咨询与建议

限定检索结果

文献类型

  • 28,411 篇 会议
  • 11,542 篇 期刊文献
  • 345 册 图书

馆藏范围

  • 40,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,675 篇 工学
    • 19,383 篇 计算机科学与技术...
    • 16,021 篇 软件工程
    • 5,066 篇 信息与通信工程
    • 3,218 篇 控制科学与工程
    • 2,581 篇 生物工程
    • 2,091 篇 电气工程
    • 1,633 篇 机械工程
    • 1,617 篇 电子科学与技术(可...
    • 1,597 篇 生物医学工程(可授...
    • 1,290 篇 光学工程
    • 896 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 851 篇 化学工程与技术
    • 800 篇 动力工程及工程热...
    • 704 篇 建筑学
    • 704 篇 交通运输工程
  • 10,991 篇 理学
    • 6,403 篇 数学
    • 2,824 篇 生物学
    • 2,155 篇 物理学
    • 1,839 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,305 篇 管理学
    • 4,404 篇 管理科学与工程(可...
    • 3,231 篇 图书情报与档案管...
    • 2,023 篇 工商管理
  • 1,399 篇 医学
    • 1,225 篇 临床医学
    • 1,112 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,125 篇 法学
    • 885 篇 社会学
  • 695 篇 经济学
    • 693 篇 应用经济学
  • 694 篇 教育学
  • 383 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,819 篇 software enginee...
  • 1,653 篇 computer science
  • 880 篇 computational mo...
  • 868 篇 feature extracti...
  • 817 篇 training
  • 708 篇 software
  • 675 篇 semantics
  • 664 篇 deep learning
  • 640 篇 accuracy
  • 569 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 431 篇 computer archite...
  • 420 篇 predictive model...
  • 384 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 370 篇 optimization
  • 370 篇 data models
  • 341 篇 security

机构

  • 1,262 篇 college of compu...
  • 359 篇 school of comput...
  • 304 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 160 篇 school of softwa...
  • 157 篇 college of compu...
  • 149 篇 state key labora...
  • 142 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of softwa...
  • 121 篇 school of comput...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 100 篇 school of softwa...

作者

  • 67 篇 ruimin hu
  • 59 篇 liu yang
  • 55 篇 baowen xu
  • 53 篇 chen zhong
  • 47 篇 wang ping
  • 47 篇 hu ruimin
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,022 篇 英文
  • 1,776 篇 其他
  • 520 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Computer and Software Engineering"
40298 条 记 录,以下是821-830 订阅
排序:
AI-Enabled Grouping Bridgehead to Secure Penetration Topics of Metaverse
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5609-5624页
作者: Woo Hyun Park Isma Farah Siddiqui Nawab Muhammad Faseeh Qureshi Department of Electrical and Computer Engineering Sungkyunkwan UniversitySuwon16419Korea Department of Computer Education Sungkyunkwan UniversitySeoul03063Korea Department of Software Engineering Mehran University of Engineering&TechnologyJamshoroPakistan
With the advent of the big data era,security issues in the context of artificial intelligence(AI)and data analysis are attracting research *** the metaverse,which will become a virtual asset in the future,users’commu... 详细信息
来源: 评论
On Evaluation of Bangla Word Analogies
On Evaluation of Bangla Word Analogies
收藏 引用
2023 Conference on Empirical Methods in Natural Language Processing, EMNLP 2023
作者: Akter, Mousumi Sarkar, Souvika Karmaker, Shubhra Kanti Lab Department of Computer Science & Software Engineering Auburn University AL United States
This paper presents a benchmark dataset of Bangla word analogies for evaluating the quality of existing Bangla word embeddings. Despite being the 7th largest spoken language in the world, Bangla is still a low-resourc... 详细信息
来源: 评论
Steel surface defect detection based on Improved YOLOX Algorithm
Steel surface defect detection based on Improved YOLOX Algor...
收藏 引用
International Conference on Emerging Electronic and Automation Technology 2022, ICEEAT 2022
作者: Li, Guohao Mokhtarzadeh, Amir Ali School of Computer and Software Engineering Huaiyin Institute of Technology Jiangsu Huaian223003 China
As one of the very common industrial products, strip steel plays a very important role in various fields. Steel production has received extensive attention. In industrial production, scratches are unavoidable due to n... 详细信息
来源: 评论
Method for Improving the Performance of Linear Interpolation Implementation using the Formation of Two-step Movements  14
Method for Improving the Performance of Linear Interpolation...
收藏 引用
14th International Conference on Advanced computer Information Technologies, ACIT 2024
作者: Romanyuk, Olexandr Zavalniuk, Yevhen Romanyuk, Oksana Snigur, Anatoliy Reshetnik, Oleksandr Maidaniuk, Volodymyr Vinnytsia National Technical University Department of Software Engineering Vinnytsia Ukraine Vinnytsia National Technical University Department of Computer Engineering Vinnytsia Ukraine
The purpose of the work is increasing the productivity of evaluation function-based line segment formation through the usage of two-step movements and parallelization of movements calculation. © 2024 IEEE.
来源: 评论
Framework-Agnostic JavaScript Component Libraries: Benefits, Implementation Strategies, and Commercialization Models  16
Framework-Agnostic JavaScript Component Libraries: Benefits,...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Gupta, Kishan Kesari Awasthi, Prashant Shaik, Mahaboobsubani Kaveri, Parag Ravikant Software Engineering Capgemini Technology Service Limited Chennai India Software Engineering Accenture Limited Liability Partnership Chicago United States Software Engineering Hilton Worldwide Holdings Inc McLean United States Symbiosis Institute of Computer Studies and Research Symbiosis International University Pune India
This study explores the edges, implementation processes, and commercialization standards for framework-agnostic JavaScript element libraries, concentrating on their role in making cross-framework compatible UI element... 详细信息
来源: 评论
CADS: Cyber-Attack Detection System Using Decision Tree for Automotive Cyber-Physical Systems  4
CADS: Cyber-Attack Detection System Using Decision Tree for ...
收藏 引用
4th International Conference on Electrical, Communication and computer engineering, ICECCE 2023
作者: Park, Seo-Hee Baek, Youngmi Dept. of Computer Software Engineering Changshin University Changwon-si Korea Republic of
Modern vehicles are equipped with a large number of electronic control units (ECUs) to provide more convenient and safe services for drivers. These ECUs are required to share the various control data for driving using... 详细信息
来源: 评论
LLM-Based Digital Twin Water Conservancy Knowledge Graph Construction  36
LLM-Based Digital Twin Water Conservancy Knowledge Graph Con...
收藏 引用
36th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2024
作者: Yang, Yan Ye, Feng Xu, Dong Zhang, Xuejie Xu, Jin College of Computer Science and Software Engineering Hohai University Nanjing China College of Water Conservancy and Hydropower Engineering Hohai University Nanjing China
In the study, a novel method for extracting domain-specific knowledge in digital twin water conservancy construction is proposed, addressing the challenges of interdisciplinary complexity and the limitations in existi... 详细信息
来源: 评论
Deep Learning-Based Anomaly Detection in 5G Cellular Networks  15
Deep Learning-Based Anomaly Detection in 5G Cellular Network...
收藏 引用
15th International Conference on Information, Intelligence, Systems and Applications, IISA 2024
作者: Farooq, Umar Hameed, Aroosa Leivadeas, Aris Lambadaris, Ioannis École de Technologie Supérieure Department of Software and It Engineering Montreal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
The telecommunication industry saw a dramatic shift with the introduction of 5G technologies. This new cellular generation brought lightening speed, massive capacity, and better connectivity. Despite the many introduc... 详细信息
来源: 评论
Performance Evaluation of ECC based Cryptographic Accumulator on Resource-Constrained Platform
Performance Evaluation of ECC based Cryptographic Accumulato...
收藏 引用
2024 Innovations in Intelligent Systems and Applications Conference, ASYU 2024
作者: Toros, Armağan Çekiş, İsmet Kaan Korkmaz, Kübra Özçelik, İlker Computer Engineering Eskişehir Osmangazi University Eskişehir Turkey Software Engineering Eskişehir Osmangazi University Eskişehir Turkey
Cryptographic accumulators are efficient data structures used for membership testing in various applications, including resource-constrained devices like IoT systems. This paper explores the performance of an ECC-base... 详细信息
来源: 评论
"i look like a gorilla, but don't move like one!": Impact of Avatar-Locomotion Congruence in Virtual Reality
"i look like a gorilla, but don't move like one!": Impact of...
收藏 引用
2025 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VRW 2025
作者: Khan, Omar Nam, Hyeongil Kim, Kangsoo University of Calgary Department of Computer Science Canada University of Calgary Department of Electrical and Software Engineering Canada
As virtual reality (VR) continues to expand, particularly in social VR platforms and immersive gaming, understanding the factors that shape user experience is becoming increasingly important. Avatars and locomotion me... 详细信息
来源: 评论