咨询与建议

限定检索结果

文献类型

  • 21,824 篇 会议
  • 9,705 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,831 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,764 篇 工学
    • 15,687 篇 计算机科学与技术...
    • 12,997 篇 软件工程
    • 3,976 篇 信息与通信工程
    • 2,508 篇 控制科学与工程
    • 2,081 篇 生物工程
    • 1,542 篇 电气工程
    • 1,313 篇 机械工程
    • 1,209 篇 生物医学工程(可授...
    • 1,174 篇 电子科学与技术(可...
    • 1,031 篇 光学工程
    • 698 篇 安全科学与工程
    • 665 篇 仪器科学与技术
    • 662 篇 化学工程与技术
    • 583 篇 动力工程及工程热...
    • 583 篇 交通运输工程
    • 564 篇 建筑学
  • 8,759 篇 理学
    • 5,169 篇 数学
    • 2,276 篇 生物学
    • 1,671 篇 物理学
    • 1,491 篇 统计学(可授理学、...
    • 1,052 篇 系统科学
    • 669 篇 化学
  • 5,891 篇 管理学
    • 3,499 篇 管理科学与工程(可...
    • 2,640 篇 图书情报与档案管...
    • 1,592 篇 工商管理
  • 1,070 篇 医学
    • 926 篇 临床医学
    • 835 篇 基础医学(可授医学...
  • 894 篇 法学
    • 698 篇 社会学
  • 566 篇 经济学
    • 564 篇 应用经济学
  • 547 篇 教育学
    • 533 篇 教育学
  • 303 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,628 篇 computer science
  • 1,462 篇 software enginee...
  • 649 篇 feature extracti...
  • 644 篇 training
  • 609 篇 computational mo...
  • 558 篇 deep learning
  • 541 篇 semantics
  • 480 篇 software
  • 437 篇 accuracy
  • 413 篇 machine learning
  • 411 篇 application soft...
  • 393 篇 data mining
  • 355 篇 computer archite...
  • 305 篇 support vector m...
  • 295 篇 predictive model...
  • 294 篇 internet of thin...
  • 276 篇 software systems
  • 262 篇 data models
  • 258 篇 programming
  • 255 篇 testing

机构

  • 1,262 篇 college of compu...
  • 359 篇 school of comput...
  • 276 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 190 篇 school of inform...
  • 170 篇 school of comput...
  • 157 篇 college of compu...
  • 152 篇 school of softwa...
  • 150 篇 school of comput...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 126 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 103 篇 school of softwa...
  • 102 篇 school of softwa...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 91 篇 department of co...

作者

  • 64 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 50 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 40 篇 zhou jie
  • 39 篇 wang lei
  • 39 篇 shen linlin
  • 37 篇 zhen ji
  • 37 篇 wang xingwei
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 31 篇 bo du

语言

  • 29,936 篇 英文
  • 1,494 篇 其他
  • 420 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Software Engineering"
31831 条 记 录,以下是261-270 订阅
排序:
Neural Operator-Based Framework for Time Efficient Denoising of Displacement Fields in Ultrasound Elastography
Neural Operator-Based Framework for Time Efficient Denoising...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhu, Yihong Peng, Bo School of Computer Science and Software Engineering Southwest Petroleum University Chengdu610500 China
In ultrasound elastography, the noise present in the measured displacement fields has been a critical factor affecting the quality of the strain or elastic distribution reconstruction. Existing partial differential eq... 详细信息
来源: 评论
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model Contrastive Detection
Fed-BRMC: Byzantine-Robust Federated Learning via Dual-Model...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Gan, Xiaoyun Lu, Peng Gan, Shanyu Xian, Youqian Peng, Kaichen Liu, Peng Li, Dongcheng School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China
Federated Learning (FL) is a distributed privacy-protecting machine learning paradigm that enables collaborative training among multiple parties without the need to share raw data. This mode of training renders FL par... 详细信息
来源: 评论
Unsupervised Insider Threat Detection Using Multi-Head Self-Attention Mechanisms  4
Unsupervised Insider Threat Detection Using Multi-Head Self-...
收藏 引用
4th Intelligent Cybersecurity Conference, ICSC 2024
作者: Bertrand, Simon Germain, Pascal Tawbi, Nadia Laval University Dept. of Computer Science & Software Engineering Québec Canada
We propose an unsupervised insider threat detection system that learns normal user behaviors through audit data using neural networks equipped with multi-head self-attention mechanisms. The attention mechanisms learn ... 详细信息
来源: 评论
Applied Technology Research on the Construction of Bidirectional Knowledge Graph Curriculum System Based on SmartKG  6
Applied Technology Research on the Construction of Bidirecti...
收藏 引用
6th International Workshop on Artificial Intelligence and Education, WAIE 2024
作者: Jiang, Su Luo, Wei Cui, Hengji School of Computer Science and Software Engineering Dalian Neusoft University of Information Dalian China
Amidst the rapid advancements in artificial intelligence technology, it is imperative to apply these technological developments to the realm of education to enhance information-based teaching methodologies. This artic... 详细信息
来源: 评论
A Brief Review on Prediction Methods for Cloud Resource Management  9
A Brief Review on Prediction Methods for Cloud Resource Mana...
收藏 引用
9th IEEE International Conference on Smart Cloud, SmartCloud 2024
作者: Kuang, Chenxing Qiu, Yunyun Cao, Weipeng Xiao, Zhijiao Ming, Zhong Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen China
The complexity of apps running on cloud platforms is evident in their nature. Every application has distinct needs for processing power and memory at various times. In order to effectively cater to tenants' varied... 详细信息
来源: 评论
CBBFT - A Byzantine Fault Tolerance Mechanism for Education Credit Banks  7
CBBFT - A Byzantine Fault Tolerance Mechanism for Education ...
收藏 引用
7th International Conference on computer Information science and Application Technology, CISAT 2024
作者: Li, Xin Zhou, Lianghaojie Chen, Ningtian Jiang, Jianyong Liu, Peng GuangXi Normal University School of Computer Science and Engineering School of Software Guilin China
In the education sector, an increasing amount of research is beginning to explore the application of blockchain technology to credit banks. This paper proposes a consortium blockchain consensus mechanism tailored for ... 详细信息
来源: 评论
Research On Fatigue Driving Detection Based On Deep Learning
收藏 引用
engineering Letters 2025年 第2期33卷 348-356页
作者: Zhou, Huinan Dai, Hong University of Science and Technology Liaoning Liaoning AnshanCO 114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning AnshanCO 114051 China
Fatigue driving is one of the main causes of traffic accidents. Effective fatigue driving detection technology can reduce traffic accidents caused by fatigue driving. Traditional fatigue driving detection methods usua... 详细信息
来源: 评论
B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture
B2-C2: Blockchain-based Flow Control Consistency for Multi-C...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Medury, Lalith Kandah, Farah Auburn University Computer Science and Software Engineering AuburnAL36849 United States
software-defined networking (SDN) is transforming network management, yet it grapples with performance bottlenecks in large-scale deployments. Multi-controller solutions have been proposed to address this issue. Howev... 详细信息
来源: 评论
A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment
收藏 引用
computer Modeling in engineering & sciences 2024年 第9期140卷 3001-3016页
作者: Weijian Song Xi Li Peng Chen Juan Chen Jianhua Ren Yunni Xia School of Computer and Software Engineering Xihua UniversityChengdu610039China West China Second University Hospital Sichuan UniversityChengdu610065China School of Computer Science Chongqing UniversityChongqing400044China
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexit... 详细信息
来源: 评论
Curse to Blessing: Leveraging Model Inversion Attacks to Detect Backdoor Attacks in Federated Learning
Curse to Blessing: Leveraging Model Inversion Attacks to Det...
收藏 引用
2024 IEEE International Performance, Computing, and Communications Conference, IPCCC 2024
作者: Chen, Zhaowen Zhang, Mingze Mostyn, Caleb Jiang, Honglu Feng, Xianglong Miami University Department of Computer Science and Software Engineering Oxford45056 United Kingdom
Federated Learning (FL) offers significant advancements in user/data privacy, learning quality, model efficiency, scalability, and network communication latency. However, it faces notable security challenges, particul... 详细信息
来源: 评论