咨询与建议

限定检索结果

文献类型

  • 64,544 篇 会议
  • 1,386 册 图书
  • 573 篇 期刊文献
  • 1 篇 科技报告

馆藏范围

  • 66,502 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 34,262 篇 工学
    • 27,999 篇 计算机科学与技术...
    • 22,309 篇 软件工程
    • 6,758 篇 信息与通信工程
    • 4,371 篇 控制科学与工程
    • 4,132 篇 电气工程
    • 2,566 篇 电子科学与技术(可...
    • 2,327 篇 生物工程
    • 2,127 篇 机械工程
    • 1,588 篇 生物医学工程(可授...
    • 1,504 篇 动力工程及工程热...
    • 1,437 篇 仪器科学与技术
    • 1,119 篇 光学工程
    • 1,109 篇 安全科学与工程
    • 971 篇 网络空间安全
    • 952 篇 土木工程
    • 945 篇 建筑学
  • 11,242 篇 理学
    • 6,411 篇 数学
    • 2,524 篇 生物学
    • 2,487 篇 物理学
    • 1,555 篇 统计学(可授理学、...
    • 1,349 篇 系统科学
    • 920 篇 化学
  • 8,251 篇 管理学
    • 5,818 篇 管理科学与工程(可...
    • 3,038 篇 图书情报与档案管...
    • 2,695 篇 工商管理
  • 1,411 篇 医学
    • 1,180 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
  • 1,268 篇 法学
    • 946 篇 社会学
  • 1,184 篇 教育学
    • 1,161 篇 教育学
  • 1,002 篇 经济学
    • 996 篇 应用经济学
  • 423 篇 农学
  • 332 篇 文学
  • 116 篇 军事学
  • 79 篇 艺术学
  • 6 篇 哲学
  • 4 篇 历史学

主题

  • 4,658 篇 application soft...
  • 4,387 篇 software enginee...
  • 4,106 篇 software
  • 3,607 篇 cloud computing
  • 2,677 篇 computer archite...
  • 2,587 篇 computational mo...
  • 2,442 篇 computer science
  • 2,274 篇 hardware
  • 1,906 篇 distributed comp...
  • 1,269 篇 artificial intel...
  • 1,224 篇 protocols
  • 1,157 篇 concurrent compu...
  • 1,151 篇 mobile computing
  • 1,109 篇 educational inst...
  • 1,078 篇 computer network...
  • 1,057 篇 servers
  • 1,027 篇 security
  • 1,023 篇 quality of servi...
  • 1,015 篇 costs
  • 947 篇 testing

机构

  • 216 篇 college of compu...
  • 130 篇 school of comput...
  • 89 篇 national enginee...
  • 74 篇 school of comput...
  • 69 篇 school of softwa...
  • 68 篇 school of comput...
  • 64 篇 school of comput...
  • 59 篇 department of co...
  • 50 篇 school of big da...
  • 49 篇 state key labora...
  • 48 篇 national enginee...
  • 48 篇 school of softwa...
  • 41 篇 beijing key labo...
  • 41 篇 school of comput...
  • 39 篇 institute of inf...
  • 37 篇 department of co...
  • 37 篇 school of inform...
  • 36 篇 school of softwa...
  • 34 篇 college of compu...
  • 34 篇 department of co...

作者

  • 41 篇 zhang lei
  • 36 篇 lei wang
  • 35 篇 wang lei
  • 33 篇 m. takizawa
  • 32 篇 jian wang
  • 32 篇 zhu huibiao
  • 31 篇 ruimin hu
  • 29 篇 xiao liu
  • 29 篇 li li
  • 27 篇 jing zhang
  • 25 篇 li yang
  • 25 篇 yu wang
  • 23 篇 wang jing
  • 23 篇 jun zhang
  • 23 篇 liu yang
  • 22 篇 xin liu
  • 21 篇 min huang
  • 21 篇 bin wang
  • 21 篇 bernady o. apduh...
  • 20 篇 wei liu

语言

  • 65,393 篇 英文
  • 777 篇 其他
  • 397 篇 中文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 2 篇 德文
  • 1 篇 法文
检索条件"任意字段=International Conference on Multimedia, Software Engineering and Computing"
66504 条 记 录,以下是4951-4960 订阅
排序:
FAS-reid: Fair Architecture Search for Person Re-IDentification  3
FAS-reid: Fair Architecture Search for Person Re-IDentificat...
收藏 引用
3rd IEEE international conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Chen, Shengbo Chen, Shijie Lei, Zhou Shanghai University School of Computer Engineering and Science Shanghai200444 China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai201112 China
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ... 详细信息
来源: 评论
Brain-Inspired Hyperdimensional computing for Ultra-Efficient Edge AI
Brain-Inspired Hyperdimensional Computing for Ultra-Efficien...
收藏 引用
ACM/IEEE international conference on Hardware/software Codesign and System Synthesis part of the Embedded Systems Week (ESWEEK)
作者: Amrouch, Hussam Imani, Mohsen Jiao, Xun Aloimonos, Yiannis Fermuller, Cornelia Yuan, Dehao Ma, Dongning Barkam, Hamza E. Genssler, Paul R. Sutor, Peter Univ Stuttgart Chair Semicond Test & Reliabil STAR Stuttgart Germany UC Irvine Bio Inspired Architecture & Syst Irvine CA USA Villanova Univ Dependable Efficient & Intelligent Comp Lab DETAIL Villanova PA USA Univ Maryland Percept & Robot Grp College Pk MD USA
Hyperdimensional computing (HDC) is rapidly emerging as an attractive alternative to traditional deep learning algorithms. Despite the profound success of Deep Neural Networks (DNNs) in many domains, the amount of com... 详细信息
来源: 评论
Nirjas: An open source framework for extracting metadata from the source code  12
Nirjas: An open source framework for extracting metadata fro...
收藏 引用
12th international conference on Cloud computing, Data Science and engineering, Confluence 2022
作者: Bhardwaj, Ayush Sahil Pratap, Kaushlendra Mishra, Gaurav Amity University Aset Department Of Computer Science Engineering Noida India Sathyabama University India
Metadata/Comments are the critical element of any software development process. In this paper, we went on to explain how the metadata/comments in the source code can play an essential role in comprehending the softwar... 详细信息
来源: 评论
Research of Duplicate Requirement Detection Method  7th
Research of Duplicate Requirement Detection Method
收藏 引用
7th international conference on Smart computing and Communication, SmartCom 2022
作者: Rao, Dansheng Bian, Lingfeng Zhao, Hui COMAC Shanghai Aircraft and Research Institute Shanghai201210 China Fudan University Shanghai200433 China Henan University Kaifeng475000 China
With the rapid development of the software industry, the number of requirements included in the software is also increasing. In particular, in a complex software system such as an avionics software system, dozens of s... 详细信息
来源: 评论
An Enhanced Reversible Data Hiding Algorithm to Maintain Privacy of multimedia in Cloud
An Enhanced Reversible Data Hiding Algorithm to Maintain Pri...
收藏 引用
2022 international conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2022
作者: Vidhya, A. Kumar, P. Mohan Jeppiaar Engineering College Department of Computer Science and Engineering Tamilnadu Chennai India Sri Krishna College of Engineering and Technology Department of Computer Science and Engineering Tamilnadu Coimbatore India
This paper proposes high-capacity image-based reversible data-hiding techniques that may be tested in both plaintext and encrypted domains. We proposed methods for maintaining the authenticity and privacy of multimedi... 详细信息
来源: 评论
Detection and Mitigation of DDoS attack in software Defined Networking: A Survey
Detection and Mitigation of DDoS attack in Software Defined ...
收藏 引用
2022 international conference on Sustainable computing and Data Communication Systems, ICSCDS 2022
作者: Ashodia, Namita Makadiya, Kishan Marwadi University Department of Cyber Security Gujarat Rajkot India Marwadi University Department of Computer Engineering Gujarat Rajkot India
software Defined Networking (SDN) is an emerging technology, which provides the flexibility in communicating among network. software Defined Network features separation of the data forwarding plane from the control pl... 详细信息
来源: 评论
Monitoring and Warning of Flooding Conditions Using IoT Based System  9
Monitoring and Warning of Flooding Conditions Using IoT Base...
收藏 引用
9th international conference on Advanced computing and Communication Systems, ICACCS 2023
作者: Ashokkumar, N. Arun, V. Prabhu, S. Kalaimagal, V. Srinivasan, Dhamodharan Shanthi, B. Mohan Babu University Department of Electronics and Communication Engineering Tirupati India Mohan Babu University Department of Electrical and Electronics Engineering Tirupati India RLE Motors Pvt.Ltd Tamilnadu India Annamalai University Centralized Instrumentation and Service Lab Tamilnadu India
To be sure, flooding is one of the most devastating natural calamities that needs to be addressed. It has widespread repercussions for the economy and has caused many deaths. Lack of warning causes a great deal of ann... 详细信息
来源: 评论
Microsoft Malware Detection using Machine Learning  6
Microsoft Malware Detection using Machine Learning
收藏 引用
6th international conference on Intelligent computing and Control Systems, ICICCS 2022
作者: Garg, Aayushi Tahilramani, Nikunj Chauhan, Parth Patel, Ritu Silver Oak University Electronics & Communication Dept Ahmedabad India Aiie Information Communication Technology Dept. Ahmedabad India Sage University Computer Engineering Dept Madhya Pradesh India
A malware is any software intentionally designed to cause damage to a computer, server, client or network. Malware is very challenging issue and major concern for privacy of data. This detection can give information a... 详细信息
来源: 评论
ORFPPrediction: Machine Learning Based Online Recruitment Fraud Probability Prediction
ORFPPrediction: Machine Learning Based Online Recruitment Fr...
收藏 引用
2023 international conference on Cognitive computing and Complex Data, ICCD 2023
作者: Zhang, Haiyan Wang, Meifeng Wang, Yuanyuan Li, Yazhou Gu, Dingyun Zhu, Yemeng Huaiyin Institute of Technology Institute of Computer and Software Engineering Jiangsu Province Internet of Things Mobile Interconnection Technology Engineering Laboratory Huai'an City Jiangsu223001 China
In response to the issue of inadequate public datasets concerning imbalances in Internet recruitment scams, this paper constructs an imbalanced experimental dataset, labels it, and proposes an ensemble learning method... 详细信息
来源: 评论
Research on Visualization Technology of Data Mining Based on RD-SOM (Radar-Self-Organizing Map) Clustering Algorithm
Research on Visualization Technology of Data Mining Based on...
收藏 引用
Cloud computing, Big Data Applications and software engineering (CBASE), international conference on
作者: Bing Ma Dongsheng Li Xiaotan Liu Yiyuan Mai Shasha Qin PLAA Infantry College PLAA Infantry College Shijiaozhuang Hebei China Changsha Hunan China Hainan Hospital of Chinese PLA General Hospital Sanya Hainan China
With the continuous development of data storage, analysis, processing and other technologies, people are eager to visualize the mining process of complex data, and data mining visualization technology is gradually app... 详细信息
来源: 评论