咨询与建议

限定检索结果

文献类型

  • 21,069 篇 会议
  • 10,063 篇 期刊文献
  • 238 册 图书
  • 6 篇 专利
  • 1 篇 学位论文

馆藏范围

  • 31,377 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 19,615 篇 工学
    • 14,693 篇 计算机科学与技术...
    • 12,241 篇 软件工程
    • 3,990 篇 信息与通信工程
    • 2,588 篇 控制科学与工程
    • 2,019 篇 生物工程
    • 1,817 篇 电气工程
    • 1,478 篇 机械工程
    • 1,463 篇 电子科学与技术(可...
    • 1,207 篇 生物医学工程(可授...
    • 1,073 篇 光学工程
    • 964 篇 化学工程与技术
    • 779 篇 仪器科学与技术
    • 763 篇 动力工程及工程热...
    • 750 篇 安全科学与工程
    • 640 篇 交通运输工程
    • 637 篇 材料科学与工程(可...
    • 574 篇 建筑学
  • 9,244 篇 理学
    • 5,130 篇 数学
    • 2,288 篇 物理学
    • 2,195 篇 生物学
    • 1,505 篇 统计学(可授理学、...
    • 1,017 篇 系统科学
    • 885 篇 化学
  • 5,996 篇 管理学
    • 3,818 篇 管理科学与工程(可...
    • 2,488 篇 图书情报与档案管...
    • 1,657 篇 工商管理
  • 1,117 篇 医学
    • 974 篇 临床医学
    • 851 篇 基础医学(可授医学...
  • 871 篇 法学
    • 690 篇 社会学
  • 639 篇 经济学
    • 637 篇 应用经济学
  • 551 篇 教育学
  • 295 篇 农学
  • 93 篇 文学
  • 93 篇 军事学
  • 64 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 1,006 篇 software enginee...
  • 641 篇 feature extracti...
  • 622 篇 training
  • 609 篇 deep learning
  • 559 篇 computational mo...
  • 522 篇 software
  • 512 篇 computer science
  • 443 篇 accuracy
  • 437 篇 semantics
  • 389 篇 machine learning
  • 386 篇 data mining
  • 319 篇 internet of thin...
  • 309 篇 computer archite...
  • 289 篇 data models
  • 285 篇 application soft...
  • 285 篇 predictive model...
  • 274 篇 conferences
  • 265 篇 cloud computing
  • 260 篇 support vector m...
  • 251 篇 optimization

机构

  • 754 篇 school of inform...
  • 498 篇 state key labora...
  • 469 篇 school of softwa...
  • 452 篇 college of compu...
  • 342 篇 school of softwa...
  • 220 篇 school of comput...
  • 219 篇 school of softwa...
  • 153 篇 school of comput...
  • 144 篇 university of el...
  • 140 篇 school of softwa...
  • 102 篇 school of comput...
  • 99 篇 school of comput...
  • 90 篇 school of softwa...
  • 89 篇 school of softwa...
  • 88 篇 school of softwa...
  • 77 篇 school of big da...
  • 77 篇 beijing engineer...
  • 75 篇 software enginee...
  • 73 篇 national key lab...
  • 68 篇 department of co...

作者

  • 58 篇 wang lei
  • 55 篇 liu yang
  • 47 篇 lei wang
  • 46 篇 bieliková mária
  • 40 篇 baowen xu
  • 38 篇 xiong hu
  • 38 篇 li li
  • 37 篇 shen furao
  • 36 篇 wang jian
  • 36 篇 wei jun
  • 35 篇 sun xingming
  • 33 篇 wang hui
  • 32 篇 jun zhang
  • 30 篇 zhou zhi-hua
  • 30 篇 zhang tao
  • 30 篇 john grundy
  • 29 篇 niyato dusit
  • 29 篇 stefan biffl
  • 29 篇 li xin
  • 29 篇 liu jinyuan

语言

  • 29,929 篇 英文
  • 962 篇 其他
  • 496 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 7 篇 土耳其文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Software Engineering and Technology"
31377 条 记 录,以下是51-60 订阅
排序:
Infrared Small Target Detection with UAV Based on Convolutional Neural Networks
收藏 引用
engineering Letters 2025年 第5期33卷 1505-1512页
作者: Zhang, Jingshi Zhang, Yujun School of Computer and Software Engineering University of Science and Technology Liaoning Anshan 114051 China
Infrared target detection is now applied in many fields, such as medical imaging, military detection, autonomous driving, and environmental monitoring with drones. Due to the small size of these targets, complex envir... 详细信息
来源: 评论
Multi-Task Chinese Speech Recognition Method Based on the Squeezeformer Model
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of Computer Science 2025年 第1期52卷 23-31页
作者: Guo, Ying Wang, Li School of Computer Science and software Engineering University of Science and Technology Liaoning Anshan114051 China College of Computer Science and Technology Liaoning Anshan114051 China
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d... 详细信息
来源: 评论
System for Alcohol Detection and Drowsiness Monitoring Based on Face and Drowsiness Recognition Model
收藏 引用
Journal of Institute of Control, Robotics and Systems 2025年 第4期31卷 343-350页
作者: Jang, Soyoung Lee, Yeon Woo Jung, Yuna An, Eun Hyeon Lee, Jaeho Department of Information & Communication Technology Convergence Engineering Duksung University Korea Republic of Department of Software Duksung Universitys Korea Republic of
This study introduces an integrated real-time monitoring system to enhance driver safety. The system incorporates facial recognition, alcohol detection, and drowsiness monitoring to comprehensively analyze the driver... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of Computer Science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 229-241页
作者: Songle Chen Hongbo Sun Yuxin Wu Lei Shang Xiukai Ruan Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Nanjing University of Posts and Telecommunications State Key Lab for Novel Software Technology Nanjing University Institute of Intelligent Locks Wenzhou University
Wearing a helmet is one of the effective measures to protect workers' safety. To address the challenges of severe occlusion, multi-scale, and small target issues in helmet detection, this paper proposes a helmet d... 详细信息
来源: 评论
Poisoning The Diffusion: A Simple and Robust Watermarking Method for Audio Generation
Poisoning The Diffusion: A Simple and Robust Watermarking Me...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Tang, Yi School of Software Engineering South China University of Technology Guangzhou China
As the capabilities of diffusion-based audio generation models advance, intellectual property protection for both generated audio and model weights becomes important. However, current audio watermarking methods mainly... 详细信息
来源: 评论
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5298-5311页
作者: Han, Xinhui Pan, Haoyuan Wang, Zhaorui Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Future Network of Intelligence Institute School of Science and Engineering Shenzhen518172 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology College of Computer Science and Software Engineering Shenzhen518060 China
We investigate the timely status update in linear multi-hop wireless networks, where a source tries to deliver status update packets to a destination through a sequence of half-duplex relays. Timeliness is measured by... 详细信息
来源: 评论
DSCR: A Dynamic Secure Clustering Routing Scheme for UANETs Based on Reputation Mechanism
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14109-14123页
作者: Gong, Yinyan Chen, Yuxiang Li, Kuanching Liang, Wei Li, Xiong Wang, Jin Xiang, Yang Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China Sanya Research Institute Hunan University of Science and Technology Sanya572024 China School of Computer Science and Engineering Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Swinburne University of Technology School of Software and Electrical Engineering HawthornVIC3122 Australia
In UAV ad hoc networks (UANETs), rapid movement of nodes leads to frequent changes in network topology, increasing the risk of packet loss and affecting data transmission. Furthermore, current research on drone cluste... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
Road Defect Detection Model Based on YOLOv8
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of Computer Science 2025年 第4期52卷 986-994页
作者: Cong, Shengqiang Zhang, Chunna Yu, Yang Yue, Xiaoping Zhao, Jinchi Shen, Yuming School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning Anshan114051 China University of Science and Technology Liaoning Liaoning Anshan114051 China
The detection of road defects is crucial for ensuring vehicular safety and facilitating the prompt repair of roadway imperfections. Existing YOLOv8-based models face the following issues: extraction capabilities and i... 详细信息
来源: 评论