咨询与建议

限定检索结果

文献类型

  • 28,016 篇 会议
  • 11,437 篇 期刊文献
  • 352 册 图书

馆藏范围

  • 39,805 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,385 篇 工学
    • 19,152 篇 计算机科学与技术...
    • 15,962 篇 软件工程
    • 5,004 篇 信息与通信工程
    • 3,049 篇 控制科学与工程
    • 2,573 篇 生物工程
    • 2,104 篇 电气工程
    • 1,624 篇 机械工程
    • 1,592 篇 生物医学工程(可授...
    • 1,572 篇 电子科学与技术(可...
    • 1,285 篇 光学工程
    • 891 篇 安全科学与工程
    • 888 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 789 篇 动力工程及工程热...
    • 688 篇 交通运输工程
    • 685 篇 建筑学
  • 10,942 篇 理学
    • 6,371 篇 数学
    • 2,816 篇 生物学
    • 2,143 篇 物理学
    • 1,836 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,271 篇 管理学
    • 4,382 篇 管理科学与工程(可...
    • 3,220 篇 图书情报与档案管...
    • 2,002 篇 工商管理
  • 1,398 篇 医学
    • 1,218 篇 临床医学
    • 1,108 篇 基础医学(可授医学...
    • 701 篇 药学(可授医学、理...
  • 1,117 篇 法学
    • 880 篇 社会学
  • 701 篇 经济学
    • 698 篇 应用经济学
  • 685 篇 教育学
  • 381 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,808 篇 software enginee...
  • 1,651 篇 computer science
  • 863 篇 computational mo...
  • 840 篇 feature extracti...
  • 790 篇 training
  • 693 篇 software
  • 668 篇 semantics
  • 604 篇 deep learning
  • 582 篇 accuracy
  • 550 篇 machine learning
  • 543 篇 data mining
  • 510 篇 application soft...
  • 425 篇 computer archite...
  • 388 篇 predictive model...
  • 383 篇 internet of thin...
  • 373 篇 software systems
  • 371 篇 testing
  • 352 篇 optimization
  • 351 篇 data models
  • 332 篇 support vector m...

机构

  • 1,216 篇 college of compu...
  • 353 篇 school of comput...
  • 299 篇 state key labora...
  • 221 篇 school of comput...
  • 196 篇 department of co...
  • 194 篇 school of comput...
  • 160 篇 school of softwa...
  • 156 篇 college of compu...
  • 146 篇 state key labora...
  • 142 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 127 篇 national enginee...
  • 127 篇 school of comput...
  • 125 篇 school of softwa...
  • 120 篇 school of comput...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 96 篇 school of big da...

作者

  • 70 篇 ruimin hu
  • 58 篇 liu yang
  • 54 篇 chen zhong
  • 54 篇 baowen xu
  • 48 篇 hu ruimin
  • 46 篇 zhang lei
  • 45 篇 wang ping
  • 44 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 43 篇 zhou jie
  • 43 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 38,310 篇 英文
  • 1,005 篇 其他
  • 500 篇 中文
  • 13 篇 德文
  • 8 篇 日文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Software Engineering"
39805 条 记 录,以下是4971-4980 订阅
排序:
software architectures for task-oriented computing  08
Software architectures for task-oriented computing
收藏 引用
7th IEEE/ACIS International Conference on computer and Information Science, IEEE/ACIS ICIS 2008
作者: Garlan, David Department of Computer Science Carnegie Mellon University Department of Computer Science Software Engineering Professional Programs School of Computer Science Carnegie Mellon University
Recent advances in ubiquitous computing, autonomic computing, and artificial intelligence have led to a desire to better support user-oriented tasks by placing more intelligence In the computing infrastructure. This i... 详细信息
来源: 评论
A Tree based strategy for test data generation and cost calculation for uniform and non-uniform parametric values
A Tree based strategy for test data generation and cost calc...
收藏 引用
10th IEEE International Conference on computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Klaib, Mohammad F. J. Muthuraman, Sangeetha Ahmad, Noraziah Sidek, Roslina School of Computer Systems and Software Engineering University Malaysia Pahang 26300 Gambang Pahang Malaysia
software testing is a very important phase of software development to ensure that the developed system is reliable. Due to huge number of possible combinations involved in testing and the limitation in the time and re... 详细信息
来源: 评论
A copy detection method for chinese text by character based N-gram
收藏 引用
Journal of Convergence Information Technology 2011年 第3期6卷 277-282页
作者: Zhang, Wei Yang, Lincong Sun, Xingming Liu, Yuling School of Information Science and Engineering Hunan University Changsha 410082 China College of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
This paper studies Chinese character-based n-grams used in copy detection by Sogou Chinese News Corpus. Texts were compared each other to find out the same news event written by different authors which were viewed as ... 详细信息
来源: 评论
Impact of daily computer usage on GUI usage analysis  07
Impact of daily computer usage on GUI usage analysis
收藏 引用
4th Annual Conference on Information Security Curriculum Development, InfoSecCD'07
作者: Imsand, Eric S. Hamilton Jr., John A. Department of Computer Science and Software Engineering 107 Dunstan Hall Auburn University United States
This paper investigates a new method for detecting masquerade attacks. A masquerade attack is a form of attack wherein the attacker uses someone else's identity or one system assumes the identity of another system... 详细信息
来源: 评论
Peel-And-Bound: Generating Stronger Relaxed Bounds with Multivalued Decision Diagrams  28
Peel-And-Bound: Generating Stronger Relaxed Bounds with Mult...
收藏 引用
28th International Conference on Principles and Practice of Constraint Programming, CP 2022
作者: Rudich, Isaac Cappart, Quentin Rousseau, Louis-Martin Mathematics and Industrial Engineering Department Polytechnique Montréal Canada Computer Engineering and Software Engineering Department Polytechnique Montréal Canada
Decision diagrams are an increasingly important tool in cutting-edge solvers for discrete optimization. However, the field of decision diagrams is relatively new, and is still incorporating the library of techniques t... 详细信息
来源: 评论
Neighbor stability routing in MANETs
Neighbor stability routing in MANETs
收藏 引用
2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off
作者: Lei, Chen Lee, Chung-Wei Department of Computer Science and Software Engineering Auburn University Auburn AL 36830 United States
Mobile Ad Hoc Networks (MANETs) are characterized by wireless connectivity through multi-hops, frequently changing network topology among wireless mobile devices. These characteristics require routing algorithms to be... 详细信息
来源: 评论
Performance evaluation and optimization of NCOR methods in wireless mesh networks
Performance evaluation and optimization of NCOR methods in w...
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Zhang, Sanfeng Li, Shuang Di, Huang Zhang, Xiang College of Computer Science and Engineering Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China
Network Coding Opportunistic Routing (NCOR) methods are novel routing methods which can fit the broadcast nature of wireless mesh networks better. They can use the multi-user diversity advantage of the wireless channe... 详细信息
来源: 评论
A software Framework Based on JUnit for Automated software Testing in computer Science Courses  54
A Software Framework Based on JUnit for Automated Software T...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Zmuda, Michael A. Miami University Dept. of Computer Science and Software Engineering OxfordOH United States
This innovative practice full paper describes a new software framework based on JU nit to test student work. Automated testing is an important capability when teaching software development at the college level. Ideall... 详细信息
来源: 评论
Gray-box Adversarial Attack of Deep Reinforcement Learning-based Trading Agents  22
Gray-box Adversarial Attack of Deep Reinforcement Learning-b...
收藏 引用
22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023
作者: Ataiefard, Foozhan Hemmati, Hadi University of Calgary Electrical and Software Engineering Calgary Canada York University Electrical Engineering and Computer Science Toronto Canada
In recent years, deep reinforcement learning (Deep RL) has been successfully implemented as a smart agent in many systems such as complex games, self-driving cars, and chat-bots. One of the interesting use cases of De... 详细信息
来源: 评论
A selective literature review on cyber counterintelligence  17
A selective literature review on cyber counterintelligence
收藏 引用
17th European Conference on Cyber Warfare and Security, ECCWS 2018
作者: Duvenage, Petrus Jaquire, Victor Von Solms, Sebastian Centre for Cyber Security Academy of Computer Science and Software Engineering University of Johannesburg South Africa
For state and non-state actors with sizable cyber interests, numerous breaches during this decade affirmed the necessity of having cyber counterintelligence (CCI) at the centre of cybersecurity efforts. Concurrent wit... 详细信息
来源: 评论