咨询与建议

限定检索结果

文献类型

  • 3,635 篇 会议
  • 2,476 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,162 篇 工学
    • 3,175 篇 计算机科学与技术...
    • 2,622 篇 软件工程
    • 744 篇 信息与通信工程
    • 486 篇 控制科学与工程
    • 363 篇 生物工程
    • 305 篇 电气工程
    • 294 篇 机械工程
    • 257 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 198 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 138 篇 化学工程与技术
    • 122 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 101 篇 材料科学与工程(可...
    • 96 篇 建筑学
    • 96 篇 交通运输工程
    • 94 篇 安全科学与工程
  • 1,839 篇 理学
    • 1,164 篇 数学
    • 397 篇 生物学
    • 328 篇 统计学(可授理学、...
    • 320 篇 物理学
    • 213 篇 系统科学
    • 146 篇 化学
  • 1,211 篇 管理学
    • 719 篇 管理科学与工程(可...
    • 549 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 132 篇 医学
    • 108 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 130 篇 法学
    • 98 篇 社会学
  • 74 篇 经济学
  • 68 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 161 篇 computer science
  • 137 篇 software enginee...
  • 135 篇 feature extracti...
  • 126 篇 laboratories
  • 123 篇 training
  • 115 篇 computational mo...
  • 102 篇 software
  • 98 篇 data mining
  • 96 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 86 篇 accuracy
  • 82 篇 cloud computing
  • 80 篇 optimization
  • 73 篇 clustering algor...
  • 68 篇 data models
  • 63 篇 authentication
  • 62 篇 predictive model...

机构

  • 447 篇 state key labora...
  • 286 篇 state key labora...
  • 210 篇 school of comput...
  • 179 篇 college of compu...
  • 177 篇 state key labora...
  • 156 篇 state key labora...
  • 152 篇 school of inform...
  • 130 篇 school of electr...
  • 126 篇 key laboratory o...
  • 113 篇 national key lab...
  • 111 篇 state key labora...
  • 104 篇 shanghai key lab...
  • 103 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 90 篇 shandong provinc...
  • 79 篇 state key labora...
  • 71 篇 shandong provinc...
  • 69 篇 school of comput...
  • 66 篇 department of co...

作者

  • 71 篇 junping du
  • 55 篇 shen linlin
  • 50 篇 du bo
  • 49 篇 tao dacheng
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 39 篇 gao yang
  • 39 篇 shi yinghuan
  • 35 篇 yu huiqun
  • 34 篇 chen zhong
  • 32 篇 limin xiao
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 30 篇 baowen xu
  • 30 篇 fan guisheng
  • 29 篇 zhao jian
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen
  • 27 篇 liu hong

语言

  • 5,417 篇 英文
  • 581 篇 其他
  • 138 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6125 条 记 录,以下是541-550 订阅
排序:
FAS-reid: Fair Architecture Search for Person Re-IDentification
FAS-reid: Fair Architecture Search for Person Re-IDentificat...
收藏 引用
Information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Shengbo Chen Shijie Chen Zhou Lei School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ...
来源: 评论
Recommending Missed Citations Identified by Reviewers: A New Task, Dataset and Baselines
arXiv
收藏 引用
arXiv 2024年
作者: Long, Kehan Li, Shasha Wang, Pancheng Bao, Chenlong Tang, Jintao Wang, Ting School of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China
Citing comprehensively and appropriately has become a challenging task with the explosive growth of scientific publications. Current citation recommendation systems aim to recommend a list of scientific papers for a g... 详细信息
来源: 评论
Pooling Under the Sun: A Mining Pool Centralized Revisit and Solution
Pooling Under the Sun: A Mining Pool Centralized Revisit and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Kundu Chen Jie Luo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Mining pools are fundamental infrastructure in most public blockchain networks that utilize Proof-of-Work consensus, ensuring that miners receive stable rewards and contribute to the computational power and storage of... 详细信息
来源: 评论
Response Time Analysis for Real-Time DAG Tasks Under Partitioned Scheduling
Response Time Analysis for Real-Time DAG Tasks Under Partiti...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Yumeng Chen Songlin Liu Jianhong Zhou Xiang Ling National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China China School of Computer and Software Engineering Xihua University China
Parallel task systems with real-time constraints are widely applied in various fields. Response time analysis is a necessary condition for online admission of applications in dynamic systems. This article focuses on t... 详细信息
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and Security (IDS)
作者: Jingnian Liu Wei Liang Yuxiang Chen Kai Jin School of Computer Science and Engineering Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
A Comprehensive Overview of Object Detection Based on Deep Learning
A Comprehensive Overview of Object Detection Based on Deep L...
收藏 引用
Intelligent Data and Security (IDS), IEEE International Conference on
作者: Gaojing Yuan Linshu Chen Jiahong Cai Chaoyi Yang Jinnian Liu Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Target detection is an important task in the field of computer vision and its application has been extended to the medical field. In the medical field, target detection techniques can be used for diagnosis, treatment ... 详细信息
来源: 评论
Contribution of Ambient Air Pollution on Risk Assessment of Type 2 Diabetes Mellitus via Explainable Machine Learning
收藏 引用
Biomedical and Environmental Sciences 2023年 第6期36卷 557-560页
作者: DING Zhong Ao ZHANG Li Ying LI Rui Ying NIU Miao Miao ZHAO Bo DONG Xiao Kang LIU Xiao Tian HOU Jian MAO Zhen Xing WANG Chong Jian Department of Epidemiology and Biostatistics College of Public HealthZhengzhou UniversityZhengzhou 450001HenanChina Department of Software Engineering School of Computer and Artificial IntelligenceZhengzhou UniversityZhengzhou 450001HenanChina Department of Statistics University of Illinois at Urbana-ChampaignChampaignU.S.A NHC Key Laboratory of Prevention and Treatment of Cerebrovascular Diseases Zhengzhou 450001HenanChina
Type 2 diabetes mellitus(T2DM)is recognized as a heterogeneous and complicated disease that is able to influence individuals at various life stages[1].Apart from traditional predictors such as age,family history of di... 详细信息
来源: 评论
RGA-Reid: Neural Architecture Search Based on Relation-Aware Global Attention for Person Re-Identification
RGA-Reid: Neural Architecture Search Based on Relation-Aware...
收藏 引用
IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
作者: Shijie Chen Shengbo Chen Zhou Lei School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the continuous development of deep learning, reid has been continually improved. However, the network backbones of reid are mostly manually designed. This paper proposes RGA-Reid based on auto-reid. NASBR-Reid ob...
来源: 评论
User-level failure detection and auto-recovery of parallel programs in HPC systems
收藏 引用
Frontiers of computer Science 2021年 第6期15卷 31-42页
作者: Guozhen ZHANG Yi LIU Hailong YANG Jun XU Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China Sino-German Joint Software Institute Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China Science and Technology on Space System Simulation Laboratory Beijing Simulation Center Beijing 100854China
As the mean-time-between-failures(MTBF)continues to decline with the increasing number of components on large-scale high performance computing(HPC)systems,program failures might occur during the execution period with ... 详细信息
来源: 评论
A real-time privacy-preserving scheme based on grouping queries for continuous location-based services
A real-time privacy-preserving scheme based on grouping quer...
收藏 引用
作者: Liu, Haoyu Zhang, Shiwen Li, Mengling Liang, Wei Arthur Sandor, Voundi Koe School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan Xiangtan China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Guangzhou China
With the advancement of global positioning systems and communication technologies, location-based services (LBS) have become widely used. However, user location privacy is vulnerable during service exchange, and locat... 详细信息
来源: 评论