咨询与建议

限定检索结果

文献类型

  • 2,307 篇 会议
  • 1,871 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,543 篇 工学
    • 1,556 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 478 篇 信息与通信工程
    • 444 篇 控制科学与工程
    • 364 篇 电气工程
    • 298 篇 电子科学与技术(可...
    • 277 篇 光学工程
    • 273 篇 生物工程
    • 241 篇 生物医学工程(可授...
    • 172 篇 机械工程
    • 156 篇 化学工程与技术
    • 130 篇 仪器科学与技术
    • 129 篇 动力工程及工程热...
    • 112 篇 材料科学与工程(可...
    • 97 篇 安全科学与工程
    • 88 篇 交通运输工程
  • 1,540 篇 理学
    • 668 篇 数学
    • 582 篇 物理学
    • 327 篇 生物学
    • 205 篇 统计学(可授理学、...
    • 187 篇 系统科学
    • 180 篇 化学
  • 581 篇 管理学
    • 362 篇 管理科学与工程(可...
    • 228 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 267 篇 医学
    • 228 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 90 篇 公共卫生与预防医...
  • 99 篇 法学
    • 75 篇 社会学
  • 61 篇 经济学
  • 60 篇 教育学
  • 46 篇 农学
  • 20 篇 军事学
  • 16 篇 文学
  • 8 篇 艺术学

主题

  • 138 篇 software enginee...
  • 97 篇 computer science
  • 73 篇 machine learning
  • 65 篇 deep learning
  • 64 篇 neural networks
  • 61 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 55 篇 optimization
  • 52 篇 computational mo...
  • 52 篇 accuracy
  • 48 篇 computer archite...
  • 48 篇 artificial intel...
  • 47 篇 predictive model...
  • 45 篇 software testing
  • 45 篇 humans
  • 44 篇 costs
  • 43 篇 testing
  • 41 篇 semantics
  • 40 篇 software systems

机构

  • 84 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 64 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 56 篇 warsaw
  • 56 篇 university of ci...
  • 56 篇 infn sezione di ...

作者

  • 64 篇 beiter a.
  • 64 篇 barter w.
  • 64 篇 brundu d.
  • 64 篇 bellee v.
  • 57 篇 ao d.
  • 56 篇 bobulska d.
  • 56 篇 afsharnia h.
  • 55 篇 aliouche z.
  • 55 篇 blake t.
  • 55 篇 andersson m.
  • 55 篇 borsato m.
  • 55 篇 betancourt c.
  • 55 篇 belin s.
  • 55 篇 carus l.
  • 55 篇 barbetti m.
  • 55 篇 beck a.
  • 55 篇 cali s.
  • 54 篇 casse g.
  • 54 篇 amato s.
  • 54 篇 baryshnikov f.

语言

  • 3,909 篇 英文
  • 238 篇 其他
  • 47 篇 中文
  • 2 篇 日文
  • 1 篇 俄文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4198 条 记 录,以下是811-820 订阅
排序:
DearLLM: Enhancing Personalized Healthcare via Large Language Models-Deduced Feature Correlations  39
DearLLM: Enhancing Personalized Healthcare via Large Languag...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Yongxin Jiang, Xinke Chu, Xu Qiu, Rihong Feng, Yujie Ding, Hongxin Zhao, Junfeng Wang, Yasha Xie, Bing School of Computer Science School of Software & Microelectronics Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China National Engineering Research Center For Software Engineering Peking University Beijing China Center on Frontiers of Computing Studies Peking University Beijing China Peking University Information Technology Institute Binhai Tianjin China Nanhu Laboratory Jiaxing China Department of Computing The Hong Kong Polytechnic University Hong Kong
Exploring the correlations between medical features is essential for extracting patient health patterns from electronic health records (EHR) data, and strengthening medical predictions and decision-making. To constrai... 详细信息
来源: 评论
A Secure Framework for Authenticating and Controlling Access to IoT Devices Integrated with Blockchain
A Secure Framework for Authenticating and Controlling Access...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Sibgha Tahir Noshina Tariq Farrukh Aslam Khan Hilmand Khan Jalal Al-Muhtadi Department of Avionics Engineering Air University Islamabad Pakistan Department of Artificial Intelligence and Data Science National University of Computer and Emerging Sciences Islamabad Pakistan Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia Department of Computer Science College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
The Internet of Things (IoT) enables autonomous communication among devices, improving human life but posing security risks. The main challenges to IoT systems' security are unauthorized access, data tampering, an... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yifan Zhang Haolong Xiang Xuyun Zhang Xiaolong Xu Wei Fan Qin Zhang Lianyong Qi School of software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia Uffield Department of Women's & Reproductive Health University of Oxford England College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering University of Petroleum (East China) China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
S3-Mamba: Small-Size-Sensitive Mamba for Lesion Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Gui Li, Yuexiang Chen, Wenting Ding, Meidan Cheah, Wooi Ping Qu, Rong Ren, Jianfeng Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Shenzhen China School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Group University Engineering Research Center of Digital Medicine and Healthcare Guangxi Medical University Guangxi Nanning China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong School of Computer Science University of Nottingham Nottingham United Kingdom
Small lesions play a critical role in early disease diagnosis and intervention of severe infections. Popular models often face challenges in segmenting small lesions, as it occupies only a minor portion of an image, w... 详细信息
来源: 评论
Joint Route-Reservations with Pricing ⁎
收藏 引用
IFAC-PapersOnLine 2021年 第2期54卷 25-30页
作者: C. Menelaou S. Timotheou P. Kolios C.G. Panayiotou KIOS Research and Innovation Center of Excellence and the Department of Electrical and Computer Engineering University of Cyprus
This work investigates how pricing can enhance the operation and adoption of route-reservations. Route-reservations is a demand and traffic management mechanism that can alleviate congestion and significantly reduce t... 详细信息
来源: 评论
Optimal Economic Dispatch of Power System Networks with Renewable Energy Sources
Optimal Economic Dispatch of Power System Networks with Rene...
收藏 引用
IEEE PES Conference on Innovative Smart Grid Technologies - Middle East (ISGT Middle East)
作者: Atif M. Mohammad Osama A. Alghamdi Abdullah Ali Alhusssainy Muhyaddin Rawa Abdullah M. Abusorrah Y. A. Al-Turki Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia Department of Electrical and Computer Engineering K. A. CARE Energy Research and Innovation Center King Abdulaziz University Jeddah Saudi Arabia Department of Electrical and Computer Engineering K. A. CARE Energy Research and Innovation Center Smart Grids Research Group Center of Research Excellence in Renewable Energy and Power Systems King Abdulaziz University Jeddah Saudi Arabia
This paper compares betwe!en different types of batteries of a grid-connected hybrid power system that utilizes renewable energy sources (PV and Wind Turbines). The hybrid system is located in Yanbu region in Saudi Ar... 详细信息
来源: 评论
An empirical study on the impact of class overlap in just-in-time software defect prediction  33
An empirical study on the impact of class overlap in just-in...
收藏 引用
33rd International Conference on software engineering and Knowledge engineering, SEKE 2021
作者: Yi, Minyang Fan, Guisheng Yu, Huiqun Yang, Xingguang Department of Computer Science and Engineering East China University of Science and Technology Shanghai200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China Shanghai Engineering Research Center of Smart Energy Shanghai China
Just-in-time software defect prediction (JIT-SDP) is an active research topic in the field of software engineering, aiming at identifying defect-inducing code changes. Most of the current JIT-SDP work focused on model... 详细信息
来源: 评论
Reinforcement Learning Architecture for Facial Skin Treatment Recommender
Reinforcement Learning Architecture for Facial Skin Treatmen...
收藏 引用
International Conference on software engineering Research, Management and Applications (SERA)
作者: Jennifer Kim Jin Khalil Dajani Mira Kim Soo Dong Kim Bilal Khan Daniel Hyun Jin Computer Science and Engineering California State University San Bernardino CA Department of Computer Science California State University Fullerton CA USA School of Software Soongsil University Seoul Korea Department of Radiology Medical Center Loma Linda University Loma linda CA
In the domain of facial skin treatment, personalization of treatment methods and management of treatment effectiveness among users/patients become the key challenges. Our approach to addressing the challenges is to de... 详细信息
来源: 评论
An Implementation of a Route Reservation Architecture ⁎
收藏 引用
IFAC-PapersOnLine 2021年 第2期54卷 1-6页
作者: C. Makridis C. Menelaou S. Timotheou C.G. Panayiotou KIOS Research and Innovation Center of Excellence and the Department of Electrical and Computer Engineering University of Cyprus
Route Reservation Architecture seems to be a reliable and durable traffic congestion mitigation mechanism that can significantly reduce drivers’ travel-times. In this framework, a Route Reservation controller is resp... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论