咨询与建议

限定检索结果

文献类型

  • 443 篇 会议
  • 220 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 414 篇 工学
    • 250 篇 计算机科学与技术...
    • 215 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 52 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 17 篇 仪器科学与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 安全科学与工程
    • 14 篇 建筑学
    • 12 篇 交通运输工程
  • 221 篇 理学
    • 99 篇 数学
    • 69 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 43 篇 医学
    • 37 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 17 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 17 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...
  • 10 篇 performance anal...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 15 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 638 篇 英文
  • 18 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
664 条 记 录,以下是31-40 订阅
排序:
Distributionally Robust Control for Chance-Constrained Signal Temporal Logic Specifications  63
Distributionally Robust Control for Chance-Constrained Signa...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Kordabad, Arash Bahari Vlahakis, Eleftherios E. Lindemann, Lars Dimarogonas, Dimos V. Soudjani, Sadegh Max Planck Institute for Software Systems Kaiserslautern Germany Kth Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden University of Southern California Viterbi School of Engineering Thomas Lord Department of Computer Science Los Angeles United States
We consider distributionally robust optimal control of stochastic linear systems under signal temporal logic (STL) chance constraints when the disturbance distribution is unknown. By assuming that the underlying predi... 详细信息
来源: 评论
KDTL: knowledge-distilled transfer learning framework for diagnosing mental disorders using EEG spectrograms
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18919-18934页
作者: Singh, Shreyash Jadli, Harshit Padma Priya, R. Surya Prasath, V.B. Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore India Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Center CincinnatiOH45229 United States Department of Pediatrics University of Cincinnati College of Medicine CincinnatiOH45257 United States Department of Biomedical Informatics College of Medicine University of Cincinnati CincinnatiOH45267 United States Department of Computer Science University of Cincinnati CincinnatiOH45221 United States
Electroencephalography (EEG) is a well-known modality in neuroscience and is widely used in identifying and classifying neurological disorders. This paper investigates how EEG data can be used along with knowledge dis... 详细信息
来源: 评论
Semantic API Alignment: Linking High-level User Goals to APIs
arXiv
收藏 引用
arXiv 2024年
作者: Feldt, Robert Coppola, Riccardo The Software Engineering division of Chalmers Institute of Technology Göteborg Sweden The Department of Computer and Control Engineering of Politecnico di Torino Turin Italy
Large Language Models (LLMs) are becoming key in automating and assisting various software development tasks, including text-based tasks in requirements engineering but also in coding. Typically, these models are used... 详细信息
来源: 评论
Hemochromatosis Pathogenesis and Its Association with Liver Disease: An Analysis Through Machine Learning  4
Hemochromatosis Pathogenesis and Its Association with Liver ...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Imtiaz, Isra Rehman, Attique Ur Javaid, Sabeen Ali, Tahir Muhammad Mir, Azka Masud, Mehedi Kumar, Deepak University of Sialkot Department of Software Engineering Sialkot Pakistan Gulf University for Science and Technology Department of Computer Science Kuwait Taif University Department of Computer Science Saudi Arabia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR Institute of Technology and Sciences Andhra Pradesh Guntur India
A significant risk factor for the development of liver disease is hemochromatosis, an inherited iron overload illness, but the complex pathophysiology behind this link is still unknown. To understand the intricate int... 详细信息
来源: 评论
Search and Recommendation Systems with Metadata Extensions
Search and Recommendation Systems with Metadata Extensions
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Woo-Hyeon Kim Joo-Chang Kim Division of AI Computer Science and Computer Engineering Kyonggi University South Korea Contents Convergence Software Research Institute Kyonggi University South Korea
This paper proposes an AI-based video metadata extension model to overcome the limitations of video search and recommendation systems in the multimedia industry. Current video searches and recommendations utilize pre-...
来源: 评论
EPM: Evolutionary Perception Method for Anomaly Detection in Noisy Dynamic Graphs
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年
作者: Wang, Huan Chen, Junyang Wu, Yirui Leung, Victor C. M. Wang, Di King Abdullah University of Science and Technology Division of Computer Electrical and Mathematical Sciences and Engineering Saudi Arabia Huazhong Agricultural University College of Informatics China Shenzhen University College of Computer Science and Software Engineering China Hohai University College of Computer and Information China
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve... 详细信息
来源: 评论
Exploring Cognition through Morphological Info-Computational Framework
arXiv
收藏 引用
arXiv 2024年
作者: Dodig-Crnkovic, Gordana Department of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden Division of Computer Science and Software Engineering School of Innovation Design and Engineering Mälardalen University Västerås Sweden
Traditionally, cognition has been considered a uniquely human capability involving perception, memory, learning, reasoning, and problem-solving. However, recent research shows that cognition is a fundamental ability s...
来源: 评论
Rethinking Cognition: Morphological Info-Computation and the Embodied Paradigm in Life and Artificial Intelligence
arXiv
收藏 引用
arXiv 2024年
作者: Dodig-Crnkovic, Gordana Department of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden Division of Computer Science and Software Engineering School of Innovation Design and Engineering Mälardalen University Västerås Sweden
This study aims to place Lorenzo Magnani’s Eco-Cognitive Computationalism within the broader context of current work on information, computation, and cognition. Traditionally, cognition was believed to be exclusive t...
来源: 评论
A Mutation-Guided Assessment of Acceleration Approaches for Continuous Integration: An Empirical Study of YourBase
A Mutation-Guided Assessment of Acceleration Approaches for ...
收藏 引用
International Mining software Repositories, MSR
作者: Zhili Zeng Tao Xiao Maxime Lamothe Hideaki Hata Shane McIntosh Software REBELs University of Waterloo Canada Division of Information Science Nara Institute of Science and Technology Japan Department of Computer Engineering and Software Engineering Polytechnique Montréal Canada Faculty of Engineering Shinshu University Japan
Continuous Integration (CI) is a popular software development practice that quickly verifies updates to codebases. To cope with the ever-increasing demand for faster software releases, CI acceleration approaches have ... 详细信息
来源: 评论
Classification of Real and Deepfakes Visual Samples with Pre-trained Deep Learning Models  7th
Classification of Real and Deepfakes Visual Samples with Pre...
收藏 引用
Proceedings of the 7th International Conference on Advances in Computing and Data Sciences, ICACDS 2023
作者: Nawaz, Marriam Javed, Ali Nazir, Tahira Khan, Muhammad Attique Rajinikanth, Venkatesan Kadry, Seifedine Department of Software Engineering UET Taxila Taxila47050 Pakistan Department of Computing Riphah International University Islamabad Pakistan Department of Computer Science HITEC University Taxila Pakistan Department of Computer Science and Engineering Division of Research and Innovation Saveetha School of Engineering SIMATS Chennai602105 India Department of Applied Data Science Noroff University College Kristiansand4612 Norway Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Serious security and privacy problems have arisen as a result of significant advancements in the creation of deepfakes. Attackers can easily replace a person’s face with the target person’s face in an image using so... 详细信息
来源: 评论