力学(可授工学、理...
    • 868 篇 交通运输工程
    • 855 篇 安全科学与工程
  • 20,646 篇 理学
    • 8,767 篇 物理学
    • 8,753 篇 数学
    • 3,793 篇 生物学
    • 2,750 篇 统计学(可授理学、...
    • 2,464 篇 化学
    • 1,964 篇 系统科学
  • 7,423 篇 管理学
    • 4,648 篇 管理科学与工程(可...
    • 3,005 篇 图书情报与档案管...
    • 2,061 篇 工商管理
  • 2,236 篇 医学
    • 1,880 篇 临床医学
    • 1,541 篇 基础医学(可授医学...
    • 985 篇 药学(可授医学、理...
  • 1,084 篇 法学
    • 879 篇 社会学
  • 724 篇 经济学
  • 549 篇 教育学
  • 527 篇 农学
  • 189 篇 文学
  • 130 篇 军事学
  • 93 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,172 篇 computer science
  • 1,544 篇 laboratories
  • 1,131 篇 software enginee...
  • 924 篇 computational mo...
  • 651 篇 feature extracti...
  • 649 篇 machine learning
  • 614 篇 application soft...
  • 604 篇 deep learning
  • 595 篇 training
  • 532 篇 computer archite...
  • 524 篇 testing
  • 508 篇 semantics
  • 493 篇 accuracy
  • 481 篇 data mining
  • 470 篇 costs
  • 463 篇 artificial intel...
  • 429 篇 bandwidth
  • 399 篇 optimization
  • 366 篇 software
  • 358 篇 predictive model...

机构

  • 1,102 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 795 篇 university of ch...
  • 638 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 593 篇 fakultät physik ...
  • 589 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 524 篇 iccub universita...
  • 524 篇 department of ph...
  • 517 篇 h.h. wills physi...
  • 516 篇 imperial college...
  • 514 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 506 篇 physik-institut ...

作者

  • 267 篇 barter w.
  • 260 篇 a. gomes
  • 252 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 232 篇 g. spigo
  • 231 篇 blake t.
  • 231 篇 s. chen
  • 227 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 f. siegert
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.

语言

  • 52,628 篇 英文
  • 1,809 篇 其他
  • 683 篇 中文
  • 13 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Engineering"
55119 条 记 录,以下是261-270 订阅
排序:
3DSN-Net: A 3-D Scale-Aware convNet With Nonlocal Context Guidance for Kidney and Tumor Segmentation From CT Volumes
收藏 引用
IEEE Transactions on Cybernetics 2024年 第5期54卷 3299-3312页
作者: Wu, Huisi Zhang, Baiming Li, Zhuoying Qin, Jing Lee, Tong-Yee Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The Hong Kong Polytechnic University Centre for Smart Health School of Nursing Hong Kong Hong Kong National Cheng-Kung University Department of Computer Science and Information Engineering Tainan70101 Taiwan
Automatic kidney and tumor segmentation from CT volumes is a critical prerequisite/tool for diagnosis and surgical treatment (such as partial nephrectomy). However, it remains a particularly challenging issue as kidne... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
SFPL: Improving CRS via Prompt Learning based Semantic Fusion Module  4
SFPL: Improving CRS via Prompt Learning based Semantic Fusio...
收藏 引用
4th IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Song, Ao Lei, Zhou Chen, Shengbo Shanghai University College of Computer Engineering and Science Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the popularity of the Internet and the massive increase of content production, users are faced with massive information and content, and it is often difficult to accurately and efficiently find the content that m... 详细信息
来源: 评论
A dynamic and resource sharing virtual network mapping algorithm
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1101-1112页
作者: Xiancui Xiao Xiangwei Zheng Ji Bian Cun Ji Xinchun Cui School of Information Science and Engineering Shandong Normal UniversityJinan250014China School of Information Engineering Shandong Management UniversityJinan250358China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014China School of Computer Science and Technology Qufu Normal UniversityRizhao276800China
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind... 详细信息
来源: 评论
Boosting Write Performance of KV Stores: An NVM -Enabled Storage Collaboration Approach  40
Boosting Write Performance of KV Stores: An NVM -Enabled Sto...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi He, Jiajian Sun, Kaoyi Dong, Yunhao Chen, Jiaxian Ma, Chenlin Zhou, Amelie Chi Mao, Rui College of Computer Science and Software Engineering Shenzhen University China Hong Kong Baptist University Department of Computer Science Hong Kong
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr... 详细信息
来源: 评论
Speed Harmonic based Saturation Free Inductance Modeling and Estimation of Interior PMSM Using Measurements Under One Load Condition
收藏 引用
CES Transactions on Electrical Machines and Systems 2025年 第1期9卷 91-99页
作者: Guodong Feng Yuting Lu Zhe Tong Beichen Ding Guishan Yan Chunyan Lai the School of Intelligent Systems Engineering Sun Yat-sen UniversityShenzhenChina the School of Advanced Manufacturing Sun Yat-sen University the Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai) China the Department of Electrical and Computer Engineering Concordia UniversityQCCanada
For permanent magnet synchronous machines(PMSMs),accurate inductance is critical for control design and condition *** to magnetic saturation,existing methods require nonlinear saturation model and measurements from mu... 详细信息
来源: 评论
LeaderKV: Improving Read Performance of KV Stores via Learned Index and Decoupled KV Table  40
LeaderKV: Improving Read Performance of KV Stores via Learne...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi Yuan, Jianan Wu, Shangyu Liu, Huan Chen, Jiaxian Ma, Chenlin Qin, Jianbin Shenzhen University College of Computer Science and Software Engineering China City University of Hong Kong Department of Computer Science Hong Kong
Log-structured merge-tree (LSM-tree) is a storage architecture widely used in key-value (KV) stores. To enhance the read efficiency of LSM-tree, recent works utilize the learned index to learn the mapping between keys... 详细信息
来源: 评论
A model to measure the spread power of rumors
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13787-13811页
作者: Jahanbakhsh-Nagadeh, Zoleikha Feizi-Derakhshi, Mohammad-Reza Ramezani, Majid Akan, Taymaz Asgari-Chenaghlu, Meysam Nikzad-Khasmakhi, Narjes Feizi-Derakhshi, Ali-Reza Ranjbar-Khadivi, Mehrdad Zafarani-Moattar, Elnaz Balafar, Mohammad-Ali Computerized Intelligence Systems Laboratory Department of Computer Engineering University of Tabriz Tabriz Iran Department of Computer Engineering Naghadeh Branch Islamic Azad University Naghadeh Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran Department of Software Engineering Istanbul Topkapi University Istanbul Turkey Clinical Informatics Louisiana State University Health Sciences Center Shreveport Shreveport United States Department of Computer Engineering Shabestar Branch Islamic Azad University Shabestar Iran Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering University of Tabriz Tabriz Iran
With technologies that have democratized the production and reproduction of information, a significant portion of daily interacted posts in social media has been infected by rumors. Despite the extensive research on r... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论