咨询与建议

限定检索结果

文献类型

  • 21,586 篇 会议
  • 9,560 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,495 篇 工学
    • 15,471 篇 计算机科学与技术...
    • 12,929 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,368 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,301 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,152 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 576 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,715 篇 理学
    • 5,147 篇 数学
    • 2,269 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 888 篇 法学
    • 694 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 531 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 416 篇 application soft...
  • 412 篇 accuracy
  • 409 篇 machine learning
  • 382 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,215 篇 college of compu...
  • 352 篇 school of comput...
  • 273 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 154 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 90 篇 school of comput...
  • 89 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,161 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31448 条 记 录,以下是4811-4820 订阅
排序:
The Human Behind the Data: Reflections from an Ongoing Co-Design and Deployment of a Data-Navigation Interface for Front-Line Emergency Housing Shelter Staff
arXiv
收藏 引用
arXiv 2023年
作者: Masrani, Teale W. He, Helen Ai Messier, Geoffrey Department of Computer Science University of Calgary Calgary Canada Electrical and Software Engineering University of Calgary Calgary Canada
On any night in Canada, at least 35,000 individuals experience homelessness. These individuals use emergency shelters to transition out of homelessness and into permanent housing. We designed and deployed a technology... 详细信息
来源: 评论
Voice Presentation Attacks Detection using Acoustic MLTP Features and BiLSTM
Voice Presentation Attacks Detection using Acoustic MLTP Fea...
收藏 引用
International Conference on Communication, Computing and Digital Systems (C-CODE)
作者: Sundas Ibrar Ali Javed Hafsa Ilyas Department of Computer Science UET Taxila Punjab Pakistan Department of Software Engineering UET Taxila Punjab Pakistan
Automatic speaker verification (ASV) systems have been used in numerous voice-controlled technologies including voice banking, automobiles, smartphones, smart homes, etc. The growth of voice-operated devices is increa...
来源: 评论
Multimodal Attention-Enhanced Feature Fusion-based Weekly Supervised Anomaly Violence Detection
arXiv
收藏 引用
arXiv 2024年
作者: Kaneko, Yuta Musa Miah, Abu Saleh Hassan, Najmul Lee, Hyoun-Sup Jang, Si-Woong Shin, Jungpil School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Department of Applied Software Engineering Dongeui University Busanjin-Gu Busan47340 Korea Republic of Department of Computer Engineering Dongeui University Busan47340 Korea Republic of
Weakly supervised video anomaly detection (WS-VAD) is a crucial area in computer vision for developing intelligent surveillance systems. Researchers are actively working on WS-VAD systems by assessing anomaly scores, ... 详细信息
来源: 评论
Interaction Petri Nets for Modeling Multiagent Interactions
Interaction Petri Nets for Modeling Multiagent Interactions
收藏 引用
computer science, computer engineering, & Applied Computing (CSCE), Congress in
作者: Norah Aldahash Steve King Abir Benabid Computer Science University of York York UK Software Engineering King Saud University Riyadh Saudi Arabia
Petri nets have been closely related to multiagent systems (MAS) and used as a tool for modeling agents and their behavior for specification, verification, and validation purposes. Various models of agent activities, ...
来源: 评论
A2RNet: Adversarial Attack Resilient Network for Robust Infrared and Visible Image Fusion
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jiawei Yu, Hongwei Chen, Jiansheng Ding, Xinlong Wang, Jinlong Liu, Jinyuan Zou, Bochao Ma, Huimin School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Software Technology Dalian University of Technology Dalian China
Infrared and visible image fusion (IVIF) is a crucial technique for enhancing visual performance by integrating unique information from different modalities into one fused image. Exiting methods pay more attention to ... 详细信息
来源: 评论
Identity-preserving 3D Facial Completion under Skull Constraints
Identity-preserving 3D Facial Completion under Skull Constra...
收藏 引用
IEEE International Joint Conference on Biometrics (IJCB)
作者: Longtao Yu Junli Zhao Fuqing Duan Chenlei Lv Dantong Li Zhenkuan Pan Mingquan Zhou College of Computer Science and Technology Qingdao University School of Artificial Intelligence Beijing Normal University College of Computer Science and Software Engineering Shenzhen University School of Computer Science and Informations Cardiff University School of Information Science and Technology Northwest University National and Local Joint Engineering Research Center for Cultural Heritage Digitization Northwest University
3D face shape completion is a necessary pre-process for various facial applications as they are often mutilated due to the acquiring environment or occlusion. However, it is challenging to ensure identity consistency ... 详细信息
来源: 评论
A Distributed Privacy-Preserving Framework for Deep Learning with Edge-Cloud Computing  15
A Distributed Privacy-Preserving Framework for Deep Learning...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart Data, SmartData 2022
作者: Dai, Fei Liu, Guozhi Huang, Bi Xu, Xiaolong Chen, Chaochao Zhou, Zhangbing Zhou, Xiaokang Southwest Forestry University School of Big Data and Intelligent Engineering Kunming China Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Zhejiang University College of Computer Science and Technology Zhejiang China China University of Geosciences School of Information Engineering Beijing China Shiga University Faculty of Data Science Shiga Japan
Industrial Internet of Things (IIoT) systems can leverage deep learning (DL) models to provide intelligent applications. However, the training process of such DL models tends to leak privacy when the training data con... 详细信息
来源: 评论
Privacy-preserving polyp segmentation using federated learning with differential privacy
收藏 引用
Smart Health 2025年 36卷
作者: Hasan, Md. Mahmodul Rahman, Mohammad Motiur Department of Software Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Bangladesh Department of Computer Science and Engineering Mawlana Bhashani Science and Technology University Tangail 1902 Bangladesh
Background and Objective: Patient privacy is of paramount importance in the medical field, especially as data-driven medical applications gain popularity. The privacy of medical records is increasingly crucial. In thi... 详细信息
来源: 评论
Cultivating software Quality Improvement in the Classroom: An Experience with ChatGPT
Cultivating Software Quality Improvement in the Classroom: A...
收藏 引用
Conference on software engineering Education & Training (CSEE&T)
作者: Eman Abdullah AlOmar Mohamed Wiem Mkaouer Software Engineering Department Stevens Institute of Technology Hoboken NJ USA Computer Science Department University of Michigan-Flint Flint MI USA
Large Language Models (LLMs), like ChatGPT, have gained widespread popularity and usage in various software engineering tasks, including programming, testing, code review, and program comprehension. However, their eff... 详细信息
来源: 评论
Provably Secure Non-interactive Key Exchange Protocol for Group-Oriented Applications in Scenarios with Low-Quality Networks
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Rui Zhang, Lei Computer Science and Artificial Intelligence Institute Southwestern University of Finance and Economics China Software Engineering Institute East China Normal University China
Non-interactive key exchange (NIKE) enables two or multiple parties (just knowing the public system parameters and each other’s public key) to derive a (group) session key without the need for interaction. Recently, ... 详细信息
来源: 评论