咨询与建议

限定检索结果

文献类型

  • 4,474 篇 会议
  • 3,055 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,838 篇 工学
    • 3,724 篇 计算机科学与技术...
    • 3,041 篇 软件工程
    • 1,091 篇 信息与通信工程
    • 623 篇 控制科学与工程
    • 582 篇 生物工程
    • 550 篇 电气工程
    • 359 篇 生物医学工程(可授...
    • 352 篇 电子科学与技术(可...
    • 327 篇 机械工程
    • 269 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 181 篇 网络空间安全
    • 180 篇 化学工程与技术
    • 175 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 157 篇 仪器科学与技术
  • 2,289 篇 理学
    • 1,335 篇 数学
    • 643 篇 生物学
    • 441 篇 物理学
    • 422 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 194 篇 化学
  • 1,471 篇 管理学
    • 865 篇 管理科学与工程(可...
    • 652 篇 图书情报与档案管...
    • 343 篇 工商管理
  • 361 篇 医学
    • 303 篇 临床医学
    • 271 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 207 篇 法学
    • 163 篇 社会学
  • 132 篇 经济学
  • 101 篇 教育学
  • 87 篇 农学
  • 22 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 212 篇 deep learning
  • 210 篇 training
  • 205 篇 feature extracti...
  • 181 篇 computational mo...
  • 164 篇 machine learning
  • 163 篇 semantics
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 121 篇 data models
  • 105 篇 data mining
  • 105 篇 cloud computing
  • 102 篇 internet of thin...
  • 94 篇 security
  • 85 篇 neural networks
  • 85 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,223 篇 college of compu...
  • 156 篇 college of compu...
  • 135 篇 shenzhen univers...
  • 118 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 96 篇 college of compu...
  • 95 篇 software college...
  • 91 篇 state key labora...
  • 79 篇 school of softwa...
  • 71 篇 school of comput...
  • 67 篇 national enginee...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 58 篇 college of compu...
  • 57 篇 college of softw...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 53 篇 school of inform...
  • 47 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 35 篇 zhong ming
  • 34 篇 lin qiuzhen
  • 34 篇 he jingsha
  • 32 篇 zhen ji
  • 32 篇 wang xingwei
  • 31 篇 victor c. m. leu...
  • 31 篇 jianqiang li
  • 30 篇 kaishun wu
  • 30 篇 leung victor c. ...
  • 29 篇 zhou jie
  • 29 篇 ismail leila
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 wu kaishun
  • 24 篇 li yan

语言

  • 7,133 篇 英文
  • 337 篇 其他
  • 130 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7596 条 记 录,以下是4961-4970 订阅
排序:
Enhanced Breast Cancer Relapse Prediction using Ensemble Learning Techniques
Enhanced Breast Cancer Relapse Prediction using Ensemble Lea...
收藏 引用
Sustainable Expert Systems (ICSES), International Conference on
作者: Mukesh Kumar Tripathi Meka Ananya V.N.L.N Murthy Tumma Shashank Jale Subash Reddy Kaushal Attaluri Department of Computer Science & Engineering Vardhaman college of Engineering Hyderabad Department of Information Technology Vardhaman college of Engineering Hyderabad Software Engineer (Machine Learning/AI Team) Pegasystems Worldwide India Pvt Ltd Hyderabad
Breast cancer remains a significant health concern for women, and accurate prediction of recurrence is vital for effective treatment and improved outcomes. This research investigates the application of advanced ensemb... 详细信息
来源: 评论
Reflection-Optimized Covert Communication for Jammer-Aided Ambient Backscatter Systems
Reflection-Optimized Covert Communication for Jammer-Aided A...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yuanai Xie Tse-Tin Chan Xiao Zhang Pan Lai Haoyuan Pan College of Computer Science South-Central Minzu University Wuhan China Department of Mathematics and Information Technology The Education University of Hong Kong Hong Kong SAR China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The integration of Ambient Backscatter Communication (ABC) with covert communication is expected to support emerging Internet of Things (IoT) applications (e.g., Radio Frequency (RF)-powered networks) due to the need ...
来源: 评论
Benchmark problems for CEC2021 competition on evolutionary transfer multiobjectve optimization
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Songbai Lin, Qiuzhen Tan, Kay Chen Li, Qing Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong
Evolutionary transfer multiobjective optimization (ETMO) has been becoming a hot research topic in the field of evolutionary computation, which is based on the fact that knowledge learning and transfer across the rela... 详细信息
来源: 评论
Wireless Sensing for Material Identification: A Survey
收藏 引用
IEEE Communications Surveys and Tutorials 2024年
作者: Chen, Yande Xu, Chongzhi Li, Kexin Zhang, Jia Guo, Xiuzhen Jin, Meng Zheng, Xiaolong He, Yuan Tsinghua University School of Software Beijing China Beijing University of Posts and Telecommunications School of Computer Science Beijing China Shanghai Jiao Tong University John Hopcroft Center for Computer Science Shanghai China Zhejiang University College of Control Science and Engineering Hangzhou China
As an application of fine-grained wireless sensing, RF-based material identification follows the paradigm of RF computing that fetches the information during RF signal propagation. Specifically, the RF signal accesses... 详细信息
来源: 评论
Multi-Source Data Integration-Based Urban Road GPS Environment Friendliness Estimation
Multi-Source Data Integration-Based Urban Road GPS Environme...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Liantao Ma Yasha Wang Guangju Peng Chaohe Zhang Chao Chen Junfeng Zhao Jiangtao Wang Key Laboratory of High Condence Software Technologies Ministry of Education Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China National Engineering Research Center of Software Engineering Peking University Beijing China College of Computer Science Chongqing University China School of Computing and Communications Lancaster University UK
In urban areas, multipath errors may occur due to blockage and reflection of GPS signals by buildings, and significantly reduce the accuracy of GPS positioning. The degree to which the environment causes multipath err... 详细信息
来源: 评论
An improved character segmentation algorithm based on local adaptive thresholding technique for Chinese NvShu documents
收藏 引用
Journal of Networks 2014年 第6期9卷 1496-1501页
作者: Sun, Yangguang Cai, Zhihua College of Computer Science South-Central University for Nationalities Key Laboratory of Education Ministry for Image Processing and Intelligent Control Huazhong University of Science and Technology Wuhan 430074 China State Key Laboratory of Software Engineering Wuhan University College of Computer Science South-Central University for Nationalities Wuhan 430072 China
For the structural characteristics of Chinese NvShu character, by combining the basic idea in LLT local threshold algorithm and introducing the maximal betweenclass variance algorithm into local windows, an improved c... 详细信息
来源: 评论
Enhancing Consistency in Container Migration via TEE: A Secure Architecture
Enhancing Consistency in Container Migration via TEE: A Secu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Qingyu Gao Liantao Song Yan Lei Feng Wang Lei Wang Shize Zong Yan Ding College of Computer Science National University of Defense Technology Changsha China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Electronic Engineering Hunan University Changsha China National Innovation Institution of Defense Technology AMS China
Secure migration of multi-tenant containerized cloud servers is critical to maintaining the stability and security of cloud services. However, migrating applications across servers owned by different platforms introdu... 详细信息
来源: 评论
Blockchain-Enhanced AI Security and Trust Through Auditable Decision-Making and Data Integrity in Modern Industry
Blockchain-Enhanced AI Security and Trust Through Auditable ...
收藏 引用
Innovations in High Speed Communication and Signal Processing (IHCSP), International Conference on
作者: Digantkumar N Parmar Sudharshan Putha Renato R. Maaliw Bhavani Prasad Kasaraneni Faheem Ahmad Reegu Haewon Byeon Department of Computer Engineering Silver Oak University Independent Researcher and Senior Software Developer at Salesforce USA College of Engineering Southern Luzon State University Lucban Philippines Independet Researcher USA Department of Electrical and Electronics Engineering College of Engineering and Computer Science Jazan University Ksa Department of AI and Software Inje University Gimhae Republic of Korea
AI and blockchain can make companies safer and more trustworthy. AI can handle massive quantities of data and make complicated judgments, but its lack of clarity and reliance on centralized data present safety, accoun... 详细信息
来源: 评论
Resource sharing models and heuristic load balancing methods for grid scheduling problems
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第9期4卷 315-322页
作者: Shu, Wanneng Ding, Lixin Wang, Shenwen College of Computer Science South-Central University for Nationalities Wuhan 430074 China State Key Lab of Software Engineering Wuhan University Wuhan 430072 China Computer School Wuhan University Wuhan 430072 China
Grid computing utilizes distributed heterogeneous resources to support large-scale or complicated computing tasks, and an appropriate resource scheduling algorithm is fundamentally important for the success of grid ap... 详细信息
来源: 评论
Face Recognition with Single Training Image per Person Based on Wavelet Transform and Virtual Information
Face Recognition with Single Training Image per Person Based...
收藏 引用
International Conference on Pervasive Computing Signal Processing and Applications (PCSPA)
作者: Yingnan Zhao Yan Ma Shiwei Ji School of Computer and Software Nanjing University of Information Science & Technology Nanjing China College of Physics Science & Information Engineering Jishou University Computer Science & Technology Jinshou China Nanjing University of Information Science and Technology Nanjing Jiangsu CN
One of the most challenging tasks for face recognition lies in the so-called one sample per person problem. Numerous face recognition techniques will suffer serious performance drop or even fail to work in this situat... 详细信息
来源: 评论