咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 3,600 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,114 篇 工学
    • 4,785 篇 计算机科学与技术...
    • 3,974 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 720 篇 控制科学与工程
    • 689 篇 生物工程
    • 543 篇 电气工程
    • 419 篇 机械工程
    • 402 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 203 篇 安全科学与工程
    • 200 篇 仪器科学与技术
    • 198 篇 网络空间安全
    • 172 篇 建筑学
  • 2,795 篇 理学
    • 1,567 篇 数学
    • 758 篇 生物学
    • 615 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 221 篇 化学
  • 1,896 篇 管理学
    • 1,166 篇 管理科学与工程(可...
    • 799 篇 图书情报与档案管...
    • 515 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 321 篇 法学
    • 243 篇 社会学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 173 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 239 篇 software enginee...
  • 197 篇 deep learning
  • 196 篇 feature extracti...
  • 185 篇 computational mo...
  • 182 篇 machine learning
  • 162 篇 data mining
  • 149 篇 semantics
  • 145 篇 training
  • 136 篇 cloud computing
  • 130 篇 software
  • 127 篇 accuracy
  • 125 篇 internet of thin...
  • 121 篇 optimization
  • 119 篇 authentication
  • 116 篇 predictive model...
  • 107 篇 artificial intel...
  • 104 篇 security
  • 101 篇 educational inst...
  • 100 篇 servers

机构

  • 297 篇 college of compu...
  • 267 篇 school of comput...
  • 266 篇 school of inform...
  • 143 篇 school of comput...
  • 117 篇 state key labora...
  • 87 篇 school of softwa...
  • 84 篇 school of inform...
  • 55 篇 school of comput...
  • 52 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 42 篇 sri lanka instit...
  • 42 篇 shandong provinc...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of comput...

作者

  • 51 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 29 篇 susilo willy
  • 28 篇 huang min
  • 25 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 liu yang
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 21 篇 wang wei
  • 20 篇 lu dianjie
  • 20 篇 mahmood khalid

语言

  • 8,749 篇 英文
  • 494 篇 其他
  • 146 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9375 条 记 录,以下是4811-4820 订阅
排序:
The Application of PAD Teaching Method in computer Network Course
收藏 引用
IOP Conference Series: Earth and Environmental science 2021年 第1期693卷
作者: Lining Liu Yongsheng Zhang Penglong Zhang Wenqian Sun School of Information Science and Engineering Shandong Normal University Jinan 250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology
As a new teaching mode and method, PAD has been developed in recent years. This teaching mode has been applied in the teaching of universities, ordinary primary and secondary schools and vocational colleges. It has ac...
来源: 评论
Optimal approximations of available states and a triple uncertainty relation
收藏 引用
Physical Review A 2020年 第6期101卷 062106-062106页
作者: Xiao-Bin Liang Bo Li Liang Huang Biao-Liang Ye Shao-Ming Fei Shi-Xiang Huang School of Mathematics and Computer Science Shangrao Normal University Shangrao 334001 China Department of Computer and Software Engineering Wonkwang University Iksan 54538 Korea Quantum Information Research Center Shangrao Normal University Shangrao 334001 China School of Mathematical Sciences Capital Normal University Beijing 100048 China Max-Planck-Institute for Mathematics in the Sciences 04103 Leipzig Germany
We investigate the optimal convex approximation of the quantum state with respect to a set of available states. By isometric transformation, we have presented the general mathematical model and its solutions together ... 详细信息
来源: 评论
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing  2nd
Fault Tolerance Impact on Near Field Communication for Data ...
收藏 引用
2nd International Conference on Advanced Data and information engineering, DaEng 2015
作者: Noraziah, Ahmad Herawan, Tutut Rahman, Mohd Tarmizi Abd Abdullah, Zailani Mustafa, Balsam A. Fakharaldien, Mohammed Adam Ibrahim Faculty of Computer Systems and Software Engineering University Malaysia Pahang GambangPahang26300 Malaysia Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia School of Informatics & Applied Mathematics University Malaysia Terengganu Kuala Terengganu21030 Malaysia
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. Recently, due to rapid expansion of smart phone market and wireless communication env... 详细信息
来源: 评论
Requirements Dependency Extraction by Integrating Active Learning with Ontology-Based Retrieval
Requirements Dependency Extraction by Integrating Active Lea...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Gouri Deshpande Quim Motger Cristina Palomares Ikagarjot Kamra Katarzyna Biesialska Xavier Franch Guenther Ruhe Jason Ho dept. of Computer Science University of Calgary Calgary Canada dept. of Service and Information System Engineering (ESSI) Universitat Politècnica de Catalunya Barcelona Spain dept. of Electrical and Software Engineering University of Calgary Calgary Canada Blackline Safety. Inc Calgary Canada
Context: Incomplete or incorrect detection of requirement dependencies has proven to result in reduced release quality and substantial rework. Additionally, the extraction of dependencies is challenging since requirem... 详细信息
来源: 评论
Epilepsy Classification for Mining Deeper Relationships between EEG Channels based on GCN
Epilepsy Classification for Mining Deeper Relationships betw...
收藏 引用
computer Vision, Image and Deep Learning (CVIDL), International Conference on
作者: Xin Chen Yuanjie Zheng Yi Niu Chengiiang Li School of Information Science and Engineering Shandong Normal University Jinan China Key Lab of Intelligent Computing and Information Security Universities of Shandong Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Institute of Biomedical Sciences Jinan China Shandong University of Science and Technology Jinan China
Epilepsy is a brain disorder caused by abnormal discharges of neurons in brain. It is one of the most commonly studied disorders in neurology. The research of epilepsy electroencephalogram (EEG) has become a hot resea... 详细信息
来源: 评论
Feedforward neural network based on ensemble evolutionary algorithm with self-adaptive strategy and parameter for intrusion detection
收藏 引用
International Journal of Wireless and Mobile Computing 2019年 第2期17卷 202-211页
作者: Xue, Yu Tang, Tao Liu, Alex X. School of Computer and Software Nanjing University of Information Science and Technology Pukou Nanjing China Department of Computer Science and Engineering Michigan State University East Lansing United States
The applications of Wireless Sensor Networks (WSNs) have driven the development of many fields, and the information security is an important issue in the WSNs. Intrusion Detection System (IDS) is a kind of effective s... 详细信息
来源: 评论
Fine-grained image analysis with deep learning: A survey
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Xiu-Shen Song, Yi-Zhe Aodha, Oisin Mac Wu, Jianxin Peng, Yuxin Tang, Jinhui Yang, Jian Belongie, Serge PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China University of Surrey United Kingdom The University of Edinburgh United Kingdom The State Key Laboratory for Novel Software Technology Nanjing University China Peking University China Nanjing University of Science and Technology China The University of Copenhagen The Pioneer Centre for AI Denmark
Fine-grained image analysis (FGIA) is a longstanding and fundamental problem in computer vision and pattern recognition, and underpins a diverse set of real-world applications. The task of FGIA targets analyzing visua... 详细信息
来源: 评论
SDN-based routing mechanism for industrial wireless sensor networks  14
SDN-based routing mechanism for industrial wireless sensor n...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Cheng, Dandan Wang, Xingwei Zhang, Shuang Huang, Min College of Computer Science and Engineering China College of Software China College of Information Science and Engineering Northeastern University Shenyang China
With the development of industrial network, Industrial Wireless Sensor Networks (IWSNs) outperform traditional wired automation system in terms of flexibility, scalability, and efficiency, etc. And IWSNs have critical... 详细信息
来源: 评论
Fair Down to the Device: A GC-Aware Fair Scheduler for SSD
Fair Down to the Device: A GC-Aware Fair Scheduler for SSD
收藏 引用
IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
作者: Cheng Ji Lun Wang Qiao Li Congming Gao Liang Shi Chia-Lin Yang Chun Jason Xue Department of Computer Science City University of Hong Kong Department of Computer Science and Information Engineering National Taiwan University College of Computer Science Chongqing University School of Computer Science and Software Engineering East China Normal University
Solid-state drives (SSD) are the mainstream solutions for massive data storage today. For modern computer systems, fair resource assignment is a critical design consideration and has drawn great interests in recent ye... 详细信息
来源: 评论
Hierarchical Polygamy Inequality for Entanglement of Tsallis q-Entropy
收藏 引用
Communications in Theoretical Physics 2018年 第5期69卷 532-536页
作者: Yu Luo Yong-Ming Li College of Computer Science Shaanxi Normal UniversityXi'an 710062China Centre for Quantum Software and Information(UTS:Q|SI>) Faculty of Engineering and Information TechnologyUniversity of Technology SydneyAustralia
In this paper, we study the polygamy inequality of quantum entanglement in terms of Tsallis *** first give a lower bound of Tsallis q-entropy entanglement of assistance(TOA) in the 2  d systems. The relationships be... 详细信息
来源: 评论