咨询与建议

限定检索结果

文献类型

  • 21,580 篇 会议
  • 9,511 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 31,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,448 篇 工学
    • 15,434 篇 计算机科学与技术...
    • 12,928 篇 软件工程
    • 3,925 篇 信息与通信工程
    • 2,367 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,299 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,145 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 658 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 575 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,714 篇 理学
    • 5,146 篇 数学
    • 2,268 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 887 篇 法学
    • 693 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 64 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,366 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 528 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 419 篇 application soft...
  • 412 篇 accuracy
  • 396 篇 machine learning
  • 383 篇 data mining
  • 359 篇 computer archite...
  • 302 篇 support vector m...
  • 292 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 260 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,203 篇 college of compu...
  • 349 篇 school of comput...
  • 269 篇 state key labora...
  • 217 篇 school of comput...
  • 195 篇 department of co...
  • 189 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 151 篇 school of comput...
  • 145 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 117 篇 department of co...
  • 115 篇 department of co...
  • 102 篇 school of softwa...
  • 94 篇 school of softwa...
  • 93 篇 school of softwa...
  • 88 篇 school of comput...
  • 88 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 49 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhang lei
  • 35 篇 zhen ji
  • 35 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 ruimin hu
  • 34 篇 jun zhang
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 miao huaikou

语言

  • 29,809 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31096 条 记 录,以下是271-280 订阅
排序:
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and Technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
Suitable and Style-Consistent Multi-Texture Recommendation for Cartoon Illustrations
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2024年 第7期20卷 1-26页
作者: Wu, Huisi Wang, Zhaoze Li, Yifan Liu, Xueting Lee, Tong-Yee College of Computer Science and Software Engineering Shenzhen University No. 3688 Nanhai Road Nanshan District Guangdong Shenzhen518060 China Dept. of Computer Science and Information Engineering National Cheng-Kung University No. 1 University Road Tainan70101 Taiwan
Texture plays an important role in cartoon illustrations to display object materials and enrich visual experiences. Unfortunately, manually designing and drawing an appropriate texture is not easy even for proficient ... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Cardinality estimation for property graph queries with gated learning approach on the graph database
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9159-9183页
作者: He, Zhenzhen Yu, Jiong Du, Xusheng Guo, Binglei Li, Ziyang Li, Zhe School of Information Science and Engineering Xinjiang University Urumqi China School of Computer Engineering Hubei University of Arts and Science Xiangyang China School of Software Xinjiang University Urumqi China Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia... 详细信息
来源: 评论
Weakly Supervised Intracranial Hemorrhage Segmentation with YOLO and an Uncertainty Rectified Segment Anything Model  4th
Weakly Supervised Intracranial Hemorrhage Segmentation with...
收藏 引用
4th International Workshop on Imaging and Treatment Challenges, SWITCH 2024, and 6th International Challenge on Ischemic Stroke Lesion Segmentation Challenge, ISLES 2024, Held in Conjunction with Medical Image Computing and computer Assisted Intervention, MICCAI 2024
作者: Spiegler, Pascal Rasoulian, Amirhossein Xiao, Yiming Department of Computer Science and Software Engineering Concordia University Montreal Canada NeuroRx Research Montreal Canada
Intracranial hemorrhage (ICH) is a life-threatening condition that requires rapid and accurate diagnosis to improve treatment outcomes and patient survival rates. Recent advancements in supervised deep learning have g... 详细信息
来源: 评论
Decentralizing Philippine Driver’s License Application and Identity Management for Transparency, Efficiency, and Security: A Design Proposal  4th
Decentralizing Philippine Driver’s License Application and...
收藏 引用
4th International Conference on Novel and Intelligent Digital Systems, NiDS 2024
作者: Lorico, Hans Daniel Q. Zamuco, Amiel David P. Caro, Jaime D. L. Juayong, Richelle Ann B. Service Science and Software Engineering Laboratory Department of Computer Science College of Engineering University of the Philippines Diliman Quezon City1101 Philippines
Blockchain is a developing and promising field in transaction and identity management. Recent efforts have been underway to address issues of data insecurity and inefficiency presented by centralized systems. Philippi... 详细信息
来源: 评论
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation  4
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time T...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Diakhame, Mouhamadou Lamine Diallo, Cherif Mejri, Mohamed Gaston Berger University Department of Computer Science Saint Louis Senegal Laval University Department of Computer Science & Software Engineering Quebec Canada
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative... 详细信息
来源: 评论
Algorithm for Identifying Critical Nodes in Networks Based on Spectral Clustering to Construct Hypergraphs  16
Algorithm for Identifying Critical Nodes in Networks Based o...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Li, Xujie Shao, Fei Li, Haotian College of Computer Science and Software Engineering Hohai University Nanjing China College of Information Science and Engineering Hohai University Nanjing China
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
A Novel Semi-supervised IoT Time Series Anomaly Detection Model Using Graph Structure Learning  19th
A Novel Semi-supervised IoT Time Series Anomaly Detection Mo...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Song, Weijian Chen, Peng Chen, Juan Xia, Yunni Li, Xi Xi, Qinghui He, Hongxia School of Computer and Software Engineering XiHua University Chengdu China School of Computer Science Chongqing University Chongqing China
Internet of Things (IoT) is an evolving paradigm for building smart cross-industry. The data gathered from IoT devices may have anomalies or other errors for various reasons, such as malicious activities or sensor fai... 详细信息
来源: 评论