咨询与建议

限定检索结果

文献类型

  • 10,990 篇 会议
  • 6,051 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,849 篇 工学
    • 8,417 篇 计算机科学与技术...
    • 6,977 篇 软件工程
    • 2,331 篇 信息与通信工程
    • 1,391 篇 控制科学与工程
    • 1,226 篇 生物工程
    • 978 篇 电气工程
    • 763 篇 机械工程
    • 748 篇 电子科学与技术(可...
    • 719 篇 生物医学工程(可授...
    • 616 篇 光学工程
    • 411 篇 仪器科学与技术
    • 407 篇 动力工程及工程热...
    • 402 篇 化学工程与技术
    • 396 篇 安全科学与工程
    • 340 篇 交通运输工程
    • 315 篇 网络空间安全
  • 5,056 篇 理学
    • 2,881 篇 数学
    • 1,344 篇 生物学
    • 1,099 篇 物理学
    • 856 篇 统计学(可授理学、...
    • 610 篇 系统科学
    • 418 篇 化学
  • 3,377 篇 管理学
    • 2,090 篇 管理科学与工程(可...
    • 1,441 篇 图书情报与档案管...
    • 883 篇 工商管理
  • 688 篇 医学
    • 596 篇 临床医学
    • 531 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 523 篇 法学
    • 412 篇 社会学
  • 320 篇 经济学
    • 319 篇 应用经济学
  • 279 篇 教育学
  • 171 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 472 篇 computer science
  • 435 篇 software enginee...
  • 379 篇 deep learning
  • 356 篇 computational mo...
  • 329 篇 feature extracti...
  • 269 篇 data mining
  • 267 篇 training
  • 234 篇 semantics
  • 231 篇 optimization
  • 226 篇 machine learning
  • 212 篇 educational inst...
  • 204 篇 internet of thin...
  • 198 篇 predictive model...
  • 197 篇 accuracy
  • 174 篇 software
  • 171 篇 support vector m...
  • 171 篇 neural networks
  • 170 篇 wireless sensor ...
  • 162 篇 computer archite...
  • 158 篇 image segmentati...

机构

  • 447 篇 college of compu...
  • 342 篇 state key labora...
  • 261 篇 school of comput...
  • 257 篇 school of inform...
  • 219 篇 school of comput...
  • 163 篇 school of softwa...
  • 138 篇 school of comput...
  • 128 篇 school of softwa...
  • 100 篇 school of comput...
  • 98 篇 college of compu...
  • 92 篇 school of comput...
  • 73 篇 department of co...
  • 72 篇 department of co...
  • 72 篇 school of comput...
  • 68 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of softwa...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 63 篇 school of comput...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 31 篇 jiacun wang
  • 30 篇 wang chao
  • 30 篇 qi lianyong
  • 29 篇 niyato dusit
  • 29 篇 wang lei
  • 29 篇 shen furao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zhao jian
  • 25 篇 yang yang
  • 24 篇 jun zhang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 22 篇 xiang li
  • 22 篇 tao dacheng
  • 21 篇 zhi-hui wang

语言

  • 16,334 篇 英文
  • 608 篇 其他
  • 265 篇 中文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17189 条 记 录,以下是121-130 订阅
排序:
VmPTP: Precise Time Protocol for Inter-VM Communication in Embedded Virtualized Systems
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 897-910页
作者: Zhao, Sirong Xie, Guoqi Ma, Wenhong Ren, Wei Li, Kenli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan Changsha410082 China Huawei Technology Co. Ltd. Central Software Institute Guangdong Shenzhen518129 China
System virtualization techniques are gradually applied to embedded systems with the performance improvement of embedded devices;however, there is a large time offset (i.e., deviation) of hundreds of ms between virtual... 详细信息
来源: 评论
A Credible and Fair Federated Learning Framework Based on Blockchain
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 301-316页
作者: Chen, Leiming Zhao, Dehai Tao, Liping Wang, Kai Qiao, Sibo Zeng, Xingjie Tan, Chee Wei China University of Petroleum School of Computer Science and Technology East China Qingdao266580 China CSIRO's Data61 Sydney2015 Australia Hefei University of Technology Anhui230009 China Nanyang Technological University School of Computer Science and Engineering Singapore639798 Singapore Tiangong University School of Software Tianjin300387 China Southwest Petroleum University School of Computer Science Chengdu610500 China
Federated learning (FL) enables cooperative computation between multiple participants while protecting user privacy. Currently, FL algorithms assume that all participants are trustworthy and their systems are secure. ... 详细信息
来源: 评论
Enhanced Reversible Data Hiding in Encrypted Images by Pixel Shifting  16
Enhanced Reversible Data Hiding in Encrypted Images by Pixel...
收藏 引用
2024 16th International Conference on Graphics and Image Processing, ICGIP 2024
作者: Yang, Ching-Nung Lu, Yu-Quan Liu, Shu-Yu Xiong, Lizhi Dept. of Computer Sci. and Inf. Engineering National Dong Hwa University Hualien Taiwan School of Computer and Software Nanjing University of Inf. Sci. & Technology Nanjing China
Reversible data hiding (RDH) is one special type of data hiding, and is widely used for many intended applications. Moreover, to protect the cover image, RDH in encrypted image (RDHEI) is accordingly proposed. With th... 详细信息
来源: 评论
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16451-16466页
作者: Sun, Xinrong Tao, Yunting Kong, Fanyu Yu, Qian Ge, Chunpeng Xu, Qiuliang Zhang, Hanlin Binzhou Polytechnic College of Information Engineering Shandong Binzhou256603 China Shandong University School of Software Jinan250101 China Shandong Sansec Information Technology Co. Ltd Jinan250101 China Singapore Singapore Qingdao University College of Computer Science and Technology Qingdao266071 China
For the huge amount of data from the Internet of Things (IoT) devices, multiple kernel learning is a widely concerned issue in data analyzing, among which the multiple kernel fuzzy clustering (MKFC) algorithm is an ef... 详细信息
来源: 评论
YFLM: An Improved Levenberg-Marquardt Algorithm for Global Bundle Adjustment  41st
YFLM: An Improved Levenberg-Marquardt Algorithm for Global ...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Peng, Jiaxin Li, Tao Jiang, Qin Liu, Jie Wang, Ruibo Laboratory of Software Engineering for Complex Systems School of Computer Science National University of Defense Technology Hunan Changsha410073 China Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Hunan Changsha410073 China
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ... 详细信息
来源: 评论
Lightweight Deep Convolutional Neural Network for Pavement Crack Recognition with Explainability Analysis  1st
Lightweight Deep Convolutional Neural Network for Pavement ...
收藏 引用
1st International Conference on Intelligent Systems, Blockchain, and Communication Technologies, ISBCom 2024
作者: Gulfam, Muhammad Seals, Cheryl D. Vargas-Nordcbeck, Adriana Dozier, Gerry V. Computer Science and Software Engineering Auburn University AuburnAL United States National Center for Asphalt Technology Auburn University AuburnAL36849 United States
Pavement crack detection is an integral part of maintaining pavements. Identifying the pavement areas that require maintenance through manual processes is a laborious and time-consuming task. Latest researches have em... 详细信息
来源: 评论
Multispectral Images and IoT Based Tea Plantation Monitoring: A Proposed System Architecture  5
Multispectral Images and IoT Based Tea Plantation Monitoring...
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Kariyawasam, K.P.W.D.V. Kahandagamage, P.N. Fernando, M.R.R. Fernandopulle, J.M. Jayasinghearachchi, Vishan Dissanayaka, Kapila Dept. of Software Engineering Sri Lanka Dept. of Information Technology Sri Lanka Dept. of Computer Science Sri Lanka
In recent years, the Sri Lankan tea industry has fallen behind its competitors in the global tea market. This decline is caused by the challenges in productivity and resource management due to the limitations of tradi... 详细信息
来源: 评论
Energy Oriented Three-Tier Computation Offloading Scheme in Maritime Edge Computing Network
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8126-8140页
作者: Zhang, Hongxia Xi, Shiyu Shang, Bodong Zhang, Peiying Wu, Sheng Jiang, Chunxiao Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Eastern Institute of Technology Eastern Institute for Advanced Study Ningbo315200 China Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing100876 China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing100084 China
With the development of maritime continuing to grow, large-scale maritime wireless devices (MWDs) are being deployed for various maritime applications. The rapid development of maritime Internet of Things (IoT) and gr... 详细信息
来源: 评论
MULTI-TARGET VITAL SIGN DETECTION BY FUSION OF BIOLOGICAL RADAR AND CONVOLUTIONAL NEURAL NETWORK
收藏 引用
Scalable Computing 2025年 第3期26卷 1496-1503页
作者: Yuan, Hongbin Yuan†, Chenyao Cao, Huiqun School of Telecommunications and Intelligent Manufacturing Sias University Henan Zhengzhou451150 China School of Computer and Software Engineering Sias University Zhengzhou451150 China Academic Affairs Office of Kaifeng Modern Technology Secondary Vocational School Henan Kaifeng475000 China
In order to address the increasing demand for vital sign detection, the author proposes a multi-target vital sign detection research that combines biological radar and convolutional neural network. Based on the fundam... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论