咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,452 篇 计算机科学与技术...
    • 1,209 篇 软件工程
    • 358 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 164 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 83 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 569 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 159 篇 医学
    • 142 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 67 篇 computational mo...
  • 63 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 38 篇 optimization
  • 38 篇 data models

机构

  • 125 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 31 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,719 篇 英文
  • 157 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是981-990 订阅
排序:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
Development of Blockchain-based e-Voting System: Requirement...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Md Jobair Hossain Faruk Bilash Saha Mazharul Islam Fazlul Alam Hossain Shahriar Maria Valero Akond Rahman Fan Wu Zakirul Alam Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department of Computing Sultan Idris Education University Malaysia Department of Computer Science and Engineering Daffodil International University Bangladesh Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA Department of Computer and Information Sciences Fordham University USA
Elections make a fundamental contribution to democratic governance and are very important to select the appropriate person to determine the fate of a nation while a large number of citizens do not trust the ballot-pap... 详细信息
来源: 评论
Realizing Emotional Interactions to Learn User Experience and Guide Energy Optimization for Mobile Architectures  22
Realizing Emotional Interactions to Learn User Experience an...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Xueliang Li Zhuobin Shi Junyang Chen Yepang Liu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation and Department of Computer Science and Engineering Southern University of Science and Technology China
In the age of AI, mobile architectures such as smartphones are still "cold machines"; machines do not feel. If the architecture is able to feel users' feelings and runtime user experience (UX), it will a...
来源: 评论
Infrastructure and city ontologies
收藏 引用
Proceedings of the Institution of Civil Engineers: Smart Infrastructure and Construction 2022年 第2期176卷 43-52页
作者: Varga, Liz McMillan, Lauren Hallett, Stephen Russell, Tom Smith, Luke Truckell, Ian Postnikov, Andrey Rodger, Sunil Vizcaino, Noel Perkins, Bethan Matthews, Brian Lomax, Nik Department of Civil Environmental and Geomatic Engineering Infrastructure Systems Institute University College London London United Kingdom School of Water Energy and Environment Cranfield University Cranfield United Kingdom Environmental Change Institute Oxford University Oxford United Kingdom Software Engineering Department De la Rue Team Valley Trading Estate Gateshead United Kingdom Lincoln Agri-Robotics University of Lincoln Lincoln United Kingdom Zentrum Klinische Studien Universitätsklinikum Freiburg Freiburg Germany Scientific Computing Department Science and Technology Facilities Council Uk Research and Innovation Rutherford Appleton Laboratory Harwell Campus Didcot United Kingdom School of Geography University of Leeds Leeds United Kingdom
The creation and use of ontologies has become increasingly relevant for complex systems in recent years. This is because of the growing number of use of cases that rely on real-world integration of disparate systems, ... 详细信息
来源: 评论
Research on experimental method of high-speed railway perimeter intrusion monitoring technology based on multi-sensor fusion  24
Research on experimental method of high-speed railway perime...
收藏 引用
4th International Conference on Big Data, Artificial Intelligence and Risk Management, ICBAR 2024
作者: Yang, Xue Zhang, Bo Yu, Tao Liang, Ye Zhang, Wanpeng Li, Wentao Institute of Computing Technologies China Academy of Railway Sciences Corporation Limited Beijing China School of Automation and Software Engineering Shanxi University Shanxi Taiyuan China China Railway Nanchang Group Co. Ltd. Jiangxi Nanchang China Graduate Department China Academy of Railway Sciences Beijing China
In recent years, China's high-speed railway has achieved rapid development, and has become the largest and fastest high-speed railway country in the world. By the end of 2023, the operating mileage has reached 159... 详细信息
来源: 评论
UX Definitions: The Missing Components and the Need for the Context and Time of Use  13
UX Definitions: The Missing Components and the Need for the ...
收藏 引用
13th International Conference on computing Communication and Networking Technologies, ICCCNT 2022
作者: Mkpojiogu, Emmanuel O.C. Okeke-Uzodike, Obianuju E. Emmanuel, Emelda I. Eze, Chika Universiti Utara Malaysia School of Computing Sintok06010 UUM Malaysia Veritas University Department of Software Engineering Abuja Nigeria Durban University of Technology Faculty of Management Sciences Department of Applied Management KwaZulu-Natal Pietermaritzburg South Africa Ibrahim Badamasi Babangida University Faculty of Management and Social Science Department of Sociology Niger State Lapai Nigeria Veritas University Abuja Faculty of Education Department of Educational Foundations Guidance and Counselling Unit Abuja Nigeria
There are several definitions for user experience (UX). However, this study unveiled that there are missing components in those definitions. An analysis of user experience definitions shows that the definitions had th... 详细信息
来源: 评论
Next-Generation Human Activity Recognition Using Locality Constrained Linear Coding Combined With Machine Learning (NG-HAR-LCML)
收藏 引用
Healthcare Technology Letters 2025年 第1期12卷
作者: Shabbir, Maryam Ahmad, Fahad Alanazi, Saad Awadh Khan, Muhammad Hassan Li, Jianqiang Mahmood, Tariq Naseem, Shahid Anwar, Muhammad Department of Computer Sciences Bahria University Punjab Lahore Pakistan Department of Computer Science Faculty of Computing & Information Technology University of the Punjab Lahore Pakistan School of Computing Faculty of Technology University of Portsmouth Portsmouth United Kingdom University of Portsmouth Portsmouth United Kingdom Department of Computer Science College of Computer and Information Sciences Jouf University Aljouf Sakaka Saudi Arabia The School of Software Engineering Beijing University of Technology Beijing China Lab CCIS Prince Sultan University Riyadh Saudi Arabia Department of Information Sciences University of Education Vehari Pakistan Faculty of Information Sciences Division Science &Technology University of Education Lahore Pakistan
Accurate Human Activity Recognition (HAR) is a critical challenge with wide-ranging applications in healthcare, assistive technologies, and human-computer interaction. Traditional feature extraction methods often stru... 详细信息
来源: 评论
A Cooperative Co-Evolution Algorithm with Variable-Importance Grouping for Large-Scale Optimization
A Cooperative Co-Evolution Algorithm with Variable-Importanc...
收藏 引用
Congress on Evolutionary Computation
作者: Yongfeng Li Yuze Zhang Lijia Ma Junkai Ji Dugang Liu Victor C. M. Leung Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Cooperative co-evolution (CC) is a promising direction in solving large-scale multiobjective optimization problems (LMOPs). However, most existing methods of grouping decision variables face some difficulties when sea... 详细信息
来源: 评论
Generative Adversarial Network-Based Network Intrusion Detection System for Supervisory Control and Data Acquisition System
Generative Adversarial Network-Based Network Intrusion Detec...
收藏 引用
IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)
作者: Hong Nhung Nguyen Thi Lan-Phan Chai-Jong Song Department of AI and Software Engineering School of Computing Gachon University Seongnam-si Gyeonggi-do Republic of Korea Division of Information Technology Viet Nam - Korea Institute of Science and Technology Thach That Ha Noi Vietnam Information Media Research Center Korea Electronics Technology Institute Seoul Korea
In the context of burgeoning cyber threats targeting Supervisory Control and Data Acquisition (SCADA) systems, this paper presents a pioneering Intrusion Detection System (IDS) grounded in Generative Adversarial Netwo... 详细信息
来源: 评论
Offsite Evaluation of Localization Systems: Criteria, Systems, and Results From IPIN 2021 and 2022 Competitions
IEEE Journal on Indoor and Seamless Positioning and Navigati...
收藏 引用
IEEE Journal on Indoor and Seamless Positioning and Navigation 2024年 2卷 92-129页
作者: Potorti, Francesco Crivello, Antonino Lee, Soyeon Vladimirov, Blagovest Park, Sangjoon Chen, Yushi Wang, Long Chen, Runze Zhao, Fang Zhuge, Yue Luo, Haiyong Perez-Navarro, Antoni Jimenez, Antonio R. Wang, Han Liang, Hengyi De Cock, Cedric Plets, David Cui, Yan Xiong, Zhi Li, Xiaodong Ding, Yiming Franco, Fernando Javier Alvarez Polo, Fernando Jesus Aranda Rodriguez, Felipe Parralejo Moreira, Adriano Pendao, Cristiano Silva, Ivo Ortiz, Miguel Zhu, Ni Li, Ziyou Renaudin, Valerie Wei, Dongyan Ji, Xinchun Zhang, Wenchao Wang, Yan Ding, Longyang Kuang, Jian Zhang, Xiaobing Dou, Zhi Yang, Chaoqun Kram, Sebastian Stahlke, Maximilian Mutschler, Christopher Coene, Sander Li, Chenglong Venus, Alexander Leitinger, Erik Tertinek, Stefan Witrisal, Klaus Wang, Yi Wang, Shaobo Jin, Beihong Zhang, Fusang Su, Chang Wang, Zhi Li, Siheng Li, Xiaodong Li, Shitao Pan, Mengguan Zheng, Wang Luo, Kai Ma, Ziyao Gao, Yanbiao Chang, Jiaxing Ren, Hailong Guo, Wenfang Torres-Sospedra, Joaquin Pisa56124 Italy Electronics and Telecommunications Research Institute Daejeon34129 Korea Republic of Beijing University of Posts and Telecommunications School of Computer Science National Pilot Software Engineering School Beijing100876 China Chinese Academy of Sciences Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Beijing100190 China Universitat Oberta de Catalunya Faculty of Computer Sciences Multimedia and Telecommunication Barcelona08035 Spain Arganda del Rey28500 Spain Huawei Technologies Company Ltd. Shenzhen100015 China IMEC-WAVES/Ghent University Department of Information Technology Gent9052 Belgium Nanjing University of Aeronautics and Astronautics College of Automation Nanjing210016 China University of Extremadura Badajoz06006 Spain University of Trás-os-Montes and Alto Douro Department of Engineering School of Sciences and Technology Vila Real5000-801 Portugal Universidade Do Minho Centro Algoritmi Guimarães4800-058 Portugal Ame Department of the University Gustave Eiffel Geoloc Laboratory Bouguenais44344 France Chinese Academy of Sciences Aerospace Information Research Institute Beijing100094 China Wuhan University Gnss Research Center Wuhan430072 China AutoNavi Software Company Ltd. China Fraunhofer Institute for Integrated Circuits Iis Fraunhofer Iis Nuremberg90411 Germany Erlangen91058 Germany Graz University of Technology Christian Doppler Laboratory for Location-Aware Electronic Systems Graz8010 Austria Institute of Software Chinese Academy of Sciences Beijing100190 China Purple Mountain Laboratories Pervasive Communication Research Center Nanjing210000 China Beijing University of Posts and Telecommunications Beijing100876 China
Indoor positioning is a thriving research area, which is slowly gaining market momentum. Its applications are mostly customized, ad hoc installations;ubiquitous applications analogous to Global Navigation Satellite Sy... 详细信息
来源: 评论
Deepfake Detection Using EfficientNet and XceptionNet
Deepfake Detection Using EfficientNet and XceptionNet
收藏 引用
IEEE International Conference on Intelligent computing and Information Systems (ICICIS)
作者: Basma Yasser Jumana Hani Salma El-Gayar Omar Amgad Nourhan Ahmed Hala M. Ebied Habiba Amr Mohamed Salah Software Engineering Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Computer Science Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt
The increasing prevalence of manipulated media, particularly deepfake videos, poses significant challenges in distinguishing real from fake content. This paper addresses the issue of detecting deepfake videos using ad...
来源: 评论