咨询与建议

限定检索结果

文献类型

  • 3,948 篇 会议
  • 2,063 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,769 篇 工学
    • 3,025 篇 计算机科学与技术...
    • 2,485 篇 软件工程
    • 749 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 337 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 191 篇 光学工程
    • 140 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 118 篇 交通运输工程
  • 1,692 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 367 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,146 篇 管理学
    • 712 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 227 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 137 篇 教育学
    • 132 篇 教育学
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 145 篇 feature extracti...
  • 140 篇 training
  • 136 篇 semantics
  • 123 篇 deep learning
  • 112 篇 software
  • 111 篇 machine learning
  • 110 篇 computer science
  • 107 篇 accuracy
  • 99 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 86 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 231 篇 college of compu...
  • 104 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 53 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 school of big da...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,733 篇 英文
  • 310 篇 其他
  • 52 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6089 条 记 录,以下是1111-1120 订阅
排序:
A Survey on IEEE 802.15.7 MAC Protocols for Visible Light Communication
A Survey on IEEE 802.15.7 MAC Protocols for Visible Light Co...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: Abdulwadood Alawadhi Abdullah Almogahed Mohd. Hasbullah Omar InterNetWorks Research Laboratory School of Computing Universiti Utara Malaysia Sintok-Kedah Malaysia Department of Software Engineering Faculty of Engineering and Information Technolog Taiz University Taiz Yemen
Networks that use visible light communication (VLC) are suitable for meeting 5G and 6G criteria. The VLC is a new wireless high-speed communication technology. To meet the bandwidth requirements of bandwidth-hungry de... 详细信息
来源: 评论
Secure software Development in Google Colab
Secure Software Development in Google Colab
收藏 引用
AI IoT Congress (AIIoT), World
作者: Tarun Potluri Yong Shi Hossain Shahriar Dan Lo Reza Parizi Hongmei Chi Kai Qian College of Computing and Software Engineering Kennesaw State University USA Department of Computer and Information Sciences Florida A&M University Tallahassee FL
software is said to be secure if it has been developed and designed with security as its top priority. This entails implementing secure coding practices, performing vulnerability testing and repair, as well as continu...
来源: 评论
A Multiple-Path Learning Neural Network Model for Code Completion
A Multiple-Path Learning Neural Network Model for Code Compl...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Liu, Yi Liu, Jianxun Zhang, Xiangping Hu, Haize Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Xiangtan411201 China Hunan University of Humanities Science and Technology School of Informationn Loudi417000 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
Code completion, which can accelerate the software development process and improve the quality of software products, is an essential part of today's integrated development environments. It has become an important ... 详细信息
来源: 评论
Practical and Efficient Model Extraction of Sentiment Analysis APIs
Practical and Efficient Model Extraction of Sentiment Analys...
收藏 引用
International Conference on software engineering (ICSE)
作者: Weibin Wu Jianping Zhang Victor Junqiu Wei Xixian Chen Zibin Zheng Irwin King Michael R. Lyu School of Software Engineering Sun Yat-sen University Department of Computer Science and Engineering The Chinese University of Hong Kong Department of Computing The Hong Kong Polytechnic University Tencent
Despite their stunning performance, developing deep learning models from scratch is a formidable task. Therefore, it popularizes Machine-Learning-as-a-Service (MLaaS), where general users can access the trained models...
来源: 评论
Hierarchical Crowdsourcing for Data Labeling with Heterogeneous Crowd  39
Hierarchical Crowdsourcing for Data Labeling with Heterogene...
收藏 引用
39th IEEE International Conference on Data engineering, ICDE 2023
作者: Zhang, Haodi Huang, Wenxi Su, Zhenhan Chen, Junyang Jiang, Di Fan, Lixin Zhang, Chen Lian, Defu Wu, Kaishun Shenzhen University College of Computer Science and Software Engineering China Shenzhen University WeBank Institute of Financial Technology China Webank Co. Ltd. China Hong Kong Polytechnic University Department of Computing Hong Kong University of Science and Technology of China School of Data Science China
With the rapid and continuous development of data-driven technologies such as supervised learning, high-quality labeled data sets are commonly required by many applications. Due to the easiness of crowdsourcing small ... 详细信息
来源: 评论
Visual Perturbation for Text-Based Person Search  39
Visual Perturbation for Text-Based Person Search
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Pengcheng Yu, Xiaohan Bai, Xiao Zheng, Jin School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Jiangxi Research Institute Beihang University Beijing China School of Computing Macquarie University Sydney Australia
Text-based person search aims at locating a person described by natural language in uncropped scene images. Recent works for TBPS mainly focus on aligning multi-granularity vision and language representations, neglect...
来源: 评论
Cybersecurity and Smart Cities: Current Status and Future
Cybersecurity and Smart Cities: Current Status and Future
收藏 引用
Emerging Trends in engineering, Sciences and Technology (ICES&T), IEEE International Conference on
作者: Muhammad Yasir Habib Haseeb Ahmad Qureshi Shujahat Ali Khan Zara Mansoor Abdul Rehman Chishti Dept. of Electronic Engineering Faculty of Engineering The Islamia University of Bahawalpur Dept. of Computing and Informatics Faculty of Computing Bournemouth University Bournemouth United Kingdom College of Engineering IT and Environment Charles Darwin University Darwin Australia Dept. of Software Engineering Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Information and Communication Engineering Faculty of Engineering The Islamia University of Bahawalpur Bahawalpur Pakistan
A Smart city implements the latest IoT and information and communication technologies (ICT) to improve the quality of urban city administrations, decrease expenditures, asset management and interconnect citizens of a ...
来源: 评论
Instructors' Perspectives on Capstone Courses in computing Fields: A Mixed-Methods Study  2024
Instructors' Perspectives on Capstone Courses in Computing F...
收藏 引用
29th Working Group Reports on Innovation and Technology in Computer Science Education, ITiCSE WGR 2024
作者: Hooshangi, Sara Shakil, Asma Dasgupta, Subhasish Davis, Karen C.C. Farghally, Mohammed Fitzpatrick, KellyAnn Gutica, Mirela Hardt, Ryan Riddle, Steve Seyam, Mohammed Department of Computer Science Virginia Tech BlacksburgVA United States School of Computer Science University of Auckland Auckland New Zealand Info Systems and Tech Mgmt Dept George Washington University WashingtonDC United States Computer Science and Software Engineering Dept. Miami University OxfordOH United States School of Computing Instruction Georgia Institute of Technology AtlantaGA United States School of Computing & Academic Studies British Columbia Institute of Technology BurnabyBC Canada Computer & Information Science University of St. Thomas Saint PaulVA United States School of Computing Newcastle University Newcastle upon Tyne United Kingdom
Team-based capstone courses are integral to many undergraduate and postgraduate degree programs in the computing field. They are designed to help students gain hands-on experience and practice professional skills such... 详细信息
来源: 评论
A Sample Detection Model Applying IoT Technology
A Sample Detection Model Applying IoT Technology
收藏 引用
Network, Multimedia and Information Technology (NMITCON) International Conference on
作者: Li Wang Shu Huang Computer and Information Engineering College Wuhan Railway Vocational College of Technology Wuhan Hubei China School of Computing Wuhan Vocational College of Software and Engineering Wuhan Hubei China
This article first analyzes the development trend of IoT technology to determine its process framework in the industry. Then, through sample analysis, the application value and direction of intelligent instruments in ...
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng University of Oxford Department of Computer Science United Kingdom Peking University Department of Information and Computing Science School of Mathematical Science China Monash University Department of Software Systems and Cybersecurity Australia Singapore Management University School of Computing and Information Systems Singapore Nanyang Technological University School of Computer Science and Engineering Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论