咨询与建议

限定检索结果

文献类型

  • 4,493 篇 会议
  • 2,994 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,777 篇 工学
    • 3,676 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 599 篇 控制科学与工程
    • 581 篇 生物工程
    • 516 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 343 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 200 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,261 篇 理学
    • 1,324 篇 数学
    • 638 篇 生物学
    • 432 篇 物理学
    • 413 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,461 篇 管理学
    • 863 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 361 篇 医学
    • 304 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 131 篇 经济学
  • 101 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 training
  • 209 篇 deep learning
  • 206 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 124 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 121 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 83 篇 clustering algor...

机构

  • 1,224 篇 college of compu...
  • 156 篇 college of compu...
  • 131 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 60 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of softw...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 53 篇 school of inform...
  • 47 篇 school of comput...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 24 篇 yan li
  • 24 篇 wu kaishun

语言

  • 7,114 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7554 条 记 录,以下是4981-4990 订阅
排序:
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segmentation
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segme...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Changlu Guo Márton Szemenyei Yang Pei Yugen Yi Wei Zhou Department of Control Engineering and Information Technology Budapest University of Technology and Economics Budapest Hungary Budapest University of Technology and Economics Budapest Hungary School of Software Jiangxi Normal University Nanchang China College of Computer Science Shenyang Aerospace University Shenyang China
At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in... 详细信息
来源: 评论
False Trajectory Privacy Protection Scheme Based on Location Service
收藏 引用
IOP Conference Series: Materials science and engineering 2020年 第7期768卷
作者: Chen Yang Wei Yan School of Software Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, w...
来源: 评论
An efficient quantum blind digital signature scheme
收藏 引用
science China(Information sciences) 2017年 第8期60卷 226-239页
作者: Hong LAI Mingxing LUO Josef PIEPRZYK Zhiguo QU Shudong LI Mehmet A.ORGUN College of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences School of Computer and Software Nanjing University of Information Science and Technology College of Mathematics and Information Science Shandong Technology and Business University School of Computer Science National University of Defense Technology Department of Computing Macquarie University Faculty of Information Technology Macau University of Science and Technology
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign... 详细信息
来源: 评论
An Effective Stock Clustering Method Based on Hybrid Correlation Coefficient
An Effective Stock Clustering Method Based on Hybrid Correla...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yahui Lu Xiaochu Tang Hui Wang College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Management Shenzhen University Shenzhen China
Clustering stocks by their time series data is a significant but challenging task in computer supported financial decision systems. In this paper, we propose an effective stocks clustering method based on hybrid corre... 详细信息
来源: 评论
An Efficient File System for Hybrid In-Memory NVM and Block Devices
An Efficient File System for Hybrid In-Memory NVM and Block ...
收藏 引用
IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
作者: Yuansong Zeng Edwin H.-M. Sha Qingfeng Zhuge Xianzhang Chen Zhulin Ma Lin Wu School of Computer Science and Software Engineering East China Normal University Shanghai China College of Computer Science Chongqing University Chongqing China
Emerging Non-Volatile Memory (NVM) technologies are promised to revolutionize storage systems by providing fast, persist data accesses on memory bus. However, the limited capacity of NVM devices calls for multi-layer ... 详细信息
来源: 评论
Trust-Based Security Routing Mechanism in Mobile Social Networks
Trust-Based Security Routing Mechanism in Mobile Social Netw...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Shuang Yang Xingwei Wang Shuang Zhang Min Huang College of Computer Science and Engineering Northeastern University Shenyang China College of Software Northeastern University Shenyang China College of Information Science and Engineering Northeastern University Shenyang China
Malicious and selfish behaviors represent a serious security threat against routing in Mobile Social Network (MSN). Due to the unique network characteristics, it is a challenge to design a misbehavior detection scheme...
来源: 评论
Green Energy Sources: Issues and Challenges
Green Energy Sources: Issues and Challenges
收藏 引用
Roedunet International Conference (RoEduNet)
作者: Mostafa Abdulghafoor Mohammed Inas Adnan Mohammed Raed.A. Hasan Nicolae Ţăpuş Ahmed Hussien Ali Omar A. Hammood Faculty of Automatic Control and Computers University Polytechnic of Bucharest/Romania The Great Emam University College Baghdad University of Information Technology and Communications / college of Engineering/ Baghdad Iraq Faculty of Al-dour Technical institute Northern Technical University Mosel IRAQ Faculty of Automatic Control and Computers University Polytechnic of Bucharest/Romania Computer Science Department AL Salam University College Baghdad Iraq Faculty of Computer Systems and Software Engineering UniversityMalaysia Pahang Malaysia
Mobile offloading is a platform that facilitates the distribution of computationally intensive tasks from mobile devices to the cloud or other devices in order to conserve energy and improve performance. The concept i... 详细信息
来源: 评论
On the Dual p-Measures of Asymmetry for Star Bodies
收藏 引用
Wuhan University Journal of Natural sciences 2018年 第6期23卷 465-470页
作者: HUANG Xing ZHU Huawei GUO Qi School of Mathematics and Information Science Guangzhou University Guangzhou 51006 Guangdong China Academy for Intelligent Software Guangzhou University Guangzhou 51006 Guangdong China Guangdong Provincial Engineering and Technology Research Center for Mathematical Education Software Guangzhou University Guangzhou 510006 Guangdong China Institute of Mathematics and Computer Science GuizhouNormal College Guiyang 550018 Guizhou China Department of Mathematics Suzhou University of Scienceand Technology Suzhou 215009 Jiangsu China
Recently, the connection between p-measures of asymmetry and the L_p-mixed volumes for convex bodies was found soon after the p-measure of asymmetry was proposed, and the Orlicz-measures of asymmetry was proposed insp... 详细信息
来源: 评论
Convolutional sparse coding for compressed sensing ct reconstruction
arXiv
收藏 引用
arXiv 2019年
作者: Bao, Peng Xia, Wenjun Yang, Kang Chen, Weiyan Chen, Mianyi Xi, Yan Niu, Shanzhou Zhou, Jiliu Zhang, He Sun, Huaiqiang Wang, Zhangyang Zhang, Yi College of Computer Science Sichuan University Chengdu610065 China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China School of Electronics Engineering and Computer Science Peking University China Shanghai First-imaging Information Technology co. LTD School of Mathematics and Computer Science Gannan Normal University Ganzhou341000 China State University of New Jersey RutgersNJ08854 United States Department of Radiology West China Hospital of Sichuan University Chengdu610041 China Department of Computer Science and Engineering Texas AandM University United States
Over the past few years, dictionary learning (DL)-based methods have been successfully used in various image reconstruction problems. However, traditional DL-based computed tomography (CT) reconstruction methods are p... 详细信息
来源: 评论
A New Type-2 Intuitionistic Exponential Triangular Fuzzy Number and Its Ranking Method with Centroid Concept and Euclidean Distance
A New Type-2 Intuitionistic Exponential Triangular Fuzzy Num...
收藏 引用
IEEE International Conference on Fuzzy Systems
作者: Salim Rezvani Xizhao Wang Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen Guangdong China
This paper introduces a new type-2 intuitionistic exponential triangular fuzzy number. Basic generalized exponential triangular intuitionistic fuzzy numbers are formulated by (α,β)-cuts. Some of properties and theor... 详细信息
来源: 评论