咨询与建议

限定检索结果

文献类型

  • 11,440 篇 会议
  • 5,236 篇 期刊文献
  • 234 册 图书

馆藏范围

  • 16,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,418 篇 工学
    • 8,307 篇 计算机科学与技术...
    • 6,880 篇 软件工程
    • 2,042 篇 信息与通信工程
    • 1,342 篇 控制科学与工程
    • 1,106 篇 生物工程
    • 834 篇 电气工程
    • 744 篇 生物医学工程(可授...
    • 706 篇 机械工程
    • 598 篇 电子科学与技术(可...
    • 566 篇 光学工程
    • 424 篇 安全科学与工程
    • 355 篇 仪器科学与技术
    • 348 篇 化学工程与技术
    • 331 篇 建筑学
    • 325 篇 动力工程及工程热...
  • 4,572 篇 理学
    • 2,665 篇 数学
    • 1,250 篇 生物学
    • 845 篇 物理学
    • 749 篇 统计学(可授理学、...
    • 634 篇 系统科学
    • 358 篇 化学
  • 3,207 篇 管理学
    • 1,955 篇 管理科学与工程(可...
    • 1,373 篇 图书情报与档案管...
    • 960 篇 工商管理
  • 724 篇 医学
    • 627 篇 临床医学
    • 562 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 499 篇 法学
    • 384 篇 社会学
  • 332 篇 教育学
    • 323 篇 教育学
  • 325 篇 经济学
    • 322 篇 应用经济学
  • 177 篇 农学
  • 72 篇 文学
  • 49 篇 军事学
  • 31 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,079 篇 computer science
  • 1,024 篇 software enginee...
  • 331 篇 deep learning
  • 303 篇 application soft...
  • 300 篇 computational mo...
  • 270 篇 data mining
  • 254 篇 machine learning
  • 245 篇 computer archite...
  • 232 篇 software
  • 221 篇 accuracy
  • 208 篇 feature extracti...
  • 203 篇 software systems
  • 196 篇 internet of thin...
  • 195 篇 training
  • 189 篇 support vector m...
  • 181 篇 programming
  • 170 篇 educational inst...
  • 170 篇 semantics
  • 168 篇 optimization
  • 166 篇 laboratories

机构

  • 357 篇 college of compu...
  • 200 篇 department of co...
  • 147 篇 state key labora...
  • 118 篇 department of co...
  • 116 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 87 篇 department of co...
  • 83 篇 school of inform...
  • 81 篇 department of co...
  • 75 篇 department of co...
  • 74 篇 department of co...
  • 71 篇 department of co...
  • 65 篇 school of comput...
  • 55 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 school of softwa...
  • 46 篇 department of co...
  • 45 篇 software enginee...
  • 44 篇 school of comput...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 32 篇 jiacun wang
  • 31 篇 shen furao
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 niyato dusit
  • 23 篇 christopher leck...
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 15,591 篇 英文
  • 1,210 篇 其他
  • 131 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 3 篇 罗马尼亚文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Department Computer Science& Software Engineering"
16910 条 记 录,以下是31-40 订阅
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
DocTTT: Test-Time Training for Handwritten Document Recognition Using Meta-Auxiliary Learning
DocTTT: Test-Time Training for Handwritten Document Recognit...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Gu, Wenhao Gu, Li Wang, Ziqiang Suen, Ching Yee Wang, Yang Concordia University Department of Computer Science and Software Engineering Canada
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r... 详细信息
来源: 评论
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4243-4262页
作者: Youseef Alotaibi B.Rajasekar R.Jayalakshmi Surendran Rajendran Department of Software Engineering College of ComputingUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Electronics and Communication Engineering Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Science and Engineering Panimalar Engineering CollegeChennai600123India Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Exploring AI Innovations in Automated software Source Code Generation: Progress, Hurdles, and Future Paths
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第8期48卷 125-136页
作者: Odeh, Ayman Odeh, Nada Software Engineering and Computer Science Department College of Engineering Al Ain University Al Jimi Al Ain United Arab Emirates
In today's dynamic world of software development, the demand for efficient and rapid creation of high-quality code has never been more pronounced. Automated software source code generation (ASSCG) emerges as a com... 详细信息
来源: 评论
ACOCA-G: scenario-based context query generation for evaluating performance of context management platforms
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-28页
作者: De Silva, Ravindi Zaslavsky, Arkady Loke, Seng W. Jayaraman, Prem Prakash Faculty of Information Technology Deakin University Melbourne Australia Department of Computer Science and Software Engineering Swinburne University Melbourne Australia
Context-awareness is a pivotal trend within the Internet of Things research area, facilitating the near real-time processing and interpretation of relevant sensor data to enhance data processing efficiency. Context Ma... 详细信息
来源: 评论
Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging:Comparative Analysis of 2D,2.5D,and 3D Approaches Using UNet Transformer
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 2351-2373页
作者: Mohammed A.Mahdi Shahanawaj Ahamad Sawsan A.Saad Alaa Dafhalla Alawi Alqushaibi Rizwan Qureshi Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PetronasSeri Iskandar32610Malaysia Center for Research in Computer Vision(CRCV) University of Central FloridaOrlandoFL 32816USA
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p... 详细信息
来源: 评论
A Common Declarative Language for UML State Machine Representation, Model Transformation, and Interoperability of Visualization Tools  1st
A Common Declarative Language for UML State Machine Represe...
收藏 引用
1st International Symposium on software Fault Prevention, Verification, and Validation, SFPVV 2024
作者: Jannatpour, Ali Constantinides, Constantinos Department of Computer Science and Software Engineering Concordia University Montreal Canada
Originally presented in previous work to capture the set of fundamental elements of the UML state machine specification, Common Declarative Language (CDL) provides a model that can aid in the validation and verificati... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论