咨询与建议

限定检索结果

文献类型

  • 3,891 篇 会议
  • 2,050 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,709 篇 工学
    • 2,973 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 333 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,677 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 362 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 167 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 224 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,773 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6019 条 记 录,以下是101-110 订阅
排序:
RGCNU: Recurrent Graph Convolutional Network With Uncertainty Estimation for Remaining Useful Life Prediction
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第7期10卷 1640-1642页
作者: Qiwu Zhu Qingyu Xiong Zhengyi Yang Yang Yu School of Big Data&Software Engineering Chongqing UniversityChongqing 400044 Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of EducationChongqing 400044China School of Biology and Engineering Guizhou Medical UniversityGuiyang 550025China
Dear Editor,This letter focuses on the problem of remaining useful life(RUL)prediction of equipment. Existing graph neural network(GCN)-based approaches merely provide the point estimation of RUL. However,the estimate... 详细信息
来源: 评论
Exploring implicit influence for social recommendation based on GNN
收藏 引用
Soft computing 2024年 第19期28卷 11001-11014页
作者: Liu, Zhewei Yang, Peilin Hao, Qingbo Zheng, Wenguang Xiao, Yingyuan Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
In recent years, the method of using graph neural networks (GNN) to learn users’ social influence has been widely applied to social recommendation and has shown effectiveness, but several important challenges have no... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
A survey on federated learning:a perspective from multi-party computation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 93-103页
作者: Fengxia LIU Zhiming ZHENG Yexuan SHI Yongxin TONG Yi ZHANG Institute of Artificial Intelligence and Key Laboratory of Mathematics Informatics Behavioral Semantics Beihang UniversityBeijing 100191China State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang UniversityBeijing 100191China Pengcheng Laboratory Shenzhen 518055China Zhongguancun Laboratory Beijing 100190China Institute for Mathematical Sciences and Engineering Research Center of Financial Computing and Digital Engineering Renmin University of ChinaBeijing 100872China
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation ... 详细信息
来源: 评论
Enhancing Topic Interpretability for Neural Topic Modeling Through Topic-Wise Contrastive Learning  40
Enhancing Topic Interpretability for Neural Topic Modeling T...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Gao, Xin Lin, Yang Li, Ruiqing Wang, Yasha Chu, Xu Ma, Xinyu Yu, Hailong Software Engineering Institution School of Computer Science Peking University Beijing China Key Lab of High Confidence Software Technologies Ministry of Education Beijing China Peking University National Engineering Research Center of Software Engineering Beijing China School of Computer Science Center on Frontiers of Computing Studies Peking University China
Data mining and knowledge discovery are essential aspects of extracting valuable insights from vast datasets. Neural topic models (NTMs) have emerged as a valuable unsupervised tool in this field. However, the predomi... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
Advanced Mechanisms of Perception in the Digital Hide and Seek Game Based on Deep Learning  5
Advanced Mechanisms of Perception in the Digital Hide and Se...
收藏 引用
5th IEEE International Conference on Smart Systems and Technologies, SST 2022
作者: Livada, Časlav Hodak, David Department of Software Engineering Faculty of Electrical Engineering Computing and Information Osijek Croatia Faculty of Electrical Engineering Computing and Information Osijek Croatia
The goal of this paper is to demonstrate the power of machine learning and deep learning combined with powerful tools used in creating virtual simulations. This is made possible by the Unity Game Engine, a software us... 详细信息
来源: 评论
Facial Expression Recognition Based on TripletLoss and Attention Mechanism  28
Facial Expression Recognition Based on TripletLoss and Atten...
收藏 引用
28th International Conference on Automation and computing, ICAC 2023
作者: Gou, Rongqiang Gai, Qiuyan Xu, Zhijie Xu, Yuanping Zhang, Chaolong Jin, Jin He, Jia Shi, Yajing School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
The paper proposes a facial expression recognition method called Triplet-Loss Attention Network (TAN), which aims to address the problem of large intra-class and inter-class distances in facial expression recognition.... 详细信息
来源: 评论
RAHN: A Reputation Based Hourglass Network for Web Service QoS Prediction  36
RAHN: A Reputation Based Hourglass Network for Web Service Q...
收藏 引用
36th International Conference on software engineering and Knowledge engineering, SEKE 2024
作者: Chen, Xia Du, Yugen Tang, Guoxing Luo, Yingwei Ma, Benchi Software Engineering Institute East China Normal University Shanghai200062 China Shanghai Key Laboratory of Trustworthy Computing Shanghai200062 China
As the homogenization of Web services becomes more and more common, the difficulty of service recommendation is gradually increasing. How to predict Quality of Service (QoS) more efficiently and accurately becomes an ... 详细信息
来源: 评论
Buffer with Feature Tokens: Combating Confusion in Medical Image Continual Learning
Buffer with Feature Tokens: Combating Confusion in Medical I...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Fan, Zheming Chen, Weiting Fan, Jiahao Yu, Ruizhi East China Normal University Shanghai Key Laboratory of Trustworthy Computing Moe Research Center of Software/Hardware Co-Design Engineering China
Due to its complexity and privacy concerns, medical data is often difficult to collect fully at once. New data emerges with the discovery of new diseases and advances in medical technology, but privacy concerns limit ... 详细信息
来源: 评论