咨询与建议

限定检索结果

文献类型

  • 21,580 篇 会议
  • 9,511 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 31,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,448 篇 工学
    • 15,434 篇 计算机科学与技术...
    • 12,928 篇 软件工程
    • 3,925 篇 信息与通信工程
    • 2,367 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,299 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,145 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 658 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 575 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,714 篇 理学
    • 5,146 篇 数学
    • 2,268 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 887 篇 法学
    • 693 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 64 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,366 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 528 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 419 篇 application soft...
  • 412 篇 accuracy
  • 396 篇 machine learning
  • 383 篇 data mining
  • 359 篇 computer archite...
  • 302 篇 support vector m...
  • 292 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 260 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,203 篇 college of compu...
  • 349 篇 school of comput...
  • 269 篇 state key labora...
  • 217 篇 school of comput...
  • 195 篇 department of co...
  • 189 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 151 篇 school of comput...
  • 145 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 117 篇 department of co...
  • 115 篇 department of co...
  • 102 篇 school of softwa...
  • 94 篇 school of softwa...
  • 93 篇 school of softwa...
  • 88 篇 school of comput...
  • 88 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 49 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhang lei
  • 35 篇 zhen ji
  • 35 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 ruimin hu
  • 34 篇 jun zhang
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 miao huaikou

语言

  • 29,809 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31096 条 记 录,以下是4841-4850 订阅
排序:
Revisiting fixed-point quantum search: proof of the quasi-Chebyshev lemma
arXiv
收藏 引用
arXiv 2024年
作者: Li, Guanzhong Li, Lvzhou Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Shenzhen518045 China
The original Grover's algorithm suffers from the souffle problem, which means that the success probability of quantum search decreases dramatically if the iteration time is too small or too large from the right ti... 详细信息
来源: 评论
EdgeMob: A Context-Aware Dynamic Service Migration for Wearable IoT in Healthcare
EdgeMob: A Context-Aware Dynamic Service Migration for Weara...
收藏 引用
Computing, Internet of Things and Microwave Systems (ICCIMS), International Conference on
作者: Imran Raza Syed Asad Hussain Sana Latif Department of Computer Science COMSATS University Islamabad Lahore Lahore Pakistan Department of Software Engineering University of Central Punjab (UCP) Lahore Pakistan
Edge Computing (EC) is a distributed network architecture offering computation and storage resources at the network edge, addressing cloud computing limitations by optimizing latency and enhancing data safety and priv... 详细信息
来源: 评论
Research on the Numerical Representation of Stock Linkage Prediction  2nd
Research on the Numerical Representation of Stock Linkage Pr...
收藏 引用
2nd International Symposium on Simulation and Process Modelling, ISSPM 2020
作者: Ma, Chi Wang, Shaofan Lu, Shengliang Han, Guojing School of Computer Science and Engineering Huizhou University Huizhou516007 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Meteorological Administration Anshan China
In this paper, time series of numerical correlations and morphological similarities are analyzed. It is proposed to combine the correlation coefficient with a time-weighted dynamic time warping (DTW) distance to empha... 详细信息
来源: 评论
Unveiling Crime Patterns and Empowering Investigative Insights Through Machine Learning and NLP
Unveiling Crime Patterns and Empowering Investigative Insigh...
收藏 引用
Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC), International Conference on
作者: Prashanth Ragam H.V. Mallesh L. Pavithra Suma L. Yasaswini M. Varun Kumar N. Siri Varsha Sankati Jyothi School of Computer Science & Engineering VIT-AP UNIVERSITY Vijayawada AP Software Development Cell (SDC) VIT-AP UNIVERSITY Vijayawada AP
The well-being of society and public safety are severely threatened by crime. Policymakers, law enforcement agencies, and community stakeholders must comprehend the distribution of crimes, their patterns, and the vari... 详细信息
来源: 评论
A Brief Review on Prediction Methods for Cloud Resource Management
A Brief Review on Prediction Methods for Cloud Resource Mana...
收藏 引用
IEEE International Conference on Smart Cloud (SmartCloud)
作者: Chenxing Kuang Yunyun Qiu Weipeng Cao Zhijiao Xiao Zhong Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China
The complexity of apps running on cloud platforms is evident in their nature. Every application has distinct needs for processing power and memory at various times. In order to effectively cater to tenants’ varied co... 详细信息
来源: 评论
Enhanced Fourier Transform Using Wavelet Packet Decomposition
收藏 引用
Journal of Sensor Technology 2024年 第1期14卷 1-15页
作者: Wouladje Cabrel Golden Tendekai Mumanikidzwa Jianguo Shen Yutong Yan Department of Physics and Electronic Information Engineering Optical Engineering Zhejiang Normal University Jinhua China Department of Computer Science and Technology Software Engineering Zhejiang Normal University Jinhua China Department of Physics and Electronic Information Engineering Electronic Engineering Zhejiang Normal University Jinhua China
Many domains, including communication, signal processing, and image processing, use the Fourier Transform as a mathematical tool for signal analysis. Although it can analyze signals with steady and transitory properti... 详细信息
来源: 评论
A computer Vision-Based Vehicle Detection System Leveraging Deep Learning
A Computer Vision-Based Vehicle Detection System Leveraging ...
收藏 引用
Humanitarian Technology Conference (KHI-HTC), IEEE Karachi Section
作者: Saadullah Khan Sanayna Vohra Sultan Abdullah Siddique Abdul Ahad Abro Mansoor Ebrahim Department of Software Engineering Iqra University Main Campus Karachi Pakistan Department of Computer Science Iqra University Main Campus Karachi Pakistan
This study uses advanced computer vision (CV) and deep learning (DL) techniques to present a combined approach for extensive vehicle detection and number plate recognition. Improving the effectiveness and precision of...
来源: 评论
Genealogical Relationship Extraction from Unstructured Text Using Fine-Tuned Transformer Models
Genealogical Relationship Extraction from Unstructured Text ...
收藏 引用
International Conference on Semantic Computing
作者: Carloangello Parrolivelli Lubomir Stanchev Computer Science and Software Engineering Department California Polytechnic State University San Luis Obispo CA USA
The paper tackles the task of extracting genealogical relationships, such as "sibling-of", "parent-of", "child-of", and "spouse-of", from unstructured, free-form text. In order ...
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
OMLog: Online Log Anomaly Detection for Evolving System with Meta-learning
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Jiyu Li, Mingchu Wang, Zumin Chen, Liming Qin, Jing Zhang, Runfa The School of Software Technology Dalian University of Technology Dalian China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang China The College of Information Engineering Dalian University Dalian China The School of Computer Science and Technology Dalian University of Technology Dalian China The School of Software Engineering Dalian University Dalian China The School of Automation and Software Engineering Shanxi University Taiyuan China
Log anomaly detection (LAD) is essential to ensure safe and stable operation of software systems. Although current LAD methods exhibit significant potential in addressing challenges posed by unstable log events and te... 详细信息
来源: 评论