咨询与建议

限定检索结果

文献类型

  • 3,890 篇 会议
  • 2,033 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,697 篇 工学
    • 2,964 篇 计算机科学与技术...
    • 2,445 篇 软件工程
    • 740 篇 信息与通信工程
    • 487 篇 控制科学与工程
    • 414 篇 生物工程
    • 327 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 225 篇 机械工程
    • 218 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,674 篇 理学
    • 953 篇 数学
    • 448 篇 生物学
    • 362 篇 物理学
    • 299 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 702 篇 管理科学与工程(可...
    • 490 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 154 篇 法学
    • 116 篇 社会学
  • 134 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 168 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 111 篇 machine learning
  • 110 篇 computer science
  • 110 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 222 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,756 篇 英文
  • 201 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6001 条 记 录,以下是391-400 订阅
排序:
Exactly Minimax-Optimal Locally Differentially Private Sampling
arXiv
收藏 引用
arXiv 2024年
作者: Park, Hyun-Young Asoodeh, Shahab Lee, Si-Hyeon School of Electrical Engineering KAIST Korea Republic of Department of Computing and Software McMaster University Canada
The sampling problem under local differential privacy has recently been studied with potential applications to generative models, but a fundamental analysis of its privacy-utility trade-off (PUT) remains incomplete. I... 详细信息
来源: 评论
Towards Dynamic Evolutionary Analysis of ProgrammableWeb for API-Mashup Ecosystem  26
Towards Dynamic Evolutionary Analysis of ProgrammableWeb for...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Yang Xiang, Jiayan Cheng, Hangyu Chen, Wanjun Xiao, Yong Kang, Guosheng Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hnust Xiangtan China
With the wide adoption of Web APIs released on Internet, users tend to reuse them for business requirements or software development. Mashup is a useful technology for composing Web APIs into a new and value-added appl... 详细信息
来源: 评论
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming  36
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based A...
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Tashtarian, Farzad Bentaleb, Abdelhak Amirpour, Hadi Taraghi, Babak Timmerer, Christian Hellwagner, Hermann Zimmermann, Roger Alpen-Adria-Universitat Klagenfurt Christian Doppler Laboratory Athena Austria Concordia University Department of Computer Science and Software Engineering Canada National University of Singapore School of Computing Singapore
Video content in Live HTTP Adaptive Streaming (HAS) is typically encoded using a pre-defined, fixed set of bitrate-resolution pairs (termed Bitrate Ladder), allowing play-back devices to adapt to changing network cond... 详细信息
来源: 评论
Offloading approach for mobile edge computing based on chaotic quantum particle swarm optimization strategy
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第10期14卷 14333-14347页
作者: Zhang, DeGan Sun, GuiXiang Zhang, Jie Zhang, Ting Yang, Peng Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China School of Sports Economics and Management Tianjin University of Sport Tianjin301617 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100093 China
With the development of 5 g, computing-intensive and complex applications in smart-city is growing rapidly. Due to the limited resources of mobile terminal devices in smart-city, new applications have higher requ... 详细信息
来源: 评论
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks
收藏 引用
Journal of Computer Science & Technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
Cybersecurity in Malware Research
Cybersecurity in Malware Research
收藏 引用
IEEE Annual computing and Communication Workshop and Conference (CCWC)
作者: Horatiu Lupsan Remaz Ahmed Yong Shi College of Computing and Software Engineering Kennesaw State University Marietta USA
As most of our daily activities and routines are connected to technology and software, cybersecurity and malware research become significantly more important in ensuring that our personal information is kept private a... 详细信息
来源: 评论
Design and Implementation of an ERC-20 Smart Contract on the Ethereum Blockchain
Design and Implementation of an ERC-20 Smart Contract on the...
收藏 引用
IEEE International Conference on Big Data
作者: Joshua Priest Cameron Cooper Savvy Lovell Yong Shi Dan Lo College of Computing and Software Engineering Kennesaw State University Marietta USA
As technology continues to develop, there is a growing need to find sustainable solutions in all industries, including cryptocurrency. Due to the high energy consumption that cryptocurrencies are known for, there have...
来源: 评论
Sensitive Information Protection Model Based on Bayesian Game
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 883-898页
作者: Yuzhen Liu Zhe Liu Xiaoliang Wang Qing Yang Guocai Zuo Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan411201China College of computer and information engineering Hunan University of Technology and BusinessChangshaChina School of Computer Science and Information Engineering Guangzhou Maritime UniversityGuangzhouChina Hunan Software Vocational and Technical University XiangtanChina School of Engineering and IT University of New South WalesNSWAustralia
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *... 详细信息
来源: 评论
3D Model Management and Dynamic Loading based on GIS Database
3D Model Management and Dynamic Loading based on GIS Databas...
收藏 引用
2022 International Conference on Algorithms, Data Mining, and Information Technology, ADMIT 2022
作者: Wang, Jiaxing Wang, Wei Yue, Yong Zhu, Xiaohui Xi'an Jiaotong-Liverpool University Department of Computing Suzhou China School of Software Engineering Hebei Normal University Shijiazhuang China
This paper proposes a new method based Binary Large Object (BLO) to more effectively manage and load a massive number of three-dimensional (3D) models in the Geographic Information System (GIS). Different from those m... 详细信息
来源: 评论
A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model
A Privacy Preserving Computer-aided Medical Diagnosis Framew...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Feng, Xinyu Shen, Qingni Li, Cong Wang, Xuewei Xie, Niantao Xie, Luyuan Fang, Yuejian Wu, Zhonghai School of Software and Microelectronics Peking University Beijing102600 China School of Computer Science Peking University Beijing100871 China National Engineering Research Center for Software Engineering Peking University Beijing100871 China PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University Beijing100871 China
Computer-aided diagnosis plays an increasingly important role in modern medical activities, relying largely on the deployment of medical machine learning models. Protecting the security of model parameters is crucial ... 详细信息
来源: 评论