咨询与建议

限定检索结果

文献类型

  • 3,879 篇 会议
  • 2,081 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,740 篇 工学
    • 3,000 篇 计算机科学与技术...
    • 2,472 篇 软件工程
    • 755 篇 信息与通信工程
    • 499 篇 控制科学与工程
    • 413 篇 生物工程
    • 357 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 227 篇 机械工程
    • 224 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 141 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 121 篇 交通运输工程
  • 1,686 篇 理学
    • 958 篇 数学
    • 451 篇 生物学
    • 365 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,130 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 492 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 229 篇 医学
    • 203 篇 临床医学
    • 187 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 130 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 45 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 138 篇 feature extracti...
  • 135 篇 training
  • 132 篇 semantics
  • 122 篇 deep learning
  • 114 篇 machine learning
  • 111 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 223 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 ismail leila
  • 27 篇 buyya rajkumar
  • 24 篇 zhang lei
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 xiaofei wang

语言

  • 5,784 篇 英文
  • 210 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6038 条 记 录,以下是221-230 订阅
排序:
YOLO-RAW: Advancing UAV Detection With Robustness to Adverse Weather Conditions
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2025年 第6期26卷 7857-7873页
作者: Munir, Adnan Siddiqui, Abdul Jabbar Hossain, M. Shamim El-Maleh, Aiman Computer Engineering Department Dhahran31261 Saudi Arabia KFUPM SDAIA-KFUPM Joint Research Center for Artificial Intelligence IRC for Intelligent Secure Systems and Computer Engineering Department Dhahran31261 Saudi Arabia King Saud University College of Computer and Information Sciences Research Chair of Pervasive and Mobile Computing Department of Software Engineering Riyadh12372 Saudi Arabia KFUPM Computer Engineering Department Information and Computer Science Department IRC for Intelligent Secure Systems Dhahran31261 Saudi Arabia
With the widespread adoption of unmanned aerial vehicles (UAVs) in various applications (e.g., aerial transportation, traffic monitoring), there have been apprehensions regarding the associated risks of employing UAVs... 详细信息
来源: 评论
Predicting land suitability for wheat and barley crops using machine learning techniques
收藏 引用
Scientific Reports 2025年 第1期15卷 1-19页
作者: Ganati, Bikila Abebe Sitote, Tilahun Melak Department of Computer Science Faculty of Computing and Informatics Jimma Institute of Technology Jimma University P.O. Box 378 Jimma Ethiopia Department of Software Engineering College of Engineering Addis Ababa Science and Technology University P.O. Box 16417 Addis Ababa Ethiopia
Ensuring food security to meet the demands of a growing population remains a key challenge, especially for developing countries like Ethiopia. There are various policies and strategies designed by the government and s... 详细信息
来源: 评论
A Blockchain-Based Distributed Collaborative Sensing and Spectrum Access Approach for Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Peng, Yuhuai Li, Yuan Guo, Yu Zhang, Dawei Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Northeastern University College of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Xihu District Hangzhou China Zhengzhou University School of Computer and Artificial Intelligence Henan Zhengzhou450001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China KKR and KSR Institute of Technology and Sciences Department of Computer Science and Engineering Andhra Pradesh Guntur India Division of Research and Development Lovely Professional University Phagwara India University Centre of Research and Development Chandigarh University Mohali India Umm Al-Qura University Department of Software Engineering College of Computing Makkah Saudi Arabia Umm Al-Qura University College of Computing Department of Computer and Network Engineering Makkah Saudi Arabia
Cognitive radio (CR) provides key technical support for the seamless communication of consumer electronic (CE) devices through distributed cooperative sensing and spectrum access. However, its openness and dynamic nat... 详细信息
来源: 评论
Detection of ARP Spoofing Attack in Healthcare Networks Using a LSTM Model
Detection of ARP Spoofing Attack in Healthcare Networks Usin...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Salam Al-E'mari Yousef Sanjalawe Ghader Kurdi Budoor Allehyani Information Security Department Faculty of Information Technology University of Petra (UoP) Amman Jordan Information Technology Department King Abdullah II School for Information Technology The University of Jordan (UJ) Amman Jordan Department of Data Science College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical ... 详细信息
来源: 评论
LFQAP: A Lightweight and Flexible Quantum Artificial Intelligence Application Platform
Quantum Engineering
收藏 引用
Quantum engineering 2025年 第1期2025卷
作者: Zhang, Xin Li, Xiaoyu Hou, Yuexian College of Intelligence and Computing Tianjin University No.135 Ya Guan Road Tianjin300350 China School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu610054 China Institute of Electronics and Information Industry Technology of Kash Xinjiang Kash844000 China
Quantum artificial intelligence (AI) is one of the critical research domains in the field of quantum computing and holds significant potential for practical applications in the near future. A quantum AI software platf... 详细信息
来源: 评论
RsDiff: Rational score based knowledge graph diffusion for recommendation
收藏 引用
Information Sciences 2025年 717卷
作者: Cui, Mengmeng Wu, Siyu Chen, Hao Zhang, Xiangnan School of Software Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Jiangsu Nanjing China National Research Facility For Phenotypic and Genotypic Analysis of Model Animals China Agricultural University Beijing China
The Knowledge graph (KG) provides auxiliary information to improve the recommendation system performance. However, the knowledge graph includes a large number of triplets that have nothing to do with the recommendatio... 详细信息
来源: 评论
PA-Rank: A GAN and Reinforcement Learning Powered Framework for Multi-Metric Anomaly Detection and Causal Diagnosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Zhaowen Zhou, Yong Zhang, YangSiyu Cong, Fengyu Zhou, Dongdong An, Zhijian School of Software Engineering Dalian University of Technology Dalian116024 China Dalian University of Technology School of Software Dalian116024 China Dalian University of Technology School of Biomedical Engineering Faculty of Medicine Dalian116024 China Ministry of Education Key Laboratory of Social Computing and Cognitive Intelligence Dalian University of Technology China University of Jyväskylä Faculty of Information Technology Jyväskylä40014 Finland Dalian University of Technology School of Computer Science and Technology Dalian116024 China Faculty of Information Technology University of Jyvaskyla Jyvaskyla40014 Finland
The increasing scale and complexity of modern IT systems necessitate advanced solutions for monitoring and managing performance anomalies. Artificial intelligence for IT operations (AIOps) has emerged as a promising a... 详细信息
来源: 评论
Tip the Scales: Achieving Balance in Adversarial Examples Across Modalities
Tip the Scales: Achieving Balance in Adversarial Examples Ac...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhenbo Shi Zhidong Yu Yuxuan Zhang Shuchang Wang Xiaoman Liu Wei Yang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Hefei China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China School of Software Engineering University of Science and Technology of China Suzhou China Hefei National Laboratory University of Science and Technology of China Hefei China
In the field of multimodal learning, controlling the training of unimodal encoders from different perspectives is a primary approach to addressing Training Imbalance. However, the inherent capacity limitations of the ... 详细信息
来源: 评论
Digital Human Techniques for Education Reform  24
Digital Human Techniques for Education Reform
收藏 引用
7th International Conference on Educational Technology Management, ICETM 2024
作者: Guo, Peirong Zhang, Qi Tian, Chunwei Xue, Wanli Feng, Xiaocheng School of Software Northwestern Polytechnical University Shaanxi Xi’an China School of Economics and Management Harbin Institute of Technology at Weihai Shandong Weihai China Shenzhen Research Institute of Northwestern Polytechnical University Northwestern Polytechnical University Guangdong Shenzhen China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Heilongjiang Harbin China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Guangdong Shenzhen China
The rapid evolution of artificial intelligence, big data, and generative AI models has ushered in significant transformations across various sectors, including education. Digital Human Technique, an innovative technol... 详细信息
来源: 评论
Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog computing
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Al-Shareeda, Mahmood A. Gaber, Tarek Alqarni, Mohammed A. Alkinani, Monagi H. Almazroey, Alaa Atallah Almazroi, Abdulwahab Ali Southern Technical University Department of Electronic Technologies Basra Technical Institute Basra61001 Iraq Engineering and Environment University Salford School of Science Manchester United Kingdom University of Jeddah College of Computer Science and Engineering of Software Engineering Jeddah Saudi Arabia University of Jeddah College of Computer Science and Engineering Department of Computer Science and Artificial Intelligence Jeddah Saudi Arabia Modern Aljazeera Company Jeddah Saudi Arabia University of Jeddah College of Computing and Information Technology at Khulais Department of Information Technology Jeddah Saudi Arabia
Supporting vehicular emergency applications requires fast access to infrastructure so vehicles can call for help. Because of their environment's poor wireless qualities, vehicle-infrastructure communication paths ... 详细信息
来源: 评论