咨询与建议

限定检索结果

文献类型

  • 2,646 篇 会议
  • 1,937 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 4,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,047 篇 工学
    • 2,170 篇 计算机科学与技术...
    • 1,768 篇 软件工程
    • 536 篇 信息与通信工程
    • 342 篇 控制科学与工程
    • 335 篇 生物工程
    • 300 篇 电气工程
    • 241 篇 电子科学与技术(可...
    • 227 篇 机械工程
    • 222 篇 生物医学工程(可授...
    • 218 篇 光学工程
    • 208 篇 化学工程与技术
    • 139 篇 动力工程及工程热...
    • 133 篇 仪器科学与技术
    • 126 篇 材料科学与工程(可...
    • 125 篇 安全科学与工程
    • 98 篇 土木工程
    • 91 篇 交通运输工程
  • 1,520 篇 理学
    • 774 篇 数学
    • 462 篇 物理学
    • 354 篇 生物学
    • 232 篇 统计学(可授理学、...
    • 177 篇 化学
    • 122 篇 系统科学
  • 793 篇 管理学
    • 526 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 206 篇 医学
    • 189 篇 临床医学
    • 150 篇 基础医学(可授医学...
    • 105 篇 药学(可授医学、理...
  • 117 篇 法学
  • 86 篇 经济学
    • 85 篇 应用经济学
  • 71 篇 教育学
  • 49 篇 农学
  • 26 篇 军事学
  • 11 篇 文学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 102 篇 software enginee...
  • 100 篇 feature extracti...
  • 90 篇 training
  • 89 篇 deep learning
  • 87 篇 computational mo...
  • 84 篇 semantics
  • 76 篇 software
  • 68 篇 accuracy
  • 58 篇 machine learning
  • 57 篇 cloud computing
  • 54 篇 data models
  • 53 篇 computer archite...
  • 53 篇 security
  • 49 篇 internet of thin...
  • 47 篇 data mining
  • 45 篇 blockchain
  • 44 篇 analytical model...
  • 43 篇 reinforcement le...
  • 43 篇 servers
  • 43 篇 predictive model...

机构

  • 121 篇 school of comput...
  • 77 篇 beijing engineer...
  • 77 篇 technology cente...
  • 70 篇 university of ch...
  • 59 篇 jiangsu engineer...
  • 58 篇 collaborative in...
  • 57 篇 national enginee...
  • 49 篇 school of inform...
  • 45 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 school of softwa...
  • 37 篇 school of softwa...
  • 34 篇 school of softwa...
  • 34 篇 state key labora...
  • 33 篇 collaborative in...
  • 32 篇 national enginee...
  • 32 篇 college of compu...
  • 29 篇 school of softwa...
  • 28 篇 school of softwa...
  • 28 篇 jiangsu collabor...

作者

  • 37 篇 wei jun
  • 30 篇 zhangqin huang
  • 26 篇 hu ruimin
  • 24 篇 sun xingming
  • 23 篇 ruimin hu
  • 22 篇 wang jin
  • 21 篇 huang tao
  • 21 篇 wang wei
  • 20 篇 ismail leila
  • 19 篇 xiaorui zhang
  • 18 篇 li leixiao
  • 18 篇 jin wang
  • 17 篇 yan jun
  • 17 篇 wei sun
  • 17 篇 shen jian
  • 16 篇 tao dacheng
  • 16 篇 jun yan
  • 16 篇 du bo
  • 16 篇 huang zhangqin
  • 15 篇 yang yang

语言

  • 4,346 篇 英文
  • 149 篇 其他
  • 102 篇 中文
  • 3 篇 日文
  • 1 篇 德文
检索条件"机构=Software Engineering and Technology Center"
4596 条 记 录,以下是51-60 订阅
排序:
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4471-4488页
作者: Guojun Wang Qi Liu School of Electronics&Information Engineering Nanjing University of Information Science&TechnologyNanjing210044China Yancheng Polytechnic College Yancheng224000China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of SoftwareNanjing University of Information Science and TechnologyNanjingChina
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based *** this dynamic m... 详细信息
来源: 评论
Cross-Dimension Attentive Feature Fusion Network for Unsupervised Time-Series Anomaly Detection
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第6期139卷 3011-3027页
作者: Rui Wang Yao Zhou Guangchun Luo Peng Chen Dezhong Peng School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer Science Sichuan UniversityChengdu610065China National Innovation Center for UHD Video Technology Chengdu610095China
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstructi... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
Ubiquitous WiFi and Acoustic Sensing:Principles,Technologies,and Applications
收藏 引用
Journal of Computer Science & technology 2023年 第1期38卷 25-63页
作者: 黄佳玲 王云舒 邹永攀 伍楷舜 倪明选 The IoT Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060 China The Hong Kong University of Science and Technology(Guangzhou) Guangzhou 511455China The Hong Kong University of Science and Technology Hong KongChina
With the increasing pervasiveness of mobile devices such as smartphones,smart TVs,and wearables,smart sensing,transforming the physical world into digital information based on various sensing medias,has drawn research... 详细信息
来源: 评论
A novel policy iteration algorithm for solving the optimal consensus control problem of a discrete-time multiagent system with unknown dynamics
收藏 引用
Science China(Information Sciences) 2023年 第8期66卷 269-270页
作者: Wenkai XU Li WANG Shiwen SUN Chengyi XIA Zengqiang CHEN Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology The Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomp...
来源: 评论
ALBIG: a Chinese medical text entity recognition model based on Global Pointer  3
ALBIG: a Chinese medical text entity recognition model based...
收藏 引用
3rd International Conference on Electronic Information engineering, Big Data, and Computer technology, EIBDCT 2024
作者: Zhang, Yijie Gao, Yan Zeng, Qiong School of Software Engineering Chengdu University of Information Technology Chengdu610225 China Sichuan Prov. Eng. Technology Research Center of Support Software of Informatization Application Chengdu610225 China
Current work on Chinese medical name entity recognition focuses on extracting flattened entities, and when there are nested entities in the entities, the entity recognition is prone to errors and cannot accurately ide... 详细信息
来源: 评论
An Uncertainty Quantization-Based Method for Anti-UAV Detection in Infrared Images
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1439-1458页
作者: Can Wu Wenyi Tang Yunbo Rao Yinjie Chen Hui Ding Shuzhen Zhu Yuanyuan Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China State Key Laboratory of Air Traffic Management System Nanjing210000China National Airspace Management Center Beijing100094China
Infrared unmanned aerial vehicle(UAV)target detection presents significant challenges due to the inter-play between small targets and complex *** methods,while effective in controlled environments,often fail in scenar... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Design of LoRa Communication Protocol for Image Transmission  8
Design of LoRa Communication Protocol for Image Transmission
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Gao, Han Huang, Zhangqin Zhang, Xiaobo Huang, Ling Beijing University of Technology Beijing Engineering Research Center for IoT Software and System Beijing China
With the expansion of IoT application scenarios, the demand for edge IoT devices with integrated video analysis capabilities is gradually increasing. In remote areas where cellular base stations cannot reach, a low-co... 详细信息
来源: 评论
Research on Multi-protocol Access Method for IoT Platform Based on Microservice Container Scheduling  8
Research on Multi-protocol Access Method for IoT Platform Ba...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Fan, XiaoJie Huang, ZhangQin Huo, SiJia Zhang, XiaoBo Beijing University of Technology Beijing Engineering Research Center for IoT Software and System Beijing China
The number of Internet of Things (IoT) devices in the world has grown to 43 billion in 2023. With the expansion of the IoT industry, the types and communication protocols of IoT devices are also increasing. In the act... 详细信息
来源: 评论