咨询与建议

限定检索结果

文献类型

  • 3,962 篇 会议
  • 2,035 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,747 篇 工学
    • 3,007 篇 计算机科学与技术...
    • 2,468 篇 软件工程
    • 744 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 327 篇 电气工程
    • 264 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 189 篇 光学工程
    • 139 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 125 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,690 篇 理学
    • 959 篇 数学
    • 450 篇 生物学
    • 366 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 146 篇 化学
  • 1,133 篇 管理学
    • 702 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 324 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 132 篇 教育学
  • 125 篇 经济学
    • 124 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 艺术学
  • 14 篇 文学
  • 1 篇 哲学

主题

  • 232 篇 software enginee...
  • 170 篇 computational mo...
  • 148 篇 feature extracti...
  • 139 篇 training
  • 137 篇 semantics
  • 122 篇 deep learning
  • 111 篇 software
  • 110 篇 computer science
  • 110 篇 accuracy
  • 109 篇 machine learning
  • 102 篇 data models
  • 94 篇 cloud computing
  • 89 篇 computer archite...
  • 85 篇 predictive model...
  • 83 篇 data mining
  • 83 篇 security
  • 80 篇 quality of servi...
  • 75 篇 optimization
  • 72 篇 internet of thin...
  • 71 篇 visualization

机构

  • 229 篇 college of compu...
  • 100 篇 national enginee...
  • 71 篇 department of co...
  • 71 篇 state key labora...
  • 68 篇 shanghai key lab...
  • 56 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 department of co...
  • 53 篇 college of intel...
  • 50 篇 school of big da...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 35 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 28 篇 buyya rajkumar
  • 27 篇 xu yuanping
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 qi liu
  • 20 篇 tao dacheng
  • 20 篇 ding zuohua
  • 19 篇 victor c. m. leu...

语言

  • 5,377 篇 英文
  • 653 篇 其他
  • 58 篇 中文
  • 3 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computing and Software Engineering"
6075 条 记 录,以下是1201-1210 订阅
排序:
Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 3653-3666页
作者: Inam Ullah Khan Muhammad Abul Hassan Muhammad Fayaz Jeonghwan Gwak Muhammad Adnan Aziz Department of Electronic Engineering Isra University(SEAS)Islamabad44000Pakistan Department of Computing and Technology Abasyn University Peshawar25000Pakistan Deparment of Computer Engineering Jeju National UniversityJejuKorea Department of Software Korea National University of TransportationChungju27469Korea Department of Biomedical Engineering Korea National University of TransportationChungju27469Korea Department of AI Robotics Engineering Korea National University of TransportationChungju27469Korea Department of IT&Energy Convergence(BK21 FOUR) Korea National University of TransportationChungju27469Korea
Most interesting area is the growing demand of flying-IoT mergers with smart ***,aerial vehicles,especially unmanned aerial vehicles(UAVs),have limited capabilities for maintaining node energy *** order to communicate... 详细信息
来源: 评论
Generalizability of CNN Architectures for Face Morph Presentation Attack
arXiv
收藏 引用
arXiv 2023年
作者: HmaSalah, Sherko R. Asaad, Aras T. Department of Software Engineering Faculty of Engineering Koya University Danielle Mitterrand Boulevard KOY45 Kurdistan Region Koya Iraq School of computing The University of Buckingham United Kingdom
Automatic border control systems are wide spread in modern airports worldwide. Morphing attacks on face biometrics is a serious threat that undermines the security and reliability of face recognition systems deployed ... 详细信息
来源: 评论
Research on the Current State of Privacy Risks in Children's Mobile Applications  4
Research on the Current State of Privacy Risks in Children's...
收藏 引用
4th International Symposium on Computer Technology and Information Science, ISCTIS 2024
作者: Geng, Xinrui Liu, Tao Shang, Chong Chen, Jianxiang Lu, Yueran Zhang, Yan Wang, Lifeng Xi'an Jiaotong-Liverpool University School of AI and Advanced Computing Suzhou China MIIT Key Laboratory of Mobile Application Innovation and Governance Technology Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China Shanxi Agricultural University School of Agricultural Engineering China Tianjin Normal University School of Software Engineering Tianjin China University of Chinese Academy of Sciences Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security Beijing China Shandong Yeda Smart City Operation Technology Co. Ltd. Shandong China
In the digital age, children increasingly access a vast world of information through mobile applications. Despite global regulations and protective measures by app stores, privacy breaches in these apps persist. This ... 详细信息
来源: 评论
HealthEdge: A Machine Learning-Based Smart Healthcare Framework for Prediction of Type 2 Diabetes in an Integrated IoT, Edge, and Cloud computing System  14
HealthEdge: A Machine Learning-Based Smart Healthcare Framew...
收藏 引用
14th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Hennebelle, Alain Materwala, Huned Ismail, Leila Melbourne Australia Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates National Water and Energy Center United Arab Emirates University United Arab Emirates Lab School of Computing and Information Systems The University of Melbourne Australia
Diabetes Mellitus has no permanent cure to date and is one of the leading causes of death globally. The alarming increase in diabetes calls for the need to take precautionary measures to avoid/predict the occurrence o... 详细信息
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
An Efficient Ensemble approach for Fake Reviews Detection
An Efficient Ensemble approach for Fake Reviews Detection
收藏 引用
Artificial Intelligence (ICAI), International Conference on
作者: Asif Iqbal Muhammad Arslan Rauf Muhammad Zubair Tanveer Younis Riphah College of Computing Riphah International University Faisalabad Pakistan School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
People prefer to buy items and services online to save time in the current age of growing e-commerce. these internet purchases are heavily impacted by the reviews or opinions of people who have already purchased them....
来源: 评论
Video Surveillance-Based Intrusion Detection System in Edge Cloud Environment  3rd
Video Surveillance-Based Intrusion Detection System in Edge ...
收藏 引用
3rd International Conference on Emergent Converging Technologies and Biomedical Systems, ETBS 2023
作者: Sharma, Annu Devasenapathy, Deepa Raja, M. Shadrach, Finney Daniel Shirgire, Anil Arun, R. Yau, Thomas Moh Shan Department of Computer Science and Applications Rajarajeshwari College of Engineering Karnataka Bengaluru560074 India Instructor-II/Computing and Software Engineering U.A. Whitaker College of Engineering Florida Gulf Coast University Fort Myers United States Department of Computer Science and Engineering CMR Institute of Technology Karnataka Bengaluru560037 India Department of Electronics and Communication Engineering KPR Institute of Engineering and Technology Tamil Nadu Coimbatore641407 India Department of Civil Engineering Dr. D Y Patil Institute of Technology Maharashtra Pimpri Pune411018 India Department of Computer Science and Engineering Hindusthan Institute of Technology Coimbatore India Director of Centre of University Courses and Innovative Learning University of Technology Sarawak Jalan Universiti Sibu Sarawak96000 Malaysia
Video surveillance is mostly used for monitoring distant videos and the cloud memory in the system provides more secure to the data. But, in the existing methodologies poor intrusion detection accuracy as well as poor... 详细信息
来源: 评论
Deep Reinforcement Learning with Human Guidance for Autonomous Driving Car Following
Deep Reinforcement Learning with Human Guidance for Autonomo...
收藏 引用
IEEE International Conference on Mechatronics, Robotics and Automation (ICMRA)
作者: Wenbo Wang Qingchao Xu Xingfu Yang Yandong Liu School of Software Engineering Dalian University Dalian China Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
To solve the complex modeling and difficult parameter adjustment of traditional car-following control methods, we propose the car-following framework KgPPO-CF. The KgPPOCF brings expert experience into the interactive... 详细信息
来源: 评论
Enhancing Anomaly Detection in Electric Vehicle Supply Equipment (EVSE) Networks Using Classical and Ensemble Learning Approaches
Enhancing Anomaly Detection in Electric Vehicle Supply Equip...
收藏 引用
Control Instrumentation System Conference (CISCON)
作者: Sandeep R. Hegde Vijayabhaskaramoorthy V. K. R. M. Vijaya Chandrakala Gireesh Kumar T. V. K. Arun Shankar Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India Department of Electrical and Electronics Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Software Testing Engineer Danfoss Industries Private Limited USA
Electric Vehicle Supply Equipment (EVSE) networks, integral to modern transportation systems, are vulnerable to cyber threats due to integration into smart grids and IoT ecosystems. EVSE network A represents a traditi... 详细信息
来源: 评论
Fused Fuzzy Deep Learning and Information Steganography for Privacy Preservation in Medical Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Chen, Jingxue Zhao, Pengbiao Deng, Erqiang Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Xiong, Hu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China the School of Computer Science Faculty of Science and Engineering University of Nottingham Ningbo China Zhejiang Ningbo315104 China the KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India the Division of Research and Development Lovely Professional University Phagwara India the University Centre of Research and Development Chandigarh University Mohali India the Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia the Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia
—Medical Consumer Electronics (MCE) have greatly facilitated people’s lives, allowing patients to obtain personal medical information including medical images. These medical images obtained from MCE need to be proce... 详细信息
来源: 评论