咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是831-840 订阅
排序:
Overview of Medical Data Privacy Protection based on Blockchain Technology  7
Overview of Medical Data Privacy Protection based on Blockch...
收藏 引用
7th IEEE International Conference on Smart Cloud, SmartCloud 2022
作者: Chen, Lin Yu, Qingchun Liang, Wei Cai, Jiahong Zhu, Hangyu Xie, Songyou Hunan University of Science and Technology Hunan Key Laboratory for Service computing and Novel Software Technology School of Computer Science and Engineering Xiangtan China Shenzhen Research Institute Sun Yat-sen University and Novel Software Technology ShenZhen China Hunan University College of Computer Science and Electronic Engineering Changsha China
With the increasing growth of electronic medical data, the difficulties of data sharing among medical institutions and the leakage of data privacy have become the focus of the public and medical workers. The blockchai... 详细信息
来源: 评论
Quantum and classical query complexities for determining connectedness of matroids
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Xiaowei Feng, Shiguang Li, Lvzhou Institute of Quantum Computing and and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China
Connectivity is a fundamental structural property of matroids, and has been studied algorithmically over 50 years. In 1974, Cunningham proposed a deterministic algorithm consuming O(n2) queries to the independence ora... 详细信息
来源: 评论
Energy and Exergy-Aware Workload Assignment for Air-Cooled Data Centers  21
Energy and Exergy-Aware Workload Assignment for Air-Cooled D...
收藏 引用
12th ACM International Conference on Future Energy Systems, e-Energy 2021
作者: Gupta, Rohit Down, Douglas G. Puri, Ishwar K. Department of Mechanical Engineering McMaster University HamiltonON Canada Department of Computing and Software McMaster University HamiltonON Canada
The energy required to cool a data center (DC) depends on both thermal and workload management. Although existing energy-and temperature-aware workload assignment approaches reduce operational expenditure by minimizin... 详细信息
来源: 评论
Unveiling Public Perception of ChatGPT Through Twitter Data and Machine Learning  4
Unveiling Public Perception of ChatGPT Through Twitter Data ...
收藏 引用
4th International Conference on Data Analytics for Business and Industry, ICDABI 2023
作者: Abishethvarman, Vadivel Banujan, Kuhaneswaran Wijeratne, Ashansa Nirubikaa, Ravikumar Kumara, Samantha Prasanth, Senthan Sabaragamuwa University of Sri Lanka Department of Computing and Information Systems Belihuloya Sri Lanka Sabaragamuwa University of Sri Lanka Department of Software Engineering Belihuloya Sri Lanka Sabaragamuwa University of Sri Lanka Department of Physical Sciences and Technology Belihuloya Sri Lanka
The study comprehensively analysed public sentiment towards ChatGPT, a language processing AI tool, using approximately 135,000 tweets from an initial dataset of 236,275 entries. After cleaning and pre-processing the ... 详细信息
来源: 评论
Process Mining representation using Communication Structured Acyclic Nets (CSA-nets)
Process Mining representation using Communication Structured...
收藏 引用
2024 International Workshop on Petri Nets and software engineering, PNSE 2024
作者: Almutairi, Nadiyah Alshammari, Tuwailaa Alahmadi, Mohammed School of Computing Newcastle University Science Square Newcastle upon TyneNE4 5TG United Kingdom Department of Science and Technology University of Hafr Albatin Hafr Al-Batin39524 Saudi Arabia Department of Software Engineering University of Jeddah Jeddah21493 Saudi Arabia
Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets SON which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). It consists of... 详细信息
来源: 评论
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Nimra Basit Fatima Khalid Qurat Ul Ain Maria Andleeb Department of Software Engineering University of Engineering and Technology Taxila Pakistan Faculty of Computer Sciences and Engineeing GIKI Topi Pakistan Department of Computing Shifa Tameer-e-Millat University PRC Islamabad Pakistan
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photo... 详细信息
来源: 评论
Comparative Analysis of Differential Privacy Implementations on Synthetic Data
Comparative Analysis of Differential Privacy Implementations...
收藏 引用
IEEE Annual computing and Communication Workshop and Conference (CCWC)
作者: Huwida E. Said Qusay H. Mahmoud Mandeep Goyal Faiza Hashim Department of Computing and Applied Technolgy College of Technological Innovation Zayed University Dubai UAE Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa ON Canada Department of Computer Science and Software Engineering College of Information Technology UAE University AI-Ain UAE
Differential privacy offers a promising solution to balance data utility and user privacy. This paper compares two prominent differential privacy tools-PyDP and IBM's diffprivlib-that are applied to a synthetic da... 详细信息
来源: 评论
Finite-Time Probabilistic Impulsive Synchronization for Fuzzy Multiplicative Stochastic Coupled Memristive Neural Networks
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Nijing Peng, Hong Lu, Xiang Wang, Xiangxiang Deng, Ping School of Computer and Software Engineering Xihua University Chengdu610039 China Ascend Computing Product Department Huawei Technologies Co Ltd Chengdu610041 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
In this paper, the finite-time synchronization (FTS) of T-S fuzzy multiplicative stochastic coupled memristive neural networks (CMNNs) with probabilistic delayed impulsive effects is investigated. First, a novel CMNNs... 详细信息
来源: 评论
Exploiting the sequential nature of genomic data for improved analysis and identification
收藏 引用
Computers in Biology and Medicine 2024年 183卷 109307-109307页
作者: Nawaz, M. Saqib Nawaz, M. Zohaib Junyi, Zhang Fournier-Viger, Philippe Qu, Jun-Feng College of Computer Science and Software Engineering Shenzhen University China Faculty of Computing and Information Technology Department of Computer Science University of Sargodha Pakistan School of Computer Engineering Hubei University of Arts and Science Hubei Xiangyang China
Genomic data is growing exponentially, posing new challenges for sequence analysis and classification, particularly for managing and understanding harmful new viruses that may later cause pandemics. Recent genome sequ... 详细信息
来源: 评论
Formal Timing Analysis and Verification of the Interrupt-driven Programs for ISO26262
Formal Timing Analysis and Verification of the Interrupt-dri...
收藏 引用
2025 2nd International Conference on Algorithms, software engineering and Network Security (ASENS)
作者: Qing She He Huang Shenglin Bao Xin Guo National Trusted Embedded Software Engineering Technology Research Center East China Normal University / Shanghai Huayuan Chuangxin Software Co. Ltd China High end Equipment Systems Department Shanghai Huayuan Chuangxin Software Co. Ltd China Basic Software Department East China Institute of Computing Technology China National Trusted Embedded Software Engineering Technology Research Center East China Normal University China
Safety-critical systems refer to software systems whose operation can affect the safety of people and facilities used in the automotive industry, aerospace, and hospital health care systems. The high level of safety o... 详细信息
来源: 评论