咨询与建议

限定检索结果

文献类型

  • 678,896 篇 会议
  • 11,789 篇 期刊文献
  • 6,203 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 696,892 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 411,886 篇 工学
    • 303,618 篇 计算机科学与技术...
    • 243,290 篇 软件工程
    • 84,088 篇 信息与通信工程
    • 56,316 篇 控制科学与工程
    • 46,439 篇 电气工程
    • 36,329 篇 机械工程
    • 35,289 篇 电子科学与技术(可...
    • 35,190 篇 生物工程
    • 29,370 篇 生物医学工程(可授...
    • 21,395 篇 光学工程
    • 21,133 篇 仪器科学与技术
    • 19,170 篇 动力工程及工程热...
    • 18,141 篇 化学工程与技术
    • 15,240 篇 安全科学与工程
    • 14,410 篇 材料科学与工程(可...
    • 13,455 篇 交通运输工程
    • 12,910 篇 土木工程
  • 167,335 篇 理学
    • 93,610 篇 数学
    • 41,086 篇 物理学
    • 37,912 篇 生物学
    • 26,617 篇 统计学(可授理学、...
    • 19,386 篇 系统科学
    • 17,233 篇 化学
  • 102,448 篇 管理学
    • 65,964 篇 管理科学与工程(可...
    • 41,557 篇 图书情报与档案管...
    • 31,183 篇 工商管理
  • 24,704 篇 医学
    • 20,738 篇 临床医学
    • 19,348 篇 基础医学(可授医学...
  • 15,974 篇 法学
    • 12,978 篇 社会学
  • 14,840 篇 教育学
    • 14,214 篇 教育学
  • 12,365 篇 经济学
  • 8,590 篇 农学
  • 4,549 篇 文学
  • 1,780 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,326 篇 computer science
  • 20,254 篇 application soft...
  • 18,800 篇 computational mo...
  • 17,824 篇 software
  • 16,049 篇 computer archite...
  • 16,046 篇 feature extracti...
  • 15,726 篇 software enginee...
  • 15,683 篇 accuracy
  • 13,618 篇 training
  • 11,107 篇 data mining
  • 10,959 篇 deep learning
  • 10,392 篇 hardware
  • 10,097 篇 machine learning
  • 9,625 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,412 篇 testing
  • 8,879 篇 costs
  • 8,744 篇 data models
  • 8,555 篇 support vector m...
  • 8,384 篇 neural networks

机构

  • 1,889 篇 chitkara univers...
  • 1,361 篇 school of comput...
  • 1,135 篇 school of comput...
  • 1,094 篇 school of comput...
  • 865 篇 school of comput...
  • 802 篇 department of co...
  • 678 篇 college of compu...
  • 678 篇 school of comput...
  • 664 篇 school of comput...
  • 643 篇 department of co...
  • 621 篇 university of ch...
  • 584 篇 state key labora...
  • 569 篇 lovely professio...
  • 548 篇 college of compu...
  • 542 篇 school of comput...
  • 516 篇 maharishi school...
  • 508 篇 department of co...
  • 431 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 415 篇 school of comput...

作者

  • 451 篇 wang wei
  • 341 篇 liu yang
  • 328 篇 yang yang
  • 266 篇 li li
  • 265 篇 china
  • 252 篇 yang liu
  • 247 篇 li wei
  • 239 篇 wang lei
  • 239 篇 zhang lei
  • 228 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 191 篇 liu wei
  • 185 篇 wei wang
  • 183 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 168 篇 zhang yan
  • 168 篇 wei zhang

语言

  • 678,986 篇 英文
  • 12,739 篇 其他
  • 6,236 篇 中文
  • 82 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 45 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
696923 条 记 录,以下是4871-4880 订阅
排序:
Intelligent Identification of Airborne Target Trajectory Behaviour Based on Long Time-Series Space-Based Radar Data
Intelligent Identification of Airborne Target Trajectory Beh...
收藏 引用
software engineering and computer science (CSECS), international conference on
作者: Changhong He Xin Lin Jing Liu Tao Yi Xiangcheng Wan Guozhong Chen Yangbo Feng Nanjing Research Institute of Electronics Technology Nanjing China Shanghai Institute of Satellite Engineering Shanghai China School of Electrical and Information Engineering Tianjin University Tianjin China
As the intensity of confrontation in the neighbourhood continues to escalate, the air defence threat facing our country is growing, and information-based air defence is facing unprecedented challenges. On the basis of... 详细信息
来源: 评论
An Efficient Threshold Ring Signature from G+G Identification Protocol  2nd
An Efficient Threshold Ring Signature from G+G Identificati...
收藏 引用
2nd international conference on Data Security and Privacy Protection, DSPP 2024
作者: Wu, Chunhui Jiang, Siwei Zhang, Fangguo Du, Yusong Lin, Qiping School of Internet Finance and Information Engineering Guangdong University of Finance Guangzhou510521 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou510006 China Xingtang Telecommunication Technology Co. Ltd. Beijing100191 China
Threshold ring signature confirms that t signers are participating in the signature and keep them anonymous. It is a generalization of ring signature, and has many important applications such as whistleblower, e-votin... 详细信息
来源: 评论
Tolerant Testing and Distance Estimation for Distributions Under Memory Constraints  50th
Tolerant Testing and Distance Estimation for Distributions...
收藏 引用
50th international conference on Current Trends in Theory and Practice of computer science, SOFSEM 2025
作者: Roy, Sampriti Vasudev, Yadu Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var... 详细信息
来源: 评论
Machine Learning Algorithms for Cloud-Based Educational Games: Engaging Students with Adaptive Learning Systems
Machine Learning Algorithms for Cloud-Based Educational Game...
收藏 引用
2025 international conference on Pervasive Computational Technologies, ICPCT 2025
作者: Ravindar, B. Podduturi, Mahipal Reddy Basha, D Khalandar Mohan, Chinnem Rama Rokade, Geetanjali Popat Chakravarthi, M. Kalyan Sr University School of Cs & Ai Telangana Warangal India Solutions Architect Affiliation Penske Corporation DowningtownPA19335 United States Institute of Aeronautical Engineering Hyderabad500049 India Narayana Engineering College Department of Computer Science and Engineering Andhra Pradesh Nellore524004 India Maharashtra Pune India University of Technology and Applied Sciences Department of Electronics and Communication Engineering MuscatPO Box 74 Oman
The climate of contemporary instruction is changing because of the fast improvement of instructive methodologies. This review looks at a scope of new instructive innovations, including their purposes, benefits, hardsh... 详细信息
来源: 评论
Automatic software Vulnerability Detection in Binary Code  6th
Automatic Software Vulnerability Detection in Binary Code
收藏 引用
6th international conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Liu, Shigang Li, Lin Ban, Xinbo Chen, Chao Zhang, Jun Camtepe, Seyit Xiang, Yang CSIRO’s Data 61 Clayton Australia Swinburne University of Technology Melbourne Australia Royal Melbourne Institute of Technology Melbourne Australia
Cybersecurity is critical in today’s digital world, where the severity of threats from software vulnerabilities grows significantly each year. Many techniques have been developed to analyze vulnerabilities in source ... 详细信息
来源: 评论
Integrating Spectro-Temporal Cross Aggregation and Multi-Scale Dynamic Learning for Audio Deepfake Detection
Integrating Spectro-Temporal Cross Aggregation and Multi-Sca...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hao, Yunqi Xu, Minqiang Chen, Yihao Liu, Yanyan He, Liang Fang, Lei Liu, Lin School of Computer Science and Technology Xinjiang University Urumqi China Hefei iFly Digital Technology Co. Ltd. Hefei China University of Science and Technology of China Hefei China Department of Electronic Engineering Tsinghua University Beijing China
Audio deepfake refers to the technology of synthesizing speech using deep learning or large model algorithms. Compared to human voice, synthetic deepfake speech exhibits artifacts at global and local levels, which can... 详细信息
来源: 评论
Error-Correcting Graph Codes  16
Error-Correcting Graph Codes
收藏 引用
16th Innovations in Theoretical computer science conference, ITCS 2025
作者: Kopparty, Swastik Potukuchi, Aditya Sha, Harry Department of Mathematics Department of Computer Science University of Toronto Canada Department of Electrical Engineering and Computer Science York University Toronto Canada
In this paper, we construct Error-Correcting Graph Codes. An error-correcting graph code of distance δ is a family C of graphs, on a common vertex set of size n, such that if we start with any graph in C, we would ha... 详细信息
来源: 评论
High-Fidelity Single-View Reconstruction of Indoor Scenes using 3D Shape Prior Template and Pixel-Aligned Deformation
High-Fidelity Single-View Reconstruction of Indoor Scenes us...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Xiaohao He, Xiaolin Wu, Jialin Wang, Xu Tang, Zhuo Li, Ruihui College of Computer Science and Electronic Engineering Hunan University Changsha China
This paper presents a novel pipeline for estimating room layouts and reconstructing the 3D shapes of indoor objects. This task remains challenging due to occlusions of indoor scenes, which lead to incomplete shape and... 详细信息
来源: 评论
StableTalk: Advancing Audio-to-Talking Face Generation with Stable Diffusion and Vision Transformer  27th
StableTalk: Advancing Audio-to-Talking Face Generation with...
收藏 引用
27th international conference on Pattern Recognition, ICPR 2024
作者: Nazarieh, Fatemeh Kittler, Josef Rana, Muhammad Awais Kanojia, Diptesh Feng, Zhenhua School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom Centre for Vision Speech and Signal Processing University of Surrey Guildford United Kingdom Institute for People-Centred AI University of Surrey Guildford United Kingdom School of Artificial Intelligence and Computer Science Jiangnan University Wuxi China
Audio-to-talking face generation stands at the forefront of advancements in generative AI. It bridges the gap between audio and visual representations by generating synchronized and realistic talking faces. Despite re... 详细信息
来源: 评论
Optimizing DC-Stabilized Direct Antenna Modulation Transmitters for Electrically-Small Antennas
Optimizing DC-Stabilized Direct Antenna Modulation Transmitt...
收藏 引用
2025 United States National Committee of URSI National Radio science Meeting, USNC-URSI NRSM 2025
作者: Mayekar, Miheer P. Dusenbury, Joseph K. Schab, Kurt R. Adams, Jacob J. Dept. of Electrical and Computer Engineering North Carolina State University RaleighNC United States Dept. of Electrical and Computer Engineering Santa Clara University Santa ClaraCA United States
Linear time-invariant (LTI) electrically small antennas have high radiation quality factors, leading to a challenging tradeoff between efficiency and bandwidth. Bandwidth limitations distort broadband signals, limitin... 详细信息
来源: 评论