咨询与建议

限定检索结果

文献类型

  • 2,307 篇 会议
  • 1,871 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,543 篇 工学
    • 1,556 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 478 篇 信息与通信工程
    • 444 篇 控制科学与工程
    • 364 篇 电气工程
    • 298 篇 电子科学与技术(可...
    • 277 篇 光学工程
    • 273 篇 生物工程
    • 241 篇 生物医学工程(可授...
    • 172 篇 机械工程
    • 156 篇 化学工程与技术
    • 130 篇 仪器科学与技术
    • 129 篇 动力工程及工程热...
    • 112 篇 材料科学与工程(可...
    • 97 篇 安全科学与工程
    • 88 篇 交通运输工程
  • 1,540 篇 理学
    • 668 篇 数学
    • 582 篇 物理学
    • 327 篇 生物学
    • 205 篇 统计学(可授理学、...
    • 187 篇 系统科学
    • 180 篇 化学
  • 581 篇 管理学
    • 362 篇 管理科学与工程(可...
    • 228 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 267 篇 医学
    • 228 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 90 篇 公共卫生与预防医...
  • 99 篇 法学
    • 75 篇 社会学
  • 61 篇 经济学
  • 60 篇 教育学
  • 46 篇 农学
  • 20 篇 军事学
  • 16 篇 文学
  • 8 篇 艺术学

主题

  • 138 篇 software enginee...
  • 97 篇 computer science
  • 73 篇 machine learning
  • 65 篇 deep learning
  • 64 篇 neural networks
  • 61 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 55 篇 optimization
  • 52 篇 computational mo...
  • 52 篇 accuracy
  • 48 篇 computer archite...
  • 48 篇 artificial intel...
  • 47 篇 predictive model...
  • 45 篇 software testing
  • 45 篇 humans
  • 44 篇 costs
  • 43 篇 testing
  • 41 篇 semantics
  • 40 篇 software systems

机构

  • 84 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 64 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 56 篇 warsaw
  • 56 篇 university of ci...
  • 56 篇 infn sezione di ...

作者

  • 64 篇 beiter a.
  • 64 篇 barter w.
  • 64 篇 brundu d.
  • 64 篇 bellee v.
  • 57 篇 ao d.
  • 56 篇 bobulska d.
  • 56 篇 afsharnia h.
  • 55 篇 aliouche z.
  • 55 篇 blake t.
  • 55 篇 andersson m.
  • 55 篇 borsato m.
  • 55 篇 betancourt c.
  • 55 篇 belin s.
  • 55 篇 carus l.
  • 55 篇 barbetti m.
  • 55 篇 beck a.
  • 55 篇 cali s.
  • 54 篇 casse g.
  • 54 篇 amato s.
  • 54 篇 baryshnikov f.

语言

  • 3,909 篇 英文
  • 238 篇 其他
  • 47 篇 中文
  • 2 篇 日文
  • 1 篇 俄文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4198 条 记 录,以下是971-980 订阅
排序:
Prediction of Near-Term Breast Cancer Occurrence using Subtraction of Temporally Sequential Digital Mammograms
Prediction of Near-Term Breast Cancer Occurrence using Subtr...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Kosmia Loizidou Galateia Skouroumouni Gabriella Savvidou Anastasia Constantinidou Christos Nikolaou Costas Pitris Department of Electrical and Computer Engineering KIOS Research and Innovation Center of Excellence University of Cyprus Cyprus German Oncology Center Cyprus Medical School University of Cyprus and the Bank of Cyprus Oncology Centre Cyprus Limassol General Hospital Cyprus
Breast cancer remains one of the leading cancers for women worldwide. Fortunately, with the introduction of mammography, the mortality rate has significantly decreased. However, earlier breast cancer prediction could ...
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
SafeDrones: Real-Time Reliability Evaluation of UAVs using Executable Digital Dependable Identities
arXiv
收藏 引用
arXiv 2022年
作者: Aslansefat, Koorosh Nikolaou, Panagiota Walker, Martin Akram, Mohammed Naveed Sorokos, Ioannis Reich, Jan Kolios, Panayiotis Michael, Maria K. Theocharides, Theocharis Ellinas, Georgios Schneider, Daniel Papadopoulos, Yiannis University of Hull United Kingdom Kios Research and Innovation Center of Excellence Department of Electrical and Computer Engineering University of Cyprus Nicosia Cyprus Germany
The use of Unmanned Arial Vehicles (UAVs) offers many advantages across a variety of applications. However, safety assurance is a key barrier to widespread usage, especially given the unpredictable operational and env... 详细信息
来源: 评论
Elderly Standing Imbalance Detection Using Noise-Resilient Robust Mean Estimator and Deep Learning
Elderly Standing Imbalance Detection Using Noise-Resilient R...
收藏 引用
International Conference on software, Knowledge Information, Industrial Management and Applications (SKIMA)
作者: Drishya Raj Shanfeng Hu Nauman Aslam Xiaomin Chen Worasak Rueangsirarak Surapong Uttama Fatimah Nauman Department of Computer and Information Sciences Northumbria University UK Center of Excellence in Computer and Communication Engineering for Capacity Building of Information Technology Mae Fah Luang University Chiang Rai Thailand Center of Excellence in AI and Emerging Technologies School of Information Technology Mae Fah Luang University Chiang Rai Thailand Faculty of Medicine Lancaster University UK
Elderly standing imbalance is a critical public health concern, demanding robust and accurate detection techniques for improved safety and well-being. In this paper, we propose a novel method employing unsupervised le...
来源: 评论
A Probabilistic Framework for Pruning Transformers Via a Finite Admixture of Keys
A Probabilistic Framework for Pruning Transformers Via a Fin...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Tan M. Nguyen Tam Nguyen Long Bui Hai Do Duy Khuong Nguyen Dung D. Le Hung Tran-The Nhat Ho Stan J. Osher Richard G. Baraniuk Department of Mathematics University of California Los Angeles USA Department of Electrical and Computer Engineering Rice University Houston USA FPT Software AI Center Ha Noi Vietnam College of Engineering and Computer Science Vin University Vietnam Applied Artificial Intelligence Institute Deakin University Geelong Australia Department of Statistics and Data Sciences The University of Texas Austin USA
Pairwise dot product-based self-attention is key to the success of transformers which achieve state-of-the-art performance across a variety of applications in language and vision, but are costly to compute. It has bee... 详细信息
来源: 评论
Privacy-Preserving Quantum Two-Party Geometric Intersection
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, James C.N. Yu, Wen-Bin Chi, Lian-Hua Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan Department of Computer Science and Information Technology La Trobe University VIC3086 Australia
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geome... 详细信息
来源: 评论
Intelligent larval zebrafish phenotype recognition via attention mechanism for high-throughput screening
收藏 引用
computers in Biology and Medicine 2025年 188卷 109892-109892页
作者: Wang, Baihua Sun, Qi Liu, Yujia Zhang, Jiheng Li, Gaozheng Wu, Sifang Zheng, Houbing Ye, Jialin Zhou, Meihua Zheng, Haisu Yu, Yongqiang Zhong, Yi Wu, Yuanzi Huang, Da Wang, Biao Weng, Zuquan College of Biological Science and Engineering Fuzhou University Fujian Fuzhou China Department of Plastic and Cosmetic Surgery The First Affiliated Hospital of Fujian Medical University Fujian Fuzhou China The Center for Big Data Research in Burns and Trauma College of Computer and Data Science/College of Software Fuzhou University Fujian China
Background: Larval zebrafish phenotypes serve as critical research indicators in fields such as ecotoxicology and safety assessment since phenotypic defects are closely related to alterations of underlying pathway. Ho... 详细信息
来源: 评论
Sampled-data local exponential stabilization of nonlinear retarded systems by first order approximation methods and spline interpolation of measures
Sampled-data local exponential stabilization of nonlinear re...
收藏 引用
IEEE Conference on Decision and Control
作者: P. Pepe A. Borri M. Di Ferdinando Department of Information Engineering Computer Science and Mathematics Center of Excellence for Research DEWS University of L’Aquila L’Aquila Italy Istituto di Analisi dei Sistemi ed Informatica “A. Ruberti” Consiglio Nazionale delle Ricerche Rome Italy
It is proved, for systems described by nonlinear retarded functional differential equations, that (local) exponential stability is guaranteed under fast sampling and spline approximation of stabilizing feedbacks obtai... 详细信息
来源: 评论
How Deep is Love in LLMs’ Hearts? Exploring Semantic Size in Human-like Cognition
arXiv
收藏 引用
arXiv 2025年
作者: Yao, Yao Yang, Yifei Ma, Xinbei Yang, Dongjie Zhang, Zhuosheng Li, Zuchao Zhao, Hai Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Trusted Data Circulation and Governance in Web3 Shanghai China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan University Wuhan430072 China
How human cognitive abilities are formed has long captivated researchers. However, a significant challenge lies in developing meaningful methods to measure these complex processes. With the advent of large language mo... 详细信息
来源: 评论
A SHAP-based Active Learning Approach for Creating High-Quality Training Data
A SHAP-based Active Learning Approach for Creating High-Qual...
收藏 引用
IEEE International Conference on Big Data
作者: Nailcan Kara Yagiz Levent Gume Umit Tigrak Gokce Ezeroglu Serdar Mola Omer Burak Akgun Arzucan Özgür Analytics Center of Excellence Fibabanka İzmir Turkey R&D Center Fibabanka İstanbul Turkey Analytics Center of Excellence Fibabanka İstanbul Turkey Department of Computer Engineering Boğaziçi University İstanbul Turkey
Machine learning-based text classification models require labeled data for training. However, manual labeling is a costly and time-consuming process. This task is particularly difficult in domains such as banking, whe... 详细信息
来源: 评论