咨询与建议

限定检索结果

文献类型

  • 28,197 篇 会议
  • 11,360 篇 期刊文献
  • 345 册 图书

馆藏范围

  • 39,902 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,342 篇 工学
    • 19,119 篇 计算机科学与技术...
    • 15,908 篇 软件工程
    • 4,998 篇 信息与通信工程
    • 3,064 篇 控制科学与工程
    • 2,571 篇 生物工程
    • 2,039 篇 电气工程
    • 1,617 篇 机械工程
    • 1,591 篇 电子科学与技术(可...
    • 1,586 篇 生物医学工程(可授...
    • 1,278 篇 光学工程
    • 888 篇 安全科学与工程
    • 886 篇 仪器科学与技术
    • 844 篇 化学工程与技术
    • 792 篇 动力工程及工程热...
    • 690 篇 建筑学
    • 690 篇 交通运输工程
  • 10,920 篇 理学
    • 6,365 篇 数学
    • 2,813 篇 生物学
    • 2,135 篇 物理学
    • 1,830 篇 统计学(可授理学、...
    • 1,340 篇 系统科学
    • 847 篇 化学
  • 7,258 篇 管理学
    • 4,377 篇 管理科学与工程(可...
    • 3,209 篇 图书情报与档案管...
    • 2,008 篇 工商管理
  • 1,386 篇 医学
    • 1,213 篇 临床医学
    • 1,101 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,115 篇 法学
    • 880 篇 社会学
  • 695 篇 经济学
    • 693 篇 应用经济学
  • 689 篇 教育学
  • 381 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,810 篇 software enginee...
  • 1,650 篇 computer science
  • 871 篇 computational mo...
  • 854 篇 feature extracti...
  • 803 篇 training
  • 701 篇 software
  • 668 篇 semantics
  • 636 篇 deep learning
  • 623 篇 accuracy
  • 562 篇 machine learning
  • 544 篇 data mining
  • 509 篇 application soft...
  • 435 篇 computer archite...
  • 407 篇 predictive model...
  • 384 篇 internet of thin...
  • 374 篇 testing
  • 373 篇 software systems
  • 367 篇 optimization
  • 362 篇 data models
  • 336 篇 support vector m...

机构

  • 1,220 篇 college of compu...
  • 354 篇 school of comput...
  • 302 篇 state key labora...
  • 218 篇 school of comput...
  • 196 篇 department of co...
  • 188 篇 school of comput...
  • 158 篇 school of softwa...
  • 156 篇 college of compu...
  • 149 篇 state key labora...
  • 140 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 129 篇 school of comput...
  • 127 篇 national enginee...
  • 125 篇 school of comput...
  • 124 篇 school of softwa...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 102 篇 school of softwa...
  • 96 篇 school of big da...

作者

  • 68 篇 ruimin hu
  • 60 篇 liu yang
  • 55 篇 baowen xu
  • 53 篇 chen zhong
  • 47 篇 wang ping
  • 47 篇 hu ruimin
  • 45 篇 man ka lok
  • 44 篇 zhang lei
  • 44 篇 stuckey peter j.
  • 42 篇 zhou jie
  • 41 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin

语言

  • 38,368 篇 英文
  • 1,041 篇 其他
  • 502 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 7 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
检索条件"机构=Computer Software and Engineering"
39902 条 记 录,以下是4861-4870 订阅
排序:
Periodicity Analysis of Most Time Series Methods: A Review  8
Periodicity Analysis of Most Time Series Methods: A Review
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Yousif, Muneera Mohammed, Musab Ahmed Celik, Mete Hamdoon, Asmaa E. Jassim, Riham Abdullah, Noor M. College of Information Technology Ninevah University Software Department Mosul Iraq College of Education for Humanities Sciences Kirkuk University Kirkuk Iraq Erciyes University Computer Engineering Department Engineering Faculty Kayseri Turkey Water Resources Studies Center for Northern Region Projects Ministry of Water Resources of Iraq Mosul Iraq
One of the most important methods of predicting the future is through past events and data repeated over time, as time series are those data indexed using time sequentially on data points distributed according to time... 详细信息
来源: 评论
PrAIoritize: Automated Early Prediction and Prioritization of Vulnerabilities in Smart Contracts
arXiv
收藏 引用
arXiv 2023年
作者: Soud, Majd Liebel, Grischa Hamdaqa, Mohammad Department of Computer Science Reykjavik University Reykjavik Iceland Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada
Context: Smart contracts are prone to numerous security threats due to undisclosed vulnerabilities and code weaknesses. In Ethereum smart contracts, the challenges of timely addressing these code weaknesses highlight ... 详细信息
来源: 评论
The Classic Television Dramas Restoration Based on Super Resolution  4
The Classic Television Dramas Restoration Based on Super Res...
收藏 引用
4th International Conference on computer Information Science and Artificial Intelligence, CISAI 2021
作者: Wang, Wanjun DIng, Xintao Liu, Chao Wu, Jinghua Anhui Institute of Information Technology School of Computer and Software Engineering Wuhu China
Super-resolution is a widely used technology in many applications, such as video repair. Aiming at the insufficiency of the method Fast Super-Resolution Convolutional Neural Networks (FSRCNN), an image super-resolutio... 详细信息
来源: 评论
Relation-Algebraic Verification of Borůvka’s Minimum Spanning Tree Algorithm  1
收藏 引用
19th International Conference on Relational and Algebraic Methods in computer Science, RAMiCS 2021
作者: Guttmann, Walter Robinson-O’Brien, Nicolas Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
Previous work introduced a relation-algebraic framework for reasoning about weighted-graph algorithms. We use this framework to prove partial correctness of a sequential version of Borůvka’s minimum spanning tree alg... 详细信息
来源: 评论
Deep Learning Based Intrusion Detection for IoT Networks
Deep Learning Based Intrusion Detection for IoT Networks
收藏 引用
Ubiquitous Computing and Intelligent Information Systems (ICUIS), International Conference on
作者: P. Ananthi K. Nirmaladevi Mothika G Department of Computer Technology-PG Kongu Engineering College Erode Tamilnadu Department of Computer Applications Madanapalle Institute of Technology &Science MSc Software Systems Kongu Engineering College Erode India
Intrusion detection is crucial for securing IoT networks amid the rapid proliferation of devices, posing significant security challenges. This study offers a unique intrusion detection model for IoT deep learning meth... 详细信息
来源: 评论
Towards Compositional Assurance of Large Cyber-Physical Systems  25
Towards Compositional Assurance of Large Cyber-Physical Syst...
收藏 引用
Proceedings of the 1st Workshop on Formal Arguments for Cps CerTification
作者: Gabriel A. Moreno Mark H. Klein Shambwaditya Saha Farzaneh Derakhshan Limin Jia Software Engineering Institute Carnegie Mellon University Pittsburgh PA USA Computer Science Illinois Institute of Technology Chicago IL USA Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA
Assurance of evolving large cyber-physical systems (CPS) is time-consuming, and usually a bottleneck for deploying them with confidence. Several factors contribute to this problem, including the lack of effective reus...
来源: 评论
Dysarthric Speech Recognition using Depthwise Separable Convolutions: Preliminary Study
Dysarthric Speech Recognition using Depthwise Separable Conv...
收藏 引用
Conference on Speech Technology and Human-computer Dialogue, SpeD
作者: Seyed Reza Shahamiri Krishnendu Mandal Sudeshna Sarkar Department of Electrical Computer and Software Engineering Faulty of Engineering The University of Auckland Auckland New Zealand Computer Science & Engineering Department Indian Institute of Technology Kharagpur India
As a neurological disability that affects muscles involved in articulation, dysarthria is a speech impairment that leads to reduced speech intelligibility. In severe cases, these individuals could also be handicapped ...
来源: 评论
Audio Based Machine Fault Diagnosis using Hybrid Feature Extraction and Ensemble Learning  15
Audio Based Machine Fault Diagnosis using Hybrid Feature Ext...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Singhal, Shashvat Goel, Bhavya Agrawal, Kshitij Sethi, Rithwick Sah, Shashi Jain, Rachit Vishwakarma, Dinesh K. Delhi Technological University Department of Computer Science Delhi India Delhi Technological University Department of Mechanical Engineering Delhi India Delhi Technological University Department of Ece Delhi India Delhi Technological University Department of Software Engineering Delhi India Delhi Technological University Department of Information Technology Delhi India
Over the last decade, proliferation of mechanical machines has surged exponentially, amplifying the challenge of monitoring their operational health due to the inevitability of wear and tear. Consequently, the convent... 详细信息
来源: 评论
A Survey on Scheduling the Task in Fog Computing Environment
arXiv
收藏 引用
arXiv 2023年
作者: Ishaq, Faiza Ashraf, Humaira Jhanjhi, Nz Department of computer and software Engineering International Islamic University Pakistan School of Computer Science SCS Taylors University Malaysia
With the rapid increase in the Internet of Things (IoT), the amount of data produced and *** processed is also increased. Cloud Computing facilitates to handle storage, processing, and analysis of data as needed. Howe... 详细信息
来源: 评论
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem  7
Towards Understanding Third-party Library Dependency in C/C+...
收藏 引用
37th IEEE/ACM International Conference on Automated software engineering, ASE 2022
作者: Tang, Wei Xu, Zhengzi Liu, Chengwei Wu, Jiahui Yang, Shouguo Li, Yi Luo, Ping Liu, Yang School of Software Tsinghua University Beijing China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Institute of Information Engineering Chinese Academy of Sciences Beijing China
Third-party libraries (TPLs) are frequently reused in software to reduce development cost and the time to market. However, external library dependencies may introduce vulnerabilities into host applications. The issue ... 详细信息
来源: 评论