咨询与建议

限定检索结果

文献类型

  • 1,768 篇 会议
  • 1,071 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,884 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,789 篇 工学
    • 1,443 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 356 篇 信息与通信工程
    • 260 篇 控制科学与工程
    • 215 篇 生物工程
    • 158 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 105 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 88 篇 光学工程
    • 82 篇 安全科学与工程
    • 71 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 813 篇 理学
    • 463 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 564 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 184 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 80 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 7 篇 文学

主题

  • 124 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 66 篇 computational mo...
  • 63 篇 accuracy
  • 62 篇 deep learning
  • 61 篇 software
  • 58 篇 training
  • 56 篇 internet of thin...
  • 56 篇 cloud computing
  • 50 篇 resource managem...
  • 50 篇 quality of servi...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 46 篇 security
  • 45 篇 computer archite...
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 37 篇 optimization
  • 37 篇 monitoring

机构

  • 123 篇 college of compu...
  • 71 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 30 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...
  • 15 篇 college of compu...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 xiaofei wang
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 11 篇 leila ismail

语言

  • 2,544 篇 英文
  • 328 篇 其他
  • 15 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2884 条 记 录,以下是1151-1160 订阅
排序:
The impact of feature importance methods on the interpretation of defect classifiers
arXiv
收藏 引用
arXiv 2022年
作者: Rajbahadur, Gopi Krishnan Wang, Shaowei Oliva, Gustavo A. Kamei, Yasutaka Hassan, Ahmed E. The Centre for Software Excellence Huawei Canada School of Computing Queen’s University Canada The department of computer science University of Manitoba Canada Lab Graduate School and Faulty of Information Science and Electrical Engineering Kyushu University Japan
Classifier specific (CS) and classifier agnostic (CA) feature importance methods are widely used (often interchangeably) by prior studies to derive feature importance ranks from a defect classifier. However, different... 详细信息
来源: 评论
SCALABLE EDGE BLOCKING ALGORITHMS FOR DEFENDING ACTIVE DIRECTORY STYLE ATTACK GRAPHS :A PREPRINT
arXiv
收藏 引用
arXiv 2022年
作者: Guo, Mingyu Ward, Max Neumann, Aneta Neumann, Frank Nguyen, Hung School of Computer Science University of Adelaide Australia School of Physics Maths and Computing Computer Science and Software Engineering University of Western Australia Australia Department of Molecular and Cellular Biology Harvard University CambridgeMA United States
Active Directory (AD) is the default security management system for Windows domain networks. An AD environment naturally describes an attack graph where nodes represent computers/accounts/security groups, and edges re... 详细信息
来源: 评论
Systematic Literature Review on Global software Development Risks in Agile Methodology  8
Systematic Literature Review on Global Software Development ...
收藏 引用
8th International Conference on Information Technology and Multimedia, ICIMU 2020
作者: Podari, Zuriyaninatasa Arbain, Adila Firdaus Ibrahim, Noraini Abang Jawawi, Dayang Norhayati Nasir Wan Kadir, Wan Mohd Fahmi, Azim Muhammad Universiti Tun Hussein Onn Malaysia Software Engineering Department Parit Raja86400 Malaysia School of Computing Universiti Teknologi Malaysia Skudai81310 Malaysia
Background: The word 'Global software Development' can be described as the development of software, with development teams spread across different geographical locations. Problem statement: The issues arise wh... 详细信息
来源: 评论
Application of Transfer Learning for Fruits and Vegetable Quality Assessment  14
Application of Transfer Learning for Fruits and Vegetable Qu...
收藏 引用
14th International Conference on Innovations in Information Technology, IIT 2020
作者: Turaev, Sherzod Almisreb, Ali Abd Saleh, Mohammed A. United Arab Emirates University Department of Computer Science and Software Engineering Al Ain15551 United Arab Emirates International University of Sarajevo Department of Computer Science and Engineering and Software Engineering Sarajevo71210 Bosnia and Herzegovina University College of Technology School of Computing and Creative Media Sarawak Sarawak Malaysia
In this paper, we utilize the concept of transfer learning in fruits and vegetable quality assessment. The transfer learning concept applies the idea of reuse the pre-trained Convolutional Neural Network to solve a ne... 详细信息
来源: 评论
Unsupervised software repositories mining and its application to code search
Unsupervised software repositories mining and its applicatio...
收藏 引用
作者: Hu, Gang Peng, Min Zhang, Yihan Xie, Qianqian Gao, Wang Yuan, Mengting Department of National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China School of Computing National University of Singapore Singapore
software repositories are crucial resources for many software tasks, including code retrieval and annotation. Programming forums provide questions and answers (Q&A) from software developers, containing abundant co... 详细信息
来源: 评论
Learning Signed Hyper Surfaces for Oriented Point Cloud Normal Estimation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qing Feng, Huifang Shi, Kanle Gao, Yue Fang, Yi Liu, Yu-Shen Han, Zhizhong School of Software Tsinghua University Beijing China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Xihua University Chengdu China Kuaishou Technology Beijing China Center for Artificial Intelligence and Robotics New York University Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wayne State University Detroit United States
We propose a novel method called SHS-Net for point cloud normal estimation by learning signed hyper surfaces, which can accurately predict normals with global consistent orientation from various point clouds. Almost a... 详细信息
来源: 评论
Joint Multimodal Entity-Relation Extraction Based on Edge-enhanced Graph Alignment Network and Word-pair Relation Tagging
arXiv
收藏 引用
arXiv 2022年
作者: Yuan, Li Cai, Yi Wang, Jin Li, Qing School of Software Engineering South China University of Technology Guangzhou China MOE of China China The Peng Cheng Laboratory Shenzhen China School of Information Science and Engineering Yunnan University Yunnan China Department of Computing The Hong Kong Polytechnic University Hong Kong
Multimodal named entity recognition (MNER) and multimodal relation extraction (MRE) are two fundamental sub-tasks in the multimodal knowledge graph construction task. However, the existing methods usually handle two t... 详细信息
来源: 评论
Controllable Abstractive Sentence Summarization with Guiding Entities  28
Controllable Abstractive Sentence Summarization with Guiding...
收藏 引用
28th International Conference on Computational Linguistics, COLING 2020
作者: Zheng, Changmeng Cai, Yi Zhang, Guanjie Li, Qing School of Software Engineering South China University of Technology Guangzhou China Ministry of Education China Department of Computing The Hong Kong Polytechnic University Hong Kong
Entities are the major proportion and build up the topic of text summaries. Although existing text summarization models can produce promising results of automatic metrics, for example, ROUGE, it is difficult to guaran... 详细信息
来源: 评论
FLOW: Fusing and Shuffling Global and Local Views for Cross-User Human Activity Recognition with IMUs
arXiv
收藏 引用
arXiv 2024年
作者: Qiu, Qi Zhu, Tao Duan, Furong Wang, Kevin I-Kai Chen, Liming Nie, Mingxing Wan, Yaping School of Computer Science University of South China Hunan Hengyang430001 China School of Computing University of Ulster NewtownabbeyBT37 0QB United Kingdom Department of Electrical Computer and Software Engineering The University of Auckland Auckland1010 New Zealand School of Computer Science and Technology Dalian University of Technology Liaoning Dalian116000 China
Inertial Measurement Unit (IMU) sensors are widely employed for Human Activity Recognition (HAR) due to their portability, energy efficiency, and growing research interest. However, a significant challenge for IMU-HAR... 详细信息
来源: 评论
A Convolution-Based System for Malicious URLs Detection
收藏 引用
Computers, Materials & Continua 2020年 第1期62卷 399-411页
作者: Chaochao Luo Shen Su Yanbin Sun Qingji Tan Meng Han Zhihong Tian Institute of Computer Application China Academy of Engineering PhysicsMianyang621054China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Mechanical and Electrical Engineering Heilongjiang State Farm Science Technology Vocational CollegeHarbin150431China Department of Computing and Software Engineering Kennesaw State UniversityKennesawGA 30144USA
Since the web service is essential in daily lives,cyber security becomes more and more important in this digital *** Uniform Resource Locator(URL)is a common and serious threat to *** hosts unsolicited content and lur... 详细信息
来源: 评论