咨询与建议

限定检索结果

文献类型

  • 21,811 篇 会议
  • 9,656 篇 期刊文献
  • 303 册 图书

馆藏范围

  • 31,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,702 篇 工学
    • 15,622 篇 计算机科学与技术...
    • 13,031 篇 软件工程
    • 3,951 篇 信息与通信工程
    • 2,423 篇 控制科学与工程
    • 2,079 篇 生物工程
    • 1,532 篇 电气工程
    • 1,312 篇 机械工程
    • 1,208 篇 生物医学工程(可授...
    • 1,166 篇 电子科学与技术(可...
    • 1,038 篇 光学工程
    • 696 篇 安全科学与工程
    • 664 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 581 篇 动力工程及工程热...
    • 579 篇 交通运输工程
    • 569 篇 建筑学
  • 8,755 篇 理学
    • 5,171 篇 数学
    • 2,273 篇 生物学
    • 1,670 篇 物理学
    • 1,496 篇 统计学(可授理学、...
    • 1,051 篇 系统科学
    • 665 篇 化学
  • 5,896 篇 管理学
    • 3,499 篇 管理科学与工程(可...
    • 2,644 篇 图书情报与档案管...
    • 1,597 篇 工商管理
  • 1,063 篇 医学
    • 921 篇 临床医学
    • 832 篇 基础医学(可授医学...
  • 893 篇 法学
    • 699 篇 社会学
  • 569 篇 经济学
    • 567 篇 应用经济学
  • 551 篇 教育学
    • 537 篇 教育学
  • 300 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,628 篇 computer science
  • 1,462 篇 software enginee...
  • 646 篇 feature extracti...
  • 638 篇 training
  • 606 篇 computational mo...
  • 550 篇 deep learning
  • 536 篇 semantics
  • 480 篇 software
  • 435 篇 accuracy
  • 411 篇 application soft...
  • 408 篇 machine learning
  • 393 篇 data mining
  • 355 篇 computer archite...
  • 305 篇 support vector m...
  • 296 篇 predictive model...
  • 293 篇 internet of thin...
  • 276 篇 software systems
  • 262 篇 data models
  • 257 篇 programming
  • 255 篇 testing

机构

  • 1,260 篇 college of compu...
  • 358 篇 school of comput...
  • 275 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 188 篇 school of inform...
  • 170 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of softwa...
  • 152 篇 school of comput...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 126 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 103 篇 school of softwa...
  • 101 篇 school of softwa...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 90 篇 department of co...

作者

  • 66 篇 liu yang
  • 57 篇 baowen xu
  • 52 篇 chen zhong
  • 51 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 40 篇 zhou jie
  • 39 篇 wang lei
  • 39 篇 shen linlin
  • 37 篇 zhen ji
  • 37 篇 wang xingwei
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 ruimin hu
  • 31 篇 kaishun wu

语言

  • 29,975 篇 英文
  • 1,396 篇 其他
  • 418 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31770 条 记 录,以下是1191-1200 订阅
排序:
DocTTT: Test-Time Training for Handwritten Document Recognition Using Meta-Auxiliary Learning
DocTTT: Test-Time Training for Handwritten Document Recognit...
收藏 引用
IEEE Workshop on Applications of computer Vision (WACV)
作者: Wenhao Gu Li Gu Ziqiang Wang Ching Yee Suen Yang Wang Department of Computer Science and Software Engineering Concordia University
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r... 详细信息
来源: 评论
Federated Learning for Detecting COVID-19 in Chest CT Images: A Lightweight Federated Learning Approach  4
Federated Learning for Detecting COVID-19 in Chest CT Images...
收藏 引用
4th International Conference on Frontiers Technology of Information and computer, ICFTIC 2022
作者: Lai, Weimin Yan, Qiao College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The novel coronavirus is spreading rapidly worldwide, and finding an effective and rapid diagnostic method is apriority. Medical data involves patient privacy, and the centralized collection of large amounts of medica... 详细信息
来源: 评论
On the Implications of Human-Paper Interaction for software Requirements engineering Education  34
On the Implications of Human-Paper Interaction for Software ...
收藏 引用
34th International Conference on software engineering and Knowledge engineering, SEKE 2022
作者: Kamthan, Pankaj Department of Computer Science and Software Engineering Concordia University Montreal Canada
It is broadly accepted that requirements engineering is one of the most important phases of a software project, and requires tools to be effective. For a variety of reasons, paper as a tool has lasted for millennia an... 详细信息
来源: 评论
A Multiobjective Evolutionary Multitasking Algorithm Based on Decomposition and Multiple Knowledge Transfer  4
A Multiobjective Evolutionary Multitasking Algorithm Based o...
收藏 引用
4th International Conference on Data-Driven Optimization of Complex Systems, DOCS 2022
作者: Wu, Zhongjian Zhu, Qingling Chen, Jianyong Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Multiobjective evolutionary multitasking (MOEMT) has become very popular in recent years, as this kind of methods aims to solve a set of multiobjective optimization problems (MOPs) simultaneously, which has been valid... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论
A Design Framework for a Blockchain-Based Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking
A Design Framework for a Blockchain-Based Open Market Platfo...
收藏 引用
12th International Conference on Data science, Technology and Applications, DATA 2023
作者: Toy, Trevor Langerman, Josef Academy of Computer Science and Software Engineering University of Johannesburg Auckland Park Johannesburg South Africa
Around a quarter of the world’s data is generated by financial institutions. The Capgemini 2022 World Payments Report predicts a 28% increase in transaction volumes from 2021 to 2026, to an estimated total of 2.122 t... 详细信息
来源: 评论
Mask Wearing Detection System for Epidemic Control Based on STM32  6th
Mask Wearing Detection System for Epidemic Control Based on ...
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Luoli Yadav, Amit Khan, Asif Varish, Naushad Singh, Priyanka Thakkar, Hiren Kumar Department of Computer and Software Chengdu Neusoft University Chengdu China College of Engineering IT and Environment Charles Darwin University DarwinNT Australia Department of Computer Application Integral University Lucknow India Department of Computer Science and Engineering GITAM University Hyderabad502329 India Department of Computer Science and Engineering SRM University Andhra Pradesh Amravati522502 India Department of Computer Science and Engineering Pandit Deendayal Energy Univrsity Gujarat Gandhinagar382007 India
This paper designs an epidemic prevention and control mask wearing detection system based on STM32, which is used to monitor the situation of people wearing masks. Tiny-YOLO detection algorithm is adopted in the syste... 详细信息
来源: 评论
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)  2nd
Analysis of Techniques for Detection and Removal of Zero-Day...
收藏 引用
2nd International Conference on Ubiquitous Security, UbiSec 2022
作者: Hamid, Khalid Iqbal, Muhammad Waseem Aqeel, Muhammad Liu, Xiangyong Arif, Muhammad Department of Software Engineering The Superior University Lahore54000 Pakistan Department of Computer Science The Superior University Lahore54000 Pakistan School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China
Zero-day attacks (ZDAs) are previously unknown flaws and errors in operating systems, networks, and general-purpose software. ZDAs are the cause to open security breach holes for external users or hackers for illegal ... 详细信息
来源: 评论
Resilient and Reliable Communication for First Responders with Ad-Hoc Network and MPTCP
Resilient and Reliable Communication for First Responders wi...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Cui, Yue Lim, Alvin Yan, Yufei Kulkarni, Abhishek Lan, Tianhang Computer Science and Software Engineering Auburn University Auburn United States
In severe hazardous situations, reliable network communication is an important infrastructure for conveying vital real-time information from sensors embedded in first responders. Important communications and emergency... 详细信息
来源: 评论
FedSeProto: Learning Semantic Prototype in Federated Learning  27
FedSeProto: Learning Semantic Prototype in Federated Learnin...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Lai, Yanyi Fu, Lele Liao, Tianchi Chen, Chuan Zheng, Zibin School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China School of Systems Science and Engineering Sun Yat-Sen University Guangzhou China School of Software Engineering Sun Yat-Sen University Zhuhai China
Federated learning enables multiple clients to collaboratively train a global model without revealing their local data. However, conventional federated learning often overlooks the fact that data stored on different c... 详细信息
来源: 评论