咨询与建议

限定检索结果

文献类型

  • 679,455 篇 会议
  • 11,754 篇 期刊文献
  • 6,243 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 697,457 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 411,607 篇 工学
    • 303,264 篇 计算机科学与技术...
    • 243,291 篇 软件工程
    • 83,730 篇 信息与通信工程
    • 56,140 篇 控制科学与工程
    • 46,156 篇 电气工程
    • 36,237 篇 机械工程
    • 35,195 篇 生物工程
    • 35,175 篇 电子科学与技术(可...
    • 29,374 篇 生物医学工程(可授...
    • 21,441 篇 光学工程
    • 21,141 篇 仪器科学与技术
    • 19,162 篇 动力工程及工程热...
    • 18,125 篇 化学工程与技术
    • 15,239 篇 安全科学与工程
    • 14,277 篇 材料科学与工程(可...
    • 13,437 篇 交通运输工程
    • 12,918 篇 土木工程
  • 167,117 篇 理学
    • 93,352 篇 数学
    • 40,992 篇 物理学
    • 37,919 篇 生物学
    • 26,616 篇 统计学(可授理学、...
    • 19,381 篇 系统科学
    • 17,229 篇 化学
  • 102,424 篇 管理学
    • 65,972 篇 管理科学与工程(可...
    • 41,522 篇 图书情报与档案管...
    • 31,206 篇 工商管理
  • 24,650 篇 医学
    • 20,742 篇 临床医学
    • 19,354 篇 基础医学(可授医学...
  • 15,994 篇 法学
    • 12,992 篇 社会学
  • 14,853 篇 教育学
    • 14,228 篇 教育学
  • 12,373 篇 经济学
  • 8,594 篇 农学
  • 4,548 篇 文学
  • 1,780 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,332 篇 computer science
  • 20,254 篇 application soft...
  • 18,846 篇 computational mo...
  • 17,854 篇 software
  • 16,101 篇 feature extracti...
  • 16,063 篇 computer archite...
  • 15,812 篇 accuracy
  • 15,738 篇 software enginee...
  • 13,663 篇 training
  • 11,110 篇 data mining
  • 10,969 篇 deep learning
  • 10,401 篇 hardware
  • 10,069 篇 machine learning
  • 9,666 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,428 篇 testing
  • 8,884 篇 costs
  • 8,772 篇 data models
  • 8,593 篇 support vector m...
  • 8,387 篇 neural networks

机构

  • 1,891 篇 chitkara univers...
  • 1,367 篇 school of comput...
  • 1,138 篇 school of comput...
  • 1,094 篇 school of comput...
  • 875 篇 school of comput...
  • 808 篇 department of co...
  • 686 篇 college of compu...
  • 684 篇 school of comput...
  • 664 篇 school of comput...
  • 646 篇 department of co...
  • 621 篇 university of ch...
  • 582 篇 lovely professio...
  • 581 篇 state key labora...
  • 546 篇 college of compu...
  • 544 篇 school of comput...
  • 516 篇 maharishi school...
  • 507 篇 department of co...
  • 431 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 419 篇 school of comput...

作者

  • 451 篇 wang wei
  • 338 篇 liu yang
  • 334 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 258 篇 yang liu
  • 246 篇 li wei
  • 239 篇 zhang lei
  • 237 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 206 篇 li yang
  • 193 篇 liu wei
  • 185 篇 wei wang
  • 181 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 167 篇 lei wang
  • 166 篇 zhang yan

语言

  • 679,876 篇 英文
  • 12,414 篇 其他
  • 6,185 篇 中文
  • 81 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 45 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
697488 条 记 录,以下是4791-4800 订阅
排序:
The Security Analysis of ROS2 Communication  19th
The Security Analysis of ROS2 Communication
收藏 引用
19th international conference on Security and Privacy in Communication Networks
作者: Yang, Shuo Li, Hongru Guo, Jian ECNU MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU Xinjiang Teachers Coll Shanghai Peoples R China ECNU Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati... 详细信息
来源: 评论
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks  38
Cell2Doc: ML Pipeline for Generating Documentation in Comput...
收藏 引用
38th IEEE/ACM international conference on Automated software engineering (ASE)
作者: Mondal, Tamal Barnett, Scott Lal, Akash Vedurada, Jyothi IIT Hyderabad Hyderabad Telangana India Deakin Univ Geelong Vic Australia Micorosoft Res Redmond WA USA
Computational notebooks have become the go-to way for solving data-science problems. While they are designed to combine code and documentation, prior work shows that documentation is largely ignored by the developers ... 详细信息
来源: 评论
State of the Art in software Verification and Witness Validation: SV-COMP 2024  30th
State of the Art in Software Verification and Witness Valida...
收藏 引用
30th international conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) Held as Part of the 27th European Joint conferences on Theory and Practice of software (ETAPS)
作者: Beyer, Dirk Ludwig Maximilians Univ Munchen Munich Germany
The 13th edition of the Competition on software Verification (SV-COMP 2024) was the largest competition of its kind so far: A total of 76 tools for verification and witness validation were compared. The competition ev... 详细信息
来源: 评论
Analysis of Brain Health Using Machine Learning and Artificial Intelligence Technology: Modern Drug Discovery Perspective  1
Analysis of Brain Health Using Machine Learning and Artifici...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Thirunagalingam, Arunkumar Usha, M.S. Geetha, S. Dhanamathi, A. Dhivya, S. Thendral, M.Tamil Business Intelligence and Reporting B. S. Abdur Rahman Crescent Institute of Science and Technology Department of CSE Chennai600048 India VS.B. ENGINEERING COLLEGE Department of Computer Science and Engineering Karur India Roever Engineering College Department of CSE Perambalur621220 India Sri Venkateswara College of Engineering Department of Computer Science and Engineering Sriperumbudur India Bannari Amman Institute of Technology Department of Information Technology Sathyamangalam India
The creation and discovery of pharmaceuticals may be considered the most important translational science activity that improves human invulnerability and happiness. In the pharmaceutical sector, strategies to reduce c... 详细信息
来源: 评论
Vehicle Driving Position Data Encryption Storage Method Based on Internet of Vehicles
Vehicle Driving Position Data Encryption Storage Method Base...
收藏 引用
2023 IEEE international conference on Sensors, Electronics and computer engineering, ICSECE 2023
作者: Tong, Wei Xie, Huan Haikou University of Economics TJ-YZ School of Network Science Hainan Haikou China
This paper designs the data acquisition and data encryption storage system of car CAN bus based on the Internet of vehicles. The system through the Internet of vehicles data acquisition process design, data informatio... 详细信息
来源: 评论
Stochastic Models for computer Malware Propagation  17
Stochastic Models for Computer Malware Propagation
收藏 引用
17th IEEE international conference on Advanced Trends in Radioelectronics, Telecommunications and computer engineering, TCSET 2024
作者: Zhuravel, Ihor Semenyuk, Serhiy Lviv Polytechnic National University Department of Information Technology Security Lviv Ukraine
Malware propagation is a significant cybersecurity threat, with malicious software such as viruses, worms, and ransomware capable of spreading rapidly across networks. Traditional deterministic models, often based on ... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Mixed Channel Attention  36
Smart Contract Vulnerability Detection Based on Mixed Channe...
收藏 引用
36th international conference on software engineering and Knowledge engineering, SEKE 2024
作者: Wang, Jiao Ran Zeng, Cheng Ba, Kai Yang Quan, Qing Yu Wang, Yi Feng School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China School of Cyberspace Security Hubei University Wuhan China Key Laboratory of Intelligence Sensing System and Security Hubei University Ministry of Education Wuhan China
As blockchain technology progresses, the deployment of smart contracts has become increasingly prevalent. Despite their growing popularity, smart contracts introduce substantial security risks and vulnerabilities. Pre... 详细信息
来源: 评论
Facial Emotion Detection using CNN and OpenCV
Facial Emotion Detection using CNN and OpenCV
收藏 引用
2024 IEEE international conference on Emerging Technologies in computer science for Interdisciplinary Applications, ICETCS 2024
作者: Pradeep, V. Madhushree Sumukha, B.S. Richards, Gary R. Prashant, Shetty Prajakta Alva's Institute of Engineering and Technology Dept of ISE Mangalore India
In various cases, like social robotics, psychological research, and human-computer interaction, highly accurate real-time facial emotional recognition is highly desirable. Nonetheless, current methods suffer from a lo... 详细信息
来源: 评论
CIXG: A Comprehensive Approach to Driver Gene Identification and Causal Interpretation
CIXG: A Comprehensive Approach to Driver Gene Identification...
收藏 引用
2024 IEEE international conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yawen Chen, Yiwen Nie, Shanling Yang, Hai East China University of Science and Technology Department of Computer Science and Engineering Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China National University of Singapore Center for Continuing and Lifelong Education Singapore University of Sydney Faculty of Engineering Australia
With the ongoing advancements in science and technology and the increasing research focus on cancer-related issues, there has been a proliferation of omics-related resources for in-depth analysis and exploration. This... 详细信息
来源: 评论
Optimizing acoustic field rendering through heterogeneous computing  5
Optimizing acoustic field rendering through heterogeneous co...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Sheng, Zhang Zhu, Huiling Hefei University of Technology Hefei China
The objective of this research is to enhance sound field rendering efficiency using a heterogeneous computing framework. By integrating GPU and CPU resources, we address performance challenges in complex environments ... 详细信息
来源: 评论