咨询与建议

限定检索结果

文献类型

  • 14,815 篇 会议
  • 6,236 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,311 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,837 篇 工学
    • 10,047 篇 计算机科学与技术...
    • 8,352 篇 软件工程
    • 2,590 篇 信息与通信工程
    • 1,713 篇 控制科学与工程
    • 1,394 篇 生物工程
    • 1,205 篇 电气工程
    • 971 篇 生物医学工程(可授...
    • 882 篇 电子科学与技术(可...
    • 833 篇 机械工程
    • 703 篇 光学工程
    • 524 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 437 篇 化学工程与技术
    • 407 篇 建筑学
  • 5,757 篇 理学
    • 3,330 篇 数学
    • 1,562 篇 生物学
    • 1,075 篇 物理学
    • 949 篇 统计学(可授理学、...
    • 800 篇 系统科学
    • 459 篇 化学
  • 3,892 篇 管理学
    • 2,415 篇 管理科学与工程(可...
    • 1,639 篇 图书情报与档案管...
    • 1,205 篇 工商管理
  • 938 篇 医学
    • 827 篇 临床医学
    • 738 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 615 篇 法学
    • 476 篇 社会学
  • 400 篇 教育学
    • 383 篇 教育学
  • 399 篇 经济学
    • 397 篇 应用经济学
  • 209 篇 农学
  • 102 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,244 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 381 篇 deep learning
  • 355 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 305 篇 machine learning
  • 291 篇 accuracy
  • 272 篇 software systems
  • 268 篇 data mining
  • 261 篇 training
  • 245 篇 internet of thin...
  • 242 篇 feature extracti...
  • 222 篇 programming
  • 217 篇 support vector m...
  • 191 篇 artificial intel...
  • 185 篇 testing
  • 184 篇 optimization
  • 176 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 124 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 113 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 76 篇 school of inform...
  • 74 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 53 篇 department of co...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 49 篇 department of co...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 22 篇 sheldon s. willi...
  • 22 篇 zhao jian
  • 21 篇 qusay h. mahmoud

语言

  • 20,593 篇 英文
  • 566 篇 其他
  • 158 篇 中文
  • 8 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Software and Engineering Department"
21311 条 记 录,以下是31-40 订阅
排序:
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 910-919页
作者: Liang YAO Xiaolong XU Wanchun DOU Muhammad Bilal School of Software Nanjing University of Information Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive... 详细信息
来源: 评论
Code Re-use Recommendation Based on software Requirements Using Natural Language Processing in Python  13
Code Re-use Recommendation Based on Software Requirements Us...
收藏 引用
13th International Conference on computer Technologies and Development, TechDev 2024
作者: Farooqi, Hareem Butt, Wasi Haider Khan, Obaid Ullah Department of Computer and Software Engineering Islamabad Pakistan TEO International Department of Software Engineering Islamabad Pakistan
Code reuse is a pivotal practice in software development, promoting efficiency, reducing redundancy, and ensuring higher quality software products. Recommender systems play a crucial role in this process by suggesting... 详细信息
来源: 评论
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1412-1434页
作者: Shoaib Hassan Qianmu Li Khursheed Aurangzeb Affan Yasin Javed Ali Khan Muhammad Shahid Anwar School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingJiangsuChina Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Software Northwestern Polytechnical UniversityXianShaanxiChina Department of Computer Science School of PhysicsEngineering&Computer ScienceUniversity of HertfordshireHatfieldUK Department of AI and Software Gachon University Seongnam-siSeongnamSouth Korea
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a... 详细信息
来源: 评论
Multi-Tree-Based Avoidance Multicast Routing for Wireless Sensor Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年 第2期9卷 1-1页
作者: Sakai, Kazuya Sun, Min-Te Ku, Wei-Shinn Department of Electrical Engineering and Computer Science Tokyo Metropolitan University Hino Tokyo Japan Department of Computer Science and Information Engineering National Central University Taoyuan Taiwan Department of Computer Science and Software Engineering Auburn University Auburn AL USA
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into sever... 详细信息
来源: 评论
Unraveling the intricacies of EEG seizure detection: A comprehensive exploration of machine learning model performance, interpretability, and clinical insights
收藏 引用
Multimedia Tools and Applications 2024年 第41期83卷 89217-89247页
作者: Mridha, Krishna Priyok, Masrur Ahsan Shukla, Madhu Department of Computer Engineering Marwadi University Rajkot India Department of Software Engineering Tianjin University Tianjin China Department of Computer Engineering Artificial Intelligence and Big Data Analytics Marwadi University Gujarat Rajkot India
In neurology, it is critical to promptly and precisely identify epileptic episodes using EEG data. Interpretability and thorough model evaluation are still crucial to guarantee reliability, even though machine learnin... 详细信息
来源: 评论
A reliable and secure video steganography method based on 4d-logistic mapping
收藏 引用
Multimedia Tools and Applications 2025年 1-31页
作者: Sha, Mohemmed Department of Software Engineering College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj16278 Saudi Arabia
Data security is becoming more and more crucial due to developments in communication and information technology, particularly when it comes to video transmission. This research provides a unique approach that combines... 详细信息
来源: 评论
Security experimental framework of trajectory planning for autonomous vehicles
收藏 引用
International Journal of Intelligent Networks 2024年 第1期5卷 315-324页
作者: Al-sheyab, Sujoud Al-shara, Zakarea Al-khaleel, Osama Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Software Engineering Jordan University of Science and Technology Irbid Jordan
In the contemporary landscape, autonomous vehicles (AVs) have emerged as a prominent technological advancement globally. Despite their widespread adoption, significant hurdles remain, with security standing out as a c... 详细信息
来源: 评论
A parallel hybrid approach integrating clonal selection with artificial bee colony for logistic regression in spam email detection
收藏 引用
Neural Computing and Applications 2024年 1-19页
作者: Dedeturk, Bilge Kagan Akay, Bahriye Department of Software Engineering Erciyes University Kayseri Melikgazi38039 Turkey Department of Computer Engineering Erciyes University Kayseri Melikgazi38039 Turkey
Spam emails are sent to recipients for advertisement and phishing purposes. In either case, it disturbs recipients and reduces communication quality. Addressing this issue requires classifying emails on servers as eit... 详细信息
来源: 评论
A multi-mode real-time system verification model using efficient event-driven dataset
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1187-1200页
作者: Islam, Nayreet Azim, Akramul Department of Electrical Computer and Software Engineering University of Ontario Institute of Technology Oshawa Canada
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing envi... 详细信息
来源: 评论
Ensemble-based Robust Model for Accurate Driving Range Estimation of EVs Leveraging Big Data  8
Ensemble-based Robust Model for Accurate Driving Range Estim...
收藏 引用
8th IEEE International Energy Conference, ENERGYCON 2024
作者: Hosseini, Samira Yassine, Abdulsalam Akilan, Thangarajah Department of Electrical and Computer Engineering Canada Department of Software Engineering Canada Department of Software Engineering Lakehead University Thunder Bay Canada
In the emergence of greener transportation, electric vehicles (EVs) play an important role, where the accurate prediction of the driving range is pivotal for alleviating driver range anxiety, serving as a foundation f... 详细信息
来源: 评论