咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是731-740 订阅
排序:
Enhancing Blockchain Technology Education with Innovative Active Learning  2
Enhancing Blockchain Technology Education with Innovative Ac...
收藏 引用
2nd IEEE International Conference on Advanced Learning Technologies on Education and Research, ICALTER 2022
作者: Shi, Yong Shahriar, Hossain Lo, Dan Chi, Hongmei College of Computing and Software Engineering Kennesaw State University Marietta United States Florida A&m University Department of Computer and Information Sciences TallahasseeFL United States
As an emerging technology that has already impacted various sectors including finance, energy, education, and more, blockchain provides a decentralized ledger system that ensures the integrity of the recorded transact... 详细信息
来源: 评论
Dynamic Bi-Elman Attention Networks (DBEAN): Dual-Directional Context-Aware Representation Learning for Enhanced Text Classification
arXiv
收藏 引用
arXiv 2025年
作者: Liao, Mengyao Lai, Zhenglin Xu, Dong College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Text classification, a fundamental task in natural language processing (NLP), aims to categorize textual data into predefined labels. Traditional methods struggled with complex linguistic structures and semantic depen... 详细信息
来源: 评论
Statically-Directed Dynamic Taint Analysis
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 18-24页
作者: Kai Chen Yingjun Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Taint analysis is a popular method in software analysis field including vulnerability/malware analysis. By identifying taint source and making suitable taint propagation rules, we could directly know whether variables...
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars  24
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Nie, Hejing Wen, Yiping Li, Tiancai Ouyang, Sipeng Tian, Muyang School of Computer Science and Engineering Hunan University of Science and Technology China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
Complex-Valued Gabor-Attention Residual Fusion Network for Iris Recognition  27
Complex-Valued Gabor-Attention Residual Fusion Network for I...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Zhuoru Xiao, Jian Bai, Xiaowei Wang, Xiaodong Li, Yingxi Fang, Zhenyu Xie, Liang Yan, Ye Yin, Erwei College of Intelligence and Computing Tianjin University Tianjin300450 China Beijing100071 China Intelligent Game and Decision Laboratory Beijing100071 China Tianjin300450 China College of Engineering Peking University Beijing100071 China School of Software Northwestern Polytechnical University Xian710000 China
Iris recognition has gained significant attention in identity verification due to the unique, stable texture patterns in iris. Successfully extracting these patterns is essential for quick and precise identification. ... 详细信息
来源: 评论
Building a Reusable and Extensible Automatic Compiler Infrastructure for Reconfigurable Devices
Building a Reusable and Extensible Automatic Compiler Infras...
收藏 引用
International Conference on Field Programmable Logic and Applications
作者: Zhenya Zang Uwe Dolinsky Pietro Ghiglio Stefano Cherubin Mehdi Goli Shufan Yang Codeplay Software Ltd. *School of Computing Engineering and Build Environment Edinburgh Napier University Edinburgh United Kindom Codeplay Software Ltd Edinburgh United Kindom School of Computing Engineering and Build Environment Edinburgh Napier University Edinburgh United Kindom
Multi-Level Intermediate Representation (MLIR) is gaining increasing attention in reconfigurable hardware communities due to its capability to represent various abstract levels for software compilers. This project aim...
来源: 评论
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Lili Zhu, Quanyan Ray, Herman Xie, Ying Hewlett Packard Enterprise United States Department of Electrical and Computer Engineering New York University United States College of Computing and Software Engineering Kennesaw State University United States
Network threat detection has been challenging due to the complexities of attack activities and the limitation of historical threat data to learn from. To help enhance the existing practices of using analytics, machine... 详细信息
来源: 评论
Effective Entry-Wise Flow for Molecule Generation  40
Effective Entry-Wise Flow for Molecule Generation
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Zhang, Qifan Yao, Junjie Yang, Yuquan Shi, Yizhou Gao, Wei Wang, Xiaoling School of Computer Science and Technology East China Normal University China Software Engineering Institute East China Normal University China Shanghai Key Laboratory of Trustworthy Computing China University of Massachusetts Department of Chemistry Boston United States University of Michigan Ann Arbor United States
Molecule generation is a critical process in the fields of drug discovery and materials science. Recently, generative models based on normalizing flows have demonstrated significant potential in this domain. These mod... 详细信息
来源: 评论
A Novel and Pragmatic Scenario Modeling Framework with Verification-in-the-loop for Autonomous Driving Systems
A Novel and Pragmatic Scenario Modeling Framework with Verif...
收藏 引用
IEEE/ACM International Conference on software engineering: New Ideas and Emerging Technologies Results Track (ICSE-NIER)
作者: Dehui Du Bo Li Chenghang Zheng Xinyuan Zhang Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Scenario modeling for Autonomous Driving Systems (ADS) enables scenario-based simulation and verification which are critical for the development of safe ADS. However, with the increasing complexity and uncertainty of ...
来源: 评论
Real-Time CNN-Based Driver Distraction&Drowsiness Detection System
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2153-2174页
作者: Abdulwahab Ali Almazroi Mohammed A.Alqarni Nida Aslam Rizwan Ali Shah University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia University of Jeddah College of Computer Science and EngineeringDepartment of Software EngineeringJeddahSaudi Arabia Department of Computer Science National College of Business Administration&EconomicsBahawalpur Campus63100Pakistan Department of Computer Science and Information Technology The Islamia University of BahawalpurRahim Yar Khan CampusPunjab64200Pakistan
Nowadays days,the chief grounds of automobile accidents are driver fatigue and *** the development of computer vision technology,a cutting-edge system has the potential to spot driver distractions or sleepiness and al... 详细信息
来源: 评论