咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,452 篇 计算机科学与技术...
    • 1,209 篇 软件工程
    • 358 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 164 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 83 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 569 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 159 篇 医学
    • 142 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 67 篇 computational mo...
  • 63 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 38 篇 optimization
  • 38 篇 data models

机构

  • 125 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 31 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,719 篇 英文
  • 157 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是601-610 订阅
排序:
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Ji, Zhoulin Lin, Chenhao Wang, Hang Shen, Chao School of Software Engineering Xi’an Jiaotong University China School of Cyber Science and Engineering Xi’an Jiaotong University China School of Automation Science and Engineering Xi’an Jiaotong University China Department of Computing The Hong Kong Polytechnic University Hong Kong
Detecting synthetic from real speech is increasingly crucial due to the risks of misinformation and identity impersonation. While various datasets for synthetic speech analysis have been developed, they often focus on... 详细信息
来源: 评论
UNDERSTANDING USERS’ UX NEEDS THROUGH THE LENSES OF PSYCHOLOGICAL NEEDS THEORIES: USERS’ EXPECTATIONS AND FELT EXPERIENCES  16
UNDERSTANDING USERS’ UX NEEDS THROUGH THE LENSES OF PSYCHOL...
收藏 引用
16th International Conference on Interfaces and Human Computer Interaction, IHCI 2022, and 15th International Conference on Game and Entertainment Technologies 2022, GET 2022 - Held at the 16th Multi Conference on Computer Science and Information Systems, MCCSIS 2022
作者: Mkpojiogu, Emmanuel O.C. Okeke-Uzodike, Obianuju E. Omopariola, Victor School of Computing Universiti Utara Malaysia UUM Sintok06010 Malaysia Department of Software Engineering Veritas University Abuja Nigeria Department of Applied Management Durban University of Technology KwaZulu-Natal Pietermaritzburg South Africa Department of Computer and Information Technology Veritas University Abuja Nigeria
The purpose of this study was to conduct a literature review in order to gather material that would serve to underpin and support a link between UX requirements and psychological theories. In the paper, relevant sourc... 详细信息
来源: 评论
software Practice in Small software Companies: Development Context Constraints on Process Adoption.  22
Software Practice in Small Software Companies: Development C...
收藏 引用
Proceedings of the 2022 European Symposium on software engineering
作者: Micheal Tuape Victoria Hasheela-Mufeti Petrus Iiyambo Anna Kayanda Sharon Mensah Jussi Kasurinen Department of Software Engineering Lappeenranta-Lahti University of Technology Finland Dept of Computing Maths and Statistical Sciences University of Namibia Namibia Dept of Information Systems College of Business Education Tanzania Software Department B-Systems Limited Ghana
Small software companies (SSCs) interact with the immediate environment, exposing them to challenges that force the organization to undertake adjustments if it must survive and remain in business. These adjustments re... 详细信息
来源: 评论
Aligning Academic with Industrial Needs: Investigating DevOps  24
Aligning Academic with Industrial Needs: Investigating DevOp...
收藏 引用
Proceedings of the 28th International Conference on Evaluation and Assessment in software engineering
作者: Saima Rafi Muhammad Azeem Akbar Sajjad Mahmood School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom Software Engineering LUT University Finland Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia
Over recent years, DevOps has gained more attention within the software industry, owing to its pivotal role in facilitating continuous software delivery. The significant demand for DevOps practitioners necessitates su... 详细信息
来源: 评论
METHODS FOR THE EVALUATION OF UX OVER TIME  16
METHODS FOR THE EVALUATION OF UX OVER TIME
收藏 引用
16th International Conference on Interfaces and Human Computer Interaction, IHCI 2022, and 15th International Conference on Game and Entertainment Technologies 2022, GET 2022 - Held at the 16th Multi Conference on Computer Science and Information Systems, MCCSIS 2022
作者: Mkpojiogu, Emmanuel O.C. Okeke-Uzodike, Obianuju E. Omopariola, Victor School of Computing Universiti Utara Malaysia UUM Sintok06010 Malaysia Department of Software Engineering Veritas University Abuja Nigeria Department of Applied Management Durban University of Technology KwaZulu-Natal Pietermaritzburg South Africa Department of Computer and Information Technology Veritas University Abuja Nigeria
In this paper a literature review strategy was utilized to assess the methods of evaluating UX longitudinally. The review revealed that studies on user experience evaluation over time are rare. This rareness is attrib... 详细信息
来源: 评论
A formal model for multiagent Q-learning on graphs
收藏 引用
Science China(Information Sciences) 2025年
作者: Jinzhuo LIU Guangchen JIANG Chen CHU Yong LI Zhen WANG Shuyue HU School of Software Yunnan University School of Artificial Intelligence Optics and Electronics (iO PEN)Northwestern Polytechnical University Department of Statistics School of Statistics and MathematicsYunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics School of Information Science&Engineering Yunnan University School of Cybersecurity Northwestern Polytechnical University Shanghai Artificial Intelligence Laboratory
Understanding the dynamics of multi-agent learning has long been an important research topic. Existing research has focused mostly on 2-agent games or well-mixed populations. However, in real-world multi-agent systems...
来源: 评论
Efficient COVID-19 detection using data mining algorithms: a comparison of basic and hybrid approaches
收藏 引用
Soft computing 2025年 第3期29卷 1437-1451页
作者: Saidi, Mohammad Gheibi, Mohammad Ghazikhani, Adel Lotfata, Aynaz Chahkandi, Benyamin Familsamavati, Sajad Behzadian, Kourosh Department of Computer Science Imam Reza International University Mashhad Iran MS of Software Engineering Information and Communication Technology Unit Mashhad Municipality Fire and Safety Services Organization Mashhad Iran Big Data Lab Imam Reza International University Mashhad Iran Institute for Nanomaterials Advanced Technologies and Innovation Technical University of Liberec Liberec46117 Czech Republic Tallinn10615 Estonia Department of Pathology Microbiology and Immunology School of Veterinary Medicine University of California Davis95616 United States Department of Urban and Regional Planning San Jose State University San Jose95192 United States Faculty of Civil and Environmental Engineering Gdansk University of Technology Narutowicza Street 11/12 80-233 Gdansk Poland Tecnologico de Monterrey Escuela de Ingeniería y Ciencias Monterrey Mexico School of Computing and Engineering University of West London London United Kingdom
Accurate and efficient diagnosis of COVID-19 remains a significant challenge due to the limitations of current detection methods, such as blood tests and chest scans, which can be time-consuming and error-prone. This ... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
SCTransNet: Spatial-channel Cross Transformer Network for Infrared Small Target Detection
arXiv
收藏 引用
arXiv 2024年
作者: Yuan, Shuai Qin, Hanlin Yan, Xiang Akhtar, Naveed Mian, Ajmal The School of Optoelectronic Engineering Xidian University Xi’an710071 China The School of Computing and Information Systems Faculty of Engineering and IT The University of Melbourne ParkvilleVIC3052 Australia The Department of Computer Science and Software Engineering The University of Western Australia Perth6009 Australia
This is the pre-acceptance version, to read the final version please go to IEEE TRANSACTION ON GEOSCIENCE AND REMOTE SENSING on IEEE Xplore. Infrared small target detection (IRSTD) has recently benefitted greatly from... 详细信息
来源: 评论
Revolutionizing Image Recognition: Next-Generation CNN Architectures for Handwritten Digits and Objects
Revolutionizing Image Recognition: Next-Generation CNN Archi...
收藏 引用
IEEE Symposium on Wireless Technology and Applications (ISWTA)
作者: Md Nurul Absur Kazi Fahim Ahmad Nasif Sourya Saha Sifat Nawrin Nova Department of Computer Science City University of New York New York USA College of Computing and Software Engineering Kennesaw State University Georgia USA Department of Computer Science Chalmers University of Technology Gothenburg Sweden
This study addresses the pressing need for computer systems to interpret digital media images with a level of sophistication comparable to human visual perception. By leveraging Convolutional Neural Networks (CNNs), w... 详细信息
来源: 评论