咨询与建议

限定检索结果

文献类型

  • 21,824 篇 会议
  • 9,705 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,831 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,764 篇 工学
    • 15,687 篇 计算机科学与技术...
    • 12,997 篇 软件工程
    • 3,976 篇 信息与通信工程
    • 2,508 篇 控制科学与工程
    • 2,081 篇 生物工程
    • 1,542 篇 电气工程
    • 1,313 篇 机械工程
    • 1,209 篇 生物医学工程(可授...
    • 1,174 篇 电子科学与技术(可...
    • 1,031 篇 光学工程
    • 698 篇 安全科学与工程
    • 665 篇 仪器科学与技术
    • 662 篇 化学工程与技术
    • 583 篇 动力工程及工程热...
    • 583 篇 交通运输工程
    • 564 篇 建筑学
  • 8,759 篇 理学
    • 5,169 篇 数学
    • 2,276 篇 生物学
    • 1,671 篇 物理学
    • 1,491 篇 统计学(可授理学、...
    • 1,052 篇 系统科学
    • 669 篇 化学
  • 5,891 篇 管理学
    • 3,499 篇 管理科学与工程(可...
    • 2,640 篇 图书情报与档案管...
    • 1,592 篇 工商管理
  • 1,070 篇 医学
    • 926 篇 临床医学
    • 835 篇 基础医学(可授医学...
  • 894 篇 法学
    • 698 篇 社会学
  • 566 篇 经济学
    • 564 篇 应用经济学
  • 547 篇 教育学
    • 533 篇 教育学
  • 303 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,628 篇 computer science
  • 1,462 篇 software enginee...
  • 649 篇 feature extracti...
  • 644 篇 training
  • 609 篇 computational mo...
  • 558 篇 deep learning
  • 541 篇 semantics
  • 480 篇 software
  • 437 篇 accuracy
  • 413 篇 machine learning
  • 411 篇 application soft...
  • 393 篇 data mining
  • 355 篇 computer archite...
  • 305 篇 support vector m...
  • 295 篇 predictive model...
  • 294 篇 internet of thin...
  • 276 篇 software systems
  • 262 篇 data models
  • 258 篇 programming
  • 255 篇 testing

机构

  • 1,262 篇 college of compu...
  • 359 篇 school of comput...
  • 276 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 190 篇 school of inform...
  • 170 篇 school of comput...
  • 157 篇 college of compu...
  • 152 篇 school of softwa...
  • 150 篇 school of comput...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 126 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 103 篇 school of softwa...
  • 102 篇 school of softwa...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 91 篇 department of co...

作者

  • 64 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 50 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 40 篇 zhou jie
  • 39 篇 wang lei
  • 39 篇 shen linlin
  • 37 篇 zhen ji
  • 37 篇 wang xingwei
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 31 篇 bo du

语言

  • 29,936 篇 英文
  • 1,494 篇 其他
  • 420 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31831 条 记 录,以下是1011-1020 订阅
排序:
BPREC: A Bayesian Personalized Recommendation Based on User Preferences for Mining  21
BPREC: A Bayesian Personalized Recommendation Based on User ...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Qiu, Laixiang Feng, Jianping Zhou, Wang College of Computer Science Chongqing College of Mobile Communication Chongqing401420 China Mechanical and Electrica Engineering College Hainan Vocational University of Science and Technology Hainan571126 China School of Computer and Software Engineering Xihua University Chengdu610039 China
Faced with overwhelming product information, users often struggle to make choices, impacting their shopping experience and time. To address this, recommendation systems provide precise suggestions that streamline deci... 详细信息
来源: 评论
ESSD: Energy Saving and Securing Data Algorithm for WSNs Security
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3969-3981页
作者: Manar M.Aldaseen Khaled M.Matrouk Laiali H.Almazaydeh Khaled M.Elleithy Computer Engineering Department Al-Hussein Bin Talal UniversityMa’anJordan Software Engineering Department Al-Hussein Bin Talal UniversityMa’anJordan Computer Science and Engineering Department University of BridgeportCTBridgeportUSA
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,t... 详细信息
来源: 评论
A General Smart Contract Vulnerability Detection Framework with Self-attention Graph Pooling  5th
A General Smart Contract Vulnerability Detection Framework w...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Zou, Lihan Gong, Changhao Wu, Zhen Tan, Jie Tang, Junnan Jiang, Zigui Li, Dan School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China School of Software Engineering Sun Yat-Sen University Zhuhai519080 China
In recent years, the increasing development of Web 3.0 has generated growing attention toward blockchain and smart contracts. However, due to their immutability, smart contracts still exhibit various vulnerabilities t... 详细信息
来源: 评论
A Deep Learning Approach for Prediction of Protein Secondary Structure
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3705-3718页
作者: Muhammad Zubair Muhammad Kashif Hanif Eatedal Alabdulkreem Yazeed Ghadi Muhammad Irfan Khan Muhammad Umer Sarwar Ayesha Hanif Department of Computer Science Government College UniversityFaisalabadPakistan Department of Computer Science College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Department of Software Engineering/Computer Science Al Ain UniversityAbu DhabiUnited Arab Emirates
The secondary structure of a protein is critical for establishing a link between the protein primary and tertiary *** this reason,it is important to design methods for accurate protein secondary structure *** of the e... 详细信息
来源: 评论
FedTop:a constraint-loosed federated learning aggregation method against poisoning attack
收藏 引用
Frontiers of computer science 2024年 第5期18卷 233-235页
作者: Che WANG Zhenhao WU Jianbo GAO Jiashuo ZHANG Junjie XIA Feng GAO Zhi GUAN Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China China Unicom Beijing 100033China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac... 详细信息
来源: 评论
Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication
收藏 引用
SN computer science 2024年 第1期5卷 4页
作者: Althaf Ali, A. Hussain, Mohammed Muzaffar Subramaneswara Rao, A. Lavanya, S. Feroz Khan, A.B. Department of Computer Applications Madanapalle Institute of Technology & Science (MITS) Andhra Pradesh Madanapalle India Department of Computer Science and Engineering C. Abdul Hakeem College of Engineering and Technology Tamil Nadu Melvisharam India Department of Software Applications Thiruthangal Nadar College Tamil Nadu Chennai India Department of Computer Science Syed Hameedha Arts and Science College Tamil Nadu Kilakarai India
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based... 详细信息
来源: 评论
Streamlining plant disease diagnosis with convolutional neural networks and edge devices
收藏 引用
Neural Computing and Applications 2024年 第29期36卷 18445-18477页
作者: Ahamed, Md. Faysal Salam, Abdus Nahiduzzaman, Md. Abdullah-Al-Wadud, M. Islam, S. M. Riazul Department of Computer Science and Engineering Rajshahi University of Engineering & ampTechnology Rajshahi6204 Bangladesh Department of Electrical and Computer Engineering Rajshahi University of Engineering & ampTechnology Rajshahi6204 Bangladesh Department of Electrical Engineering Qatar University Doha Qatar Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Natural and Computing Sciences University of Aberdeen AberdeenAB24 3FX United Kingdom
In addressing labor-intensive process of manual plant disease detection, this article introduces an innovative solution—the lightweight parallel depthwise separable convolutional neural network (PDSCNN) coupled with ... 详细信息
来源: 评论
VisioSLR: A Vision Data-Driven Framework for Sign Language Video Recognition and Performance Evaluation on Fine-Tuned YOLO Models  16
VisioSLR: A Vision Data-Driven Framework for Sign Language V...
收藏 引用
16th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2025 / 8th International Conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Ismail, Leila Shahin, Nada Tesfaye, Henok Hennebelle, Alain Lab Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates
With the emergence of AI for good, there has been an increasing interest in building computer vision data-driven deep learning inclusive AI solutions. Sign language Recognition (SLR) has gained attention recently. It ... 详细信息
来源: 评论
A Deep Reinforcement Learning based VM Scheduling Strategy Decreasing Data Center Communication costs  24
A Deep Reinforcement Learning based VM Scheduling Strategy D...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Xiao, Zhijiao Liu, Xiao Ming, Zhong Software Engineering Research Center College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
With the rapid development of cloud computing, more and more complicated services are deployed on the cloud. The frequent communication between services places a great burden on the network of the data center and lead... 详细信息
来源: 评论
Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds
收藏 引用
Big Data 2023年 第5期11卷 339-354页
作者: Badshah, Afzal Jalal, Ateeqa Farooq, Umar Rehman, Ghani-Ur Band, Shahab S. Iwendi, Celestine Department of Computer Science and Software Engineering International Islamic University Islamabad Pakistan Department of Computer Science University of Science and Technology Bannu Pakistan Department of Computer Science and Bioinformatics Khushal Khan Khattak University Karak Pakistan Future Technology Research Center College of Future National Yunlin University of Science and Technology Douliou Taiwan School of Creative Technologies University of Bolton Bolton United Kingdom
The cloud network is rapidly growing due to a massive increase in interconnected devices and the emergence of different technologies such as the Internet of things, fog computing, and artificial intelligence. In respo... 详细信息
来源: 评论