咨询与建议

限定检索结果

文献类型

  • 664 篇 会议
  • 361 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,032 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 633 篇 工学
    • 480 篇 计算机科学与技术...
    • 391 篇 软件工程
    • 124 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 67 篇 生物工程
    • 65 篇 电气工程
    • 44 篇 机械工程
    • 42 篇 生物医学工程(可授...
    • 37 篇 电子科学与技术(可...
    • 29 篇 仪器科学与技术
    • 27 篇 光学工程
    • 26 篇 交通运输工程
    • 25 篇 化学工程与技术
    • 23 篇 土木工程
    • 18 篇 动力工程及工程热...
    • 18 篇 网络空间安全
    • 15 篇 建筑学
  • 305 篇 理学
    • 163 篇 数学
    • 72 篇 生物学
    • 59 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 29 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 27 篇 医学
    • 22 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 19 篇 法学
    • 18 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 8 篇 农学
  • 5 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 computer science
  • 37 篇 software enginee...
  • 31 篇 training
  • 30 篇 feature extracti...
  • 30 篇 accuracy
  • 25 篇 deep learning
  • 22 篇 semantics
  • 22 篇 software
  • 18 篇 laboratories
  • 17 篇 neural networks
  • 16 篇 reliability
  • 16 篇 predictive model...
  • 14 篇 software systems
  • 14 篇 data mining
  • 13 篇 quality of servi...
  • 13 篇 optimization
  • 13 篇 wireless sensor ...
  • 13 篇 computational mo...
  • 13 篇 machine learning
  • 13 篇 testing

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 32 篇 shenzhen city ke...
  • 25 篇 school of comput...
  • 23 篇 department of co...
  • 22 篇 school of comput...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 20 篇 school of cyber ...
  • 17 篇 shenzhen univers...
  • 16 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 15 篇 key laboratory o...
  • 14 篇 shenzhen institu...
  • 14 篇 cluster and grid...
  • 13 篇 tianjin key labo...
  • 12 篇 department of co...
  • 12 篇 school of comput...

作者

  • 42 篇 shen linlin
  • 21 篇 ji zhen
  • 19 篇 linlin shen
  • 19 篇 li jianqiang
  • 17 篇 zhen ji
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 yunhao liu
  • 13 篇 gao can
  • 12 篇 wang jinbao
  • 12 篇 li yan
  • 12 篇 jianqiang li
  • 12 篇 yu hang
  • 12 篇 hai jin
  • 12 篇 jin hai
  • 11 篇 tutut herawan
  • 11 篇 philippe charlan...
  • 11 篇 zhu zexuan
  • 11 篇 juergen rilling
  • 10 篇 jiang lai

语言

  • 957 篇 英文
  • 60 篇 其他
  • 16 篇 中文
  • 1 篇 德文
检索条件"机构=Software System LaboratoryDepartment of Computer Science Engineering"
1032 条 记 录,以下是91-100 订阅
排序:
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
VCformer: Variable Correlation Transformer with Inherent Lagged Correlation for Multivariate Time Series Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yingnan Zhu, Qingling Chen, Jianyong College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Multivariate time series (MTS) forecasting has been extensively applied across diverse domains, such as weather prediction and energy consumption. However, current studies still rely on the vanilla point-wise self-att... 详细信息
来源: 评论
Robust UAV Policy Learning for Urban Infrastructure Surface Screening*
Robust UAV Policy Learning for Urban Infrastructure Surface ...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Bingqing Du Uddin Md. Borhan Tianxing Chen Jianyong Chen Jianqiang Li Jie Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Unmanned Aerial Vehicles (UAVs) have emerged as pivotal tools for infrastructure inspection, mitigating risks to human life and enhancing operational efficiency. Despite advancements, achieving autonomous surface cove... 详细信息
来源: 评论
Intelligent Blocking and Prevention of SARS-CoV-2 Based on Evolutionary Reinforcement Learning
Intelligent Blocking and Prevention of SARS-CoV-2 Based on E...
收藏 引用
Congress on Evolutionary Computation
作者: Chengwei He Huaping Hong Lijia Ma Qingling Zhu Yuan Bai College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
In recent years, the global repercussions of SARS-CoV-2 and its variants have posed significant challenges to various areas, including the economic order, transportation, healthcare, and education, and the mitigation ... 详细信息
来源: 评论
PAIR: protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: protein-aptamer interaction prediction based on langua...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jun Zhang Zhiqiang Yan Hao Zeng Zexuan Zhu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
FedCrowd: Towards Promoting the Concurrency of the Server in Asynchronous Federated Learning  2
FedCrowd: Towards Promoting the Concurrency of the Server in...
收藏 引用
2nd International Symposium on Electrical, Electronics and Information engineering, ISEEIE 2022
作者: Xi, Wen Liao, Yuying Zhou, Bin Wang, Haiyang Gao, Liqun College of Computer Science and Technology National University of Defence Technology Changsha China National University of Defence Technology Key Lab. of Software Engineering for Complex System Changsha China
Federated learning is a privacy-preserving machine learning paradigm where a global model is trained collaboratively across resource-limited devices such as mobile phones, wearable devices, and sensors while the train... 详细信息
来源: 评论
Handwritten Prescription Recognition Using VGG Based Architecture with Bi-LSTM
Handwritten Prescription Recognition Using VGG Based Archite...
收藏 引用
International Research Conference on Smart Computing and systems engineering (SCSE)
作者: Isuru Kavinda Harinda Fernando Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer System Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Illegible handwriting on medical prescriptions poses a significant challenge, often leading to the misinterpretation of drug names and dosages. This issue primarily stems from doctors’ use of Latin abbreviations, dri... 详细信息
来源: 评论
Dynamic Bi-Elman Attention Networks (DBEAN): Dual-Directional Context-Aware Representation Learning for Enhanced Text Classification
arXiv
收藏 引用
arXiv 2025年
作者: Liao, Mengyao Lai, Zhenglin Xu, Dong College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Text classification, a fundamental task in natural language processing (NLP), aims to categorize textual data into predefined labels. Traditional methods struggled with complex linguistic structures and semantic depen... 详细信息
来源: 评论
Ethiopic Cryptography: An Efficient Hybrid Encryption Algorithm for Reducing Cybersecurity Attack  11th
Ethiopic Cryptography: An Efficient Hybrid Encryption Algori...
收藏 引用
11th EAI International Conference on Advancement of science and Technology, ICAST 2023
作者: Akele, Tadesse Birara Bahiru, Tadesse Kebede Molla, Tibebu Legesse Fentie, Shambel Dessale Belay, Tadesse Destaw Marye, Almaz Yemataw Getaneh, Mersha Derese Department of Information System Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Information Technology Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Deparment of Software Engineering Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Computer Science Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia
Cryptography is an essential tool in ensuring the security of data during network communication. Network and service providers prioritize data security to ensure secure data exchanges. Ethiopic cryptography is a uniqu... 详细信息
来源: 评论