咨询与建议

限定检索结果

文献类型

  • 3,878 篇 会议
  • 2,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 5,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,701 篇 工学
    • 2,969 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 331 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 218 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 123 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,678 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 363 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,128 篇 管理学
    • 700 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 137 篇 feature extracti...
  • 136 篇 training
  • 132 篇 semantics
  • 119 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 87 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 222 篇 college of compu...
  • 95 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,747 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
5993 条 记 录,以下是131-140 订阅
排序:
Overcoming Forgetting Using Adaptive Federated Learning for IIoT Devices With Non-IID Data
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Benteng Mao, Yingchi Xu, Haowen Chen, Yihan Muazu, Tasiu He, Xiaoming Wu, Jie Hohai University College of Computer Science and Software Engineering Nanjing211100 China Nanjing University of Posts and Telecommunications College of Internet of Things Nanjing210003 China Temple University Center for Networked Computing PhiladelphiaPA19122 United States
In real-world Industrial Internet of Things (IIoT) scenarios, due to the limited storage capacity of IIoT devices, fresh data continuously received by diverse devices will overwrite the outdated data and change the lo... 详细信息
来源: 评论
Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults
Securing the Silver Surfers: Cybersecurity Awareness Among O...
收藏 引用
International Conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Haslinda Sutan Ahmad Nawi Siti Fatimah Omar Suzana Basaruddin Info. Science & Computing Department Management and Science University Selangor Malaysia Software Engineering Section UniKL MIIT Kuala Lumpur Malaysia Informatics & Analytics Section UniKL MIIT Kuala Lumpur Malaysia
This research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. The data from 331 participants showed that 30.8%... 详细信息
来源: 评论
Learnable Prompt as Pseudo-Imputation: Rethinking the Necessity of Traditional EHR Data Imputation in Downstream Clinical Prediction  25
Learnable Prompt as Pseudo-Imputation: Rethinking the Necess...
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1
作者: Weibin Liao Yinghao Zhu Zhongji Zhang Yuhang Wang Zixiang Wang Xu Chu Yasha Wang Liantao Ma School of Computer Science Peking University Beijing China & Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China School of Software and Microelectronics Peking University Beijing China & Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China School of Computer Science Peking University Beijing China Center on Frontiers of Computing Studies Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China & Peking University Information Technology Institute (Tianjin Binhai) Peking University Tianjin China National Engineering Research Center for Software Engineering Peking University Beijing China & Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China
Analyzing the health status of patients based on Electronic Health Records (EHR) is a fundamental research problem in medical informatics. The presence of extensive missing values in EHR makes it challenging for deep ... 详细信息
来源: 评论
Rsta: A Reversible Signal Transmission Architecture for Breaking the Limitation of Unidirectional Transmission
SSRN
收藏 引用
SSRN 2025年
作者: Liu, Xin Cui, Shuang Zhang, Xun Zhou, Fuxing Sheng, Kaikai Wang, Bin Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian116622 China
Molecular circuits are essential tools for biosensing and molecular information processing. However, the long-distance and reversible transmission of orthogonal signals remains a significant challenge in molecular cir... 详细信息
来源: 评论
Zram Instance Pool Framework for Adaptive Memory Compression in Resource-Sensitive Embedded Operating Systems
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Deng, Yin Xie, Guoqi Xiong, Chenglai Zhao, Sirong Ren, Wei Li, Kenli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan Changsha410082 China Huawei Technology Co. Ltd. Central Software Institute Guangdong Shenzhen518129 China
Memory compression can reduce the size of the inactive data in the random access memory (RAM), thereby freeing up unused space and allowing more programs to run;however, current mainstream memory compression framework... 详细信息
来源: 评论
The role of moral intention and moral obligation in predicting attitudes toward avoiding AIgiarism: A protection motivation theory perspective
收藏 引用
Computers in Human Behavior Reports 2025年 18卷
作者: Ali, Ismail Mohamed Arpaci, Ibrahim Faculty of Computing SIMAD University Somalia Department of Software Engineering Faculty of Engineering and Natural Sciences Bandirma Onyedi Eylul University Balikesir Turkey Department of Computer Science and Engineering College of Informatics Korea University Seoul 02841 South Korea
Traditional methods of combating plagiarism have proven ineffective due to the dual use of AI chatbots to plagiarize and avoid detection. Therefore, there is a growing rationale to focus on moral responsibility toward... 详细信息
来源: 评论
Preserving Location Privacy of IoT Devices in Heterogeneous Edge computing Architecture Through Deniability-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ali, Ikram Li, Jianqiang Chen, Jie Chen, Yong Ullah, Shamsher Wakeel, Abdul Shenzhen University National Engineering Laboratory of Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Automation Engineering Chengdu611731 China National University of Sciences and Technology Military College of Signals Department of Electrical Engineering Islamabad Pakistan
Edge computing moves cloud services closer to consumer Internet of Things (IoT) devices, reducing latency and bandwidth usage. This setup enables faster responses but also introduces new security challenges, particula... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Pattern recognition in programming to support the evaluation of Computational Thinking
Pattern recognition in programming to support the evaluation...
收藏 引用
IEEE World engineering Education Conference (EDUNINE)
作者: Steven Pacheco-Portuguez Antonio Gonzalez-Torres Lilliana Sancho-Chavarria Ignacio Trejos-Zelaya Jorge Monge-Fallas School of Computing Costa Rica Institute of Technology Cartago Costa Rica School of Computer Engineering Costa Rica Institute of Technology Cartago Costa Rica School of Software Engineering & School of Computing Universidad CENFOTEC & Costa Rica Institute of Technology San José & Cartago Costa Rica School of Mathematics Costa Rica Institute of Technology Cartago Costa Rica
Computational thinking is a high-level skill that involves both critical and creative thinking. This research proposes an advanced method for analyzing source code to assess computational thinking skills in elementary... 详细信息
来源: 评论