咨询与建议

限定检索结果

文献类型

  • 683,383 篇 会议
  • 11,585 篇 期刊文献
  • 6,262 册 图书
  • 19 篇 学位论文

馆藏范围

  • 701,219 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,115 篇 工学
    • 304,233 篇 计算机科学与技术...
    • 244,052 篇 软件工程
    • 84,041 篇 信息与通信工程
    • 56,474 篇 控制科学与工程
    • 46,338 篇 电气工程
    • 36,340 篇 机械工程
    • 35,270 篇 电子科学与技术(可...
    • 35,211 篇 生物工程
    • 29,472 篇 生物医学工程(可授...
    • 21,642 篇 光学工程
    • 21,195 篇 仪器科学与技术
    • 19,248 篇 动力工程及工程热...
    • 18,178 篇 化学工程与技术
    • 15,330 篇 安全科学与工程
    • 14,299 篇 材料科学与工程(可...
    • 13,513 篇 交通运输工程
    • 13,014 篇 土木工程
  • 167,630 篇 理学
    • 93,685 篇 数学
    • 41,194 篇 物理学
    • 37,954 篇 生物学
    • 26,769 篇 统计学(可授理学、...
    • 19,386 篇 系统科学
    • 17,266 篇 化学
  • 102,778 篇 管理学
    • 66,190 篇 管理科学与工程(可...
    • 41,693 篇 图书情报与档案管...
    • 31,371 篇 工商管理
  • 24,783 篇 医学
    • 20,865 篇 临床医学
    • 19,465 篇 基础医学(可授医学...
  • 16,071 篇 法学
    • 13,050 篇 社会学
  • 14,979 篇 教育学
    • 14,356 篇 教育学
  • 12,408 篇 经济学
  • 8,622 篇 农学
  • 4,548 篇 文学
  • 1,784 篇 军事学
  • 1,544 篇 艺术学
  • 70 篇 哲学
  • 44 篇 历史学

主题

  • 34,351 篇 computer science
  • 20,262 篇 application soft...
  • 19,188 篇 computational mo...
  • 18,038 篇 software
  • 16,493 篇 accuracy
  • 16,351 篇 feature extracti...
  • 16,165 篇 computer archite...
  • 15,966 篇 software enginee...
  • 13,883 篇 training
  • 11,388 篇 deep learning
  • 11,161 篇 data mining
  • 10,410 篇 hardware
  • 10,186 篇 machine learning
  • 9,885 篇 predictive model...
  • 9,557 篇 educational inst...
  • 9,549 篇 testing
  • 8,945 篇 data models
  • 8,944 篇 costs
  • 8,730 篇 support vector m...
  • 8,501 篇 real-time system...

机构

  • 1,906 篇 chitkara univers...
  • 1,377 篇 school of comput...
  • 1,151 篇 school of comput...
  • 1,093 篇 school of comput...
  • 875 篇 school of comput...
  • 812 篇 department of co...
  • 722 篇 college of compu...
  • 694 篇 school of comput...
  • 664 篇 school of comput...
  • 638 篇 department of co...
  • 634 篇 university of ch...
  • 593 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 542 篇 school of comput...
  • 515 篇 maharishi school...
  • 494 篇 department of co...
  • 432 篇 school of comput...
  • 429 篇 school of comput...
  • 426 篇 nanjing univ sta...

作者

  • 457 篇 wang wei
  • 338 篇 liu yang
  • 338 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 264 篇 yang liu
  • 242 篇 zhang lei
  • 240 篇 li wei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 183 篇 wei wang
  • 182 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 lei wang
  • 170 篇 li bo
  • 169 篇 zhang yan

语言

  • 642,024 篇 英文
  • 54,041 篇 其他
  • 7,456 篇 中文
  • 80 篇 德文
  • 70 篇 西班牙文
  • 48 篇 俄文
  • 44 篇 法文
  • 43 篇 土耳其文
  • 28 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
701250 条 记 录,以下是1111-1120 订阅
排序:
Reversible data hiding in JPEG images based on two-stage embedding
Reversible data hiding in JPEG images based on two-stage emb...
收藏 引用
2024 international conference on computer Network Security and software engineering, CNSSE 2024
作者: Di, Fuqiang Li, Tianxue Yang, Pan Huang, Siyuan Kong, Yongjun Engineering University of Chinese People's Armed Police Force Xi'an710086 China The East China Sea Command of the Coast Guard Force Shang'hai201106 China Ningxia Corps of the People's Armed Police Force Yin'chuan750200 China
Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology... 详细信息
来源: 评论
A Web Service Recommendation Method Based on Reputation Evaluation in Small World Heterogeneous Network
A Web Service Recommendation Method Based on Reputation Eval...
收藏 引用
2023 international conference on computer Network Security and software engineering, CNSSE 2023
作者: Ye, Yanming Chen, Shuhao Cheng, Kailong School of Computer and Software Hangzhou Dianzi University Zhejiang Province Hangzhou China
In order to improve the performance of Web service recommendation in small world heterogeneous network, this paper proposes a method based on reputation evaluation. The method defines the calculation method of reputat... 详细信息
来源: 评论
SCVHUNTER: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network  24
SCVHUNTER: Smart Contract Vulnerability Detection Based on H...
收藏 引用
44th ACM/IEEE international conference on software engineering, ICSE 2024
作者: Luo, Feng Luo, Ruijie Chen, Ting Qiao, Ao He, Zheyuan Song, Shuwei Jiang, Yu Li, Sixing University of Electronic Science and Technology of China The Hong Kong Polytechnic University Hong Kong University of Electronic Science and Technology of China China Tsinghua University China
Smart contracts are integral to blockchain's growth, but their vulnerabilities pose a significant threat. Traditional vulnerability detection methods rely heavily on expert-defined complex rules that are labor-int... 详细信息
来源: 评论
Road Accident Detection using MobileNetv2 with Gradient Boosting Algorithm  1
Road Accident Detection using MobileNetv2 with Gradient Boos...
收藏 引用
1st international conference on software, Systems and Information Technology, SSITCON 2024
作者: Priyanka, K. Obaid, Saif Anguraj, K. Thangam, V. Thirumani Sahana, R. Nitte Meenakshi Institute of Technology Department of Information Science and Engineering Bengaluru India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Sona College of Technology Department of Electronics and Communication Engineering Salem India New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Chennai India Vel Tech Multi Tech Dr. Rangarajan Dr.Sakunthala Engineering College Avadi Department of Computer Science and Engineering Chennai India
An increased number of vehicles on the roads increases the risk of accidents and eventually resulted huge loss of lives and property. Accident detection utilizing computer vision in much consideration as of late. The ... 详细信息
来源: 评论
Segmentation Method of Boxed Lunch Images by Weight Optimization Using Color Texture Dissimilarity  22
Segmentation Method of Boxed Lunch Images by Weight Optimiza...
收藏 引用
22nd IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2024
作者: Qian, Yangyang Hayakawa, Koki Nishifuji, Seiji Mu, Shenglin Nakashima, Shota Yamaguchi University Department of Electrical and Electronic Engineering Yamaguchi Ube Japan Graduate School of Science and Engineering Ehime University Ehime Matsuyama Japan
People with severe upper limb disabilities need assistance from caregivers when eating, which becomes a burden for caregivers. Our laboratory has developed meal assistance robots that use image recognition and voice r... 详细信息
来源: 评论
Resonant Object Interface: Implementation and Initial Exploration of a Tactile Acoustic Interface
Resonant Object Interface: Implementation and Initial Explor...
收藏 引用
international conference on New Interfaces for Musical Expression, NIME 2024
作者: Leitman, Sasha Carnegie, Dale A. Murphy, Jim School of Engineering and Computer Science Victoria University of Wellington New Zealand New Zealand School of Music Victoria University of Wellington New Zealand
The Resonant Object Interface (ROI) is an acoustic input system that provides nuanced, embodied, and expressive engagement with control signals in audio software. The ROI’s unique sensing methodology is built from re... 详细信息
来源: 评论
Identification of Wild Animals in Forest Surveillance Cameras  1
收藏 引用
2nd EAI international conference on Pervasive knowledge and collective intelligence on Web and Social Media, PerSOM 2023
作者: Dokku, Prathyusha Mudrakola, Swapna Dadi, Kalyan Kumar Akula, Nikhitha Department of Computer Science and Engineering Matrusri Engineering College Hyderabad500059 India
In the ever-expanding realm of wildlife conservation and ecological research, the use of automated image classification software has emerged as a valuable tool for extracting crucial insights from camera trap images. ... 详细信息
来源: 评论
Bridging the Communication Gap: Sign Language Recognition Technology for the Speech and Hearing Impaired  36
Bridging the Communication Gap: Sign Language Recognition Te...
收藏 引用
36th international conference on software engineering and Knowledge engineering, SEKE 2024
作者: Ganta, Shivani Shubbar, Safa Timmapuram, Thejeswar Reddy Vangapalli, Lakshmi Poojitha Jilkara, Komal Baheri, Betis Muhajab, Hanan Muhajab, Areej Ghazinour, Kambiz Miner, Stacy Department of Computer Science Kent State University KentOH United States Department of Computer Science College of Engineering and Computer Science Jazan University Jazan Saudi Arabia Computers and Information Technology College Taif University Taif Saudi Arabia CantonNY United States College of Nursing Kent State University KentOH United States
Sign language is a vital communication medium enabling individuals with speech and hearing impairments to convey thoughts, feelings, and ideas effectively. However, the limited understanding of sign language, outside ... 详细信息
来源: 评论
The Effectiveness of Compact Fine-Tuned LLMs in Log Parsing  40
The Effectiveness of Compact Fine-Tuned LLMs in Log Parsing
收藏 引用
40th international conference on software Maintenance and Evolution
作者: Mehrabi, Maryam Hamou-Lhadj, Abdelwahab Savi, Hossein Moo Concordia Univ ECE Montreal PQ Canada Cisco Syst Ottawa ON Canada
Log parsing is defined as the process of extracting structured information from unstructured log data. It is an important step prior to many log analytics tasks. The emergence of Large Language Models (LLMs), like Gen... 详细信息
来源: 评论
A distributed machine learning dynamic remote proof scheme that resists collusion attacks  4
A distributed machine learning dynamic remote proof scheme t...
收藏 引用
4th international conference on Network Communication and Information Security, ICNCIS 2024
作者: Wang, Ke Wu, Qiuxin Qin, Yu School of Applied Science Beijing Information Science and Technology University Beijing100192 China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Science Beijing100190 China
Based on the security of distributed machine learning data and model based on remote proof, a cross-domain dynamic remote proof scheme based on ring signature improves the efficiency of computer cluster proof, the app... 详细信息
来源: 评论