咨询与建议

限定检索结果

文献类型

  • 4,017 篇 会议
  • 2,556 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 6,620 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,161 篇 工学
    • 2,746 篇 计算机科学与技术...
    • 2,210 篇 软件工程
    • 799 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 528 篇 电气工程
    • 454 篇 电子科学与技术(可...
    • 342 篇 生物工程
    • 337 篇 机械工程
    • 295 篇 光学工程
    • 281 篇 生物医学工程(可授...
    • 212 篇 仪器科学与技术
    • 212 篇 动力工程及工程热...
    • 165 篇 化学工程与技术
    • 144 篇 材料科学与工程(可...
    • 129 篇 交通运输工程
    • 123 篇 土木工程
    • 108 篇 建筑学
  • 2,032 篇 理学
    • 1,130 篇 数学
    • 511 篇 物理学
    • 413 篇 生物学
    • 299 篇 统计学(可授理学、...
    • 271 篇 系统科学
    • 181 篇 化学
  • 1,087 篇 管理学
    • 681 篇 管理科学与工程(可...
    • 440 篇 图书情报与档案管...
    • 293 篇 工商管理
  • 252 篇 医学
    • 215 篇 临床医学
    • 169 篇 基础医学(可授医学...
    • 113 篇 药学(可授医学、理...
  • 138 篇 法学
    • 101 篇 社会学
  • 98 篇 经济学
  • 51 篇 农学
  • 44 篇 教育学
  • 21 篇 文学
  • 20 篇 军事学
  • 14 篇 艺术学

主题

  • 303 篇 laboratories
  • 300 篇 computer science
  • 236 篇 software enginee...
  • 140 篇 application soft...
  • 135 篇 data mining
  • 112 篇 computational mo...
  • 105 篇 feature extracti...
  • 95 篇 costs
  • 94 篇 quality of servi...
  • 91 篇 semantics
  • 86 篇 computer archite...
  • 84 篇 algorithm design...
  • 81 篇 deep learning
  • 81 篇 wireless sensor ...
  • 81 篇 software
  • 78 篇 software systems
  • 78 篇 testing
  • 77 篇 software testing
  • 75 篇 protocols
  • 74 篇 optimization

机构

  • 225 篇 state key labora...
  • 156 篇 college of compu...
  • 117 篇 department of co...
  • 97 篇 national enginee...
  • 71 篇 state key labora...
  • 70 篇 department of co...
  • 68 篇 school of softwa...
  • 62 篇 department of co...
  • 54 篇 department of co...
  • 51 篇 state key labora...
  • 50 篇 peng cheng labor...
  • 47 篇 national key lab...
  • 43 篇 key laboratory o...
  • 43 篇 shanghai key lab...
  • 42 篇 university of ch...
  • 39 篇 tsinghua nationa...
  • 35 篇 school of comput...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 31 篇 state key labora...

作者

  • 52 篇 rajkumar buyya
  • 44 篇 shen linlin
  • 43 篇 junping du
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 33 篇 yu huiqun
  • 29 篇 shen furao
  • 29 篇 fan guisheng
  • 28 篇 zhao jian
  • 27 篇 zhou mengchu
  • 25 篇 chen shu-ching
  • 25 篇 baowen xu
  • 23 篇 yang yang
  • 22 篇 hamid soltanian-...
  • 21 篇 sylvain martel
  • 21 篇 xu baowen
  • 21 篇 zongli lin
  • 21 篇 buyya rajkumar
  • 20 篇 mengchu zhou
  • 20 篇 ji zhen

语言

  • 5,981 篇 英文
  • 516 篇 其他
  • 125 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering System Software Laboratory"
6620 条 记 录,以下是611-620 订阅
排序:
Heterogeneous Laplace Distribution Noise Background Modeling for Sperm Detection in Microscopic Images  9
Heterogeneous Laplace Distribution Noise Background Modeling...
收藏 引用
9th International Conference on computer and Communications, ICCC 2023
作者: Tian, Manqing Zhao, Yang Zeng, Ni Kang, Xiaomei Pei, Jihong Yang, Xuan Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen China Shenzhen University College of Computer Science and Software Engineering Shenzhen China Huazhong University of Science and Technology Tongji Medical College Department of Reproductive Maternal and Child Health Hospital of Hubei Province Wuhan China
Semen quality assessment is a very important tool for the timely detection and treatment of infertility disorders. Many artificial intelligence methods for sperm image analysis have emerged in recent years. Sperm dete... 详细信息
来源: 评论
Verification Tool for Securing RISC-V FPGA-Based Process Control system
Verification Tool for Securing RISC-V FPGA-Based Process Con...
收藏 引用
Intermountain engineering, Technology and Computing (IETC)
作者: Christine Johnson Ann Marie Reinhold Clemente Izurieta Bradley M. Whitaker Brock LaMeres Software Engineering and Cybersecurity Laboratory Montana State University Bozeman MT USA Pacific Northwest National Laboratory Richland WA USA Idaho National Laboratory Idaho Falls ID USA Electrical & Computer Engineering Department Montana State University Bozeman MT USA
Industrial Control systems (ICSs) are a crucial component of critical infrastructure and a popular target for cyberattacks. While most research focuses on the defense of large-scale networks of ICSs, it is critical to... 详细信息
来源: 评论
Learning a Typhoon Bayesian Network Structure from Natural Language Reports  5th
Learning a Typhoon Bayesian Network Structure from Natural...
收藏 引用
5th IFIP TC 12 International Conference on Intelligence Science, ICIS 2022
作者: Yao, Zhangrui Chen, Junhan Pan, Yinghui Zeng, Yifeng Ma, Biyang Ming, Zhong Department of Automation and Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision-Making Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer and Information Sciences Northumbria University Newcastle upon Tyne United Kingdom School of Computer Science and Engineering Minnan Normal University Zhangzhou China
Given the huge toll caused by natural disasters, it is critically important to develop an effective disaster management and emergency response technique. In this article, we investigate relationships between typhoon-r... 详细信息
来源: 评论
Anomaly Detection for Multivariate Time Series Based on Contrastive Learning and Autoformer
Anomaly Detection for Multivariate Time Series Based on Cont...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xuwen Shang Jue Zhang Xingguo Jiang Hong Luo Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Department of Computer Science and Engineering Beihang University Beijing China
Nowadays, due to the increasingly complex and huge data flow, anomaly detection has become an important technology to ensure the high security and reliability of the systems. It helps identify unusual observations in ... 详细信息
来源: 评论
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Docu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zeshi Zhang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Ministry of Education Key Laboratory of Computer Vision and System China Faculty of Engineering University of Bristol Bristol U.K.
Due to cloud security concerns, there is an increasing interest in information retrieval systems that can support private queries over public documents. It is desirable for oblivious document ranking and retrieval in ... 详细信息
来源: 评论
Novel Generation Injection Solution for Security Constrained Optimal Power Flow of Utility Practical Transmission Utility Network  5
Novel Generation Injection Solution for Security Constrained...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Singh, Bhoori Sharma, Avdhesh Garg, Akhil Ranjan Mahela, Om Prakash Khan, Baseem Mbm University Department of Electrical Engineering Jodhpur India Rajasthan Rajya Vidyut Prasaran Nigam Ltd. Power System Planning Division Jaipur India Innovader Research Labs Innovader IITian Padhaiwala LearnlAb Pvt. Ltd. Jaipur India Hawassa University Department of Electrical and Computer Engineering Ethiopia Center for Renewable Energy and Microgrids Huanjiang Laboratory Zhejiang University Zhuji311816 China Western Caspian University Department of Technical Sciences Baku Azerbaijan
The security constrained optimal power flow (SCOPF) optimally configures and dispatches the power system in normal conditions to ensure that steady-state operating conditions do not exceed the emergency ratings when c... 详细信息
来源: 评论
Unsupervised Mapping of Quantitative Measures to Qualitative Characteristics in Hierarchical software Quality Assurance
Unsupervised Mapping of Quantitative Measures to Qualitative...
收藏 引用
Intermountain engineering, Technology and Computing (IETC)
作者: Kaveen Liyanage Ethan L. Gerard Derek Reimanis Ann Marie Reinhold Clemente Izurieta Brock J. LaMeres Bradley M. Whitaker Department of Electrical and Computer Engineering Montana State University Bozeman MT USA Software Engineering and Cybersecurity Laboratory Montana State University Bozeman MT USA Pacific Northwest National Laboratory Richland WA USA Idaho National Laboratory Idaho Falls ID USA
Ensuring software quality is essential to the software development and deployment process. Evaluating software for known vulnerabilities and weaknesses is a method of assessing the quality of software. However, the ex... 详细信息
来源: 评论
When Sign Language Meets Semantic Communications  35
When Sign Language Meets Semantic Communications
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kouvakis, Vasileios Trevlakis, Stylianos E. Boulogeorgos, Alexandros-Apostolos A. Tsiftsis, Theodoros Singh, Keshav Qi, Nan InnoCube P.C. Department of Research and Development 17th Noemvriou 79 Thessaloniki55535 Greece University of Western Macedonia Department of Electrical and Computer Engineering Kozani50100 Greece University of Thessaly Department of Informatics & Telecommunications Lamia35100 Greece Institute of Communications Engineering National Sun Yat-sen University Kaohsiung804 Taiwan Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Nanjing210016 China
This paper presents an American sign language (ASL) semantic communications scheme. The scheme consists of a semantic encoder that leverages a convolutional neural network to effectively utilize the ASL alphabet. The ... 详细信息
来源: 评论
Towards Survivable In-Memory Stores with Parity Coded NVRAM
Towards Survivable In-Memory Stores with Parity Coded NVRAM
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhixuan Wang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Engineering University of Bristol Bristol U.K.
Erasure codes have been widely applied to in-memory key-value storage systems for high reliability and low redundancy. In distributed in-memory key-value storage systems, update operations are relatively frequent, esp... 详细信息
来源: 评论
IEEE T-BIOM Editorial Board Changes
IEEE Transactions on Biometrics, Behavior, and Identity Scie...
收藏 引用
IEEE Transactions on Biometrics, Behavior, and Identity Science 2024年 第1期7卷 1-2页
作者: Naser Damer Weihong Deng Jianjiang Feng Vishal M. Patel Ajita Rattani Mark Nixon Smart Living & Biometric Technologies Fraunhofer Institute for Computer Graphics Research IGD Darmstadt Germany Pattern Recognition and Intelligent System Laboratory Beijing University of Posts and Telecommunications Beijing China Department of Automation Tsinghua University Beijing China Department of Electrical and Computer Engineering Johns Hopkins University Baltimore MD USA Department of Computer Science and Engineering College of Engineering University of North Texas Denton TX USA
来源: 评论