咨询与建议

限定检索结果

文献类型

  • 5,898 篇 会议
  • 3,451 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 9,389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,621 篇 工学
    • 3,487 篇 计算机科学与技术...
    • 2,789 篇 软件工程
    • 1,108 篇 信息与通信工程
    • 975 篇 控制科学与工程
    • 779 篇 电气工程
    • 751 篇 电子科学与技术(可...
    • 572 篇 生物工程
    • 498 篇 机械工程
    • 450 篇 光学工程
    • 411 篇 生物医学工程(可授...
    • 399 篇 仪器科学与技术
    • 298 篇 动力工程及工程热...
    • 297 篇 化学工程与技术
    • 230 篇 交通运输工程
    • 208 篇 材料科学与工程(可...
    • 191 篇 土木工程
    • 173 篇 安全科学与工程
  • 2,995 篇 理学
    • 1,451 篇 数学
    • 877 篇 物理学
    • 642 篇 生物学
    • 468 篇 统计学(可授理学、...
    • 358 篇 系统科学
    • 303 篇 化学
  • 1,490 篇 管理学
    • 975 篇 管理科学与工程(可...
    • 569 篇 图书情报与档案管...
    • 410 篇 工商管理
  • 385 篇 医学
    • 327 篇 临床医学
    • 256 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 207 篇 法学
    • 172 篇 社会学
  • 161 篇 经济学
  • 96 篇 农学
  • 77 篇 教育学
  • 31 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 175 篇 feature extracti...
  • 170 篇 deep learning
  • 163 篇 computational mo...
  • 145 篇 systems engineer...
  • 145 篇 data mining
  • 127 篇 optimization
  • 122 篇 machine learning
  • 116 篇 neural networks
  • 108 篇 control systems
  • 98 篇 semantics
  • 98 篇 accuracy
  • 94 篇 computer archite...
  • 88 篇 laboratories
  • 85 篇 educational inst...
  • 84 篇 costs
  • 82 篇 predictive model...
  • 79 篇 wireless sensor ...
  • 78 篇 bandwidth
  • 77 篇 training

机构

  • 102 篇 national enginee...
  • 95 篇 college of compu...
  • 77 篇 school of comput...
  • 73 篇 department of co...
  • 63 篇 national enginee...
  • 56 篇 college of infor...
  • 44 篇 school of comput...
  • 42 篇 the key laborato...
  • 38 篇 school of inform...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 30 篇 faculty of compu...
  • 30 篇 university of ch...
  • 29 篇 huazhong univers...
  • 28 篇 national enginee...
  • 27 篇 school of comput...
  • 27 篇 hubei province k...
  • 25 篇 key laboratory o...
  • 24 篇 school of comput...

作者

  • 73 篇 hai jin
  • 37 篇 jin hai
  • 31 篇 yang yang
  • 30 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 20 篇 dutta paramartha
  • 19 篇 jianchao zeng
  • 18 篇 wang xingjun
  • 18 篇 hu shengshan
  • 17 篇 zhen ji
  • 17 篇 long zheng
  • 15 篇 niyato dusit
  • 15 篇 wang lei
  • 15 篇 li peng
  • 15 篇 zhuang songlin

语言

  • 8,874 篇 英文
  • 267 篇 其他
  • 218 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=System Engineering and Computer Science"
9389 条 记 录,以下是91-100 订阅
排序:
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Drone-Assisted Load Distribution Framework for Traffic Optimization in IoT Networks
Drone-Assisted Load Distribution Framework for Traffic Optim...
收藏 引用
International Communication systems and Networks and Workshops, COMSNETS
作者: Priyanka Soni Omkar Manohar Mense Sourav Kanti Addya Department of Computer Science and Engineering Cloud and Smart System Services Lab National Institute of Technology Karnataka India
Device connectivity has been redefined by the rapid development of the Internet of Things (IoT) technology, enabling diverse applications in areas such as smart cities, smart homes, and healthcare. These applications ... 详细信息
来源: 评论
SPViT: Accelerate Vision Transformer Inference on Mobile Devices via Adaptive Splitting and Offloading
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zhao, Sifan Liu, Tongtong Jin, Hai Yao, Dezhong Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Vision Transformer (ViT), which benefits from utilizing self-attention mechanisms, has demonstrated superior accuracy compared to CNNs. However, due to the expensive computational costs, deploying and inferring Vi... 详细信息
来源: 评论
Scar-Aware Late Mechanical Activation Detection Network for Optimal Cardiac Resynchronization Therapy Planning
Scar-Aware Late Mechanical Activation Detection Network for ...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Jiarui Xing Shuo Wang Amit R. Petal Kenneth C. Bilchick Frederick H. Epstein Miaomiao Zhang Department of Electrical and Computer Engineering University of Virginia USA School of Medicine University of Virginia Health System USA Department of Biomedical Engineering University of Virginia Health System USA Department of Computer Science University of Virginia USA
Accurate identification of late mechanical activation (LMA) regions is crucial for optimal cardiac resynchronization therapy (CRT) lead implantation. However, existing approaches using cardiac magnetic resonance (CMR)... 详细信息
来源: 评论
Impulsive Control of Nonlinear Multi-Agent systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy systems 2025年
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent systems (MASs) with u... 详细信息
来源: 评论
Prior Knowledge-Driven Hybrid Prompter Learning for RGB-Event Tracking
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Wang, Mianzhao Shi, Fan Cheng, Xu Chen, Shengyong Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education Key Laboratory of Computer Vision and System School of Computer Science and Engineering Tianjin300384 China Technical University of Denmark Department of Technology Management and Economics Kongens Lyngby Denmark
Event data can asynchronously capture variations in light intensity, thereby implicitly providing valuable complementary cues for RGB-Event tracking. Existing methods typically employ a direct interaction mechanism to... 详细信息
来源: 评论
FFCI: A Camera and IMU Sensors Based Multi-modal Neural Network for Activity Recognition in Smart Factory
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wang, Yujue Niu, Xin Lv, Xianwei Yu, Chen Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Worker activity recognition is an important aspect of the construction of smart factory. The development of deep neural networks and the widespread distribution of sensors in the smart factory have brought opportuniti... 详细信息
来源: 评论
Skill-Based Edge-Brain Smart Manufacturing: A Case of Grasp Pose Selection Skill  6
Skill-Based Edge-Brain Smart Manufacturing: A Case of Grasp ...
收藏 引用
6th International Conference on Industry 4.0 and Smart Manufacturing, ISM 2024
作者: Lee, Sukhan Jang, Byungwoo Hyeon, Seokjong Lee, Soojin Lee, Jaesun Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of Department of Artificial Intelligence Sungkyunkwan University Suwon16419 Korea Republic of Department of Computer Science and Engineering Sungkyunkwan University Suwon16419 Korea Republic of Department of AI System Engineering Sungkyunkwan University Suwon16419 Korea Republic of Department of Regional Industry Innovation Korea Institute of Industrial Technology Ulsan44413 Korea Republic of
The edge-brain framework (EBF) is a S/W framework that allows manufacturers to easily integrate AI-empowered robot work skills into a legacy production system in an edge computing environment with minimal time and eff... 详细信息
来源: 评论
Cyber Resilient Communication Network Design for Secondary Control of Microgrids
收藏 引用
IEEE Transactions on Industrial Informatics 2025年
作者: Xiao, Junjie Wang, Lu Shafiee, Qobad Bauer, Pavol Qin, Zian Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology DC System Energy Conversion and Storage Group Delft2628 Netherlands
Distributed secondary control achieves voltage restoration and power sharing through communication among adjacent units but exposes the microgrid to potential cyber-attacks. Traditional mitigation strategies modify th... 详细信息
来源: 评论