咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是171-180 订阅
排序:
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Ontological Approach to the Development and Accreditation of the Educational Programs for the Training of IT Specialists of Ukraine  15
Ontological Approach to the Development and Accreditation of...
收藏 引用
15th IEEE International Scientific and Technical Conference on Computer Sciences and information Technologies, CSIT 2020
作者: Kovaliuk, Tetiana Kobets, Nataliya Pasichnyk, Volodymyr Kunanets, Nataliia Taras Shevchenko National University of Kyiv Software System and Technology Department Kyiv Ukraine Borys Grinchenko Kyiv University Department of Computer Science and Mathematics Kyiv Ukraine Lviv Polytechnic National University Information Systems and Networks Department Lviv Ukraine
The article discusses the concept of knowledge management, which can be used as a methodological basis for the development of new educational programs. The ontology of the educational program is built based on the con... 详细信息
来源: 评论
An efficient proposed yangon railway system simulation module
An efficient proposed yangon railway system simulation modul...
收藏 引用
2020 International Conference on Electronics, information, and Communication, ICEIC 2020
作者: Aung, Htain Lynn Sasithong, Pruk Ullah, Irfan Pengnoo, Manus Wuttisittikulkij, Lunchakorn Pirom, Wasin Poomrittigul, Suvit Wijayasekara, Sanika Chulalongkorn University Department of Electrical Engineering Bangkok Thailand Pathumwan Insitute of Technology Department of Software Engineering and Information System Bangkok Thailand General Sir John Kotelawala Defence University Department of Electrical Electronic and Telecommunication Engineering Ratmalana Sri Lanka
Public transportation is significant in an economical city like Yangon. In Yangon, there are four types of public transport facilities;mostly peoples can choose bus, train, taxi and water bus particularly. Railway sys... 详细信息
来源: 评论
Analytical Models for QoT Estimations in Super-C and Super-C + L Bands Optical Transmission systems
Analytical Models for QoT Estimations in Super-C and Super-C...
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Baoluo Yan Yijun Sun Ziwen Zhou Hong Liu Hongya Wang Chen Huan Zhiyong Zhao Lipeng Feng Anxu Zhang Zhenhua Feng Hu Shi WDM System Department of Wireline Product R&D Institute ZTE Corp. Beijing China State Key Laboratory of Mobile Network and Mobile Multimedia Technology China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Optics Valley Laboratory School of Optical and Electronic Information and Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China China Telecom Research Institute Beijing China
We propose a novel physical model-based QoT estimation with achieved OSNR estimation error ≤ 1.5 dB in primary paths and OSNR prediction error ≤ 1.76 dB in unestablished lightpaths for both super-C bands and super-C... 详细信息
来源: 评论
Semantic Learning and Emulation Based Cross-platform Binary Vulnerability Seeker
arXiv
收藏 引用
arXiv 2022年
作者: Gao, Jian Jiang, Yu Liu, Zhe Yang, Xin Wang, Cong Jiao, Xun Yang, Zijiang Sun, Jiaguang The School of Software Tsinghua University Beijing National Research Center for Information Science and Technology Key Laboratory for Information System Security Ministry of Education Beijing100084 China The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China The Department of Electrical and Computer Engineering Villanova University VillanovaPA19085 United States The Department of Computer Science Western Michigan University KalamazooMI49008 United States
Clone detection is widely exploited for software vulnerability search. The approaches based on source code analysis cannot be applied to binary clone detection because the same source code can produce significantly di... 详细信息
来源: 评论
When to Update Your Model: Constrained Model-based Reinforcement Learning
arXiv
收藏 引用
arXiv 2022年
作者: Ji, Tianying Luo, Yu Sun, Fuchun Jing, Mingxuan He, Fengxiang Huang, Wenbing Department of Computer Science and Technology Tsinghua University China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences China JD Explore Academy *** Inc China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China
Designing and analyzing model-based RL (MBRL) algorithms with guaranteed monotonic improvement has been challenging, mainly due to the interdependence between policy optimization and model learning. Existing discrepan... 详细信息
来源: 评论
Enhancing Pulmonary Nodule Classification performance with TriCaps-RL: A Capsule Network Reinforcement Learning Approach
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1441-1459页
作者: Zheng, Guang-Yuan Zhang, Fu-Quan Cheng, Chen Shan, Hong-Tao Soomro, Nouman Qadeer Liu, Yi College of Information Technology Shanghai Jian Qiao University Shanghai201306 China School of Mathematics and Computer Science Yanan University Shaanxi 716000 China School of Computer and Data Science Minjiang University No.200 Xiyuangong Road Fuzhou University Town Fuzhou350108 China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu610021 China Fuzhou Technology Innovation Center of intelligent Manufacturing information System Minjiang University Fuzhou350108 China Fujian Province University Fuzhou350300 China College of Business Shanghai Jian Qiao University Shanghai201306 China College of Electronic and Electrical Engineering Shanghai University of Engineering Science Shanghai201620 China Software Department Mehran University of Engineering & Technology Sindh 76062 Pakistan
Distinguishing the manifestations of pulmonary nodules poses a significant challenge in the medical field, demanding the expertise of experienced radiologists. This complexity results in the high cost and inadequacy o... 详细信息
来源: 评论
Exploring The Use of Blockchain technology in Cybersecurity and Data Science
Exploring The Use of Blockchain Technology in Cybersecurity ...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: Robaisya Rahmat Mohd Saleh Abbas MohdNorazmi Nordin YusmiMohd Yunus Sufri Muhammad Albert Feisal Ismail Universiti Tunku Abdul Rahman Sungai Long Selangor Malaysia INTI International University Nilai Negeri Sembilan Malaysia Faculty of Education Universiti Kebangsaan Malaysia Bangi Selangor Malaysia Institut Jantung Negara College Kuala Lumpur Malaysia Department of Software Engineering and Information System FCSiT Universiti Putra Malaysia Serdang Selangor Malaysia Faculty of Technology Management & Technopreneuurship Universiti Teknikal Malaysia Melaka Malaysia
Blockchain technology has demonstrated to be extremely efficient at processing distributed transactions in a secured manner. It consists of a wide range of applications. B. To handle smart contacts and Bitcoin cash. B...
来源: 评论
A Review of Deep-Learning-Based Models for Afaan Oromo Fake News Detection on Social Media Networks  3rd
A Review of Deep-Learning-Based Models for Afaan Oromo Fake ...
收藏 引用
3rd International Conference on Advancements in Smart Computing and information Security, ASCIS 2024
作者: Arega, Kedir Lemma Tune, Kula Kekeba Beyene, Asrat Mulatu Tariku, Wegderes Bune, Nurhussen Menza ICT Infrastructures and Administrator Team Leader Ambo University Ambo Ethiopia Department of Software Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Department of Electrical and Computer Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Department of Information Systems Mizan Tepi University Tepi Ethiopia Project Management System Support Expert Ethio Telecom Addis Ababa Ethiopia
This study explores modern fake news detection techniques in the Afan Oromo language, aiming to contribute to advancing research in this field. It explores deep learning methods for transformers, including Bidirection... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论