咨询与建议

限定检索结果

文献类型

  • 663 篇 会议
  • 357 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,027 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 627 篇 工学
    • 474 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 123 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 67 篇 生物工程
    • 64 篇 电气工程
    • 44 篇 机械工程
    • 42 篇 生物医学工程(可授...
    • 36 篇 电子科学与技术(可...
    • 29 篇 仪器科学与技术
    • 28 篇 光学工程
    • 26 篇 交通运输工程
    • 25 篇 化学工程与技术
    • 23 篇 土木工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 建筑学
  • 306 篇 理学
    • 163 篇 数学
    • 72 篇 生物学
    • 60 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 29 篇 化学
  • 215 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 27 篇 医学
    • 22 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 19 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 8 篇 农学
  • 6 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 computer science
  • 37 篇 software enginee...
  • 30 篇 training
  • 29 篇 feature extracti...
  • 29 篇 accuracy
  • 25 篇 deep learning
  • 22 篇 semantics
  • 22 篇 software
  • 18 篇 laboratories
  • 17 篇 neural networks
  • 16 篇 reliability
  • 16 篇 predictive model...
  • 14 篇 software systems
  • 14 篇 data mining
  • 13 篇 quality of servi...
  • 13 篇 wireless sensor ...
  • 13 篇 computational mo...
  • 13 篇 machine learning
  • 13 篇 testing
  • 13 篇 data models

机构

  • 102 篇 national enginee...
  • 100 篇 college of compu...
  • 32 篇 shenzhen city ke...
  • 25 篇 school of comput...
  • 23 篇 department of co...
  • 22 篇 school of comput...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 20 篇 school of cyber ...
  • 17 篇 shenzhen univers...
  • 16 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...
  • 15 篇 key laboratory o...
  • 14 篇 shenzhen institu...
  • 14 篇 cluster and grid...
  • 13 篇 tianjin key labo...
  • 12 篇 department of co...
  • 12 篇 school of comput...

作者

  • 42 篇 shen linlin
  • 21 篇 ji zhen
  • 19 篇 li jianqiang
  • 18 篇 linlin shen
  • 17 篇 zhen ji
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 yunhao liu
  • 13 篇 gao can
  • 12 篇 wang jinbao
  • 12 篇 li yan
  • 12 篇 jianqiang li
  • 12 篇 yu hang
  • 12 篇 hai jin
  • 12 篇 jin hai
  • 11 篇 tutut herawan
  • 11 篇 philippe charlan...
  • 11 篇 zhu zexuan
  • 11 篇 juergen rilling
  • 10 篇 jiang lai

语言

  • 964 篇 英文
  • 48 篇 其他
  • 15 篇 中文
  • 1 篇 德文
检索条件"机构=Software System LaboratoryDepartment of Computer Science Engineering"
1027 条 记 录,以下是251-260 订阅
排序:
Integrating GPS and GSM Technologies for Enhanced Women’s Safety: A Fingerprint-Activated Device Approach
Integrating GPS and GSM Technologies for Enhanced Women’s S...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Kamred Udham Singh Varun Chaudhary Pradeep Kumar Sharma Pushpendra Kumar Neeraj Varshney Teekam Singh School of Computing Graphic Era Hill University Dehradun India IMS ENGINEERING COLLEGE Ghaziabad India Technical Architect HCL Technologies Noida UP Sr Software Engineer Scanno System Greater Noida Department of Computer Engineering & Applications GLA University Mathura UP India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun
The creation of a safety system that is based on GPS and is developed exclusively for the health and safety of women via the incorporation of novel elements in order to meet the rising concerns about crimes committed ...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
Smart Home Gas Sensor Optimization Using Kalman Filter for Data Processing
Smart Home Gas Sensor Optimization Using Kalman Filter for D...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Somantri Muhamad Ikhsan Thohir Alun Sujjada Deni Setiawan Ilham Komara Fikri Ardiansyah Efendi Muhamad Muslih Zubaile Bin Abdullah Mohd Zainuri Saringat Department of Software Engineering University Tun Hussein Onn Malaysia Informatics Engineering Study Program Nusa Putra University Sukabumi Indonesia Informatics Engineering Study Program Nusa Putra University Sukabumi Indonesia Department of Software Engineering University Tun Hussein Onn Malaysia Sukabumi Indonesia Department of Information System Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Bahru Malaysia
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smel... 详细信息
来源: 评论
sEMG-vision Tra: A Gesture Recognition Method Based on Surface EMG Signal-Vision Fusion
sEMG-vision Tra: A Gesture Recognition Method Based on Surfa...
收藏 引用
IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI
作者: Weili Ding Shuhui Zhang Han Liu Engineering Research Center of Intelligent Control System and Intelligent Equipment Ministry of Education Laboratory of Intelligent Rehabilitation and Neromodulation of Hebei Province Institute of Electrical Engineering Yanshan University Qinhuangdao People's Republic of China College of Computer Science and Software Engineering Shenzhen University Shenzhen People's Republic of China
To address the challenges of gesture recognition accuracy within human-computer interaction technologies, and to overcome the limitations of single-modal biometric feature recognition - which often falls short in prac... 详细信息
来源: 评论
Transparency Paths - Documenting the Diversity of User Perceptions  21
Transparency Paths - Documenting the Diversity of User Perce...
收藏 引用
29th ACM Conference on User Modeling, Adaptation and Personalization, UMAP 2021
作者: Giunchiglia, Fausto Kleanthous, Styliani Otterbacher, Jahna Draws, Tim Department of Information Engineering and Computer Science University of Trento Italy Open University of Cyprus and Cyens Centre of Excellence Cyprus Web Information System and Department of Software Technology Tu Delft Netherlands
We are living in an era of global digital platforms, eco-systems of algorithmic processes that serve users worldwide. However, the increasing exposure to diversity online - of information and users - has led to import... 详细信息
来源: 评论
DCSF-KD: Dynamic Channel-wise Spatial Feature Knowledge Distillation for Object Detection  39
DCSF-KD: Dynamic Channel-wise Spatial Feature Knowledge Dist...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Dai, Tao Lin, Yang Guo, Hang Wang, Jinbao Zhu, Zexuan College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China Shenzhen City Key Laboratory of Embedded System Design Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Knowledge distillation (KD) has recently gained great success in the field of object detection. By transferring the knowledge of the spatial or channel domain from the teacher model to the student model, it allows for... 详细信息
来源: 评论
COVID-19 Identification Using Deep Capsule Network: A Perspective of Super-Resolution CNN on Low-Quality CXR Images  21
COVID-19 Identification Using Deep Capsule Network: A Perspe...
收藏 引用
Proceedings of the 7th International Conference on Communication and Information Processing
作者: Grace U. Nneji Jingye Cai Jianhua Deng Happy N. Monday Edidiong C. James Bona D. Lemessa Abel Z. Yutra Yobsan B. Leta Saifun Nahar School of Information and Software Engineering University of Electronic Science and Technology of China China School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Computer and Information System University of Missouri St.Louis USA
Chest X-ray has become a useful method in the detection of coronavirus disease-19 (COVID-19). Due to the extreme global COVID-19 crisis, using the computerized diagnosis method for COVID-19 classification upon CXR ima... 详细信息
来源: 评论
Resolving Spurious Temporal Location Dependency for Video Corpus Moment Retrieval
Resolving Spurious Temporal Location Dependency for Video Co...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Yishuo Zhang Lanshan Zhang Zhizhen Zhang Ziyi Wang Xiaohui Xie Wendong Wang School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System and Network Culture Beijing University of Posts and Telecommunications Beijing China Shenzhen International Graduate School Tsinghua University Shenzhen China Department of Computer Science and Technology Tsinghua University Beijing China
Video Corpus Moment Retrieval aims to retrieve the relevant video from a large corpus and localize the corresponding moment within the target video based on a specific query. Existing methods have achieved promising a... 详细信息
来源: 评论
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Docu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zeshi Zhang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Ministry of Education Key Laboratory of Computer Vision and System China Faculty of Engineering University of Bristol Bristol U.K.
Due to cloud security concerns, there is an increasing interest in information retrieval systems that can support private queries over public documents. It is desirable for oblivious document ranking and retrieval in ... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论