咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是561-570 订阅
排序:
SC-LSTM Based Human Action Recognition
SC-LSTM Based Human Action Recognition
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Naixin Kang Pengfei Yi Qingshu Geng Jing Dong Rui Liu Ling Wang Key Laboratory of Advanced Design and Intelligent Computing (Ministry of Education) School of Software Engineering Dalian University Dalian China
Human Action Recognition is one of the most applied research directions in the field of Computer Vision, which is widely used in human-computer interaction, Augmented Reality (AR) technology, security monitoring, and ... 详细信息
来源: 评论
IP SafeGuard-An AI-Driven Malicious IP Detection Framework
收藏 引用
IEEE Access 2025年 13卷 90249-90261页
作者: Siam, Abdullah Al Alazab, Moutaz Awajan, Albara Hasan, Md Rakibul Obeidat, Areej Faruqui, Nuruzzaman Daffodil International University Department of Software Engineering Dhaka Daffodil Smart City1216 Bangladesh Liverpool John Moores University School of Computing and Data Sciences Oryx Universal College Cybersecurity Department Doha Qatar Al-Balqa Applied University Faculty of Artificial Intelligence Department of Intelligent Systems As-Salt19385 Jordan Department of Computer Science and Engineering Dhaka1216 Bangladesh Independent Researcher As-Salt19385 Jordan
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC). Traditional solutions, such as static blacklists and... 详细信息
来源: 评论
HOTFUZ: Cost-effective higher-order mutation-based fault localization
HOTFUZ: Cost-effective higher-order mutation-based fault loc...
收藏 引用
作者: Jang, Jong-In Ryu, Duksan Baik, Jongmoon School of Computing Korea Advanced Institute of Science and Technology Daejeon Korea Republic of Department of Software Engineering Jeonbuk National University Jeonju Korea Republic of
Fault localization techniques are used to deduce the exact source of a failure from a set of failure indications while debugging software and play a crucial role in improving software quality. Mutation-based fault loc... 详细信息
来源: 评论
Robust Psoriasis Severity Classification by using Data Augmentation
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2022年 第12期71卷 1841-1847页
作者: Moon, Cho-I Baek, Yoo Sang Choi, Min Hyung Lee, Onseok Dept. of Software Convergence Graduate School Soonchunhyang University Korea Republic of Dept. of Dermatology Guro Hospital Korea University College of Medicine Korea Republic of Dept. of Computer Science and Engineering College of Engineering Design and Computing University of Colorado Denver United States
Psoriasis is a chronic recurrent disease formed by lesions such as erythema and scale. To evaluate the severity of psoriasis, the psoriasis area and severity index (PASI) score have been used in clinical trials and st... 详细信息
来源: 评论
Toward Intelligent Callout and Semantic Interpretation of ISO Geometrical Production Specification  17
Toward Intelligent Callout and Semantic Interpretation of IS...
收藏 引用
17th CIRP Conference on Computer Aided Tolerancing, CAT 2022
作者: Dai, Xiangcheng Guo, Benjun Xu, Yuanping Li, Tukun Jiang, Xiangqian Gai, Qiuyan He, Jia Zhou, Jiliu Huang, Jian School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield HuddersfieldHD1 3DH United Kingdom
ISO Geometrical Product Specification and Verification standards (GPS) is a worldwide used technique language to control the geometrical variation of a workpiece and its digital twins. More than 150 standards document... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Wind Energy Forecasting: A Comparative Analysis of Machine Learning Approaches  8
Wind Energy Forecasting: A Comparative Analysis of Machine L...
收藏 引用
8th International Scientific Conference on Applying New Technology in Green Buildings, ATiGB 2023
作者: Pham, Thanh Son Nguyen, Duc Huy Phan, Nguyen Duy Minh FPT University Faculty of Computing FPT Greenwich Centre Danang Viet Nam FPT Software Quy Nhon Viet Nam The University of Danang University of Technology and Education Faculty of Mechanical Engineering Danang Viet Nam
This paper conducts a comprehensive comparative analysis of machine learning and deep learning techniques for wind energy forecasting. Wind energy prediction is a crucial aspect of renewable energy management. We stud... 详细信息
来源: 评论
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks  10
A Heuristic-based Dynamic Scheduling and Routing Method for ...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Chen, Honglong Liu, Mindong Huang, Jing Zheng, Zhiling Huang, Weihong Xiao, Yufeng Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Hunan Industry Polytechnic Information Center Changsha410125 China
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve suc... 详细信息
来源: 评论
HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices
HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xinyu Feng Cong Li Qingni Shen Jisheng Dong Wenjun Qian Yuejian Fang Zhonghai Wu School of Software and Microelectronics Peking University National Engineering Research Center for Software Engineering Peking University PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University School of Computer Science Peking University
Due to the rapid growth of mobile internet, massive multimedia data (e.g., movies, photos, notes, etc.) on mobile devices is synchronized and shared through the cloud. During this process, public key encryption plays ... 详细信息
来源: 评论
Client Segmentation and Customization in E-Commerce: Applications of Machine Learning from a Management Perspective
Client Segmentation and Customization in E-Commerce: Applica...
收藏 引用
2024 International Conference on Communication, Computer Sciences and engineering, IC3SE 2024
作者: Sriprasadh, K. Palit, Shamik Pravallika, B. Manjunatha Lenka, Reena Singla, Atul Srm Institute Of Science And Technology Faculty Of Science And Humanities Department Of Computer Science And Applications Chennai Vadapalani India University Of Stirling Rak Campus Department Of Computing Science And Software Engineering United Arab Emirates Institute Of Aeronautical Engineering Dundigal Hyderabad India New Horizon College Of Engineering Department Of Mechanical Engineering Bangalore India University Pune India Lovely Professional University Phagwara India
A machine learning-based e-commerce personalised recommendation system helps address the issue of information overload that inevitably arises when consumers have more and more options in e-commerce, leading to an incr... 详细信息
来源: 评论