咨询与建议

限定检索结果

文献类型

  • 3,948 篇 会议
  • 2,063 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,769 篇 工学
    • 3,025 篇 计算机科学与技术...
    • 2,485 篇 软件工程
    • 749 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 337 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 191 篇 光学工程
    • 140 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 118 篇 交通运输工程
  • 1,692 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 367 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,146 篇 管理学
    • 712 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 227 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 137 篇 教育学
    • 132 篇 教育学
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 145 篇 feature extracti...
  • 140 篇 training
  • 136 篇 semantics
  • 123 篇 deep learning
  • 112 篇 software
  • 111 篇 machine learning
  • 110 篇 computer science
  • 107 篇 accuracy
  • 99 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 86 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 231 篇 college of compu...
  • 104 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 53 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 school of big da...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,733 篇 英文
  • 310 篇 其他
  • 52 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6089 条 记 录,以下是961-970 订阅
排序:
CEER:Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters
收藏 引用
Computer Systems Science & engineering 2023年 第6期45卷 2587-2602页
作者: Sayyed Mudassar Shah Tariq Hussain Babar Shah Farman Ali Khalid Zaman Kyung-Sup Kwak Institute of Computer Science&Information Technology the University of Agriculture Peshawar25000Pakistan High Performance Computing and Networking Institute National Research Council(ICAR-CNR)Naples80131Italy College of Technological Innovation Zayed UniversityDubai19282UAE Department of Software Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Inha UniversityIncheon22212Korea
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration *** most of these applications,the network is composed of several sensor nodes deployed at different depths in th... 详细信息
来源: 评论
Web Application to predict Skin Disease: An Approach Using Deep Learning Algorithm
Web Application to predict Skin Disease: An Approach Using D...
收藏 引用
Human-Computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Eelanila Thayalan Ayingaran Arumugavel Sharujan Ganeshan Makenthiran Dalaxshan Harinda Fernando Kaushalya Rajapakse Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The Disease Prediction System revolutionizes healthcare with advanced machine learning techniques for early detection of skin diseases, notably focusing on skin cancer. Through image processing and Transfer Learning, ... 详细信息
来源: 评论
An efficient group key agreement protocol with administrator  3
An efficient group key agreement protocol with administrator
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Fang, Qihao Zhang, Lei Zhang, Mingrui Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
Group key agreement technology is one of the most popular solution to establish a reliable secure channel between communicating entities of a group. Group key agreement protocol with administrator (GKAA) can handle a ... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin  26
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Qianqian Xu, Lin Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony... 详细信息
来源: 评论
Smart Photo Editor for Differently-abled People using Assistive Technology  6
Smart Photo Editor for Differently-abled People using Assist...
收藏 引用
6th International Conference on Information Technology Research, ICITR 2021
作者: Buddhika, A.S. Wijesekera, P.K. Kavindu, D. G. Hasintha Dinusha, Dilshan S Arachchillage, Udara Srimath S. Samaratunge Kuruppu, Thilmi Anuththara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka
Differently-abled people are significant minority groups, have many limitations to live everyday life, are starved of services, and are mostly ignored by society due to many types of disabilities. This problem may lea... 详细信息
来源: 评论
Unifying and Improving Graph Convolutional Neural Networks with Wavelet Denoising Filters  23
Unifying and Improving Graph Convolutional Neural Networks w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wan, Liangtian Li, Xiaona Han, Huijin Yan, Xiaoran Sun, Lu Ning, Zhaolong Xia, Feng Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Research Center of Big Data Intelligence Research Institute of Artificial Intelligence Zhejiang Lab Hangzhou China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Computing Technologies Rmit University Melbourne Australia
Graph convolutional neural network (GCN) is a powerful deep learning framework for network data. However, variants of graph neural architectures can lead to drastically different performance on different tasks. Model ... 详细信息
来源: 评论
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems  23
Prism: Revealing Hidden Functional Clusters from Massive Ins...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Jinyang Liu Zhihan Jiang Jiazhen Gu Junjie Huang Zhuangbin Chen Cong Feng Zengyin Yang Yongqiang Yang Michael R. Lyu The Chinese University of Hong Kong Hong Kong SAR China School of Software Engineering Sun Yat-sen University Zhuhai China Computing and Networking Innovation Lab Huawei Cloud Computing Technology Co. Ltd China
Ensuring the reliability of cloud systems is critical for both cloud vendors and customers. Cloud systems often rely on virtualization techniques to create instances of hardware resources, such as virtual machines. Ho... 详细信息
来源: 评论
ATT&CKViz: Enhancing Cybersecurity Insights by Visual Analytics of Attack Patterns
ATT&CKViz: Enhancing Cybersecurity Insights by Visual Analyt...
收藏 引用
engineering & computing Technologies (ICECT), International Conference on
作者: Inbasat Fiza Fizza Khurshid Manahil Fatima Umara Noor Zahid Rashid Department of Software Engineering Faculty of Computing and Information Technology International Islamic University Islamabad Pakistan Technology Management Economics and Policy Program College of Engineering Seoul National University Seoul South Korea
The ATT&CK MITRE framework serves as an expansive repository of adversary tactics, techniques, and procedures. Given the sheer volume of these intricate attack patterns, the conventional manual navigation method p... 详细信息
来源: 评论
Joint QoS Prediction for Web Services based on Deep Fusion of Features
收藏 引用
IEEE Transactions on Network and Service Management 2023年 1-1页
作者: Ding, Linghang Liu, Jianxun Kang, Guosheng Xiao, Yong Cao, Buqing Hunan Provincial Key Lab. for Services Computing and Novel Software Technology and School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
In order to solve the problem of insufficient accuracy of Web service QoS prediction, a joint QoS prediction method for Web services based on the deep fusion of features was proposed by considering the hidden environm... 详细信息
来源: 评论
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论