咨询与建议

限定检索结果

文献类型

  • 5,337 篇 会议
  • 3,315 篇 期刊文献
  • 73 册 图书

馆藏范围

  • 8,725 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,504 篇 工学
    • 4,218 篇 计算机科学与技术...
    • 3,459 篇 软件工程
    • 1,212 篇 信息与通信工程
    • 699 篇 控制科学与工程
    • 653 篇 生物工程
    • 579 篇 电气工程
    • 424 篇 生物医学工程(可授...
    • 395 篇 电子科学与技术(可...
    • 367 篇 机械工程
    • 299 篇 光学工程
    • 224 篇 动力工程及工程热...
    • 208 篇 化学工程与技术
    • 199 篇 安全科学与工程
    • 194 篇 网络空间安全
    • 189 篇 仪器科学与技术
    • 179 篇 交通运输工程
  • 2,605 篇 理学
    • 1,525 篇 数学
    • 712 篇 生物学
    • 505 篇 物理学
    • 466 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 214 篇 化学
  • 1,689 篇 管理学
    • 1,008 篇 管理科学与工程(可...
    • 736 篇 图书情报与档案管...
    • 415 篇 工商管理
  • 437 篇 医学
    • 373 篇 临床医学
    • 329 篇 基础医学(可授医学...
    • 192 篇 药学(可授医学、理...
    • 187 篇 公共卫生与预防医...
  • 240 篇 法学
    • 189 篇 社会学
  • 146 篇 经济学
  • 130 篇 教育学
  • 95 篇 农学
  • 28 篇 文学
  • 22 篇 军事学
  • 20 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 227 篇 deep learning
  • 226 篇 feature extracti...
  • 221 篇 training
  • 209 篇 computational mo...
  • 193 篇 educational inst...
  • 183 篇 semantics
  • 180 篇 machine learning
  • 153 篇 software enginee...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 139 篇 predictive model...
  • 138 篇 optimization
  • 125 篇 data mining
  • 116 篇 data models
  • 110 篇 internet of thin...
  • 106 篇 security
  • 102 篇 wireless sensor ...
  • 101 篇 cloud computing
  • 95 篇 neural networks
  • 95 篇 clustering algor...

机构

  • 1,224 篇 college of compu...
  • 156 篇 college of compu...
  • 118 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 103 篇 state key labora...
  • 102 篇 college of compu...
  • 102 篇 college of compu...
  • 99 篇 software college...
  • 89 篇 college of compu...
  • 71 篇 school of comput...
  • 71 篇 school of softwa...
  • 68 篇 state key labora...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 national enginee...
  • 55 篇 college of compu...
  • 53 篇 school of inform...
  • 47 篇 school of comput...
  • 47 篇 school of softwa...

作者

  • 55 篇 shen linlin
  • 45 篇 jingsha he
  • 37 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 wang xingwei
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 zhen ji
  • 32 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 26 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 24 篇 yan li
  • 23 篇 gao can
  • 23 篇 li yan
  • 21 篇 pan haoyuan

语言

  • 8,243 篇 英文
  • 336 篇 其他
  • 153 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Software Engineering"
8725 条 记 录,以下是71-80 订阅
排序:
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management
DECAY: Dynamic Evaluation and Component Analysis for Enhanci...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Samuel Ginn College of Engineering Computer Science and Software Engineering United States
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o... 详细信息
来源: 评论
DeSAM2: Detection-Driven SAM2 for Hyperspectral Object Tracking  14
DeSAM2: Detection-Driven SAM2 for Hyperspectral Object Track...
收藏 引用
14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, WHISPERS 2024
作者: He, Wangquan Ren, Qi Zhang, Hongtao Mo, Ziqian Li, Nanying Xu, Meng Jia, Sen College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Hyperspectral object tracking (HOT) captures subtle object features, enabling precise identification and tracking in complex backgrounds. However, the high-dimensional nature of data and rapid object changes in dynami... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Computer Science and Software Engineering Samuel Ginn College of Engineering United States
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a... 详细信息
来源: 评论
VR-Recon: Visual Refiner for Fine-Grained Human Reconstruction  4
VR-Recon: Visual Refiner for Fine-Grained Human Reconstructi...
收藏 引用
4th IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2024
作者: Xie, Hong Zhu, Zibin Zhang, Xiaoyan Shen Zhen University College of Computer Science & Software Engineering Shenzhen China
To reconstruct 3D human figures with fine-grained details from sparse views, this paper proposes a novel framework called VR-Recon, which is based on a viewpoint refiner. In this framework, we first decouple geometric... 详细信息
来源: 评论
Hybrid Color Texture Features Classification Through ANN for Melanoma
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2205-2218页
作者: Saleem Mustafa Arfan Jaffar Muhammad Waseem Iqbal Asma Abubakar Abdullah S.Alshahrani Ahmed Alghamdi Faculty of Computer Science&Information Technology Superior UniversityLahore54600Pakistan Department of Software Engineering Superior UniversityLahore54600Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of Jeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Predictive Caching of File System for Database Workload Management  1
Predictive Caching of File System for Database Workload Mana...
收藏 引用
1st International Conference on AIML-Applications for engineering and Technology, ICAET 2025
作者: Jadhav, Rohini Jadhav, Veena Pawar, Prajakta Kannaujia, Abhishek Kumar, Abhishek Gohil, Jayesh College of Engineering Department of Information Technology Pune India College of Engineering Department of Computer Engineering Pune India Bharati Vidyapeeth College of Engineering Department of Computer Engineering Lavale Pune India Veritas Principal Software Engineering India
The proactive caching technique known as 'predictive caching' attempts to improve file system performance by anticipating and pre-fetching data that is likely to be requested in the future. Conventional cachin... 详细信息
来源: 评论
Human Action Recognition in Multi-Level Convolutional Temporal Attention Network
Human Action Recognition in Multi-Level Convolutional Tempor...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Qian Chen, ZhongQi Li, Chang Qian, WeiWen College of Computer Science and Software Engineering Hohai University NanJing China
Human Action Recognition (HAR) has widespread applications in areas such as human-computer interaction, elderly care, and home healthcare. However, current sensor-based HAR faces challenges of low fine-grained recogni... 详细信息
来源: 评论
Masked Face Detection and Recognition Using a Unified Feature Extractor  5
Masked Face Detection and Recognition Using a Unified Featur...
收藏 引用
5th International Conference on Advancements in Computational Sciences, ICACS 2024
作者: Iftikhar, Aroobah Shaukat, Arslan Tariq, Rimsha College of Eme Dept of Computer and Software Engineering Islamabad Pakistan Information Technology University Dept of Computer Engineering Lahore Pakistan
The research field of computer vision has recently taken an interest in the active computer vision problem of masked face recognition due to the COVID-19 pandemic. The use of face masks as a preventative measure again... 详细信息
来源: 评论