咨询与建议

限定检索结果

文献类型

  • 28,143 篇 会议
  • 11,384 篇 期刊文献
  • 345 册 图书

馆藏范围

  • 39,872 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,370 篇 工学
    • 19,141 篇 计算机科学与技术...
    • 15,939 篇 软件工程
    • 5,007 篇 信息与通信工程
    • 3,068 篇 控制科学与工程
    • 2,571 篇 生物工程
    • 2,059 篇 电气工程
    • 1,619 篇 机械工程
    • 1,592 篇 电子科学与技术(可...
    • 1,588 篇 生物医学工程(可授...
    • 1,283 篇 光学工程
    • 890 篇 安全科学与工程
    • 887 篇 仪器科学与技术
    • 845 篇 化学工程与技术
    • 792 篇 动力工程及工程热...
    • 694 篇 建筑学
    • 690 篇 交通运输工程
  • 10,939 篇 理学
    • 6,375 篇 数学
    • 2,815 篇 生物学
    • 2,143 篇 物理学
    • 1,834 篇 统计学(可授理学、...
    • 1,340 篇 系统科学
    • 850 篇 化学
  • 7,268 篇 管理学
    • 4,385 篇 管理科学与工程(可...
    • 3,212 篇 图书情报与档案管...
    • 2,012 篇 工商管理
  • 1,389 篇 医学
    • 1,215 篇 临床医学
    • 1,102 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,118 篇 法学
    • 881 篇 社会学
  • 697 篇 经济学
    • 695 篇 应用经济学
  • 692 篇 教育学
  • 382 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,808 篇 software enginee...
  • 1,650 篇 computer science
  • 867 篇 computational mo...
  • 847 篇 feature extracti...
  • 787 篇 training
  • 700 篇 software
  • 658 篇 semantics
  • 629 篇 deep learning
  • 612 篇 accuracy
  • 563 篇 machine learning
  • 539 篇 data mining
  • 509 篇 application soft...
  • 434 篇 computer archite...
  • 402 篇 predictive model...
  • 384 篇 internet of thin...
  • 374 篇 testing
  • 373 篇 software systems
  • 364 篇 optimization
  • 358 篇 data models
  • 337 篇 support vector m...

机构

  • 1,215 篇 college of compu...
  • 352 篇 school of comput...
  • 300 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 188 篇 school of comput...
  • 158 篇 school of softwa...
  • 156 篇 college of compu...
  • 150 篇 state key labora...
  • 139 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 129 篇 school of comput...
  • 126 篇 national enginee...
  • 124 篇 school of softwa...
  • 122 篇 school of comput...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 101 篇 school of softwa...
  • 97 篇 school of big da...

作者

  • 70 篇 ruimin hu
  • 60 篇 liu yang
  • 55 篇 baowen xu
  • 53 篇 chen zhong
  • 47 篇 wang ping
  • 47 篇 hu ruimin
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 stuckey peter j.
  • 42 篇 zhou jie
  • 41 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 34 篇 wang xingwei
  • 33 篇 niyato dusit
  • 33 篇 shen linlin

语言

  • 38,324 篇 英文
  • 1,056 篇 其他
  • 501 篇 中文
  • 10 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 7 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
检索条件"机构=Computer and Software Engineering"
39872 条 记 录,以下是401-410 订阅
排序:
Unsupervised Distributed Anomaly Detection Framework for IoT in Edge AI Network
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jiang, Xingguo Lu, Chang Luo, Hong Sun, Yan Beijing University of Posts and Telecommunications School of Computer Science National Pilot Software Engineering School Beijing100876 China
Anomaly detection of sensor data is crucial to ensure the stability and effectiveness of IoT system. The task requires high accuracy and low latency, which makes distributed anomaly detection gradually become a resear... 详细信息
来源: 评论
Decompose-Compose Feature Augmentation for Imbalanced Crack Recognition in Industrial Scenarios
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年
作者: Chen, Zhuangzhuang Xu, Chengqi Hu, Tao Wang, Li Chen, Jie Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering China University of Southern California Department of computer science Los AngelesCA90007 United States
Automated crack recognition has achieved remarkable progress in the past decades as a critical task in structure health monitoring, to ensure safety and durability in many industrial scenarios. However, imbalanced cra... 详细信息
来源: 评论
KANOCLIP: ZERO-SHOT ANOMALY DETECTION THROUGH KNOWLEDGE-DRIVEN PROMPT LEARNING AND ENHANCED CROSS-MODAL INTEGRATION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Chengyuan Zhou, Suyang Kong, Jieping Qi, Lei Xue, Hui College of Software Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
Zero-shot anomaly detection (ZSAD) identifies anomalies without needing training samples from the target dataset, essential for scenarios with privacy concerns or limited data. Vision-language models like CLIP show po... 详细信息
来源: 评论
Multipedal - Multilayer Perceptron Demographic Targeting Algorithm
Multipedal - Multilayer Perceptron Demographic Targeting Alg...
收藏 引用
International Conference on Knowledge and Smart Technology (KST)
作者: Paul Connolly Kieran Flanagan Enda Fallon Circana Athlone Ireland Department of Computer and Software Engineering Technological University of the Shannon Athlone Ireland
Modern data collection processes and applications provide the ability to gather detailed spending patterns of large numbers of consumers. Additionally, modern on-line marketing programs allow for highly specific targe... 详细信息
来源: 评论
HTM-CDFK: An Online Industrial Control Anomaly Detection Algorithm based on Hierarchical Time Memory
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Jingwen Zhang, Yuanyuan Wang, Zilin Ren, Yi Chen, Liangyin Chen, Yanru Sichuan University College of Computer Science College of Software Engineering Institute for Industrial Internet Research Chengdu610065 China
With the rapid advancement of industrial structures, many factories are deploying anomaly detection systems. However, most existing anomaly detection algorithms are unsuitable for high-noise industrial control system ... 详细信息
来源: 评论
TraceLens: Early Detection of software Anomalies Using Critical Path Analysis  25
TraceLens: Early Detection of Software Anomalies Using Criti...
收藏 引用
Companion of the 16th ACM/SPEC International Conference on Performance engineering
作者: Masoumeh Nourollahi Amir Haghshenas Michel Dagenais Department of Computer and Software Engineering École Polytechnique de Montréal Montreal QC Canada
Runtime smell detection in software systems, particularly through system call analysis, has garnered significant attention in recent years. Although various machine learning techniques have been employed to enhance de... 详细信息
来源: 评论
Research and Development of Kubernetes Operator for Lightweight Multi-Access Edge Computing Platform Simulator
Research and Development of Kubernetes Operator for Lightwei...
收藏 引用
2025 Systems of Signals Generating and Processing in the Field of on Board Communications, SOSG 2025
作者: Filianin, Ivan Borisov, Nikita Bogatyrev, Vladimir Itmo University Faculty of Software Engineering and Computer Engineering St. Petersburg Russia Itmo University Faculty of Infocommunication Technologies St. Petersburg Russia Saint-Petersburg State University of Aerospace Instrumentation Department of Information Systems Security St. Petersburg Russia
This paper addresses the problem of deploying complex systems in Kubernetes clusters. It discusses using the OperatorSDK framework supported by RedHat as a basis for implementing the Kubernetes operator for Lightweigh... 详细信息
来源: 评论
A Neural Network Framework for Classifying Educational Content Aligned with Learning Outcomes  16
A Neural Network Framework for Classifying Educational Conte...
收藏 引用
16th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2025 / 8th International Conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Alkhalil, Adel Department of Software Engineering College of Computer Science and Engineering University of ha'Il Ha'il81481 Saudi Arabia
Rapid growth of digital educational content necessitates efficient and accurate methods for organizing and mapping resources to ensure well-alignment with targeted learning outcomes, academic standards, and competency... 详细信息
来源: 评论
A Smart Framework for Optimizing User Feedback Prioritization in Application Development
A Smart Framework for Optimizing User Feedback Prioritizatio...
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Nuha Almoqren Mubarak Alrashoud Software Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
In mobile app development, user reviews are a significant source of requirements. Users frequently report bugs, request new features, or suggest enhancements. Mobile app vendors aim to maximize user satisfaction by ad... 详细信息
来源: 评论
The 23andMe Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies
arXiv
收藏 引用
arXiv 2025年
作者: Holthouse, Ryan Owens, Serena Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
In October 2023, 23andMe, a prominent provider of personal genetic testing, ancestry, and health information services, suffered a significant data breach orchestrated by a cybercriminal known as "Golem." Ini... 详细信息
来源: 评论