咨询与建议

限定检索结果

文献类型

  • 28,016 篇 会议
  • 11,437 篇 期刊文献
  • 352 册 图书

馆藏范围

  • 39,805 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,385 篇 工学
    • 19,152 篇 计算机科学与技术...
    • 15,962 篇 软件工程
    • 5,004 篇 信息与通信工程
    • 3,049 篇 控制科学与工程
    • 2,573 篇 生物工程
    • 2,104 篇 电气工程
    • 1,624 篇 机械工程
    • 1,592 篇 生物医学工程(可授...
    • 1,572 篇 电子科学与技术(可...
    • 1,285 篇 光学工程
    • 891 篇 安全科学与工程
    • 888 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 789 篇 动力工程及工程热...
    • 688 篇 交通运输工程
    • 685 篇 建筑学
  • 10,942 篇 理学
    • 6,371 篇 数学
    • 2,816 篇 生物学
    • 2,143 篇 物理学
    • 1,836 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,271 篇 管理学
    • 4,382 篇 管理科学与工程(可...
    • 3,220 篇 图书情报与档案管...
    • 2,002 篇 工商管理
  • 1,398 篇 医学
    • 1,218 篇 临床医学
    • 1,108 篇 基础医学(可授医学...
    • 701 篇 药学(可授医学、理...
  • 1,117 篇 法学
    • 880 篇 社会学
  • 701 篇 经济学
    • 698 篇 应用经济学
  • 685 篇 教育学
  • 381 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,808 篇 software enginee...
  • 1,651 篇 computer science
  • 863 篇 computational mo...
  • 840 篇 feature extracti...
  • 790 篇 training
  • 693 篇 software
  • 668 篇 semantics
  • 604 篇 deep learning
  • 582 篇 accuracy
  • 550 篇 machine learning
  • 543 篇 data mining
  • 510 篇 application soft...
  • 425 篇 computer archite...
  • 388 篇 predictive model...
  • 383 篇 internet of thin...
  • 373 篇 software systems
  • 371 篇 testing
  • 352 篇 optimization
  • 351 篇 data models
  • 332 篇 support vector m...

机构

  • 1,216 篇 college of compu...
  • 353 篇 school of comput...
  • 299 篇 state key labora...
  • 221 篇 school of comput...
  • 196 篇 department of co...
  • 194 篇 school of comput...
  • 160 篇 school of softwa...
  • 156 篇 college of compu...
  • 146 篇 state key labora...
  • 142 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 127 篇 national enginee...
  • 127 篇 school of comput...
  • 125 篇 school of softwa...
  • 120 篇 school of comput...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 96 篇 school of big da...

作者

  • 70 篇 ruimin hu
  • 58 篇 liu yang
  • 54 篇 chen zhong
  • 54 篇 baowen xu
  • 48 篇 hu ruimin
  • 46 篇 zhang lei
  • 45 篇 wang ping
  • 44 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 43 篇 zhou jie
  • 43 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 38,310 篇 英文
  • 1,005 篇 其他
  • 500 篇 中文
  • 13 篇 德文
  • 8 篇 日文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Software Engineering"
39805 条 记 录,以下是4951-4960 订阅
排序:
A metric for composite service reusability analysis
A metric for composite service reusability analysis
收藏 引用
2010 ICSE Workshop on Emerging Trends in software Metrics, WETSoM 2010, in Conjunction with the 32nd ACM/IEEE International Conference on software engineering, ICSE 2010
作者: Khoshkbarforoushha, A. Jamshidi, P. Shams, F. Automated Software Engineering Research Group Electrical and Computer Engineering Faculty Shahid Beheshti University GC Tehran Iran
Reusability is one of the most prominent service principles that can reduce cost of solution ownership when design services for reuse. The concept of reuse is supported by and can enable a number of complementary serv... 详细信息
来源: 评论
Method and system for detecting anomalous user behaviors: An ensemble approach  30
Method and system for detecting anomalous user behaviors: An...
收藏 引用
30th International Conference on software engineering and Knowledge engineering, SEKE 2018
作者: Xi, Xiangyu Zhang, Tong Zhao, Guoliang Duy, Dongdong Gao, Qing Zhao, Wen Zhang, Shikun School of Software and Microelectronics Peking University China National Engineering Research Center for Software Engineering Peking University China School of Electronics Engineering and Computer Science Peking University China Corporation China
Malicious user behavior that does not trigger access violation or data leak alert is difficult to detect. Using the stolen login credentials, the intruder doing espionage will first try to stay undetected, silently co... 详细信息
来源: 评论
Enhancing Ropes for Collaborative Text Editing
Enhancing Ropes for Collaborative Text Editing
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Sandal, Semih Ovatman, Tolga Aselsan Inc Software Engineering Department Ankara Turkey Istanbul Technical University Department of Computer Engineering Istanbul Turkey
Rope is a tree-based data structure providing performance enhancements in string concatenation operations in applications such as text editors. Even though collaborative text editing has become one of the major applic... 详细信息
来源: 评论
Chaos Based Pixel Scrambling Algorithm Based On Corner Traversal  8
Chaos Based Pixel Scrambling Algorithm Based On Corner Trave...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Ince, Cemile Ince, Kenan Hanbay, Davut Inönü University Computer Engineering Dept Malatya Turkey Inönü University Software Engineering Dept. Malatya Turkey
Lightweight image encryption has become a critical area of cryptography, especially for resource-constrained devices like those used in the Internet of Things (IoT). Chaotic maps, known for their sensitivity to initia... 详细信息
来源: 评论
Pattern-based trace correlation technique to compare software versions
Pattern-based trace correlation technique to compare softwar...
收藏 引用
3rd International Conference on Autonomous and Intelligent Systems, AIS 2012
作者: Idris, Maher Mehrabian, Ali Hamou-Lhadj, Abdelwahab Khoury, Richard Software Behaviour Analysis Lab. Electrical and Computer Engineering Concordia University Montréal QC Canada Department of Software Engineering Lakehead University Thunder Bay ON Canada
Understanding the behavioural aspects and functional attributes of an existing software system is an important enabler for many software engineering activities including software maintenance and evolution. In this pap... 详细信息
来源: 评论
Should Your 8-year-old Learn Coding?  14
Should Your 8-year-old Learn Coding?
收藏 引用
9th Workshop in Primary and Secondary Computing Education, WIPSCE 2014
作者: Duncan, Caitlin Bell, Tim Tanimoto, Steve Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand Department of Computer Science and Engineering University of Washington SeattleWA United States
There has been considerable interest in teaching "coding" to primary school aged students, and many creative "Initial Learning Environments" (ILEs) have been released to encourage this. Announcemen... 详细信息
来源: 评论
Quantisation design of multi-dimensional DCT for image coding
Quantisation design of multi-dimensional DCT for image codin...
收藏 引用
1999 IEEE Region 10 Conference, TENCON 1999
作者: Tan, D.M. Wu, H.R. School of Computer Science and Software Engineering Monash University Wellington Road VIC3168 Australia
This paper presents data folding as a method for rearranging image data in a manner which allows the practical application of the DCT to expand beyond the third dimension. Additionally, the design of the quantisation ... 详细信息
来源: 评论
Identification of Opinion Leaders by Using Social Network Embedding  5
Identification of Opinion Leaders by Using Social Network Em...
收藏 引用
5th IEEE International Conference on computer and Communications, ICCC 2019
作者: Luo, Jiaxing Du, Yajun Li, Ruomiao Cheng, Fei Xihua University School of Computer and Software Engineering Chengdu China SichuanLewei Technology Chengdu China
On social network platforms, users who can greatly affect other users through their posts are called opinion leaders. The discovery of opinion leaders has great significance for precision advertising, social analysis ... 详细信息
来源: 评论
FADE: Graph drawing, clustering, and visual abstraction  8th
收藏 引用
8th International Symposium on Graph Drawing, GD 2000
作者: Quigley, Aaron Eades, Peter Department of Computer Science and Software Engineering Univ. of Newcastle CallaghanNSW2308 Australia
A fast algorithm(fade) for the 2D drawing, geometric clustering and multilevel viewing of large undirected graphs is presented. The algorithm is an extension of the Barnes-Hut hierarchical space decomposition method, ... 详细信息
来源: 评论
Energy-Saving mechanisms for delay and Disruption-Tolerant networks  4th
Energy-Saving mechanisms for delay and Disruption-Tolerant n...
收藏 引用
4th International Conference on computer engineering and Networks, CENet2014
作者: Feng, Yankun Bai, Xiangyu School of Computer Science School of Software Engineering Inner Mongolia University Hohhot010021 China
In recent years, a lot of studies have been devoted to make communications possible between the nodes in the disconnected network scenarios, such as delay-/disruption-tolerant network (DTN). However, many DTN scenario... 详细信息
来源: 评论