咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,452 篇 计算机科学与技术...
    • 1,209 篇 软件工程
    • 358 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 164 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 83 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 569 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 159 篇 医学
    • 142 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 67 篇 computational mo...
  • 63 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 38 篇 optimization
  • 38 篇 data models

机构

  • 125 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 31 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,719 篇 英文
  • 157 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是771-780 订阅
排序:
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
Electrical, Computer and Energy Technologies (ICECET), International Conference on
作者: Imran Khan Fazlullah Khan Asad Ali Bandar Alshawi Ryan Alturki Mohammad Wedyan Computer Science Department Abdul Wali Khan University Mardan KPK Pakistan Faculty of Science and Engineering School of Computer Science University of Nottingham Ningbo China Zhejiang China Department of Computer Science University of Engineering and Technology Peshawar KPK Pakistan Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Computer Sciences Faculty of Information Technology and Computer Sciences Yarmouk University (YU) Irbid Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
Lessons Learned from Persona Usage in Requirements engineering Practice
Lessons Learned from Persona Usage in Requirements Engineeri...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Devi Karolita John C. Grundy Tanjila Kanij Jennifer McIntosh Humphrey O. Obie Department Informatics Engineering Faculty of Engineering Palangka Raya University Palangka Raya Indonesia Department of Software Systems and Cybersecurity Faculty of IT Monash University Melbourne Australia School of Science Computing and Engineering Technologies Swinburne University of Technology Melbourne Australia Melbourne School of Population and Global Health University of Melbourne Melbourne Australia Telstra Health Melbourne Australia
Personas, as a tool for characterising end-users, are widely utilised in requirements engineering (RE), primarily to enhance the understanding of end-users and their needs. However, the efficacy of persona usage in RE... 详细信息
来源: 评论
Online Dynamic Cyber-Attack Diagnosis in Power Electronics Systems Based on Few-Shot Learning
Online Dynamic Cyber-Attack Diagnosis in Power Electronics S...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Qi Li Jinan Zhang Jin Ye Liang Zhao Tianqi Hong Jamie Lian Beshoy Morkos Hongyue Sun Feraidoon Zahiri Chris Farnell Alan Mantooth WenZhan Song Center for Cyber-Physical Systems University of Georgia Athens Georgia College of Computing and Software Engineering Kennesaw State University Marietta GA 402 CMXG/MXDEO Robins Air Force Base Warner Robins GA Department of Electrical Engineering University Arkansas Fayetteville AR
With increasing exposure to software-based sensing and control, power electronics systems are facing higher risks of cyber-physical attacks. To ensure system stability and minimize potential economic losses, it is cri... 详细信息
来源: 评论
Reinforced Learning for Label-Efficient 3D Face Reconstruction
Reinforced Learning for Label-Efficient 3D Face Reconstructi...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Hoda Mohaghegh Hossein Rahmani Hamid Laga Farid Boussaid Mohammed Bennamoun School of Computer Science and Software Engineering University of Western Australia Australia Department of Computing and Communications Lancaster University England Information Technology Discipline Murdoch University Australia School of Engineering Electrical Electronic and Computer Engineering University of Western Australia Australia
3D face reconstruction plays a major role in many human-robot interaction systems, from automatic face authentication to human-computer interface-based entertainment. To improve robustness against occlusions and noise...
来源: 评论
A Framework for Analyzing Context-Oriented Programming Languages
SSRN
收藏 引用
SSRN 2022年
作者: Elyasaf, Achiya Cardozo, Nicolás Sturm, Arnon Software and Information Systems Engineering Department Ben-Gurion University of the Negev Beer-Sheva Israel Systems and Computing Engineering Department Universidad de los Andes Bogota Colombia
Context-aware systems keep on emerging as an intrinsic part of everyday activities. To cope with such situations, programming languages are extended to support the notion of context developing the context-oriented pro... 详细信息
来源: 评论
Improved Traffic Filtering for IoT Security  5
Improved Traffic Filtering for IoT Security
收藏 引用
5th IEEE International Conference on Electro-computing Technologies for Humanity, NIGERCON 2024
作者: Ovili, Henry Peter Okpor, Margaret Nwanze, N.E. Olayinka, Tosin Ojei, Emmanuel Nwankwo, Wilson Delta State University of Science and Technology Department of Information Systems & Technology Ozoro Nigeria Delta State University of Science and Technology Department of Cyber Security Ozoro Nigeria Delta State University of Science and Technology Faculty of Engineering Marine Engineering Department Ozoro Nigeria Wellspring University Department of Computing Benin City Nigeria Delta State University of Science and Technology Department of Software Engineering Ozoro Nigeria
This research presents an advanced traffic filtering technique using a Support Vector Machine (SVM) model to enhance IoT network security, achieving 85% accuracy, with high precision (87%) and recall (96%) in identify... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching  39
DAMPER: A Dual-Stage Medical Report Generation Framework wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Integrating Mobile Edge computing into Unmanned Aerial Vehicle Networks: An Sdn-Enabled Architecture
收藏 引用
IEEE Internet of Things Magazine 2021年 第4期4卷 18-23页
作者: Lin, Chuan Han, Guangjie Shah, Syed Bilal Hussain Zou, Yan Gou, Linfeng Software College Northeastern University China Hohai University Department of Internet of Things Engineering China School of Computing and Mathematics Manchester Metropolitan University United Kingdom School of Power and Energy Shenyang Aircraft Design and Research Institute China Northwestern Polytechnical University China
Over the past few years, we have witnessed an exponential increase in demand for seamless and continuous Internet access to online services - multimedia services, online business, gaming, scientific analysis, and so o... 详细信息
来源: 评论
PolyLite: A Lightweight Transformer With Multi-Scale Attention for Colorectal Polyp Segmentation
PolyLite: A Lightweight Transformer With Multi-Scale Attenti...
收藏 引用
International Conference on software, Knowledge Information, Industrial Management and Applications (SKIMA)
作者: Khaled ELKarazle Valliappan Raman Caslon Chua Patrick Then Faculty of Engineering Computing and Science Swinburne University of Technology (Sarawak Campus) Sarawak Malaysia Department of Artificial Intelligence and Data Science Coimbatore Institute of Technology Tamil Nadu India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The urgent need for early detection and intervention in colorectal cancer highlights the importance of automating colorectal polyp detection. Despite the use of deep learning techniques for polyp detection from medica...
来源: 评论
Research on perimeter intrusion monitoring technology of high-speed railway based on multi-source heterogeneous data fusion  24
Research on perimeter intrusion monitoring technology of hig...
收藏 引用
4th International Conference on Big Data, Artificial Intelligence and Risk Management, ICBAR 2024
作者: Li, Wentao Yu, Tao Zhang, Bo Fu, Huijin Graduate Department China Academy of Railway Sciences Beijing China School of Automation and Software Engineering Shanxi University Shanxi Taiyuan China Institute of Computing Technologies China Academy of Railway Sciences Group Co. Ltd. Beijing China
Aiming at the defects of a single protection technology for high-speed railway perimeter intrusion, such as poor environmental adaptability and difficult technical shortcomings to improve, this paper conducted an in-d... 详细信息
来源: 评论