咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是631-640 订阅
排序:
Similarities of Influencers across Different Social Media Platforms by Using Four Centrality Measures
Similarities of Influencers across Different Social Media Pl...
收藏 引用
作者: Tingyu Shi Department of Computing and Software Faculty of EngineeringMcMaster University
Searching for influencers among a social network is important because marketers can then use this information to conduct word-of-mouth(WOM) advertisement,which is an important marketing *** Review provides detailed in... 详细信息
来源: 评论
Towards Prevention of Sportsmen Burnout:Formal Analysis of Sub-Optimal Tournament Scheduling
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1509-1526页
作者: Syed Rameez Naqvi Adnan Ahmad S.M.Riazul Islam Tallha Akram M.Abdullah-Al-Wadud Atif Alamri Department of Electrical and Computer Engineering COMSATS University IslamabadWah CampusWah47040Pakistan Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Research Chair of Pervasive and Mobile Computing King Saud UniversityRiyadh11543Saudi Arabia
Scheduling a sports tournament is a complex optimization problem,which requires a large number of hard constraints to *** the availability of several such constraints in the literature,there remains a gap sincemost of... 详细信息
来源: 评论
multiPI-TransBTS: A multi-path learning framework for brain tumor image segmentation based on multi-physical information
收藏 引用
Computers in Biology and Medicine 2025年 191卷 110148-110148页
作者: Zhu, Hongjun Huang, Jiaohang Chen, Kuo Ying, Xuehui Qian, Ying School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Engineering Research Center of Software Quality Assurance Testing and Assessment Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
Brain Tumor Segmentation (BraTS) plays a critical role in clinical diagnosis, treatment planning, and monitoring the progression of brain tumors. However, due to the variability in tumor appearance, size, and intensit... 详细信息
来源: 评论
Evaluating Propagation Models for IIoT in Underground Mining: an Experimental Comparative Study in Underground Coal Mines
Evaluating Propagation Models for IIoT in Underground Mining...
收藏 引用
IEEE ANDESCON
作者: Fabian Medina Oscar Montañez Cristian Suancha Eduardo Avendaño Sandra Céspedes Systems and Computing Engineering school UPTC Sogamoso Colombia Electronic Engineering school UPTC Sogamoso Colombia Department of Computer Science and Software Engineering Concordia University Montreal Canada
Planning the Industrial Internet of Things (IIoT) systems for underground mining is critical in guaranteeing communication between nodes (sensor/actuator) and ensuring the effectiveness of their functionalities. There... 详细信息
来源: 评论
A drug recommendation system based on response prediction: Integrating gene expression and K-mer fragmentation of drug SMILES using LightGBM
收藏 引用
Intelligence-Based Medicine 2025年 11卷 100206-100206页
作者: Naveed, Sajid Husnain, Mujtaba Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur 63100 Pakistan Department of Software Engineering Faculty of Computing The Islamia University of Bahawalpur 63100 Pakistan
Medical experts and physicians examine the gene expression abnormality in glioblastoma (GBM) cancer patients to identify the drug response. The main objective of this research is to build a machine learning (ML) based... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Enhancing Federated Learning by One-Shot Transferring of Intermediate Features from Clients  10
Enhancing Federated Learning by One-Shot Transferring of Int...
收藏 引用
10th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2023
作者: Deng, Youxingzhu Zhou, Yipeng Liu, Gang Wang, Jessie Hui Shui, Yu Shenzhen University College of Computer Science and Software Engineering Shenzhen China Macquarie University School of Computing Faculty of Science and Engineering Sydney Australia Institute for Network Sciences and Cyberspace Tsinghua University Peking China University of Technology Sydney School of Computer Science Sydney Australia
Federated learning (FL) is an emerging paradigm using a parameter server (PS) to coordinate multiple decentralized clients for training a common model without exposing their raw data. Despite its amazing capability in... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
Empirical Insights into Product Security Challenges and Practices in software Development
Empirical Insights into Product Security Challenges and Prac...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Saima Rafi Muhammad Azeem Akbar Arif Ali Khan School of Computing Engineering & the Built Environment Edinburgh Napier University Scotland Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland
Ensuring product security in software development is crucial, encompassing hardware, firmware, and holistic protection measures. With rising cyber threats, organizations face challenges in safeguarding software produc... 详细信息
来源: 评论
Intelligent Model for Predicting the Quality of Services Violation
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 3607-3619页
作者: Muhammad Adnan Khan Asma Kanwal Sagheer Abbas Faheem Khan T.Whangbo Pattern Recognition and Machine Learning Lab. Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Engineering Gachon UniversitySeongnam13557Korea
Cloud computing is providing IT services to its customer based on Service level agreements(SLAs).It is important for cloud service providers to provide reliable Quality of service(QoS)and to maintain SLAs *** service ... 详细信息
来源: 评论