咨询与建议

限定检索结果

文献类型

  • 11,140 篇 会议
  • 5,174 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 16,549 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,173 篇 工学
    • 8,102 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,994 篇 信息与通信工程
    • 1,297 篇 控制科学与工程
    • 1,092 篇 生物工程
    • 855 篇 电气工程
    • 726 篇 生物医学工程(可授...
    • 671 篇 机械工程
    • 595 篇 电子科学与技术(可...
    • 549 篇 光学工程
    • 415 篇 安全科学与工程
    • 349 篇 仪器科学与技术
    • 339 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 314 篇 建筑学
  • 4,508 篇 理学
    • 2,639 篇 数学
    • 1,232 篇 生物学
    • 823 篇 物理学
    • 742 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 350 篇 化学
  • 3,142 篇 管理学
    • 1,907 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 937 篇 工商管理
  • 709 篇 医学
    • 617 篇 临床医学
    • 547 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 370 篇 社会学
  • 324 篇 经济学
    • 321 篇 应用经济学
  • 321 篇 教育学
    • 312 篇 教育学
  • 173 篇 农学
  • 72 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,070 篇 computer science
  • 1,015 篇 software enginee...
  • 303 篇 application soft...
  • 287 篇 computational mo...
  • 285 篇 deep learning
  • 269 篇 data mining
  • 244 篇 machine learning
  • 239 篇 computer archite...
  • 222 篇 software
  • 201 篇 software systems
  • 187 篇 training
  • 186 篇 internet of thin...
  • 183 篇 support vector m...
  • 183 篇 feature extracti...
  • 179 篇 programming
  • 179 篇 accuracy
  • 172 篇 semantics
  • 171 篇 educational inst...
  • 168 篇 wireless sensor ...
  • 166 篇 laboratories

机构

  • 340 篇 college of compu...
  • 196 篇 department of co...
  • 156 篇 state key labora...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 82 篇 department of co...
  • 76 篇 school of inform...
  • 74 篇 department of co...
  • 72 篇 department of co...
  • 68 篇 department of co...
  • 64 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 44 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 42 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 29 篇 shen furao
  • 29 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 15,995 篇 英文
  • 444 篇 其他
  • 119 篇 中文
  • 10 篇 德文
  • 4 篇 法文
  • 3 篇 日文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering Department"
16549 条 记 录,以下是131-140 订阅
排序:
Arithmetic Expression Evaluations with Membranes
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 55-60页
作者: Ping Guo Haizhu Chen Hui Zheng College of Computer Science Chongqing University Chongqing China Chongqing Key Laboratory of Software Theory and Technology Chongqing China Department of Software Engineering Chongqing College of Electronic Engineering Chongqing China
Arithmetic operations and expression evaluations are fundamental in computing models. This paper firstly designs arithmetic membranes without priority rules for basic arithmetic operations, and then proposes an algori... 详细信息
来源: 评论
A Meta-Model to Support Compatibility Testing of Cross-Browser Web Application
A Meta-Model to Support Compatibility Testing of Cross-Brows...
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Mishal Muneer Uzair Rasheed Muhammad Majid Hussain Department of Computer Science & IT The University of Lahore Lahore Pakistan Department of Computer and Software Engineering College of Electrical and Mechanical Engineering NUST Islamabad Pakistan
Ensuring the user interface (UI) compatibility of web applications across diverse client-side configurations, including various operating systems and browsers, is a significant challenge due to the extensive range of ... 详细信息
来源: 评论
Introduction to the Special Issue on Formal Methods and Models for System Design
收藏 引用
ACM Transactions on Embedded Computing Systems 2025年 第3期24卷 1-3页
作者: Jens Brandt Indranil Saha Lijun Zhang Engineering and Computer Science Hochschule Niederrhein Krefeld Germany Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur India State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
来源: 评论
Efficient Fingerprint Database Organization for Optimized Recognition
Efficient Fingerprint Database Organization for Optimized Re...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Jeffrey Jeeva Dhas Adhip Koshy Nishit Dua D. Ajitha Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system ... 详细信息
来源: 评论
Deep domain adaptation by joint distribution neural matching
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Hong, Zijie Chen, Sentao Wen, Lisheng Yang, Xiaowei School of Software Engineering South China University of Technology Guangzhou China Department of Computer Science Shantou University Shantou China
Domain adaptation aims to learn a prediction model that performs well in a target domain with unlabeled data by harnessing the distributionally different labeled data from a source domain. In this paper, we design a s...
来源: 评论
Evaluating Feature Prioritization in a Reduced Feature Set Using Explainable AI for Intracranial Aneurysm Classification
Evaluating Feature Prioritization in a Reduced Feature Set U...
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Iram Abdullah Ali Javed Department of Computer Science Air University Kamra Pakistan Department of Software Engineering University of Engineering & Technology Taxila Pakistan
The timely management of an unruptured aneurysm can prevent hemorrhage. Multiple anatomical, morphological, and hemodynamic features associated with an aneurysm can predict the risk of rupture and classify the nature ... 详细信息
来源: 评论
Optimizing Heart-Kidney Interaction for Cancer Detection through Physiological Process Simulation as a Decision Support System
收藏 引用
IEEE Access 2025年 13卷 79169-79179页
作者: Jaddi, Najmeh Sadat Abdullah, Salwanj Othnman, Zalinda Yahya, Yazrina Nazri, Mohd Zakree Ahmad Goh, Say Leng Alvankarian, Fatemeh Alvankarian, Jafar Iranian eUniversity Faculty of Computer Engineering Tehran Iran Faculty of Information Science and Technology Center for Artificial Intelligence Technology Selangor Bangi43600 Malaysia Center for Software Technology and Management Faculty of Information Science and Technology UniversitiKebangsaan Malaysia Selangor Bangi43600 Malaysia Universiti Malaysia Sabah KampusAntarabangsa Labuan Optimisation and Analytics Research Group Faculty of Computing and Informatics Labuan87000 Malaysia University of Maryland Department of Electrical & Computer Engineering College ParkMD20742 United States Tehran University Science and Technology Park RayanMiniFab Tehran Iran
Decision support system (DSS) is a computer-based tool used to improve decision-making capabilities for any organization, using analysis of the available *** heart-kidney (HK) model proposed in this paper as a DSS sim... 详细信息
来源: 评论
Ownership Verification for Federated Recommendation
收藏 引用
ACM Transactions on Information Systems 2025年 第3期43卷 1-27页
作者: Enyue Yang Weike Pan Lixin Fan Hanlin Gu Zhitao Li Qiang Yang Zhong Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Department WeBank Shenzhen China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China and AI Department WeBank Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Technology University Shenzhen China and Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen China
Most federated learning-based recommender systems allow clients to access a well-trained high-quality model locally, which provides adversaries with the opportunity to infringe the legitimate copyright of the model. I... 详细信息
来源: 评论
A Novel Approach Using Machine Learning for Accurate Detection of DDoS Attack in software Defined Network  2nd
A Novel Approach Using Machine Learning for Accurate Detecti...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Sharma, Hitesh Kumar Choudhury, Tanupriya Kotecha, Ketan Mahdi, Hussain Falih Dutta, Soumi Bhattacharya, Abhishek Sar, Ayan Energy Acres Bidholi Uttarakhand Bidholi India School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun India Pune India Pune India Department of Computer and Software Engineering University of Diyala Baquba Iraq Sister Nivedita University Chakpachuria India
A denial Of Service (DoS) attack is termed an attack when the request-receiving server or network shuts down or becomes inaccessible for service. This kind of attack is caused by flooding the target server or network ... 详细信息
来源: 评论
Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14526-14537页
作者: Song, Xiaoling Xu, Guangxia Huang, Yongfei Liu, Yong Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China Peng Cheng Laboratory Department of New Networks Shenzhen518000 China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing400065 China
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase, and the need for decentralized authentication across applications becomes more and more significant. In addition, multi-dimens... 详细信息
来源: 评论