咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,971 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,762 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 342 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 210 篇 training
  • 205 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 148 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 83 篇 artificial intel...

机构

  • 1,215 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 95 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 82 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 59 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of softw...
  • 52 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 36 篇 he jingsha
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 25 篇 wu kaishun
  • 24 篇 yan li

语言

  • 7,070 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7510 条 记 录,以下是4961-4970 订阅
排序:
FUSO: Fast Multi-Path Loss Recovery for Data Center Networks
FUSO: Fast Multi-Path Loss Recovery for Data Center Networks
收藏 引用
作者: Chen, Guo Lu, Yuanwei Meng, Yuan Li, Bojie Tan, Kun Pei, Dan Cheng, Peng Luo, Layong Xiong, Yongqiang Wang, Xiaoliang Zhao, Youjian College of Computer Science and Electronic Engineering Hunan University Changsha410006 China Microsoft Research Asia Beijing100083 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Huawei Technologies Central Software Institute Beijing100190 China Azure Networking Microsoft Redmond SeattleWA98052 United States Department of Computer Science and Technology Nanjing University Nanjing210008 China
To achieve low TCP flow completion time (FCT) in data center networks (DCNs), it is critical and challenging to rapidly recover loss without adding extra congestion. Therefore, in this paper, we propose a novel loss r... 详细信息
来源: 评论
Consensus control of stochastic multi-agent systems: a survey
收藏 引用
science China(Information sciences) 2017年 第12期60卷 5-19页
作者: Lifeng MA Zidong WANG Qing-Long HAN Yurong LIU School of Automation Nanjing University of Science and Technology College of Electrical Engineering and Automation Shandong University of Science and Technology Department of Computer Science Brunel University London School of Software and Electrical Engineering Swinburne University of Technology Department of Mathematics Yangzhou University
In this article, we provide a review of the consensus control problem for stochastic multi-agent systems(MASs). Recent advances are surveyed according to the method of occurrence of the stochasticity of the MASs. Firs... 详细信息
来源: 评论
Local contrast learning
arXiv
收藏 引用
arXiv 2018年
作者: Xu, Chuanyun Zhang, Yang Feng, Xin Ge, Yong Xing Zhang, Yihao Long, Jianwu College of computer science and engineering Chongqing University of Technology Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China School of Software Engineering Chongqing University Chongqing China
Learning a deep model from small data is yet an opening and challenging problem. We focus on one-shot classification by deep learning approach based on a small quantity of training samples. We proposed a novel deep le... 详细信息
来源: 评论
Synthesis and Recognition of Internet Celebrity Face Based on Deep Learning  12th
Synthesis and Recognition of Internet Celebrity Face Based o...
收藏 引用
12th Chinese Conference on Biometric Recognition, CCBR 2017
作者: Zhou, Jiancan Zeng, Guohang He, Jia Jia, Xi Shen, Linlin College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The similarity among Internet Celebrity Faces brings a big challenge to the recognition and verification of faces. To study this problem, more than 20,000 Internet Celebrity Face pictures are collected from the Intern... 详细信息
来源: 评论
Impact of temperature and relative humidity on the transmission of COVID-19: A modeling study in China and the United States
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jingyuan Tang, Ke Feng, Kai Lin, Xin Lv, Weifeng Chen, Kun Wang, Fei School of Computer Science and Engineering Beihang University China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University China School of Social Sciences Tsinghua University China State Key Laboratory of Software Development Environment Beihang University China Department of Statistics University of Connecticut United States Center for Population Health University of Connecticut Health Center United States Department of Population Health Sciences Weill Cornell Medical College Cornell University United States
Objectives We aim to assess the impact of temperature and relative humidity on the transmission of COVID-19 across communities after accounting for community-level factors such as demographics, socioeconomic status, a... 详细信息
来源: 评论
A New Anti-Spam Model Based on E-mail Address Concealment Technique
收藏 引用
Wuhan University Journal of Natural sciences 2018年 第1期23卷 79-83页
作者: ZHANG Yuqiang HE Jingsha XU Jing Beijing Institute of Aerospace Control Devices Beijing100039 China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University ofTechnology Beijing 100124 China Department of Automation Tsinghua University Beijing100084 China
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a pi... 详细信息
来源: 评论
OpenMM 8: Molecular Dynamics Simulation with Machine Learning Potentials
arXiv
收藏 引用
arXiv 2023年
作者: Eastman, Peter Galvelis, Raimondas Peláez, Raúl P. Abreu, Charlles R.A. Farr, Stephen E. Gallicchio, Emilio Gorenko, Anton Henry, Michael M. Hu, Frank Huang, Jing Krämer, Andreas Michel, Julien Mitchell, Joshua A. Pande, Vijay S. Rodrigues, João P.G.L.M. Rodriguez-Guerra, Jaime Simmonett, Andrew C. Singh, Sukrit Swails, Jason Turner, Philip Wang, Yuanqing Zhang, Ivy Chodera, John D. De Fabritiis, Gianni Markland, Thomas E. Department of Chemistry Stanford University StanfordCA94305 United States Acellera Labs C Dr Trueta 183 Barcelona08005 Spain C Dr. Aiguader 88 Barcelona08003 Spain Chemical Engineering Department School of Chemistry Federal University of Rio de Janeiro Rio de Janeiro68542 Brazil Redesign Science Inc. 180 Varick St. New YorkNY10014 United States EaStCHEM School of Chemistry University of Edinburgh EH9 3FJ United Kingdom Department of Chemistry and Biochemistry Brooklyn College The City University of New York NY United States Ph.D. Program in Chemistry Ph.D. Program in Biochemistry The Graduate Center of the City University of New York New YorkNY United States Stream HPC Koningin Wilhelminaplein 1 - 40601 Amsterdam1062 HG Netherlands Computational and Systems Biology Program Sloan Kettering Institute Memorial Sloan Kettering Cancer Center New YorkNY10065 United States Key Laboratory of Structural Biology of Zhejiang Province School of Life Sciences Westlake University 18 Shilongshan Road Zhejiang Hangzhou310024 China Department of Mathematics and Computer Science Freie Universität Berlin Arnimallee 12 Berlin14195 Germany The Open Force Field Initiative Open Molecular Software Foundation DavisCA95616 United States Andreessen Horowitz 2865 Sand Hill Rd Menlo ParkCA94025 United States Department of Structural Biology Stanford University StanfordCA94305 United States Charité Universitätsmedizin Berlin In silico Toxicology and Structural Bioinformatics Virchowweg 6 Berlin10117 Germany Laboratory of Computational Biology National Heart Lung and Blood Institute National Institutes of Health BethesdaMD20892 United States Entos Inc. 9310 Athena Circle La Jolla CA92037 United States College of Engineering Virginia Polytechnic Institute State University BlacksburgVA24061 United States Simons Center for Computational Physical Chemistry Center for Data Science New York University 24 Waverly Place New YorkNY10004 United States T
Machine learning plays an important and growing role in molecular simulation. The newest version of the OpenMM molecular dynamics toolkit introduces new features to support the use of machine learning potentials. Arbi... 详细信息
来源: 评论
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Lockout-Tagout Ransomware: A Detection Method for Ransomware...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Nitin Naik Paul Jenkins Jonathan Gillett Haralambos Mouratidis Kshirasagar Naik Jingping Song School of Computing University of Portsmouth United Kingdom Faculty of Science and Technology Bournemouth University United Kingdom Centre for Secure Intelligent and Usable Systems University of Brighton United Kingdom Department of Electrical and Computer Engineering University of Waterloo Canada Software College Northeastern University China
Ransomware attacks are a prevalent cybersecurity threat to every user and enterprise today. This is attributed to their polymorphic behaviour and dispersion of inexhaustible versions due to the same ransomware family ... 详细信息
来源: 评论
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
收藏 引用
Journal of computer science & Technology 2017年 第2期32卷 329-339页
作者: Ji-Liang Zhang Wei-Zheng Wang Xing-Wei Wang Zhi-Hua Xia Software College Northeastern University Shenyang 110169 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410014 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse... 详细信息
来源: 评论
Bilinear supervised hashing based on 2D image features
arXiv
收藏 引用
arXiv 2019年
作者: Ding, Yujuan Wong, Wai Kueng Lai, Zhihui Zhang, Zheng Institute of Textiles and Clothing Hong Kong Polytechnic University Hong Kong College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Textiles and Clothing Hong Kong Polytechnic University Hong Kong School of Information Technology & Electrical Engineering University of Queensland BrisbaneQLD4072 Australia
Hashing has been recognized as an efficient representation learning method to effectively handle big data due to its low computational complexity and memory cost. Most of the existing hashing methods focus on learning... 详细信息
来源: 评论