咨询与建议

限定检索结果

文献类型

  • 3,879 篇 会议
  • 2,081 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,740 篇 工学
    • 3,000 篇 计算机科学与技术...
    • 2,472 篇 软件工程
    • 755 篇 信息与通信工程
    • 499 篇 控制科学与工程
    • 413 篇 生物工程
    • 357 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 227 篇 机械工程
    • 224 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 141 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 121 篇 交通运输工程
  • 1,686 篇 理学
    • 958 篇 数学
    • 451 篇 生物学
    • 365 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,130 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 492 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 229 篇 医学
    • 203 篇 临床医学
    • 187 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 130 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 45 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 138 篇 feature extracti...
  • 135 篇 training
  • 132 篇 semantics
  • 122 篇 deep learning
  • 114 篇 machine learning
  • 111 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 223 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 ismail leila
  • 27 篇 buyya rajkumar
  • 24 篇 zhang lei
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 xiaofei wang

语言

  • 5,784 篇 英文
  • 210 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6038 条 记 录,以下是111-120 订阅
排序:
SafeSlice: Enabling SLA-Compliant O-RAN Slicing via Safe Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Nagib, Ahmad M. Abou-Zeid, Hatem Hassanein, Hossam S. School of Computing Queen’s University Canada Department of Electrical and Software Engineering University of Calgary Canada Faculty of Computers and Artificial Intelligence Cairo University Egypt
Deep reinforcement learning (DRL)-based slicing policies have shown significant success in simulated environments but face challenges in physical systems such as open radio access networks (O-RANs) due to simulation-t... 详细信息
来源: 评论
The Role of AI in Predictive UX Shaping the Future of Metaverse Interactions
The Role of AI in Predictive UX Shaping the Future of Metave...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Nedal Nwasra Khalil Omar Zahid Hussain Qaisar Software Engineering Department University of Petra Amman Jordan Faculty of Computing & Emerging Technologies Multan Pakistan Computer Science Department University of Petra Amman Jordan
The Metaverse is defined as a collectively shared, persistent, and contextualized virtual space that will drive next-generation digital interaction facilitated by enhanced extended reality (XR) and edge computing. One... 详细信息
来源: 评论
CMCache: An Adaptive Cross-Level Data Placement Method for Multi-Level Cache
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Zeng, Zhaoyang Tan, Yujuan Ma, Zhulin Li, Jiali Zhao, Sanle Liu, Duo Chen, Xianzhang Ren, Ao Chongqing University College of Computer Science Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing400044 China Chongqing Universityof Posts and Telecommunications College of Software Engineering China Chongqing University College of Big Data and Software Engineering Chongqing China
Multi-level cache systems enhance I/O performance by optimizing data placement across various cache levels from a global perspective. However, existing methods often struggle to place data at the optimal cache level p... 详细信息
来源: 评论
Robust and digital hyper-polarization protocol of nuclear spins via magic sequential sequence
arXiv
收藏 引用
arXiv 2025年
作者: Li, Haiyang Liao, Hao Wang, Ping Faculty of Arts and Sciences Beijing Normal University Zhuhai519087 China National Engineering Laboratory on Big Data System Computing Technology Guangdong Province Engineering Center of China-made High Performance Data Computing System College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Hyper-polarization of nuclear spins is crucial for advancing nuclear magnetic resonance (NMR) and quantum information technologies, as nuclear spins typically exhibit extremely low polarization at room temperature due... 详细信息
来源: 评论
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Nimra Basit Fatima Khalid Qurat Ul Ain Maria Andleeb Department of Software Engineering University of Engineering and Technology Taxila Pakistan Faculty of Computer Sciences and Engineeing GIKI Topi Pakistan Department of Computing Shifa Tameer-e-Millat University PRC Islamabad Pakistan
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photo... 详细信息
来源: 评论
Comparative Analysis of Differential Privacy Implementations on Synthetic Data
Comparative Analysis of Differential Privacy Implementations...
收藏 引用
IEEE Annual computing and Communication Workshop and Conference (CCWC)
作者: Huwida E. Said Qusay H. Mahmoud Mandeep Goyal Faiza Hashim Department of Computing and Applied Technolgy College of Technological Innovation Zayed University Dubai UAE Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa ON Canada Department of Computer Science and Software Engineering College of Information Technology UAE University AI-Ain UAE
Differential privacy offers a promising solution to balance data utility and user privacy. This paper compares two prominent differential privacy tools-PyDP and IBM's diffprivlib-that are applied to a synthetic da... 详细信息
来源: 评论
FDC: Feature Dropout Consistency for unsupervised domain adaptation semantic segmentation
收藏 引用
Neural Networks 2025年 189卷 107527页
作者: Rao, Chaoyu Fan, Wanshu Wang, Cong Yang, Xin Wei, Xiaopeng Zhou, Dongsheng National and Local Joint Engineering Laboratory of Computer Aided Design School of Software Engineering Dalian University China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Computer Science and Technology Dalian University of Technology China
In Unsupervised Domain Adaptation Semantic Segmentation (UDASS), while self-training techniques have become one of the most effective methods to date, the absence of target labels makes models susceptible to overfitti... 详细信息
来源: 评论
Formal Timing Analysis and Verification of the Interrupt-driven Programs for ISO26262
Formal Timing Analysis and Verification of the Interrupt-dri...
收藏 引用
2025 2nd International Conference on Algorithms, software engineering and Network Security (ASENS)
作者: Qing She He Huang Shenglin Bao Xin Guo National Trusted Embedded Software Engineering Technology Research Center East China Normal University / Shanghai Huayuan Chuangxin Software Co. Ltd China High end Equipment Systems Department Shanghai Huayuan Chuangxin Software Co. Ltd China Basic Software Department East China Institute of Computing Technology China National Trusted Embedded Software Engineering Technology Research Center East China Normal University China
Safety-critical systems refer to software systems whose operation can affect the safety of people and facilities used in the automotive industry, aerospace, and hospital health care systems. The high level of safety o... 详细信息
来源: 评论
Improved quantum linear system solver via quantum phase discrimination
收藏 引用
The European Physical Journal Special Topics 2025年 1-11页
作者: Liu, Zihao Li, Guanzhong Li, Lvzhou Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong) Shenzhen China
The problem of solving linear systems is of great significance in both theory and practice, for which quantum solvers have been shown to provide an exponential speedup over the best-known classical solvers. Recently, ...
来源: 评论
Heterogeneous Parallel Key-Insulated Multi-Receiver Signcryption Scheme for IoV
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5123-5137页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu He, Debiao Chi, Chi-Hung Lam, Kwok-Yan Wuhan University School of Cyber Science and Engineering Wuhan430000 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
The rapid growth of electric vehicle and autonomous vehicle populations has led to explosive expansion of IoV data being transmitted in the wireless communication infrastructure. Advances in IoV technologies also resu... 详细信息
来源: 评论