咨询与建议

限定检索结果

文献类型

  • 21,590 篇 会议
  • 9,721 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,613 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,646 篇 工学
    • 15,592 篇 计算机科学与技术...
    • 12,991 篇 软件工程
    • 3,986 篇 信息与通信工程
    • 2,419 篇 控制科学与工程
    • 2,071 篇 生物工程
    • 1,588 篇 电气工程
    • 1,315 篇 机械工程
    • 1,202 篇 生物医学工程(可授...
    • 1,172 篇 电子科学与技术(可...
    • 1,026 篇 光学工程
    • 703 篇 安全科学与工程
    • 662 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 584 篇 交通运输工程
    • 575 篇 动力工程及工程热...
    • 552 篇 建筑学
    • 540 篇 网络空间安全
  • 8,761 篇 理学
    • 5,169 篇 数学
    • 2,280 篇 生物学
    • 1,676 篇 物理学
    • 1,499 篇 统计学(可授理学、...
    • 1,052 篇 系统科学
    • 670 篇 化学
  • 5,886 篇 管理学
    • 3,496 篇 管理科学与工程(可...
    • 2,644 篇 图书情报与档案管...
    • 1,586 篇 工商管理
  • 1,072 篇 医学
    • 924 篇 临床医学
    • 831 篇 基础医学(可授医学...
  • 890 篇 法学
    • 696 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 551 篇 教育学
  • 305 篇 农学
  • 104 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,454 篇 software enginee...
  • 635 篇 feature extracti...
  • 620 篇 training
  • 599 篇 computational mo...
  • 542 篇 deep learning
  • 535 篇 semantics
  • 475 篇 software
  • 416 篇 accuracy
  • 414 篇 application soft...
  • 413 篇 machine learning
  • 386 篇 data mining
  • 355 篇 computer archite...
  • 301 篇 support vector m...
  • 296 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,223 篇 college of compu...
  • 356 篇 school of comput...
  • 273 篇 state key labora...
  • 220 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of softwa...
  • 152 篇 school of comput...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 100 篇 school of softwa...
  • 94 篇 school of softwa...
  • 90 篇 school of comput...
  • 90 篇 department of co...

作者

  • 64 篇 liu yang
  • 57 篇 baowen xu
  • 54 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 40 篇 zhang lei
  • 39 篇 zhou jie
  • 39 篇 wang lei
  • 37 篇 zhen ji
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 33 篇 niyato dusit
  • 33 篇 hu ruimin
  • 33 篇 shen linlin
  • 32 篇 wang xingwei
  • 31 篇 kaishun wu

语言

  • 30,288 篇 英文
  • 930 篇 其他
  • 406 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31613 条 记 录,以下是221-230 订阅
排序:
Secret Sharing Based Key Agreement Protocol for Body Area Networks  18th
Secret Sharing Based Key Agreement Protocol for Body Area N...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Sheng, Weihong Cai, Bin Hu, Chunqiang Li, Ruinian School of Big Data and Software Engineering Chongqing University Chongqing China Computer Science Department Bowling Green State University Bowling Green United States
In order to provide more comprehensive medical services and personalized health monitoring according to individual needs, Body Area Networks (BANs) have been extensively studied by many researchers. As BANs involve th... 详细信息
来源: 评论
TSMS-InceptionNeXt: A Framework for Image-Based Combustion State Recognition in Counterflow Burners via Feature Extraction Optimization
收藏 引用
computers, Materials and Continua 2025年 第3期83卷 4329-4352页
作者: Huiling Yu Xibei Jia Yongfeng Niu Yizhuo Zhang Software Engineering Department of Computer Science Changzhou University Changzhou 213146 China Electrical Engineering Department of Computer Science Changzhou University Changzhou 213146 China
The counterflow burner is a combustion device used for research on combustion. By utilizing deep convolutional models to identify the combustion state of a counterflow burner through visible flame images, it facilitat... 详细信息
来源: 评论
SA-ResNet:An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3335-3350页
作者: Zengyu Cai Yuming Dai Jianwei Zhang Yuan Feng School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450066China College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450066China Faculty of Information Engineering Xuchang Vocational Technical CollegeXuchang461000China School of Electronic Information Zhengzhou University of Light IndustryZhengzhou450066China
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguardin... 详细信息
来源: 评论
DocTTT: Test-Time Training for Handwritten Document Recognition Using Meta-Auxiliary Learning
DocTTT: Test-Time Training for Handwritten Document Recognit...
收藏 引用
IEEE Workshop on Applications of computer Vision (WACV)
作者: Wenhao Gu Li Gu Ziqiang Wang Ching Yee Suen Yang Wang Department of Computer Science and Software Engineering Concordia University
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r... 详细信息
来源: 评论
A Cross Attention Transformer-Mixed Feedback Video Recommendation Algorithm Based on DIEN
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 977-996页
作者: Jianwei Zhang Zhishang Zhao Zengyu Cai Yuan Feng Liang Zhu Yahui Sun College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450000China Faculty of Information Engineering Xuchang Vocational Technical CollegeXuchang461000China College of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450000China College of Electronics and Information Zhengzhou University of Light IndustryZhengzhou450000China
The rapid development of short video platforms poses new challenges for traditional recommendation *** systems typically depend on two types of user behavior feedback to construct user interest profiles:explicit feedb... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline  18th
Profinder: Towards Professionals Recognition on Mobile Devi...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wang, Yong Xiong, Yi Yang, Tianyu Shen, Yiran College of Computer Science and Technology Harbin Engineering University Harbin China Modeling and Emulation in E-Government National Engineering Laboratory Harbin China School of Software Shandong University Jinan China
As the global population continues to age, there is a concurrent rise in the number of individuals experiencing cognitive impairment and dementia, underscoring the critical necessity to address their hospice needs and... 详细信息
来源: 评论
Velocity Field-Based Surveillance Video Frame Deletion Detection Using Siamese Network  27th
Velocity Field-Based Surveillance Video Frame Deletion Detec...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Su, Yang Tan, ShunQuan Huang, Jiwu College of Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Surveillance videos play a crucial role in providing evidences. However, the deletion of even a few frames can significantly impact the interpretation of events, while the deletion can be performed easily using video ... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论