咨询与建议

限定检索结果

文献类型

  • 3,975 篇 会议
  • 2,082 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,792 篇 工学
    • 3,043 篇 计算机科学与技术...
    • 2,489 篇 软件工程
    • 769 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 416 篇 生物工程
    • 350 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 229 篇 电子科学与技术(可...
    • 193 篇 光学工程
    • 149 篇 网络空间安全
    • 139 篇 安全科学与工程
    • 130 篇 动力工程及工程热...
    • 129 篇 化学工程与技术
    • 127 篇 仪器科学与技术
    • 122 篇 交通运输工程
  • 1,701 篇 理学
    • 964 篇 数学
    • 450 篇 生物学
    • 374 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 151 篇 化学
  • 1,149 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 504 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 232 篇 医学
    • 206 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 120 篇 社会学
  • 138 篇 教育学
    • 133 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 艺术学
  • 14 篇 文学
  • 1 篇 哲学

主题

  • 233 篇 software enginee...
  • 173 篇 computational mo...
  • 149 篇 feature extracti...
  • 138 篇 semantics
  • 138 篇 training
  • 129 篇 deep learning
  • 115 篇 machine learning
  • 113 篇 software
  • 111 篇 accuracy
  • 110 篇 computer science
  • 100 篇 data models
  • 95 篇 cloud computing
  • 89 篇 computer archite...
  • 85 篇 predictive model...
  • 85 篇 security
  • 83 篇 data mining
  • 80 篇 quality of servi...
  • 76 篇 optimization
  • 73 篇 internet of thin...
  • 72 篇 visualization

机构

  • 232 篇 college of compu...
  • 104 篇 national enginee...
  • 72 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 56 篇 school of inform...
  • 56 篇 institute of com...
  • 53 篇 school of big da...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 43 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 school of softwa...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 55 篇 rajkumar buyya
  • 48 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 23 篇 zuohua ding
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 qi liu
  • 20 篇 tao dacheng
  • 20 篇 ding zuohua
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,188 篇 英文
  • 904 篇 其他
  • 60 篇 中文
  • 3 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computing and Software Engineering"
6135 条 记 录,以下是1121-1130 订阅
排序:
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation  41
Hyperbolic Geometric Latent Diffusion Model for Graph Genera...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论
Impact of Data Breadth and Depth on Performance of Siamese Neural Network Model: Experiments with Three Keystroke Dynamic Datasets
arXiv
收藏 引用
arXiv 2025年
作者: Wahab, Ahmed Anu Hou, Daqing Cheng, Nadia Huntley, Parker Devlen, Charles Electrical and Computer Engineering Clarkson University PotsdamNY United States Statistics University of Virginia CharlottesvilleVA United States College of Computing Georgia Tech AtlantaGA United States Software Engineering RIT RochesterNY United States Computing and Information Science RIT RochesterNY United States
Deep learning models, such as the Siamese Neural Networks (SNN), have shown great potential in capturing the intricate patterns in behavioral data. However, the impacts of dataset breadth (i.e., the number of subjects...
来源: 评论
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Wenlian Huang Guanming Zhu Qiang Huang Zhuangzhuang Chen Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o...
来源: 评论
Early Diagnosis of Lung Tumors for Extending Patients’ Life Using Deep Neural Networks
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 993-1007页
作者: A.Manju R.Kaladevi Shanmugasundaram Hariharan Shih-Yu Chen Vinay Kukreja Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang Department of Computer Science and Engineering SRM Institute of Science and TechnologyRamapuramChennaiIndia Department of Computer Science and Engineering Saveetha Engineering CollegeChennaiIndia Department of Computer Science and Engineering Vardhaman College of EngineeringHyderabadIndia Department of Computer Science and Information Engineering National Yunlin University of Science and TechnologyYunlin 64002Taiwan Intelligence Recognition Industry Service Research Center National Yunlin University of Science and TechnologyYunlin 64002Taiwan Chitkara University Institute of Engineering and Technology Chitkara UniversityPunjabIndia Department of Computing Science University of AberdeenAberdeenUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh 12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh 11437Saudi Arabia School of Computer&Communication Engineering Changsha University of Science&TechnologyChangshaChina
The medical community has more concern on lung cancer *** experts’physical segmentation of lung cancers is time-consuming and needs to be *** research study’s objective is to diagnose lung tumors at an early stage t... 详细信息
来源: 评论
Detecting Poisoning Attacks in Collaborative IDSs of Vehicular Networks Using XAI and Shapley Value
收藏 引用
ACM Journal on Autonomous Transportation Systems 2024年 第3期2卷 1-21页
作者: Ahmed Saleh Bataineh Mohammad Zulkernine Adel Abusitta Talal Halabi School of Computing Queen's University Kingston Canada and Computer Science Al Hussein Technical University Amman Jordan Queen's University Kingston Canada Department of Computer Engineering and Software Engineering Polytechnique Montréal Montreal Canada Laval University Quebec Canada
Machine learning-based Intrusion Detection Systems (IDSs) for vehicle networks can collaborate to enhance their performance by sharing crucial decisions when individual datasets lack diversity, which hinders effective... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Why not Just Look for Answers? Using a More Direct Way for API Recommendation
Why not Just Look for Answers? Using a More Direct Way for A...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Changxin Liu Ling Xu Wenhan Mu Rui Qin Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China
Automated API recommendation technology can help developers quickly find target APIs that meet their require-ments. Some retrieval-based API recommendation approaches, such as BIKER and CLEAR, adopt an indirect API re... 详细信息
来源: 评论
$\mathrm{E}_{\gamma}$-Mixing Time
$\mathrm{E}_{\gamma}$-Mixing Time
收藏 引用
IEEE International Symposium on Information Theory
作者: Behnoosh Zamanlooy Shahab Asoodeh Mario Diaz Flavio P. Calmon Department of Computing and Software McMaster University Canada IIMAS Universidad Nacional Autónoma de México Mexico School of Engineering and Applied Sciences Harvard University USA
We investigate the mixing times of Markov kernels under $\mathsf{E}_{\gamma}-\mathbf{divergence}$ . We demonstrate that the zero-error $\mathsf{E}_{\gamma}- \mathbf{mixing}$ time, for any $\gamma > 1$ , of irre... 详细信息
来源: 评论