咨询与建议

限定检索结果

文献类型

  • 4,176 篇 会议
  • 2,740 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 7,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,444 篇 工学
    • 3,401 篇 计算机科学与技术...
    • 2,720 篇 软件工程
    • 877 篇 信息与通信工程
    • 701 篇 控制科学与工程
    • 471 篇 生物工程
    • 448 篇 电气工程
    • 325 篇 机械工程
    • 313 篇 生物医学工程(可授...
    • 281 篇 电子科学与技术(可...
    • 221 篇 光学工程
    • 174 篇 仪器科学与技术
    • 166 篇 动力工程及工程热...
    • 162 篇 网络空间安全
    • 141 篇 建筑学
    • 136 篇 安全科学与工程
  • 2,003 篇 理学
    • 1,043 篇 数学
    • 534 篇 生物学
    • 503 篇 物理学
    • 318 篇 统计学(可授理学、...
    • 267 篇 系统科学
    • 156 篇 化学
  • 1,510 篇 管理学
    • 937 篇 管理科学与工程(可...
    • 680 篇 图书情报与档案管...
    • 531 篇 工商管理
  • 364 篇 医学
    • 306 篇 临床医学
    • 256 篇 基础医学(可授医学...
    • 167 篇 公共卫生与预防医...
  • 253 篇 法学
    • 213 篇 社会学
  • 193 篇 经济学
    • 191 篇 应用经济学
  • 157 篇 教育学
    • 147 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 23 篇 艺术学
  • 19 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 197 篇 deep learning
  • 181 篇 machine learning
  • 147 篇 computational mo...
  • 131 篇 artificial intel...
  • 123 篇 information syst...
  • 112 篇 training
  • 107 篇 software enginee...
  • 106 篇 accuracy
  • 100 篇 internet of thin...
  • 99 篇 semantics
  • 95 篇 cloud computing
  • 93 篇 feature extracti...
  • 90 篇 software
  • 88 篇 data mining
  • 85 篇 information tech...
  • 85 篇 security
  • 84 篇 predictive model...
  • 83 篇 data models
  • 78 篇 optimization
  • 75 篇 educational inst...

机构

  • 176 篇 school of comput...
  • 52 篇 school of comput...
  • 41 篇 state key labora...
  • 39 篇 information syst...
  • 39 篇 university of ch...
  • 37 篇 department of in...
  • 37 篇 school of comput...
  • 36 篇 department of in...
  • 36 篇 school of inform...
  • 31 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 26 篇 college of intel...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 25 篇 faculty of infor...
  • 25 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 32 篇 buyya rajkumar
  • 31 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 xiong zehui
  • 25 篇 ismail leila
  • 23 篇 john grundy
  • 22 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 20 篇 lo david
  • 18 篇 abdelwahed motwa...
  • 18 篇 zidong wang
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao
  • 17 篇 abdelaziz a.abde...

语言

  • 6,387 篇 英文
  • 602 篇 其他
  • 60 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 2 篇 罗马尼亚文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
7042 条 记 录,以下是251-260 订阅
Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition  21
Texture and Orientation-based Feature Extraction for Robust ...
收藏 引用
21st IEEE/ACIS International Conference on software Engineering Research, Management and Applications, SERA 2023
作者: Khan, Sajid Ali Bin Abdulrahman Alawairdhi, Mohammed Al-Akhras, Mousa Foundation University Islamabad Department of Software Engineering Islamabad Pakistan Saudi Electronic University College of Computing and Informatics Saudi Arabia The University of Jordan Amman King Abdullah II School for Information Technology Computer Information Systems Department Jordan
Facial expressions are the most effective way to characterize people's motives, emotions, and feelings. Several new methods are proposed each year;however, the accuracy of facial expression recognition still needs... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论
Elevating Localization Accuracy in Wireless Sensor Networks:A Refined DV-Hop Approach
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1511-1528页
作者: Muhammad Aamer Ejaz Kamalrulnizam Abu Bakar Ismail Fauzi Bin Isnin Babangida Isyaku Taiseer Abdalla Elfadil Eisa Abdelzahir Abdelmaboud Asma Abbas Hassan Elnour Department of Computer Science Faculty of ComputingUniversiti Technologi MalaysiaJohor Bahru81310Malaysia Department of Computer Science Faculty of Computing and Information TechnologySule Lamido UniversityP.M.B.048Kafin Hausa741103Nigeria Department of Information Systems-Girls Section King Khalid UniversityMahayil62529Saudi Arabia Humanities Research Center Sultan Qaboos UniversityMuscat123Oman
Localization is crucial in wireless sensor networks for various applications,such as tracking objects in outdoor environments where GPS(Global Positioning System)or prior installed infrastructure is ***,traditional te... 详细信息
来源: 评论
Evaluating software Development Agents: Patch Patterns, Code Quality, and Issue Complexity in Real-World GitHub Scenarios
Evaluating Software Development Agents: Patch Patterns, Code...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Zhi Chen Lingxiao Jiang Centre for Research on Intelligent Software Engineering School of Computing and Information Systems Singapore Management University
In recent years, AI-based software engineering has progressed from pre-trained models to advanced agentic workflows, with software Development Agents representing the next major leap. These agents, capable of reasonin... 详细信息
来源: 评论
software Defect Prediction Harnessing on Multi 1-Dimensional Convolutional Neural Network Structure
收藏 引用
Computers, Materials & Continua 2022年 第4期71卷 1521-1546页
作者: Zuhaira Muhammad Zain Sapiah Sakri Nurul Halimatul Asmak Ismail Reza M.Parizi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Computer Science and Information Technology College of CommunityPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia College of Computing and Software Engineering Kennesaw State UniversityMariettaGA30060USA
Developing successful software with no defects is one of the main goals of software *** order to provide a software project with the anticipated software quality,the prediction of software defects plays a vital *** le... 详细信息
来源: 评论
MuLAD: Multimodal Aggression Detection from Social Media Memes Exploiting Visual and Textual Features  27th
MuLAD: Multimodal Aggression Detection from Social Media Me...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Hasan, Md. Maruf Ahsan, Shawly Hoque, Mohammed Moshiul Dewan, M. Ali Akber Chittagong University of Engineering and Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada
Aggression detection from memes is challenging due to their region-specific interpretation and multimodal nature. Detecting or classifying aggressive memes is complicated in low-resource languages (including... 详细信息
来源: 评论
Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System
收藏 引用
Computer systems Science & Engineering 2023年 第11期47卷 2497-2512页
作者: Mahmoud Ragab Sultanah M.Alshammari Abdullah S.Al-Malaise Al-Ghamdi Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
The Internet of Things(IoT)system has confronted dramatic growth in high dimensionality and data *** system named intrusion detection systems(IDS)is broadly utilized for the enhancement of security posture in an IT **... 详细信息
来源: 评论
Wave Density Spectra Estimation with LSTM from Sentinel-1 SAR in the Baltic Sea  13
Wave Density Spectra Estimation with LSTM from Sentinel-1 SA...
收藏 引用
13th IEEE/OES Current, Waves and Turbulence Measurement, CWTM 2024
作者: Rikka, Sander Nomm, Sven Alari, Victor Simon, Martin Bjorkqvist, Jan-Victor Tallinn University of Technology School of Science Department of Marine Systems Tallinn Estonia Tallinn University of Technology School of Information Technology Department of Software Science Tallinn Estonia Norwegian Meteorological Institute Bergen Norway
Surface wave spectra estimation from Synthetic Aperture Radar (SAR) data has been a subject of many studies. In the open ocean, where high-resolution Wave Mode data capture predominately swell waves, various inverse m... 详细信息
来源: 评论
Enhanced Sample Selection with Confidence Tracking: Identifying Correctly Labeled yet Hard-to-Learn Samples in Noisy Data  39
Enhanced Sample Selection with Confidence Tracking: Identify...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Pan, Weiran Wei, Wei Zhu, Feida Deng, Yong School of Computer Science and Technology Huazhong University of Science and Technology China China School of Computing and Information Systems Singapore Management University Singapore State Grid Fujian Electric Power Co. China
We propose a novel sample selection method for image classification in the presence of noisy labels. Existing methods typically consider small-loss samples as correctly labeled. However, some correctly labeled samples...
来源: 评论
Data-centric-infrastructure Functional Architecture
收藏 引用
NTT Technical Review 2022年 第5期20卷 24-31页
作者: Masutani, Hitoshi Schumacher, Christoph Takasugi, Koichi Network Service Platform Research Group Core Network Technology Research Project NTT Network Service Systems Laboratories Japan Computing Systems Group System Software Project NTT Software Innovation Center Japan Frontier Communication Laboratory NTT Network Innovation Laboratories Japan
Society is changing at a rapid pace due to technical innovations in Internet technologies and cloud computing. In the near future, ever-more refined artificial-intelligence applications are expected, working on ever-l... 详细信息
来源: 评论