咨询与建议

限定检索结果

文献类型

  • 3,878 篇 会议
  • 2,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 5,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,701 篇 工学
    • 2,969 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 331 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 218 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 123 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,678 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 363 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,128 篇 管理学
    • 700 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 137 篇 feature extracti...
  • 136 篇 training
  • 132 篇 semantics
  • 119 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 87 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 222 篇 college of compu...
  • 95 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,747 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
5993 条 记 录,以下是4971-4980 订阅
排序:
Unveiling Fake News with an Attention-Based CNN Model Using Hybrid Features
Unveiling Fake News with an Attention-Based CNN Model Using ...
收藏 引用
Information and Communication Technology (ICICT), International Conference on
作者: Francis Rudra D Cruze Md. Faruk Hosen Md. Suhag Ali Mohammad Sarwar Hossain Mollah Muhammad Shahin Uddin Monir Morshed Department of Computing and Information System Daffodil International University (DIU) Ashulia Dhaka Bangladesh Department of Information and Communication Technology Mawlana Bhashani Science and Technology Univeristy Tangail Bangladesh Department of Software Engineering Daffodil International University (DIU) Ashulia Dhaka Bangladesh
Sophisticated detection mechanisms are required to protect the integrity of information in the digital age, as the widespread dissemination of false news on social media platforms has become a critical challenge. To t... 详细信息
来源: 评论
Efficient cube computing on an extended multidimensional model over uncertain data
Efficient cube computing on an extended multidimensional mod...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Chunyang Wei Hongyan Li Kai Lei Tengjiao Wang Key Laboratory of High Confidence Software Technologies Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing China The Shenzhen Key Laboratory for Cloud Computing Technology and Applications (SPCCTA) Peking University Shenzhen Graduate School Shenzhen China
Data uncertainty is an inherent property in various applications due to reasons such as measurement errors, incompleteness of data and so on. While On-Line Analytical Processing (OLAP) has been a powerful method for a... 详细信息
来源: 评论
Robust Bidirectional Generative Network For Generalized Zero-Shot Learning
Robust Bidirectional Generative Network For Generalized Zero...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yun Xing Sheng Huang Luwen Huangfu Feiyu Chen Yongxin Ge Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society School of Big Data and Software Engineering at Chongqing University Chongqing P.R.China Fowler College of Business at San Diego State University San Diego USA
In this work, we propose a novel generative approach named Robust Bidirectional Generative Network (RBGN) based on Conditional Generative Adversarial Network (CGAN) for Generalized Zero-shot Learning (GZSL). RBGN empl... 详细信息
来源: 评论
Over-the-Air Federated Learning via Second-Order Optimization
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Peng Jiang, Yuning Wang, Ting Zhou, Yong Shi, Yuanming Jones, Colin N. The Shanghai Key Lab. of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai200062 China The Automatic Control Laboratory EPFL Lausanne1015 Switzerland The School of Information Science and Technology ShanghaiTech University Shanghai201210 China
Federated learning (FL) is a promising learning paradigm that can tackle the increasingly prominent isolated data islands problem while keeping users' data locally with privacy and security guarantees. However, FL... 详细信息
来源: 评论
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem
Asymmetric Commutative Encryption Scheme Based Efficient Sol...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Meng Liu Priyadarsi Nanda Xuyun Zhang Chi Yang Shui Yu Jianxin Li School of Mechanical Electrical and Information Engineering Shandong University Weihai China School of Electrical and Data Engineering University of Technology Sydney Australia Department of Electrical and Computer Engineering University of Auckland New Zealand School of Computing and Information Technology University of Wollongong Australia School of Information Technology Deakin University Burwood Australia School of Computer Science and Software Engineering University of Western Australia Australia
Secure multiparty computation (SMC) is an important scheme in cryptography and can be applied in various real-life problems. The first SMC problem is the millionaires' problem which involves two-party secure compu... 详细信息
来源: 评论
Boundary-Guided Learning for Gene Expression Prediction in Spatial Transcriptomics
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Mingcheng Wu, Yuncong Di, Donglin Su, Anyang Su, Tonghua Song, Yang Fan, Lei Faculty of Computing Harbin Institute of Technology Harbin China School of Astronautics Harbin Institute of Technology Harbin China Space AI Li Auto Beijing China College of Software Jilin University Changchun China Computer Science and Engineering UNSW Sydney Australia
Spatial transcriptomics (ST) has emerged as an advanced technology that provides spatial context to gene expression. Recently, deep learning-based methods have shown the capability to predict gene expression from WSI ... 详细信息
来源: 评论
Comparative Analysis of Context Based Classification of Twitter
Comparative Analysis of Context Based Classification of Twit...
收藏 引用
International Conference on Advances in computing, Communication, & Automation (ICACCA) (Fall)
作者: Muhammad Salman Tiwana Farooq Javeed Muhammad Ikramullah Lali Hafsa Dar Muhammad Bilal Dept. of CS&IT University of Sargodha Sargodha Pakistan Dept. of Computer Science University of Gujrat Gujrat Pakistan Dept. of Software Engineering University of Gujrat Gujrat Pakistan School of Computing & IT Taylor’s University Subang Jaya Malaysia
Social media offers online data source where internet users' share their opinions, views and discuss any news or events that happen around the world. Twitter is a popular social media which effectively takes part ... 详细信息
来源: 评论
On Secrecy Performance of MISO SWIPT Systems with TAS and Imperfect CSI
On Secrecy Performance of MISO SWIPT Systems with TAS and Im...
收藏 引用
作者: Pan, Gaofeng Lei, Hongjiang Deng, Yansha Fan, Lisheng Yang, Jing Chen, Yunfei Ding, Zhiguo Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing School of Electronic and Information Engineering Southwest University Chongqing400715 China School of Computing and Communications Lancaster University LancasterLA14YW United Kingdom Chongqing Key Laboratory of Mobile Communications Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Centre for Telecommunications King's College London LondonWC2R2LS United Kingdom School of Computer Science and Educational Software Guangzhou University Guangzhou510000 China Department of Electronic Engineering Shantou University Guangdong515063 China School of Information Engineering Yangzhou University Yangzhou225009 China School of Engineering University of Warwick CoventryCV47AL United Kingdom
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple antennas, one desired single-antenna inf... 详细信息
来源: 评论
MT-PART: Metamorphic-Testing-Based Adaptive Random Testing Through Partitioning
MT-PART: Metamorphic-Testing-Based Adaptive Random Testing T...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Zhihao Ying Dave Towey Tsong Yueh Chen Zhi Quan Zhou School of Computer Science University of Nottingham Ningbo China Zhejiang People's Republic of China Department of Computer Science and Software Engineering Swinburne University of Technology Hawthorn VIC Australia School of Computing and Information Technology University of Wollongong Wollongong NSW Australia
Metamorphic Testing (MT) has been repeatedly proven effective in detecting software faults. MT detects faults by checking the Metamorphic Relations (MRs) among Source Test Cases (STCs) and Follow-up Test Cases (FTCs) ... 详细信息
来源: 评论
Co-Production of a Cognitive Behavioral Therapy Digital Platform for Families of Individuals Impacted by Psychosis
收藏 引用
Journal of Technology in Behavioral Science 2024年 第1期9卷 140-148页
作者: Cheng, Sunny Chieh Kopelovich, Sarah Si, Dong Divina, Myra Gao, Ningjun Serene Wang, Mia Yunqi Kim, Jamie Jaesook Li, Ziyi Blank, Jennifer Brian, Rachel Turkington, Douglas School of Nursing and Healthcare Leadership University of Washington Tacoma WA United States Department of Psychiatry and Behavioral Sciences University of Washington School of Medicine Seattle WA United States Division of Computing and Software Systems University of Washington Bothell WA United States Department of Human Centered Design & Engineering University of Washington Seattle WA United States Department of Economics University of Washington Seattle WA United States Department of Statistics University of Washington Seattle WA United States Newcastle University Newcastle Upon Tyne United Kingdom
Education and skills training have consistently been recognized as an unmet need for caregivers of individuals with psychosis, as traditional models of clinician-delivered family interventions remain inaccessible to m... 详细信息
来源: 评论