咨询与建议

限定检索结果

文献类型

  • 3,948 篇 会议
  • 2,063 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,769 篇 工学
    • 3,025 篇 计算机科学与技术...
    • 2,485 篇 软件工程
    • 749 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 337 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 191 篇 光学工程
    • 140 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 118 篇 交通运输工程
  • 1,692 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 367 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,146 篇 管理学
    • 712 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 227 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 137 篇 教育学
    • 132 篇 教育学
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 145 篇 feature extracti...
  • 140 篇 training
  • 136 篇 semantics
  • 123 篇 deep learning
  • 112 篇 software
  • 111 篇 machine learning
  • 110 篇 computer science
  • 107 篇 accuracy
  • 99 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 86 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 231 篇 college of compu...
  • 104 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 53 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 school of big da...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,733 篇 英文
  • 310 篇 其他
  • 52 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6089 条 记 录,以下是981-990 订阅
排序:
Enhancing Medical Image-Based Diagnostics Through the Application of Convolutional Neural Networks Techniques  3
Enhancing Medical Image-Based Diagnostics Through the Applic...
收藏 引用
3rd IEEE International Conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Byeon, Haewon Nair, Rajit Mahalakshmi, V. Khalaf, Mohammed I. Kaushik, Bharat Shabaz, Mohammad Inje University Department Of Ai And Software Gimhae50834 Korea Republic of School Of Computing Science & Engineering Vit Bhopal University Bhopal India College Of Engineering And Computer Science Jazan University Department Of Computer Science Jazan45142 Saudi Arabia Al Maarif University College Department Of Computer Science Al Anbar 31001 Iraq Masters University Of Northern Iowa IA United States Model Institute Of Engineering And Technology J&K Jammu India
Perioperative nutrition evaluation is crucial for patient care and resource efficiency in healthcare. This work proposes a deep learning-based perioperative nutrition evaluation tool that leverages sophisticated machi... 详细信息
来源: 评论
DeNC: Unleash Neural Codecs in Video Streaming with Diffusion Enhancement  39
DeNC: Unleash Neural Codecs in Video Streaming with Diffusio...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Qihua Li, Ruibin Guo, Jingcai Huang, Yaodong Xu, Zhenda Cui, Laizhong Guo, Song College of Computer Science and Software Engineering Shenzhen University China Department of Computing The Hong Kong Polytechnic University Hong Kong Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Recent years have witnessed the rise of Neural-enhanced Video Streaming (NeVS), which integrates neural restoration models into video codecs for higher compression-restoration performance. Despite its benefit, existin... 详细信息
来源: 评论
Online Multi-Object Tracking Based On Global Feature Enhancement Network And Historical Feature Complement Iteration
Online Multi-Object Tracking Based On Global Feature Enhance...
收藏 引用
Cognitive computing and Complex Data (ICCD), International Conference on the
作者: Zunwang Ke Puping An Gang Wang Yugui Zhang School of Software Xinjiang University Urumqi China School of Computing and Data Engineering NingboTech University Ningbo China Institute of Semiconductors Chinese Academy of Sciences Beijing China
Multi-object tracking is an important part of computer vision and plays a crucial role in many real-world application scenarios. The existing integrated tracking framework loses the key features of the target when fus... 详细信息
来源: 评论
Analysis of Bitcoin Fork by Colored Petri Nets
Analysis of Bitcoin Fork by Colored Petri Nets
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Zeyu Zhou Ding Liu Tatiana R. Shmeleva Dmitry A. Zaitsev School of Mechano-Electronic Engineering Xidian University Xi'an China Max Planck Institute for Software Systems Kaiserslautern and Saarbruecken Germany School of Computing University of Derby UK
Bitcoin is under the threat of fork since it operates with a distributed ledger. Predicting the fork probability in advance is beneficial for taking early action to avoid malicious attacks. In this study, we compose a... 详细信息
来源: 评论
An AI Multi-Model Approach to DeFi Project Trust Scoring and Security
An AI Multi-Model Approach to DeFi Project Trust Scoring and...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Viraaji Mothukuri Reza M. Parizi James L. Massa Abbas Yazdinejad Decentralized Science Lab College of Computing and Software Engineering Kennesaw State University USA Cyber Science Lab School of Computer Science University of Guelph Ontario Canada
Rampant scams plague decentralized finance (DeFi) projects, creating a DeFi credibility problem that limits the impact of DeFi advances in the availability and variety of financial services. This paper presents a nove... 详细信息
来源: 评论
Cybersecurity Risks Quantification in the Internet of Things  7
Cybersecurity Risks Quantification in the Internet of Things
收藏 引用
7th IEEE International Conference on Recent Advances and Innovations in engineering, ICRAIE 2022
作者: Alagappan, Annamalai Baptist Andrews, Leo John Sampath Kumar, V. Raj, Raymon Antony Sarathkumar, D. Botho University Faculty of Engineering and Technology Department of Network and Infrastructure Management Gaborone Botswana Botho University Faculty of Computing Department of Software Engineering Botswana Grant Thornton Plot 50370 Acument Park Fair Grounds Gaborone Botswana Kongu Engineering College Department of Electrical and Electronics Engineering Tamilnadu India
A dynamic platform, the Internet of Things uses data, which in turn invites cybersecurity risks. In a dynamic and complicated world, many organisations are putting more of their attention into understanding cyber thre... 详细信息
来源: 评论
A Data-Driven Approach Towards software Regression Testing Quality Optimization  25
A Data-Driven Approach Towards Software Regression Testing Q...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Moubayed, Abdallah Alhindawi, Nouh Alsakran, Jamal Injadat, MohammadNoor Kanan, Mohammad King Fahd University of Petroleum & Minerals Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems Dhahran Saudi Arabia Arizona State University School of Computing and Augmented Intelligence GilbertAZ United States Jadara University Department of Software Engineering Irbid Jordan Fairleigh Dickinson University Canada Zarqa University Data Science & Artificial Intelligence Department Zarqa Jordan University of Business and Technology Department of Industrial Engineering Jeddah Saudi Arabia
software testing is very important in software development to ensure its quality and reliability. As software systems have become more complex, the number of test cases has increased, which presents the challenge of e... 详细信息
来源: 评论
Multi-Scale Features Extraction and Cross-Stage Features Fusion Network for Small Object Detection (Mcfn)
SSRN
收藏 引用
SSRN 2024年
作者: Bian, Deng Tang, Mingwei Xu, Haowen Lin, Miaogui Cai, Tao Qi, Tang Lv, Shixuan Xiong, Jianqiao Wen, Ya Hu, Jie School of Computer and Software Engineering Xihua University Chengdu610039 China School of Computing and Artificial Intelligence Southwest Jiaotong University Sichuan Province Chengdu611756 China
Recently, object detection has been a hot topic in the field of computer vision and has advanced significantly. Despite the fact that today’s detectors can detect small objects, there are still deficiencies in the ex... 详细信息
来源: 评论
CLIP-Driven Multi-Scale Instance Learning for Weakly Supervised Video Anomaly Detection
CLIP-Driven Multi-Scale Instance Learning for Weakly Supervi...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhangbin Qian Jiawei Tan Zhilong Ou Hongxing Wang School of Big Data and Software Engineering Chongqing University China Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China
Existing weakly supervised video anomaly detection methods mainly employ Multiple Instance Learning (MIL) to identify abnormal snippets in untrimmed videos. However, the semantics and presentations of anomalies freque... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论