咨询与建议

限定检索结果

文献类型

  • 3,873 篇 会议
  • 2,055 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,006 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,717 篇 工学
    • 2,983 篇 计算机科学与技术...
    • 2,463 篇 软件工程
    • 748 篇 信息与通信工程
    • 493 篇 控制科学与工程
    • 413 篇 生物工程
    • 342 篇 电气工程
    • 264 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 220 篇 电子科学与技术(可...
    • 183 篇 光学工程
    • 137 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 120 篇 交通运输工程
  • 1,683 篇 理学
    • 959 篇 数学
    • 449 篇 生物学
    • 364 篇 物理学
    • 304 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,123 篇 管理学
    • 695 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 319 篇 工商管理
  • 228 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 116 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 123 篇 经济学
    • 121 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 艺术学
  • 14 篇 文学
  • 1 篇 哲学

主题

  • 228 篇 software enginee...
  • 164 篇 computational mo...
  • 139 篇 feature extracti...
  • 137 篇 training
  • 132 篇 semantics
  • 117 篇 deep learning
  • 111 篇 computer science
  • 110 篇 machine learning
  • 108 篇 software
  • 99 篇 accuracy
  • 96 篇 data models
  • 93 篇 cloud computing
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 76 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 visualization
  • 70 篇 optimization

机构

  • 224 篇 college of compu...
  • 95 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 67 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 53 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 48 篇 school of big da...
  • 46 篇 school of comput...
  • 41 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 35 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 34 篇 hung chih-cheng
  • 28 篇 xu yuanping
  • 28 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 22 篇 leung victor c.m...
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 ding zuohua
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,759 篇 英文
  • 203 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6006 条 记 录,以下是1-10 订阅
排序:
Adaptive Multi-strategy Rabbit Optimizer for Large-scale Optimization
收藏 引用
Journal of Bionic engineering 2025年 第1期22卷 398-416页
作者: Baowei Xiang Yixin Xiang Department of Computing School of Electronic and Information Engineering Taizhou UniversityTaizhou318000China Department of Software Engineering College of Software Nankai UniversityTianjin300350China
As optimization problems continue to grow in complexity,the need for effective metaheuristic algorithms becomes increasingly ***,the challenge lies in identifying the right parameters and strategies for these *** this... 详细信息
来源: 评论
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5298-5311页
作者: Han, Xinhui Pan, Haoyuan Wang, Zhaorui Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Future Network of Intelligence Institute School of Science and Engineering Shenzhen518172 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology College of Computer Science and Software Engineering Shenzhen518060 China
We investigate the timely status update in linear multi-hop wireless networks, where a source tries to deliver status update packets to a destination through a sequence of half-duplex relays. Timeliness is measured by... 详细信息
来源: 评论
HDeFC: Hierarchical Secure Fuzzy Deduplication Based on Fog computing
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12658-12668页
作者: Tang, Zehui Zeng, Shengke Han, Song Liu, Jun He, Mingxing Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China
Secure deduplication not only optimizes cloud storage but also prevents data leakage. However, traditional schemes are with high computation and communication costs to deal with large-scale multimedia data. To address... 详细信息
来源: 评论
Bias analysis of AI models for undergraduate student admissions
收藏 引用
Neural computing and Applications 2025年 第12期37卷 7785-7795页
作者: Van Busum, Kelly Fang, Shiaofen Department of Computer Science and Software Engineering Butler University IndianapolisIN United States Computing and Engineering Indiana University Luddy School of Informatics Indiana University Indianapolis IndianapolisIN United States
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp... 详细信息
来源: 评论
Evolution Analysis of Network Attack and Defense Situation Based on Game Theory
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1475-1494页
作者: Haiyan Sun Chenglong Shao Jianwei Zhang Kun Wang Wanwei Huang College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450007China Intelligent Computing Power Research Department Zhengzhou Xinda Advanced Technology Research InstituteZhengzhou450007China
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this pa... 详细信息
来源: 评论
Redactable Blockchain From Decentralized Chameleon Hash Functions, Revisited
收藏 引用
IEEE Transactions on Computers 2025年 第6期74卷 1911-1920页
作者: Li, Cong Shen, Qingni Wu, Zhonghai Peking University School of Software and Microelectronics Beijing100871 China Peking University National Engineering Research Center for Software Engineering Beijing100871 China Peking University Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing100871 China Peking University PKU-OCTA Laboratory for Blockchain and Privacy Computing Beijing100871 China
Recently, redactable blockchains have attracted attention owing to enabling the contents of blocks to be re-written. The existing redactable blockchain solutions can be classified as two categories, the centralized on... 详细信息
来源: 评论
Instruction selection optimization for VLIW architecture based on classification node merging
收藏 引用
Journal of Supercomputing 2025年 第7期81卷 1-19页
作者: Liu, Fangjun Zhang, Huifu Hu, Yonghua Xie, Anxing Cao, Wei Mo, Shangfeng School of Computer Science and Engineering Hunan University of Science and Technology XiangTan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology XiangTan411201 China
Traditional instruction selection methods fail to fully exploit the very long instruction word (VLIW) architecture’s efficient scalar instructions. We propose an optimized instruction selection method based on classi... 详细信息
来源: 评论
SQUMUTH squirrel search based algorithm for high order mutant generation in mutation testing
收藏 引用
Discover computing 2025年 第1期28卷 1-17页
作者: Mohanty, Subhasish Mishra, Jyotirmaya Mohapatra, Sudhir Kumar Bejo, Seifu Detso Deferisha, Aliazar Deneke Computer Science and Engineering GIET University Odisha Gunupur India Faculty of Engineering and Technology Sri Sri University Cuttack India Department of Software Engineering CCI Wolkite University Wolkite Ethiopia Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia
In today's software testing community, quality assessment remains critical, with mutation testing standing as a cornerstone technique for evaluating the effectiveness of test cases. This method involves introducin... 详细信息
来源: 评论
Uncertainty-Calibrated Test-Time Model Adaptation without Forgetting
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 1-14页
作者: Tan, Mingkui Chen, Guohao Wu, Jiaxiang Zhang, Yifan Chen, Yaofo Zhao, Peilin Niu, Shuaicheng South China University of Technology School of Software Engineering China Pazhou Laboratory Guangzhou China XVERSE China National University of Singapore School of Computing Singapore Tencent AI Lab China Nanyang Technological University College of Computing and Data Science Singapore
Test-time adaptation (TTA) seeks to tackle potential distribution shifts between training and testing data by adapting a given model w.r.t. any testing sample. This task is particularly important when the test environ... 详细信息
来源: 评论
Unpaired 3D Shape-to-Shape Translation via Gradient-Guided Triplane Diffusion
收藏 引用
IEEE Transactions on Visualization and Computer Graphics 2025年 第5期31卷 3376-3386页
作者: Zhang, Wenxiao Rahmani, Hossein Liu, Jun Hohai University College of Computer Science and Software Engineering Nanjing211100 China Lancaster University School of Computing and Communications LancasterLA1 4YW United Kingdom
Unpaired shape-to-shape translation refers to the task of transforming the geometry and semantics of an input shape into a new shape domain without paired training data. Previous methods utilize GAN-based architecture... 详细信息
来源: 评论