咨询与建议

限定检索结果

文献类型

  • 21,637 篇 会议
  • 9,543 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,468 篇 工学
    • 15,449 篇 计算机科学与技术...
    • 12,903 篇 软件工程
    • 3,918 篇 信息与通信工程
    • 2,364 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,494 篇 电气工程
    • 1,299 篇 机械工程
    • 1,200 篇 生物医学工程(可授...
    • 1,152 篇 电子科学与技术(可...
    • 1,019 篇 光学工程
    • 691 篇 安全科学与工程
    • 660 篇 仪器科学与技术
    • 656 篇 化学工程与技术
    • 576 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 552 篇 建筑学
  • 8,702 篇 理学
    • 5,140 篇 数学
    • 2,268 篇 生物学
    • 1,655 篇 物理学
    • 1,485 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 664 篇 化学
  • 5,852 篇 管理学
    • 3,478 篇 管理科学与工程(可...
    • 2,621 篇 图书情报与档案管...
    • 1,581 篇 工商管理
  • 1,058 篇 医学
    • 915 篇 临床医学
    • 825 篇 基础医学(可授医学...
  • 885 篇 法学
    • 693 篇 社会学
  • 566 篇 经济学
    • 564 篇 应用经济学
  • 544 篇 教育学
    • 530 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 633 篇 feature extracti...
  • 629 篇 training
  • 601 篇 computational mo...
  • 539 篇 deep learning
  • 536 篇 semantics
  • 473 篇 software
  • 421 篇 accuracy
  • 416 篇 application soft...
  • 409 篇 machine learning
  • 386 篇 data mining
  • 356 篇 computer archite...
  • 303 篇 support vector m...
  • 294 篇 internet of thin...
  • 282 篇 predictive model...
  • 276 篇 software systems
  • 258 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,220 篇 college of compu...
  • 354 篇 school of comput...
  • 274 篇 state key labora...
  • 218 篇 school of comput...
  • 196 篇 department of co...
  • 188 篇 school of inform...
  • 171 篇 school of comput...
  • 156 篇 college of compu...
  • 154 篇 school of comput...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 122 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 90 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 36 篇 laizhong cui
  • 36 篇 zhang lei
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 shen linlin
  • 32 篇 wang xingwei
  • 31 篇 kaishun wu

语言

  • 30,205 篇 英文
  • 882 篇 其他
  • 406 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31482 条 记 录,以下是661-670 订阅
排序:
A Review of Colonial Pipeline Ransomware Attack  23
A Review of Colonial Pipeline Ransomware Attack
收藏 引用
23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023
作者: Beerman, Jack Berent, David Falter, Zach Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH45056 United States
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r... 详细信息
来源: 评论
An Enhanced Multiview Transformer for Population Density Estimation Using Cellular Mobility Data in Smart City
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 161-182页
作者: Yu Zhou Bosong Lin Siqi Hu Dandan Yu College of Computer Science and Software Engineering Shenzhen UniversityShenzhen518060China College of Management Shenzhen UniversityShenzhen518060China Information Center The First Affiliated Hospital of Dalian Medical UniversityDalian116011China
This paper addresses the problem of predicting population density leveraging cellular station *** wireless communication devices are commonly used,cellular station data has become integral for estimating population fi... 详细信息
来源: 评论
Research on Visual Slam Technology for UAV Positioning and Navigation  21
Research on Visual Slam Technology for UAV Positioning and N...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Wang, Zhou Zhihao, Liu Ying, Tian Yujun, Yang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer and Software Engineering Xihua University Chengdu China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province LuZhou China College of Computer and Artificial Intelligence Software College Huaihua University Huaihua China
UAV (Unmanned Aerial Vehicle) navigation can be considered as the process of robots that determine how to successfully and quickly reach the target location. Specifically, in order to complete the scheduled task succe... 详细信息
来源: 评论
BiKD-Yolo: A Small Object Detection Algorithm from UAV Perspective Based on BiFormer Attention and Knowledge Distillation  20
BiKD-Yolo: A Small Object Detection Algorithm from UAV Persp...
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Hua, Xiang Cai, Zeju Zhu, Xiangyuan Aijia, Ouyang School of Software Engineering Sun Yat-sen University Guangdong China School of Computer Science and Software Zhaoqing University Guangdong China School of Information Engineering Zunyi Normal University Guizhou China
Object detection is crucial for the real-time operations of Unmanned Aerial Vehicles (UAVs), particularly in identifying small objects within UAV imagery. While existing computer vision techniques have shown success i... 详细信息
来源: 评论
Ensemble Graph and Device Clustering Method based on Attention Mechanism for Decomposing Monolithic to Microservices  22
Ensemble Graph and Device Clustering Method based on Attenti...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Deng, Qingyong Li, Qiuming Zuo, Qinghua Tian, Shujuan Long, Saiqin Guangxi Normal University School of Computer Science and Engineering The School of Software Guilin China Xiangtan University School of Computer Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou China
Existing methods for decomposing monolithic applications into microservices in cloud environments primarily rely on the call relationships within itself. However, these methods are difficult to apply directly in resou... 详细信息
来源: 评论
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
Multi-Agent Deep Q-Networks for Efficient Edge Federated Learning Communications in software-Defined IoT
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3319-3335页
作者: Prohim Tam Sa Math Ahyoung Lee Seokhoon Kim Department of Software Convergence Soonchunhyang UniversityAsan31538Korea Department of Computer Science Kennesaw State UniversityMariettaGA 30060USA Department of Computer Software Engineering Soonchunhyang UniversityAsan31538Korea
Federated learning(FL)activates distributed on-device computation techniques to model a better algorithm performance with the interaction of local model updates and global model distributions in aggregation averaging ... 详细信息
来源: 评论
Secure and Fast Remote Application-Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings  6
Secure and Fast Remote Application-Based Authentication Drag...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Radhi, Batool Mohammed Hussain, Mohammed Abdulridha Abduljabbar, Zaid Ameen Nyangaresi, Vincent Omollo College of Education for Pure Sciences University of Basrah Department of Computer Science Basrah61004 Iraq Jaramogi Oginga Odinga University of Science and Technology Department of Computer Science and Software Engineering Bondo40601 Kenya
The proliferation of the internet of things (IoT) has led to the emergence of a wide range of intelligent devices, creating a broad domain with significant security concerns. These concerns impose a high level of secu... 详细信息
来源: 评论
Life Expectancy Prediction Based on Particle Swarm Optimization Support Vector Machine Regression  3
Life Expectancy Prediction Based on Particle Swarm Optimizat...
收藏 引用
3rd IEEE International Conference on Electrical engineering, Big Data and Algorithms, EEBDA 2024
作者: Guo, Zhaodong Que, Yuanxi Li, Xiang College of Artificial Intelligence and Data Science Hebei University of Technology Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China College of Computer Science Nankai University Tianjin China
This study delves into the application of Particle Swarm Optimization (PSO) algorithms in the parameter optimization of Support Vector Regression (SVR) models to enhance the accuracy of predicted average life expectan... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论