咨询与建议

限定检索结果

文献类型

  • 28,399 篇 会议
  • 11,489 篇 期刊文献
  • 346 册 图书

馆藏范围

  • 40,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,611 篇 工学
    • 19,312 篇 计算机科学与技术...
    • 16,056 篇 软件工程
    • 5,038 篇 信息与通信工程
    • 3,133 篇 控制科学与工程
    • 2,580 篇 生物工程
    • 2,081 篇 电气工程
    • 1,633 篇 机械工程
    • 1,610 篇 电子科学与技术(可...
    • 1,596 篇 生物医学工程(可授...
    • 1,298 篇 光学工程
    • 894 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 798 篇 动力工程及工程热...
    • 710 篇 建筑学
    • 700 篇 交通运输工程
  • 10,991 篇 理学
    • 6,407 篇 数学
    • 2,821 篇 生物学
    • 2,156 篇 物理学
    • 1,844 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 849 篇 化学
  • 7,311 篇 管理学
    • 4,405 篇 管理科学与工程(可...
    • 3,235 篇 图书情报与档案管...
    • 2,029 篇 工商管理
  • 1,392 篇 医学
    • 1,220 篇 临床医学
    • 1,110 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,124 篇 法学
    • 886 篇 社会学
  • 699 篇 教育学
  • 698 篇 经济学
    • 696 篇 应用经济学
  • 380 篇 农学
  • 150 篇 文学
  • 104 篇 军事学
  • 76 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,818 篇 software enginee...
  • 1,653 篇 computer science
  • 877 篇 computational mo...
  • 865 篇 feature extracti...
  • 811 篇 training
  • 707 篇 software
  • 671 篇 semantics
  • 653 篇 deep learning
  • 638 篇 accuracy
  • 562 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 432 篇 computer archite...
  • 421 篇 predictive model...
  • 383 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 368 篇 optimization
  • 368 篇 data models
  • 338 篇 support vector m...

机构

  • 1,260 篇 college of compu...
  • 358 篇 school of comput...
  • 303 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 159 篇 school of softwa...
  • 156 篇 college of compu...
  • 149 篇 state key labora...
  • 140 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of comput...
  • 123 篇 school of softwa...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 101 篇 school of softwa...

作者

  • 69 篇 ruimin hu
  • 61 篇 liu yang
  • 55 篇 baowen xu
  • 52 篇 chen zhong
  • 48 篇 hu ruimin
  • 47 篇 wang ping
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,054 篇 英文
  • 1,681 篇 其他
  • 518 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Computer and Software Engineering"
40234 条 记 录,以下是1061-1070 订阅
排序:
A Review of Colonial Pipeline Ransomware Attack  23
A Review of Colonial Pipeline Ransomware Attack
收藏 引用
23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023
作者: Beerman, Jack Berent, David Falter, Zach Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH45056 United States
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r... 详细信息
来源: 评论
No-reference Image Contrast Quality Assessment based on the Degree of Uniformity in Probability Distribution
收藏 引用
IEIE Transactions on Smart Processing and Computing 2022年 第2期11卷 85-91页
作者: Kim, Wonvin Yim, Changhoon Department of Computer Software Korean Bible University Seoul Korea Republic of Department of Computer Science and Engineering Konkuk University Seoul Korea Republic of
We propose a novel contrast-based no-reference image quality assessment (NR-IQA) method. The proposed method quantifies the degree of uniformity in the probability distribution of the pixel values of an image to measu... 详细信息
来源: 评论
Optimizing auditory brainstem response detection through NSGA-II guided feature selection
收藏 引用
Neural Computing and Applications 2025年 第15期37卷 8925-8943页
作者: Majidpour, Jafar Hassanzadeh, Hiwa Khezri, Edris Arabi, Hossein Department of Software Engineering University of Raparin Kurdistan Region Rania Iraq Department of Computer Science University of Raparin Kurdistan Region Rania Iraq Department of Computer Engineering Islamic Azad University Boukan Branch Boukan Iran Division of Nuclear Medicine and Molecular Imaging Department of Medical Imaging Geneva University Hospital Geneva1211 Switzerland
Hearing-impaired people undergo auditory brainstem response (ABR) testing to assess their peripheral auditory nerve system. Audiologists apply diagnostic labels to ABR data using reference-based indicators such as pea... 详细信息
来源: 评论
Enhancing Ropes for Collaborative Text Editing
Enhancing Ropes for Collaborative Text Editing
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Sandal, Semih Ovatman, Tolga Aselsan Inc Software Engineering Department Ankara Turkey Istanbul Technical University Department of Computer Engineering Istanbul Turkey
Rope is a tree-based data structure providing performance enhancements in string concatenation operations in applications such as text editors. Even though collaborative text editing has become one of the major applic... 详细信息
来源: 评论
Tidal-Tree-Mem: Toward Read-Intensive Key-Value Stores With Tidal Structure Based on LSM-Tree
Tidal-Tree-Mem: Toward Read-Intensive Key-Value Stores With ...
收藏 引用
作者: Ma, Chenlin Yang, Hao Wu, Shangyu Wang, Yi Mao, Rui Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China City University of Hong Kong Department of Computer Science Hong Kong Shenzhen University College of Computer Science and Software Engineering The Shenzhen Institute of Computing Sciences Shenzhen518060 China
The log-structured merge-tree (LSM-tree)-based key-value store has been widely adopted by many large-scale data storage applications for its excellent write performance. However, such write performance gains mainly co... 详细信息
来源: 评论
A Vulnerability Accessibility Analysis Framework for software Supply Chain  10
A Vulnerability Accessibility Analysis Framework for Softwar...
收藏 引用
10th International Symposium on System Security, Safety, and Reliability, ISSSR 2024
作者: Xiao, Lei Gao, Zhenyu Xu, Qizhen Chang, Le Zhu, Shunzhi Xiamen University of Technology College of Computer and Information Engineering Xiamen361024 China Software Security Company Chengdu610041 China
The security issues brought by third-party components in software are becoming increasingly prominent. However, current component analysis tools only analyze the existence of the vulnerabilities introduced by componen... 详细信息
来源: 评论
Parameter-Efficient Federated Cooperative Learning for 3D Object Detection in Autonomous Driving
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20314-20325页
作者: Chi, Fangyuan Wang, Yixiao Nasiopoulos, Panos Leung, Victor C.M. University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada Toronto AI Lab LG Electronics TorontoONM5V 1M3 Canada Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
In the rapidly evolving field of autonomous driving, accurately detecting and understanding dynamic environments remains a challenge. Federated learning (FL) offers a promising approach by integrating decentralized mo... 详细信息
来源: 评论
MR Image Quality Assessment via Enhanced Mamba: A Hybrid Spatial-Frequency Approach
MR Image Quality Assessment via Enhanced Mamba: A Hybrid Spa...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lou, Yiwei Xu, Dexuan Zhang, Rongchao Zhang, Jiayu Cao, Yongzhi Wang, Hanpin Huang, Yu Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education China Peking University School of Computer Science Beijing China Peking University School of Software and Microelectronics Beijing China Peking University National Engineering Research Center for Software Engineering Beijing China
Magnetic resonance (MR) image quality assessment plays a crucial role in disease diagnosis and data analysis. Existing methods typically treat the data as images and process them with convolutional networks, thereby i... 详细信息
来源: 评论
Gray-box Adversarial Attack of Deep Reinforcement Learning-based Trading Agents  22
Gray-box Adversarial Attack of Deep Reinforcement Learning-b...
收藏 引用
22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023
作者: Ataiefard, Foozhan Hemmati, Hadi University of Calgary Electrical and Software Engineering Calgary Canada York University Electrical Engineering and Computer Science Toronto Canada
In recent years, deep reinforcement learning (Deep RL) has been successfully implemented as a smart agent in many systems such as complex games, self-driving cars, and chat-bots. One of the interesting use cases of De... 详细信息
来源: 评论
Preprocessing Method for Color-Adaptive Pix2Pix Generative Neural Network Data
收藏 引用
Journal of Institute of Control, Robotics and Systems 2023年 第6期29卷 521-526页
作者: Lee, Hayoung Son, Bong-Ki Lee, Jaeho Department of IT Media Engineering Duksung Women’s University Korea Republic of Department of Computer Science and Engineering Seowon University Korea Republic of Department of Software Duksung Women’s University Korea Republic of
Adversarial generative neural networks (GANs) have received increased research interest in recent years, and they have been applied in various fields, such as image generation, transformation, and restoration. Pix2Pix... 详细信息
来源: 评论