咨询与建议

限定检索结果

文献类型

  • 14,800 篇 会议
  • 6,199 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,817 篇 工学
    • 10,033 篇 计算机科学与技术...
    • 8,353 篇 软件工程
    • 2,590 篇 信息与通信工程
    • 1,712 篇 控制科学与工程
    • 1,394 篇 生物工程
    • 1,202 篇 电气工程
    • 971 篇 生物医学工程(可授...
    • 880 篇 电子科学与技术(可...
    • 832 篇 机械工程
    • 702 篇 光学工程
    • 524 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 437 篇 化学工程与技术
    • 407 篇 建筑学
  • 5,753 篇 理学
    • 3,328 篇 数学
    • 1,560 篇 生物学
    • 1,074 篇 物理学
    • 948 篇 统计学(可授理学、...
    • 800 篇 系统科学
    • 459 篇 化学
  • 3,890 篇 管理学
    • 2,414 篇 管理科学与工程(可...
    • 1,639 篇 图书情报与档案管...
    • 1,204 篇 工商管理
  • 936 篇 医学
    • 825 篇 临床医学
    • 737 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 614 篇 法学
    • 475 篇 社会学
  • 399 篇 经济学
    • 397 篇 应用经济学
  • 399 篇 教育学
    • 383 篇 教育学
  • 209 篇 农学
  • 102 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 373 篇 deep learning
  • 354 篇 computational mo...
  • 335 篇 computer archite...
  • 326 篇 software
  • 304 篇 machine learning
  • 287 篇 accuracy
  • 272 篇 software systems
  • 268 篇 data mining
  • 245 篇 internet of thin...
  • 245 篇 training
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 217 篇 support vector m...
  • 185 篇 testing
  • 184 篇 artificial intel...
  • 183 篇 optimization
  • 170 篇 semantics

机构

  • 342 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 113 篇 school of softwa...
  • 105 篇 department of co...
  • 89 篇 department of co...
  • 74 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 22 篇 zhao jian
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit

语言

  • 20,541 篇 英文
  • 566 篇 其他
  • 158 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21259 条 记 录,以下是181-190 订阅
排序:
A Red/Blue Video Game for Hide&Seek Analysis for Hardware Trojans and the Seeker's Dilemma
A Red/Blue Video Game for Hide&Seek Analysis for Hardware Tr...
收藏 引用
Annual IEEE Systems Conference
作者: Peter Jamieson Obed Amaning-Yeboah Jared Butler Deniz Misirlioglu Riley Taylor Suman Bhunia Department of Electrical and Computer Engineering Miami University Oxford Ohio USA Department of Computer Science and Software Engineering Miami University Oxford Ohio USA
This paper describes our work in creating a video game to analyze the human dynamics of a Hide&Seek game. By harnessing human computation, we use this approach to get insights into how humans in a game Hide&Se... 详细信息
来源: 评论
Resilient Electricity Network Recovery Operation Following Seismic Events
Resilient Electricity Network Recovery Operation Following S...
收藏 引用
Grid Edge Technologies Conference & Exposition (Grid Edge), IEEE PES
作者: Shaila Arif Nirmal-Kumar C. Nair Department of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand
Seismic events, globally, are known to impact electricity networks, causing disruptions in the provision of energy and affecting the recovery well-being of communities. Contingency analysis is an established method fo... 详细信息
来源: 评论
Evaluation of Retired Lithium-ion Batteries for Second-life Applications through Electrochemical Impedance Spectroscopy
Evaluation of Retired Lithium-ion Batteries for Second-life ...
收藏 引用
Annual IEEE Conference on Applied Power Electronics Conference and Exposition (APEC)
作者: Latha Anekal Sheldon Williamson Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa Canada
The rapid growth of electric transportation will generate a substantial number of retired batteries. Recycling the retired LIBs is being looked at worldwide to recover the expensive raw materials from used batteries. ... 详细信息
来源: 评论
A Joint Secure Mechanism of Multi-task Learning For A UAV Team Under FDI Attacks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zeng, Rongfei Jiang, Chenyang Wang, Xingwei Li, Baochun Northeastern University Software College Shenyang China AliCloud Hangzhou China Northeastern University Department of Computer Science and Engineering Shenyang China University of Toronto Department of Electrical and Computer Engineering Canada
A UAV team shows tremendous potential for various mobile scenarios. However, some evidences reveal their vulnerability to False Data Injection (FDI) attacks, which can significantly jeopardize the flight security or e... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
A modified grey wolf optimizer with multi-solution crossover integration algorithm for feature selection
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第1期16卷 329-345页
作者: Ihsan, Muhammad Din, Fakhrud Zamli, Kamal Z. Ghadi, Yazeed Yasin Alahmadi, Tahani Jaser Innab, Nisreen Faculty of IT Department of Computer Science and IT University of Malakand Khyber Pakhtunkhwa Chakdara18800 Pakistan Faculty of Computing College of Computing and Applied Sciences Universiti Malaysia Pahang Pahang Pekan26600 Malaysia Department of computer science and software engineering Al Ain University Abu Dhabi12555 United Arab Emirates Department of Information SystemsCollege of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh84428 Saudi Arabia Department of Computer Science and Information SystemsCollege of Applied Sciences Al-Maarefa University Diriyah Riyadh13713 Saudi Arabia
Feature selection helps eradicate redundant features which is essential to mitigate the curse of dimensionality when a machine-learning model deals with high-dimensional datasets. Grey Wolf Optimizer (GWO) is a swarm-... 详细信息
来源: 评论
Crop protection and disease detection using artificial intelligence and computer vision: a comprehensive review
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3723-3743页
作者: Shah, Kanish Sushra, Rajat Shah, Manan Shah, Dhairya Shah, Haard Raval, Megh Prajapati, Mitul Software Engineer Walmart SunnyvaleCA United States Atmiya Vidya Mandir Gujarat Surat India Department of Chemical Engineering School of Energy Technology Pandit Deendayal Energy University Gujarat Gandhinagar India Robotics ECE Concentration Northeastern University BostonMA United States Department of Computer Science Concentration in AI Hofstra University HempsteadNY United States Department of Chemical Engineering S. S Agrawal Institute of Engineering & Technology Gujarat Navsari India R &D Engineer Span Inspection Systems Pvt. Ltd Gujarat Gandhinagar India
The technological advancements in the field of agriculture have increased to a great extent in recent years, and many techniques have evolved from other techniques. Some methods are improved or upgraded from the previ... 详细信息
来源: 评论
Secure kNN For Distributed Cloud Environment Using Fully Homomorphic Encryption
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Fukuchi, Yuuya Hashimoto, Sota Sakai, Kazuya Fukumoto, Satoshi Sun, Min-Te Ku, Wei-Shinn Tokyo Metropolitan University Department of Electrical Engineering and Computer Science Tokyo Japan Tokyo Metropolitan University Department of Computer Science Tokyo Japan National Central University Department of Computer Science and Information Engineering Taoyuan Taiwan Auburn University Department of Computer Science and Software Engineering AuburnAL United States
Privacy-preserving k-nearest neighbor (PPkNN) classification for multiple clouds enables categorizing queried data into a class in keeping with data privacy, where the database and key servers jointly perform cryptogr... 详细信息
来源: 评论
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论
Analyzing Digital Image Anti-Forensics Techniques and Countermeasures  27
Analyzing Digital Image Anti-Forensics Techniques and Counte...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Agarwal, Saurabh Kumar, Rajeev Devi, Abha Jung, Ki-Hyun Department of Information and Communication Engineering Yeungnam University Gyeongsan38541 Korea Republic of Blockchain Technology Research Lab Department of Computer Science and Engineering Delhi Technological University New Delhi110042 India Department of Software Convergence Andong National University Gyeongbuk36729 Korea Republic of College Uttar Pradesh Sikandrabad India
With the increasing use of digital media, digital forensics has become a crucial method for ascertaining authenticity and detecting manipulations in images. However, intentional anti-forensic manipulations to hide for... 详细信息
来源: 评论