咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是271-280 订阅
排序:
Detecting Duplicate Contributions in Pull-Based Model CombiningTextual and Change Similarities
收藏 引用
Journal of computer Science & Technology 2021年 第1期36卷 191-206页
作者: Zhi-Xing Li Yue Yu Tao Wang Gang Yin Xin-Jun Mao Huai-Min Wang Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense Technology Changsha 410073China Laboratory of Software Engineering for Complex Systems College of ComputerNational University of Defense TechnologyChangsha 410073China
Communication and coordination between OSS developers who do not work physically in the same location have always been the challenging *** pull-based development model,as the state-of-art collaborative development mec... 详细信息
来源: 评论
Industry Upgrading and Public Opinion Prevention Using BERTopic  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Wang, Xinhua Yu, Xiaomei Jiang, Yunmeng Zheng, Xiangwei Li, Wei School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250358 China Shandong Normal University Library Shandong Normal University Jinan China
The development status of the hotel industry in a city is also an essential factor influencing local tourism revenue. In the tourism industry, besides dining and attractions, which are hotspots for public opinion, the... 详细信息
来源: 评论
A Burst Topic Detection Model Based on HVCH Model and Burst_NBT Method  4
A Burst Topic Detection Model Based on HVCH Model and Burst_...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhang, Chao Peng, Qingcheng Xiang, Huan Liu, Yaowei Guo, Hong Liu, Wenjun Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer and Software Engineering Xihua University Chengdu China China Electronics Anshi Technology Co. Ltd Chengdu China
This paper proposes a burst topic detection model based on HVCH model and Burst_NBT method. The model overcomes the sparsity difficulty of microblog by establishing HVCH model, effectively detects topics of microblog.... 详细信息
来源: 评论
Policy Extraction and Optimization with Access Logs for Attribute-based Access Control
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第3期8卷 932-947页
作者: Sun, Wei Li, Long Hu, Ying School of Computer and Information Technology Xinyang Normal University Xinyang464000 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Department of Electric Engineering Pacific Gas and Electric Company San Ramon94583 United States
The policy engineering technology based on attribute-based access control is commonly used to derive rules from the existing authorization information such as access logs. However, most conventional methods extract ru... 详细信息
来源: 评论
An Evaluation Approach for Website Promotion Based on Combined Weight and TOPSIS  22
An Evaluation Approach for Website Promotion Based on Combin...
收藏 引用
5th International Conference on Big Data Technologies, ICBDT 2022
作者: Wang, Xi Chen, Zhichao Kong, Mingming Li, Bo Fan, Mengmeng School of Computer and Software Engineering Xihua University Chengdu China Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
In view of the problems existing in the process of website promotion evaluation, such as inadequate decision-making information, strong subjectivity and quantification difficulty of the index weight assignment, and in... 详细信息
来源: 评论
Diverse Co-saliency Feature Learning for Text-Based Person Retrieval
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5465-5477页
作者: You, Shuai Chen, Cuiqun Feng, Yujian Liu, Hai Ji, Yimu Ye, Mang Nanjing University of Posts and Telecommunications (NJUPT) School of Internet of Things Nanjing China Anhui University School of Computer Science and Technology Hefei China South China Normal University school of computer Guangdong China NJUPT School of Computer Science Nanjing China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan 430072 China
Text-based Person Retrieval (TPR) plays a pivotal role in video surveillance systems for safeguarding public safety. As a fine-grained retrieval task, TPR faces the significant challenge of precisely capturing highly ... 详细信息
来源: 评论
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing
收藏 引用
Journal of computer Science & Technology 2022年 第5期37卷 1026-1048页
作者: She Sun Shuai Ma Jing-He Song Wen-Hai Yue Xue-Lian Lin Tiejun Ma State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang UniversityBeijing 100191China Department of Decision Analytics and Risk Southampton Business SchoolUniversity of Southampton Southampton SO171BJU.K
With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices,trajectory data is continuously *** large-scale trajectories provide opportunities ... 详细信息
来源: 评论
A Web Service Recommendation Method Based on Adaptive Gate Network and xDeepFM  1
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Tao, Zhi Cao, Buqing Ye, Hongfan Kang, Guosheng Peng, Zhenlian Wen, Yiping School of Computer Science and Engineering and Hunan Key Laboratory of Service Computing and New Software Service Technology Hunan University of Science and Technology Hunan Xiangtan China School of Computer and Artificial Intelligence Huaihua University Huaihua China
With the rapid development of service computing technology, more and more companies and organizations are encapsulating and publishing their operational data or resources to the Internet in the form of Web services, r... 详细信息
来源: 评论
Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2889-2905页
作者: Meng Zhu Xingyue Wang Honge Ren Abeer Hakeem Linda Mohaisen College of Information Engineering Harbin UniversityHarbin150086China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin UniversityHarbin150086China College of Computer and Control Engineering Northeast Forestry UniversityHarbin150040China Heilongjiang Forestry Intelligent Equipment Engineering Research Center Northeast Forestry UniversityHarbin150040China Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t... 详细信息
来源: 评论
HAPG-SAQAM: Human Auditory Perception Guided Spatial Audio Quality Assessment Metric
HAPG-SAQAM: Human Auditory Perception Guided Spatial Audio Q...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Yuanming Yao, Jiaxuan Deng, Xiangyu Yang, Yuhong Liao, Ruiqi Tu, Weiping Lin, Cedar National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan China Guangdong OPPO Mobile Telecommunications Corp. Guangdong China
Spatial audio quality evaluation is essential for applications like virtual and augmented reality, where accurate sound reproduction enhances user immersion. While subjective listening tests are the gold standard, the... 详细信息
来源: 评论