咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是4721-4730 订阅
排序:
Text Tiling Text Segmentation Based on Hierarchical Dirichlet Process Model  4
Text Tiling Text Segmentation Based on Hierarchical Dirichle...
收藏 引用
2019 4th International Conference on Intelligent Computing and Signal Processing, ICSP 2019
作者: Ye, Wei Gong, Xiaogang Zhang, Quan Ju, Xiaoming State Grid Zhejiang Electric Power Company Information and Communication Branch Hang Zhou310007 China East China Normal University School Computer Science and Software Engineering Shanghai200062 China
Text segmentation plays an extremely important role in many areas such as abstract extraction and information retrieval. Topic model is one of important methods in text segmentation. However, the current methods based... 详细信息
来源: 评论
Context aware 3d unet for brain tumor segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Ahmad, Parvez Qamar, Saqib Shen, Linlin Saeed, Adnan National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China School of Hydropower and Information Technology Huazhong University of Science and Technology Wuhan430074 China
Deep convolutional neural network (CNN) achieves remarkable performance for medical image analysis. UNet is the primary source in the performance of 3D CNN architectures for medical imaging tasks, including brain tumo... 详细信息
来源: 评论
A grouping approach based on non-uniform binary grid partitioning for crowd evacuation simulation
A grouping approach based on non-uniform binary grid partiti...
收藏 引用
作者: Liu, Hong Li, Yan Li, Wenhao Lu, Dianjie Zhang, Guijuan School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China University of South Australia Adelaide Australia
Small social groups based on kinship or friendships are ubiquitous in human crowds. Therefore, the effect of social groups on crowd evacuations and that of crowd evacuations on social groups must be investigated. To s... 详细信息
来源: 评论
Location Privacy Protection Scheme Based on Location Services  2019
Location Privacy Protection Scheme Based on Location Service...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Chen Yang Wei Yan School of Software Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location p... 详细信息
来源: 评论
Taming Self-Supervised Learning for Presentation Attack Detection: De-Folding and De-Mixing
arXiv
收藏 引用
arXiv 2021年
作者: Kong, Zhe Zhang, Wentian Liu, Feng Luo, Wenhan Liu, Haozhe Shen, Linlin Ramachandra, Raghavendra College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Guangdong Shenzhen518107 China Norwegian University of Science and Technology Gjøvik2818 Norway
Biometric systems are vulnerable to Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both... 详细信息
来源: 评论
Architecture information communication in two OSS projects: The why, who, when, and what
arXiv
收藏 引用
arXiv 2021年
作者: Bi, Tingting Ding, Wei Liang, Peng Tang, Antony School of Computer Science Wuhan University Wuhan430072 China Faculty of Information and Technology Monash University MelbourneVIC3166 Australia Faculty of Science Engineering and Technology Swinburne University of Technology MelbourneVIC3122 Australia Software and Services Research Group Vrije Universiteit Amsterdam Amsterdam1101 Netherlands Key Laboratory of Earthquake Geodesy Institute of Seismology China Earthquake Administration China
Architecture information is vital for Open Source software (OSS) development, and mailing list is one of the widely used channels for developers to share and communicate architecture information. This work investigate... 详细信息
来源: 评论
RF-WTI: Wood Types Identification based on Commodity RFID Devices
RF-WTI: Wood Types Identification based on Commodity RFID De...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xiangmao Chang Xianghui Zhang Muhammad Waqas Isa Weiwei Wu Yan Li Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Computer Science and Engeneering Southeast University Nanjing China Information and Engineering Nanjing University of Finance and Economics Nanjing China
The identification of wood is an important problem both in industrial manufacturing and in people's daily life. Traditional methods based on experts are laborious. New technologies based on computer visions rely o... 详细信息
来源: 评论
Towards long-tailed, multi-label disease classification from chest X-ray: Overview of the CXR-LT challenge
arXiv
收藏 引用
arXiv 2023年
作者: Holste, Gregory Zhou, Yiliang Wang, Song Jaiswal, Ajay Lin, Mingquan Zhuge, Sherry Yang, Yuzhe Kim, Dongkyun Nguyen-Mau, Trong-Hieu Tran, Minh-Triet Jeong, Jaehyup Park, Wongi Ryu, Jongbin Hong, Feng Verma, Arsh Yamagishi, Yosuke Kim, Changhyun Seo, Hyeryeong Kang, Myungjoo Celi, Leo Anthony Lu, Zhiyong Summers, Ronald M. Shih, George Wang, Zhangyang Peng, Yifan Department of Electrical and Computer Engineering The University of Texas at Austin AustinTX78712 United States Department of Population Health Sciences Weill Cornell Medicine New YorkNY10065 United States School of Information Systems Carnegie Mellon University PittsburghPA15213 United States Department of Electrical Engineering and Computer Science Massachussetts Institute of Technology CambridgeMA02139 United States School of Computer Science Carnegie Mellon University PittsburghPA15213 United States University of Science VNU-HCM Ho Chi Minh City70000 Viet Nam KT Research & Development Center KT Corporation Seoul06763 Korea Republic of Department of Software and Computer Engineering Ajou University Suwon16499 Korea Republic of Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China Wadhwani Institute for Artificial Intelligence Mumbai400079 India Division of Radiology and Biomedical Engineering Graduate School of Medicine The University of Tokyo Tokyo113-0033 Japan BioMedical AI Team AIX Future R&D Center SK Telecom Seoul04539 Korea Republic of Seoul National University Seoul02504 Korea Republic of Department of Mathematical Sciences Seoul National University Seoul02504 Korea Republic of Laboratory for Computational Physiology Massachusetts Institute of Technology CambridgeMA02139 United States Division of Pulmonary Critical Care and Sleep Medicine Beth Israel Deaconess Medical Center BostonMA02215 United States Department of Biostatistics Harvard T.H. Chan School of Public Health BostonMA02115 United States National Center for Biotechnology Information National Library of Medicine BethesdaMD20894 United States Clinical Center National Institutes of Health BethesdaMD20892 United States Department of Radiology Weill Cornell Medicine New YorkNY10065 United States
Many real-world image recognition problems, such as diagnostic medical imaging exams, are "long-tailed" – there are a few common findings followed by many more relatively rare conditions. In chest radiograp... 详细信息
来源: 评论
Reducing Delay Penalty of Multiple Concurrent software Projects based on Overtime Planning
Reducing Delay Penalty of Multiple Concurrent Software Proje...
收藏 引用
IEEE/ACM International Conference on Automated software engineering - Workshops (ASE Workshops)
作者: Wei Zhang Yun Yang Xiao Liu School of Computer Science and Technology School of Software Anhui University East China University of Technology Hefei China Nanchang China School of Software and Electrical Engineering School of Computer Science and Technology Swinburne University of Technology Anhui University Melbourne Australia Hefei China School of Information Technology Deakin University Geelong Australia
For software projects, significant delays can result in heavy penalty which may end up with project costs exceeding their budgets. As a consequence, employees, i.e., software developers, are often requested to work ov... 详细信息
来源: 评论
Feature Location Benchmark for Decomposing and Reusing Android Apps
arXiv
收藏 引用
arXiv 2020年
作者: Tang, Yutian Zhou, Hao Xu, Zhou Luo, Xiapu Cai, Yan Zhang, Tao Department of Computing Hong Kong Polytechnic University Hong Kong School of Big Data and Software Engineering Chongqing University China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Faculty of Information Technology Macau University of Science and Technology China
software reuse enables developers to reuse architecture, programs and other software artifacts. Realizing a systematical reuse in software brings a large amount of benefits for stakeholders, including lower maintenanc... 详细信息
来源: 评论