咨询与建议

限定检索结果

文献类型

  • 5,994 篇 会议
  • 3,446 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 9,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,653 篇 工学
    • 3,502 篇 计算机科学与技术...
    • 2,784 篇 软件工程
    • 1,118 篇 信息与通信工程
    • 990 篇 控制科学与工程
    • 773 篇 电气工程
    • 754 篇 电子科学与技术(可...
    • 575 篇 生物工程
    • 495 篇 机械工程
    • 449 篇 光学工程
    • 415 篇 生物医学工程(可授...
    • 399 篇 仪器科学与技术
    • 300 篇 动力工程及工程热...
    • 295 篇 化学工程与技术
    • 228 篇 交通运输工程
    • 213 篇 材料科学与工程(可...
    • 197 篇 土木工程
    • 173 篇 安全科学与工程
  • 2,999 篇 理学
    • 1,434 篇 数学
    • 888 篇 物理学
    • 646 篇 生物学
    • 459 篇 统计学(可授理学、...
    • 358 篇 系统科学
    • 305 篇 化学
  • 1,488 篇 管理学
    • 975 篇 管理科学与工程(可...
    • 566 篇 图书情报与档案管...
    • 404 篇 工商管理
  • 398 篇 医学
    • 336 篇 临床医学
    • 262 篇 基础医学(可授医学...
    • 172 篇 药学(可授医学、理...
  • 211 篇 法学
    • 176 篇 社会学
  • 160 篇 经济学
  • 95 篇 农学
  • 86 篇 教育学
  • 33 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 184 篇 feature extracti...
  • 178 篇 deep learning
  • 172 篇 computational mo...
  • 148 篇 data mining
  • 145 篇 systems engineer...
  • 128 篇 optimization
  • 128 篇 machine learning
  • 117 篇 neural networks
  • 105 篇 control systems
  • 104 篇 accuracy
  • 100 篇 semantics
  • 94 篇 computer archite...
  • 87 篇 laboratories
  • 85 篇 educational inst...
  • 85 篇 predictive model...
  • 83 篇 training
  • 82 篇 costs
  • 78 篇 bandwidth
  • 78 篇 wireless sensor ...

机构

  • 103 篇 college of compu...
  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 71 篇 department of co...
  • 71 篇 national enginee...
  • 56 篇 college of infor...
  • 46 篇 school of comput...
  • 41 篇 school of optica...
  • 41 篇 the key laborato...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 28 篇 huazhong univers...
  • 28 篇 school of comput...
  • 26 篇 school of comput...
  • 26 篇 hubei province k...
  • 25 篇 hubei key labora...

作者

  • 72 篇 hai jin
  • 38 篇 jin hai
  • 31 篇 yang yang
  • 29 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 hu shengshan
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 19 篇 jianchao zeng
  • 19 篇 dutta paramartha
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 16 篇 niyato dusit
  • 15 篇 jian wang
  • 15 篇 wang lei
  • 15 篇 long zheng
  • 15 篇 zhuang songlin

语言

  • 8,153 篇 英文
  • 1,084 篇 其他
  • 225 篇 中文
  • 34 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=System Engineering and Computer Science"
9480 条 记 录,以下是1161-1170 订阅
排序:
Filter-Based Adaptive Model Pruning for Efficient Incremental Learning on Edge Devices
Filter-Based Adaptive Model Pruning for Efficient Incrementa...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Jing-Jia Hung Yi-Jung Chen Hsiang-Yun Cheng Hsu Kao Chia-Lin Yang Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan Department of Computer Science and Information Engineering National Chi Nan University Nantou Taiwan Research Center for Information Technology Innovation Academia Sinica Taipei Taiwan Department of Engineering and System Science National Tsing Hua University Hsinchu Taiwan
Incremental Learning (IL) enhances Machine Learning (ML) models over time with new data, ideal for edge devices at the forefront of data collection. However, executing IL on edges faces challenges due to limited resou... 详细信息
来源: 评论
Optimal Kernel Extreme Learning Machine for COVID-19 Classification on Epidemiology Dataset
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3305-3318页
作者: Saud S.Alotaibi Amal Al-Rasheed Sami Althahabi Manar Ahmed Hamza Abdullah Mohamed Abu Sarwar Zamani Abdelwahed Motwakel Mohamed I.Eldesouki Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Research Centre Future University in EgyptNew Cairo11745Egypt Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Artificial Intelligence(AI)encompasses various domains such as Machine Learning(ML),Deep Learning(DL),and other cognitive technologies which have been widely applied in healthcare *** models are utilized in healthcare... 详细信息
来源: 评论
A Hybrid Approach with BRKGA and Data Mining for the Early/Tardy Scheduling Problem
A Hybrid Approach with BRKGA and Data Mining for the Early/T...
收藏 引用
Congress on Evolutionary Computation
作者: Israel Mendonça Tirana Noor Fatyanosa Masayoshi Aritsugi Pedro Henrique González Silva Faculty of Advanced Science and Technology Kumamoto University Kumamoto Japan Faculty of Computer Science Brawijaya University Malang Indonesia System Engineering and Computer Science Program Federal University of Rio de Janeiro Rio de Janeiro Brazil
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome re... 详细信息
来源: 评论
Gesture Recognition of sEMG Based on Res-LSTM  17th
Gesture Recognition of sEMG Based on Res-LSTM
收藏 引用
17th International Conference on Intelligent Robotics and Applications, ICIRA 2024
作者: Zhao, Yujia Zou, Chunlong Yun, Juntong Jiang, Du Huang, Li Liu, Ying Jiang, Guozhang Xie, Yuanmin Key Laboratory of Metallurgical Equipment and Control Technology of Ministry of Education Wuhan University of Science and Technology Wuhan430081 China College of Mechanical Engineering Hubei University of Automotive Technology Shiyan442000 China Research Center for Biomimetic Robot and Intelligent Measurement and Control Wuhan University of Science and Technology Wuhan430081 China Hubei Key Laboratory of Mechanical Transmission and Manufacturing Engineering Wuhan University of Science and Technology Wuhan430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan430081 China College of Computer Science and Technology Wuhan University of Science and Technology Wuhan430081 China School of Mechanical Engineering Hubei Engineering University Xiaogan432000 China
sEMG (surface electromyography) signal control of bionic prostheses has been widely studied over the past few years. In particular, sparse sEMG signals are rapidly developing in the field of gesture recognition for th... 详细信息
来源: 评论
Monocular Depth Estimation with Boundary Attention Mechanism and Shifted Window Adaptive Bins
SSRN
收藏 引用
SSRN 2024年
作者: Liang, Mengnan Wang, Congcong Zhao, Meng Shi, Fan Zhang, Chao Han, Yilin School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Laboratory of Computer Vision System of Ministry of Education Tianjin University of Technology Tianjin300384 China
Monocular depth estimation is a classic research topic in computer vision. In recent years, development of Convolutional Neural Networks (CNNs) has facilitated significant breakthroughs in this field. However, there s... 详细信息
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing Data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed Computing systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
Multi-secret Sharing Scheme for Zero Trust Environment  14
Multi-secret Sharing Scheme for Zero Trust Environment
收藏 引用
14th IEEE International Conference on Software engineering and Service science, ICSESS 2023
作者: Zhou, Qin Yang, Rumiao Zhou, Hao Cai, Lei Yongyou Network Technology Co. Ltd Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China North China Institute of Computing Technology The 4th System Department Beijing China
The zero-trust concept of 'never trust, always verify' injected new vitality into the development of network security. However, the related research on zero trust is still preliminary, and the research on secu... 详细信息
来源: 评论
LBA: Matching Theory Based Latency-Sensitive Binary Offloading in IoT-Fog Networks
LBA: Matching Theory Based Latency-Sensitive Binary Offloadi...
收藏 引用
International Communication systems and Networks and Workshops, COMSNETS
作者: Priyanka Soni Omkar Chand Deshlahre Anurag Satpathy Sourav Kanti Addya Department of Computer Science and Engineering Cloud and Smart System Services Lab National Institute of Technology Karnataka India Missouri University of Science and Technology Rolla MO USA
The Internet of Things (IoT) is growing more popular with applications like healthcare services, traffic monitoring, video streaming, smart homes, etc. These applications produce an enormous amount of data, so a reali...
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Packet Transmission using Radio Access Protocol for Intra-Cluster Communications in Mobile Ad hoc Networks  1
Packet Transmission using Radio Access Protocol for Intra-Cl...
收藏 引用
1st International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2022
作者: Sasikumar, Reshma Vaman, Dhadesugoor R. Poulose, Sojan Lal Computer Science and Engineering Dept. Kerala Kothamangalam India Apj Abdul Kalam Technological University Kerala Thiruvananthapuram India Prairie View AandM University Texas AandM University System Electrical and Computer Engineering Dept. TX United States
Mobile Ad hoc Network (MANET) is designed to support flexible and seamless deployment for military and homeland security theatres, where every resource is mobile. The resources include radios and base stations. In thi... 详细信息
来源: 评论