咨询与建议

限定检索结果

文献类型

  • 4,569 篇 会议
  • 3,006 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,642 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,821 篇 工学
    • 3,715 篇 计算机科学与技术...
    • 3,041 篇 软件工程
    • 1,061 篇 信息与通信工程
    • 610 篇 控制科学与工程
    • 584 篇 生物工程
    • 511 篇 电气工程
    • 362 篇 生物医学工程(可授...
    • 347 篇 电子科学与技术(可...
    • 321 篇 机械工程
    • 271 篇 光学工程
    • 200 篇 动力工程及工程热...
    • 178 篇 化学工程与技术
    • 171 篇 网络空间安全
    • 170 篇 安全科学与工程
    • 164 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,254 篇 理学
    • 1,323 篇 数学
    • 632 篇 生物学
    • 433 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 232 篇 系统科学
    • 188 篇 化学
  • 1,467 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 648 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 362 篇 医学
    • 305 篇 临床医学
    • 273 篇 基础医学(可授医学...
    • 159 篇 公共卫生与预防医...
    • 157 篇 药学(可授医学、理...
  • 206 篇 法学
    • 162 篇 社会学
  • 132 篇 经济学
  • 101 篇 教育学
  • 84 篇 农学
  • 18 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 216 篇 training
  • 214 篇 deep learning
  • 211 篇 feature extracti...
  • 181 篇 computational mo...
  • 163 篇 semantics
  • 159 篇 machine learning
  • 155 篇 accuracy
  • 154 篇 educational inst...
  • 141 篇 computer science
  • 127 篇 software enginee...
  • 125 篇 predictive model...
  • 122 篇 optimization
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 87 篇 neural networks
  • 85 篇 image segmentati...
  • 83 篇 artificial intel...

机构

  • 1,260 篇 college of compu...
  • 157 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 116 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 99 篇 software college...
  • 99 篇 college of compu...
  • 88 篇 state key labora...
  • 81 篇 school of softwa...
  • 74 篇 school of comput...
  • 72 篇 national enginee...
  • 61 篇 college of compu...
  • 60 篇 college of softw...
  • 59 篇 the college of c...
  • 58 篇 college of compu...
  • 57 篇 school of inform...
  • 57 篇 state key labora...
  • 55 篇 college of compu...
  • 47 篇 school of comput...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 45 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 jianqiang li
  • 30 篇 he jingsha
  • 29 篇 kaishun wu
  • 29 篇 ismail leila
  • 26 篇 gao can
  • 26 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 24 篇 yan li
  • 24 篇 li yan

语言

  • 6,629 篇 英文
  • 900 篇 其他
  • 133 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7642 条 记 录,以下是1171-1180 订阅
排序:
Boundary-Aware Temporal Dynamic Pseudo-Supervision Pairs Generation for Zero-Shot Natural Language Video Localization  39
Boundary-Aware Temporal Dynamic Pseudo-Supervision Pairs Gen...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Deng, Xiongwen Tang, Haoyu Jiang, Han Zheng, Qinghai Zhu, Jihua School of Software Engineering Xi’an Jiaotong University China School of Software Shandong University China College of Computer and Data Science Fuzhou University China
Zero-shot Natural Language Video Localization (NLVL) aims to automatically generate moments and corresponding pseudo queries from raw videos for the training of the localization model without any manual annotations. E... 详细信息
来源: 评论
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论
Class-attention video transformer for engagement prediction
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Ai, Xusheng Sheng, Victor Li, Chunhua Yang, Han Cui, Zhiming Software and Service Outsourcing College Suzhou Vocational Institute of Industrial Technology 1 Zhineng Avenue Jiangsu Suzhou215104 China Department of Computer Science Texas Tech University 2500 Broadway LubbockTX79409 United States School of Electronics and Information Engineering Suzhou University of Science and Technology No.1 Kerui Road Jiangsu Suzhou215009 China
In this paper, we propose the Class Attention in Video Transformer (CavT), an end-to-end method designed to process both long and short variant-length videos for student engagement prediction. CavT introduces a single... 详细信息
来源: 评论
Detecting Deepfakes: Using CNN to Identify Manipulated Visual Media  8
Detecting Deepfakes: Using CNN to Identify Manipulated Visua...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Sunanda, N. Shailaja, K. Babu, Jampani Satish Vamsi Krishna, K. Lakshmanpratap, N. Motupalli, Ravi Kanth and Ai&ds Hyderabad India Vasavi College of Engineering & Technology Department of Cse Hyderabad India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Guntur Vaddeswaram India Prowess Software Services Hyderabad India Mallareddy Engineering College Department of Ece Hyderabad India Vnr Vignana Jyothi Institute of Engineering & Technology Department of Cse Hyderabad India
Deepfake detection is a rapidly evolving field with significant implications for the integrity of visual media. This review explores techniques, challenges, and future directions in deepfake detection. Traditional ima... 详细信息
来源: 评论
A Safety Evaluation Method and System for a High Core Wall Dam Based on Construction Data
Journal of Intelligent Construction
收藏 引用
Journal of Intelligent Construction 2025年 第1期3卷 1-14页
作者: Zicheng Wang Yingchi Mao Yaosheng Tan Qiaoling Shen Houlei Xu College of Computer Science and Software Engineering Hohai University Nanjing China PowerChina Kunming Engineering Corporation Limited Kunming China China Three Gorges Group Corporation Beijing China
In view of the complex operational conditions and dynamically changing safety risks associated with high core wall dams in the construction period, a comprehensive safety evaluation system for high core wall dams, whi... 详细信息
来源: 评论
DP2FL: Dual Prompt Personalized Federated Learning in Foundation Models
arXiv
收藏 引用
arXiv 2025年
作者: Chang, Ying Shi, Xiaohu Zhao, Xiaohui Chen, Zhaohuang Ma, Deyin College of Software Jilin University Changchun130012 China College of Computer Science and Technology Jilin University Changchun130012 China College of Computer Science and Engineering Changchun University of Technology Changchun130000 China
Personalized federated learning (PFL) has garnered significant attention for its ability to address heterogeneous client data distributions while preserving data privacy. However, when local client data is limited, de... 详细信息
来源: 评论
Smart Energy Management System Using Machine Learning
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 959-973页
作者: Ali Sheraz Akram Sagheer Abbas Muhammad Adnan Khan Atifa Athar Taher M.Ghazal Hussam Al Hamadi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Department of Computer Science COMSATS University IslamabadLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeSharjah1797United Arab Emirates Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Energy management is an inspiring domain in developing of renewable energy ***,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more quality and reli... 详细信息
来源: 评论
DAMFE-Net: A Few-shot Crack Segmentation Model Based on Transfer Learning for Earth Dams
DAMFE-Net: A Few-shot Crack Segmentation Model Based on Tran...
收藏 引用
IEEE International Conference on software engineering and Service sciences (ICSESS)
作者: Lili Zhang Zizun Wei Peng Jin College of Information Science and Engineering Hohai University Nanjing Jiangsu Province China College of Computer Science and Software Engineering Hohai University Nanjing Jiangsu Province China
Some universal segmentation models have already shown good performance on public datasets, but they perform poorly in detecting cracks in earth dams. This deficiency stems from two aspects: one is the shortage of the ... 详细信息
来源: 评论
An Efficient Intrusion Detection System using Advanced Machine Learning Techniques in SDN for Healthcare System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Asif, Muhammad Waseem Aqdus, Aqsa Amin, Rashid Chaudhry, Shehzad Ashraf Alsubaei, Faisal S. Iqbal, Sajid Department of Computer Science and IT The University of Lahore Lahore54000 Pakistan Department of Computer Science University of Chakwal Chakwal48800 Pakistan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul Turkey The Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges... 详细信息
来源: 评论
Towards Quantifying Requirements Technical Debt for software Requirements concerning Veracity: A Perspective and Research Roadmap
arXiv
收藏 引用
arXiv 2024年
作者: Perera, Judith Tempero, Ewan Tu, Yu-Cheng Blincoe, Kelly Galster, Matthias School of Computer Science The University of Auckland Auckland1010 New Zealand Department of Electrical Computer and Software Engineering The University of Auckland Auckland1010 New Zealand Department of Computer Science and Software Engineering College of Engineering University of Canterbury Christchurch1010 New Zealand
software practitioners can make sub-optimal decisions concerning requirements during gathering, documenting, prioritizing, and implementing requirements as software features or architectural design decisions - this is... 详细信息
来源: 评论