咨询与建议

限定检索结果

文献类型

  • 21,586 篇 会议
  • 9,560 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,495 篇 工学
    • 15,471 篇 计算机科学与技术...
    • 12,929 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,368 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,301 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,152 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 576 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,715 篇 理学
    • 5,147 篇 数学
    • 2,269 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 888 篇 法学
    • 694 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 531 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 416 篇 application soft...
  • 412 篇 accuracy
  • 409 篇 machine learning
  • 382 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,215 篇 college of compu...
  • 352 篇 school of comput...
  • 273 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 154 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 90 篇 school of comput...
  • 89 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,161 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31448 条 记 录,以下是241-250 订阅
排序:
Topology Discovery in Autonomic Networks  36
Topology Discovery in Autonomic Networks
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Ghaderi, Parsa Atwood, J. William Narayanan, Lata Concordia University Computer Science and Software Engineering Montreal Canada
Access to a topological map is important to network management. Autonomic Networks have been developed, in part, because they provide a convenient, secure platform for the development of operations, administration and... 详细信息
来源: 评论
Intelligent obstacle avoidance algorithm for safe urban monitoring with autonomous mobile drones
收藏 引用
Journal of Electronic science and Technology 2024年 第4期22卷 19-36页
作者: Didar Yedilkhan Abzal E.Kyzyrkanov Zarina A.Kutpanova Shadi Aljawarneh Sabyrzhan K.Atanov Department of Computer Engineering Astana IT UniversityAstana010000Kazakhstan Department of Computer and Software Engineering L.N.Gumilyov Eurasian National UniversityAstana010000Kazakhstan Department of Automation and Control Systems L.N.Gumilyov Eurasian National UniversityAstana010000Kazakhstan Department of Software Engineering Jordan University of Science and TechnologyIrbid22110Jordan
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone *** deployment of intelligent drone swarms offers promising solutions for enha... 详细信息
来源: 评论
Vehicle logo recognition based on depth residual shrinkage network  3
Vehicle logo recognition based on depth residual shrinkage n...
收藏 引用
3rd International Conference on Artificial Intelligence and computer engineering, ICAICE 2022
作者: Lin, Zhaobo Computer Science and Software Engineering Fuzhou University 350000 China
So as to reduce the interference of noisy information and enhance the accuracy of car marker image recognition in real life, a car marker image recognition model based on deep residual shrinkage network is proposed. T... 详细信息
来源: 评论
Multi-Agent Graph Reinforcement Learning based On-Demand Wireless Energy Transfer in Multi-UAV-aided IoT Network  21
Multi-Agent Graph Reinforcement Learning based On-Demand Wir...
收藏 引用
21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023
作者: Zhao, Ze Yu Che, Yueling Luo, Sheng Wu, Kaishun Leung, Victor C.M. College of Computer Science and Software Engineering Shenzhen University China
This paper proposes a new on-demand wireless energy transfer (WET) scheme of multiple unmanned aerial vehicles (UAVs). Unlike the existing studies that simply pursuing the total or the minimum harvested energy maximiz... 详细信息
来源: 评论
ER-Net:Efficient Recalibration Network for Multi-ViewMulti-Person 3D Pose Estimation
收藏 引用
computer Modeling in engineering & sciences 2023年 第8期136卷 2093-2109页
作者: Mi Zhou Rui Liu Pengfei Yi Dongsheng Zhou National and Local Joint Engineering Laboratory of Computer Aided Design School of Software EngineeringDalian UniversityDalian116622China School of Computer Science and Technology Dalian University of TechnologyDalian116024China
Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application *** the introduction of end-to-end direct regression methods,the field has ent... 详细信息
来源: 评论
Boosting Write Performance of KV Stores: An NVM -Enabled Storage Collaboration Approach  40
Boosting Write Performance of KV Stores: An NVM -Enabled Sto...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi He, Jiajian Sun, Kaoyi Dong, Yunhao Chen, Jiaxian Ma, Chenlin Zhou, Amelie Chi Mao, Rui College of Computer Science and Software Engineering Shenzhen University China Hong Kong Baptist University Department of Computer Science Hong Kong
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr... 详细信息
来源: 评论
LeaderKV: Improving Read Performance of KV Stores via Learned Index and Decoupled KV Table  40
LeaderKV: Improving Read Performance of KV Stores via Learne...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wang, Yi Yuan, Jianan Wu, Shangyu Liu, Huan Chen, Jiaxian Ma, Chenlin Qin, Jianbin Shenzhen University College of Computer Science and Software Engineering China City University of Hong Kong Department of Computer Science Hong Kong
Log-structured merge-tree (LSM-tree) is a storage architecture widely used in key-value (KV) stores. To enhance the read efficiency of LSM-tree, recent works utilize the learned index to learn the mapping between keys... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
Resource Based Automatic Calibration System (RBACS) Using Kubernetes Framework
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 1165-1179页
作者: Tahir Alyas Nadia Tabassum Muhammad Waseem Iqbal Abdullah S.Alshahrani Ahmed Alghamdi Syed Khuram Shahzad Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Department of Computer Science&IT Virtual University of PakistanLahore54000Pakistan Department of Software Engineering The Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of Jeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,... 详细信息
来源: 评论
A user requirements-oriented privacy policy self-adaption scheme in cloud computing
收藏 引用
Frontiers of computer science 2023年 第2期17卷 33-44页
作者: Changbo KE Fu XIAO Zhiqiu HUANG Fangxiong XIAO School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210003China College of computer science and technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China School of Software Engineering Jinling Institute of TechnologyNanjing 210000China
In an ever-changing environment,software as a Service(SaaS)can rarely protect users'*** able to manage and control the privacy is therefore an important goal for *** the participant of composite service is substit... 详细信息
来源: 评论