咨询与建议

限定检索结果

文献类型

  • 21,220 篇 会议
  • 9,798 篇 期刊文献
  • 312 册 图书

馆藏范围

  • 31,330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,488 篇 工学
    • 15,370 篇 计算机科学与技术...
    • 12,713 篇 软件工程
    • 3,979 篇 信息与通信工程
    • 2,479 篇 控制科学与工程
    • 2,028 篇 生物工程
    • 1,559 篇 电气工程
    • 1,286 篇 机械工程
    • 1,195 篇 电子科学与技术(可...
    • 1,190 篇 生物医学工程(可授...
    • 1,030 篇 光学工程
    • 673 篇 安全科学与工程
    • 666 篇 化学工程与技术
    • 651 篇 仪器科学与技术
    • 602 篇 动力工程及工程热...
    • 568 篇 交通运输工程
    • 539 篇 建筑学
  • 8,693 篇 理学
    • 5,119 篇 数学
    • 2,223 篇 生物学
    • 1,690 篇 物理学
    • 1,497 篇 统计学(可授理学、...
    • 1,024 篇 系统科学
    • 680 篇 化学
  • 5,786 篇 管理学
    • 3,437 篇 管理科学与工程(可...
    • 2,583 篇 图书情报与档案管...
    • 1,556 篇 工商管理
  • 1,069 篇 医学
    • 921 篇 临床医学
    • 830 篇 基础医学(可授医学...
  • 860 篇 法学
    • 665 篇 社会学
  • 550 篇 经济学
    • 548 篇 应用经济学
  • 523 篇 教育学
    • 508 篇 教育学
  • 287 篇 农学
  • 98 篇 文学
  • 79 篇 军事学
  • 63 篇 艺术学
  • 11 篇 哲学
  • 4 篇 历史学

主题

  • 1,610 篇 computer science
  • 1,400 篇 software enginee...
  • 635 篇 training
  • 633 篇 feature extracti...
  • 588 篇 computational mo...
  • 535 篇 semantics
  • 525 篇 deep learning
  • 423 篇 software
  • 411 篇 application soft...
  • 407 篇 machine learning
  • 395 篇 data mining
  • 390 篇 accuracy
  • 344 篇 computer archite...
  • 296 篇 support vector m...
  • 294 篇 predictive model...
  • 289 篇 internet of thin...
  • 272 篇 data models
  • 258 篇 software systems
  • 251 篇 conferences
  • 242 篇 programming

机构

  • 1,262 篇 college of compu...
  • 356 篇 school of comput...
  • 276 篇 state key labora...
  • 220 篇 school of comput...
  • 197 篇 department of co...
  • 184 篇 school of inform...
  • 167 篇 school of comput...
  • 157 篇 college of compu...
  • 148 篇 school of comput...
  • 145 篇 school of softwa...
  • 139 篇 school of electr...
  • 133 篇 school of comput...
  • 125 篇 national enginee...
  • 119 篇 department of co...
  • 114 篇 department of co...
  • 103 篇 school of softwa...
  • 98 篇 school of softwa...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 89 篇 school of big da...

作者

  • 62 篇 liu yang
  • 52 篇 chen zhong
  • 52 篇 baowen xu
  • 48 篇 chen shu-ching
  • 47 篇 rajkumar buyya
  • 44 篇 man ka lok
  • 41 篇 stuckey peter j.
  • 40 篇 zhou jie
  • 40 篇 wang ping
  • 39 篇 shen linlin
  • 37 篇 zhen ji
  • 37 篇 niyato dusit
  • 37 篇 zhang lei
  • 35 篇 sun xingming
  • 34 篇 wang lei
  • 34 篇 wang xingwei
  • 33 篇 ruimin hu
  • 32 篇 laizhong cui
  • 30 篇 kaishun wu
  • 30 篇 jun zhang

语言

  • 29,417 篇 英文
  • 1,508 篇 其他
  • 425 篇 中文
  • 10 篇 德文
  • 6 篇 朝鲜文
  • 5 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering Miami University"
31330 条 记 录,以下是4921-4930 订阅
排序:
A boosting-type convergence result for *** with factorized multi-class classifiers  24
A boosting-type convergence result for *** with factorized m...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xin Zou Zhengyu Zhou Jingyuan Xu Weiwei Liu School of Computer Science and National Engineering Research Center for Multimedia Software and Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
ADABOOST is a well-known algorithm in boosting. Schapire and Singer propose, an extension of ADABOOST, named ***, for multi-class classification problems. Kégl shows empirically that *** works better when the cla...
来源: 评论
Dynamic Euclidean Bottleneck Matching
arXiv
收藏 引用
arXiv 2023年
作者: Abu-Affash, A. Karim Bhore, Sujoy Carmi, Paz Department of Software Engineering Shamoon College of Engineering Israel Department of Computer Science Indian Institute of Technology Bombay India Computer Science Department Ben-Gurion University Israel
A fundamental question in computational geometry is for a set of input points in the Euclidean space, that is subject to discrete changes (insertion/deletion of points at each time step), whether it is possible to mai... 详细信息
来源: 评论
Digital Twin, Metaverse and Smart Cities in a Race to the Future
Digital Twin, Metaverse and Smart Cities in a Race to the Fu...
收藏 引用
Information Technology (ACIT)
作者: Hijab e Zainab Narmeen Zakaria Bawanay Department of Computer Science and Software Engineering Center for Computing Research Jinnah University for Women Karachi Pakistan
In the dynamic landscape of urban development, the synergy of the Metaverse, Digital Twins, and Smart Cities emerges as a potent catalyst for transformation. The Metaverse, a vibrant virtual space, collaborates with c...
来源: 评论
Test-Time Backdoor Detection for Object Detection Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Hangtao Wang, Yichen Yan, Shihui Zhu, Chenyu Zhou, Ziqi Hou, Linshan Hu, Shengshan Li, Minghui Zhang, Yanjun Zhang, Leo Yu School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China Harbin Institute of Technology China University of Technology Sydney Australia Griffith University Australia
Object detection models are vulnerable to backdoor attacks, where attackers poison a small subset of training samples by embedding a predefined trigger to manipulate prediction. Detecting poisoned samples (i.e., those... 详细信息
来源: 评论
Multi-Objective Optimization Design for DC-Link Capacitor of Motor Driver
Multi-Objective Optimization Design for DC-Link Capacitor of...
收藏 引用
2024 CPSS and IEEE International Symposium on Energy Storage and Conversion, CPSS and ISESC 2024
作者: Liu, Qian Huang, Kangxing Wei, Xueliang Zheng, Yihong Xiang, Hao School of Automation Wuhan University of Technology Wuhan China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong College of Artificial Intelligence China University of Petroleum-Beijing Beijing China Wuhan IActuator Robotics Co. Ltd Software Development Department Wuhan China
The capacitor is a common weak point in motor drive system design, necessitating targeted selection, design, and optimization of capacitor banks within these systems. Traditional capacitor design often relies on engin... 详细信息
来源: 评论
Verilua: An Open Source Versatile Framework for Efficient Hardware Verification and Analysis Using LuaJIT
Verilua: An Open Source Versatile Framework for Efficient Ha...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Cai, Ye Zheng, Chuyu He, Wei Tang, Dan College of Computer Science and Software Engineering Shenzhen University Shenzhen China Beijing Institute of Open Source Chip Beijing China Beijing China
The growing complexity of hardware verification highlights limitations in existing frameworks, particularly regarding flexibility and reusability. Current methodologies often require multiple specialized environments ... 详细信息
来源: 评论
Medical Image Analysis of Lung Tumor Diagnosis Based on Generalized Fuzzy C-Means Clustering Algorithm
Medical Image Analysis of Lung Tumor Diagnosis Based on Gene...
收藏 引用
International Conference on Emerging Electronic and Automation Technology 2022, ICEEAT 2022
作者: Zwaid, Jassim Mohammed Ahmed Murad, Masrah Azrifah Azmi Khalid, Fatimah Binti Manshor, Noridayu Al-Jumaily, Abdulmajeed Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Affiliated to University of Anbar Ramadi Iraq Department of Software Engineering and Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Multimedia Department Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Department of Signal Theory and Communications Universidad Carlos III de Madrid Leganés Madrid28911 Spain
In recent years, the rapid development of medical imaging technology has brought medical image analysis into the era of big data. CT imaging technology is one of the most common imaging methods for disease screening. ... 详细信息
来源: 评论
Application of Neural Networks for Network Traffic Monitoring and Analysis  8
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Kushnerov, Oleksandr Murr, Pierre Herasymov, Serhii Milevskyi, Stanislav Melnyk, Marharyta Golovashych, Sergii Sumy State University Department of Economic Cybernetics Sumy Ukraine International University of Science and Technology in Kuwait Computer Engineering Department Kuwait Kuwait 'Kharkiv polytechnic institute' Cybersecurity department National Technical University Kharkiv Ukraine Set University Department of Cyber Security and information protection Kyiv Ukraine National Technical University 'Kharkiv polytechnic institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
Blockchain-Enabled EHR Framework for Internet of Medical Things
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 211-221页
作者: Lewis Nkenyereye S.M.Riazul Islam Mahmud Hossain M.Abdullah-Al-Wadud Atif Alamri Department of Computer and Information Security Sejong UniversitySeoul05006Korea Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Computer Science University of Alabama at BirminghamAlabama35294USA Department of Software Engineering King Saud UniversityRiyadh11543Saudi Arabia
The Internet of Medical Things(IoMT)offers an infrastructure made of smart medical equipment and software applications for healthcare *** the internet,the IoMT is capable of providing remote medical diagnosis and time... 详细信息
来源: 评论
Research on CNN-Based Malicious Traffic Identification Method  2021
Research on CNN-Based Malicious Traffic Identification Metho...
收藏 引用
7th International Conference on Computing and Artificial Intelligence, ICCAI 2021
作者: Tang, BinHui Jiang, Wen Xu Ke, Yong Xiang Jincheng College of Sichuan University School of Computer and Software Sichuan University School of Cyber Science and Engineering China Jincheng College of Sichuan University School of Computer and Software China
Today's Internet environment is full of all kinds of normal and malicious traffic, how to identify the feature categories of malicious traffic plays a crucial role in network management and security. With the rapi... 详细信息
来源: 评论