咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是841-850 订阅
排序:
Spatial-Temporal Graph-Based AU Relationship Learning for Facial Action Unit Detection
Spatial-Temporal Graph-Based AU Relationship Learning for Fa...
收藏 引用
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Zihan Wang Siyang Song Cheng Luo Yuzhi Zhou Shiling Wu Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Computing and Mathematical Sciences University of Leicester
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep...
来源: 评论
Improved quantum linear system solver via quantum phase discrimination
收藏 引用
The European Physical Journal Special Topics 2025年 1-11页
作者: Liu, Zihao Li, Guanzhong Li, Lvzhou Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong) Shenzhen China
The problem of solving linear systems is of great significance in both theory and practice, for which quantum solvers have been shown to provide an exponential speedup over the best-known classical solvers. Recently, ...
来源: 评论
Historical trust-based method for internet of things
Historical trust-based method for internet of things
收藏 引用
2021 International Conference on Advanced Computer Applications, ACA 2021
作者: Jasim, Zainab Abdullah Alsoufi, Muaadh A. University of Babylon Software Department Information Technology Babylon Iraq Faculty of Engineering School of Computing Johor Malaysia
The Internet of Things (IoT) defines the universal and embedded actuators and sensors network with limited and heterogeneous capabilities of computation. The trustworthiness of IoT-enabled services raises concerns, si... 详细信息
来源: 评论
Explicitly Diverse Visual Question Generation
SSRN
收藏 引用
SSRN 2024年
作者: Xie, Jiayuan Zheng, Jiasheng Fang, Wenhao Cai, Yi Li, Qing School of Software Engineering South China University of Technology Guangzhou China Ministry of Education China Department of Computing Hong Kong Polytechnic University Hong Kong Institute of Software Chinese Academy of Sciences Beijing China
Visual question generation involves the generation of meaningful questions about an image. Although we have made significant progress in automatically generating a single high-quality question related to an image, exi...
来源: 评论
Dual-Encoder Attention Fusion Model for Aspect Sentiment Triplet Extraction
Dual-Encoder Attention Fusion Model for Aspect Sentiment Tri...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yunqi Zhang Songda Li Yuquan Lan Hui Zhao Gang Zhao Software Engineering Institute East China Normal University Shanghai China Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Microsoft Beijing China
Aspect sentiment triplet extraction (ASTE) is a crucial sub-task of aspect-based sentiment analysis, which aims to extract each aspect term along with its opinion term and sentiment polarity. Prior works accomplish AS...
来源: 评论
Bounded-DWA: An Efficient Local Planner for Ackermann-driven Vehicles on Sandy Terrain
Bounded-DWA: An Efficient Local Planner for Ackermann-driven...
收藏 引用
IEEE International Conference on Real-time computing and Robotics (RCAR)
作者: Ke Gong Zhiyuan Xu Xinyu Zhang Shanghai Key Laboratory of Trustworthy Computing Engineering Research Center of Software/Hardware Co-Design Technology and Application (MoE) and School of Software Engineering East China Normal University Shanghai Midea Group China
We present a new dynamic window approach (DWA) for mobile vehicles equipped with Ackermann steering geometry that adheres to Ackermann kinematic constraints. By integrating these constraints with the sampling window i...
来源: 评论
Digital Platform to Empower the Self-Employment in Sri Lanka  6
Digital Platform to Empower the Self-Employment in Sri Lanka
收藏 引用
6th International Conference on Information Technology Research, ICITR 2021
作者: Wickramasinghe, H.C.P. Thebuwana, T.D. Wijesinghe, G.K.H.S. Dissanayake, U.N. Kodagoda, Nuwan Suriyawansa, Kushnara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Sri Lanka
Unemployment is a huge problem around the world because a lack of job opportunities. People are unable to find the job opportunities according to their preferences and qualifications. As a solution for this, many coun... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yifan Zhang Haolong Xiang Xuyun Zhang Xiaolong Xu Wei Fan Qin Zhang Lianyong Qi School of software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia Uffield Department of Women's & Reproductive Health University of Oxford England College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering University of Petroleum (East China) China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
Intrusion Detection in Smart IoT Devices for People with Disabilities  8
Intrusion Detection in Smart IoT Devices for People with Dis...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Naveed, Muhammad Usman, Syed Muhammad Satti, Muhammad Islam Aleshaiker, Sama Anwar, Aamir Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Islamabad Pakistan Ai Air University Faculty of Computing Department of Creative Technologies Islamabad Pakistan Riphah University Faculty of Computer Science and Software Engineering Islamabad Pakistan School of Computing & Engineering University of West London London United Kingdom
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev... 详细信息
来源: 评论
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 778-790页
作者: Muhammad Salah ud din Muhammad Atif Ur Rehman Rehmat Ullah Chan-Won Park Dae Ho Kim Byung-seo Kim Department of Electronics&Computer Engineering Hongik UniversitySejong City30016South Korea Department of Computing&Mathematics Manchester Metropolitan University United Kingdom Cardiff School of Technologies Cardiff Metropolitan UniversityCardiffCF52YBUnited Kingdom Electronics and Telecommunications Research Institute Daejeon34129South Korea Department of Software and Communications Engineering Hongik UniversitySejong City30016South Korea
In Wireless Multimedia Sensor Networks(WMSNs),nodes capable of retrieving video,audio,images,and small scale sensor data,tend to generate immense traffic of various *** energy-efficient transmission of such a vast amo... 详细信息
来源: 评论