咨询与建议

限定检索结果

文献类型

  • 14,802 篇 会议
  • 6,303 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,915 篇 工学
    • 10,111 篇 计算机科学与技术...
    • 8,396 篇 软件工程
    • 2,629 篇 信息与通信工程
    • 1,747 篇 控制科学与工程
    • 1,392 篇 生物工程
    • 1,253 篇 电气工程
    • 974 篇 生物医学工程(可授...
    • 897 篇 电子科学与技术(可...
    • 842 篇 机械工程
    • 707 篇 光学工程
    • 529 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 440 篇 化学工程与技术
    • 405 篇 建筑学
    • 387 篇 交通运输工程
  • 5,781 篇 理学
    • 3,335 篇 数学
    • 1,567 篇 生物学
    • 1,086 篇 物理学
    • 949 篇 统计学(可授理学、...
    • 801 篇 系统科学
    • 463 篇 化学
  • 3,902 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,650 篇 图书情报与档案管...
    • 1,203 篇 工商管理
  • 946 篇 医学
    • 832 篇 临床医学
    • 742 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 618 篇 法学
    • 479 篇 社会学
  • 400 篇 经济学
    • 398 篇 应用经济学
  • 399 篇 教育学
  • 214 篇 农学
  • 105 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 385 篇 deep learning
  • 350 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 306 篇 machine learning
  • 289 篇 accuracy
  • 272 篇 software systems
  • 269 篇 data mining
  • 247 篇 training
  • 246 篇 internet of thin...
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 216 篇 support vector m...
  • 186 篇 artificial intel...
  • 185 篇 testing
  • 182 篇 optimization
  • 173 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 76 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry

语言

  • 20,611 篇 英文
  • 601 篇 其他
  • 159 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21365 条 记 录,以下是4861-4870 订阅
排序:
Bilingual software requirements tracing using vector space model
Bilingual software requirements tracing using vector space m...
收藏 引用
3rd International Conference on Pattern Recognition Applications and Methods, ICPRAM 2014
作者: Yildiz, Olcay Taner Okutan, Ahmet Solak, Ercan Department of Computer Engineering Işik University Kumbaba Mevkii Sile Istanbul Turkey Mobipath Erenet Software Ltd Istanbul Turkey
In the software engineering world, creating and maintaining relationships between byproducts generated during the software lifecycle is crucial. A typical relation is the one that exists between an item in the require... 详细信息
来源: 评论
Adaptive and Learnable Label for Face Anti-Spoofing  3
Adaptive and Learnable Label for Face Anti-Spoofing
收藏 引用
3rd International Conference on computer Vision and Pattern Analysis, ICCPA 2023
作者: Chen, Shijie Wang, Yifeng Han, Yuehu Department of Computer Science and Technology Chongqing University of Posts and Telecommunications ChongQing China Department of Software Engineering Chongqing University of Posts and Telecommunications ChongQing China
Face anti-spoofing(FAS) is an important task to secure face recognition systems from presentation attacks (PAs). Most of the FAS methods use scalar(0, 1) or handcrafted pixel-wise labels(binary mask) as the ground tru... 详细信息
来源: 评论
computer science and communications protocols: Research relationships  3rd
收藏 引用
3rd International Conference on Computing and Information, ICCI 1991
作者: Probert, Robert L. Protocols/Software Engineering Research Group Department of Computer Science University of Ottawa OttawaONKIN 6N5 Canada
Many of the interesting problems in computer Science related to software engineering have yielded only to partial solutions or not at all. In the related areas of research denoted Communications software engineering a... 详细信息
来源: 评论
Estimating spatial cues for audio coding in MDCT domain
Estimating spatial cues for audio coding in MDCT domain
收藏 引用
2009 IEEE International Conference on Multimedia and Expo, ICME 2009
作者: Shuixian, Chen Ruimin, Hu Shuhua, Zhang Computer School Wuhan University Wuhan China National Engineering Research Center for Multimedia Software Wuhan University Wuhan China Department of Electronic Engineering Tsinghua University Beijing China
Although widely used otherwise, MDCT is excluded in the current scheme for spatial cues representation, due to its lacking of phase information and energy conservation. But combining MDCT with MDST overcomes the diffi... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论
An improved kangaroo transaction model using surrogate objects for distributed mobile system
An improved kangaroo transaction model using surrogate objec...
收藏 引用
10th ACM International Workshop on Data engineering for Wireless and Mobile Access, MobiDE'11
作者: Ravimaran, S. Maluk Mohamed, M.A. Software System Group Department of Computer Science and Engg. M.A.M. College of Engineering Anna University Tiruchirappalli India
The rapid growth in the use of wireless communication and mobile devices has created a potential for variety of mobile transaction support. The variety of mobile transaction models have already been developed for deal... 详细信息
来源: 评论
A Study on the Application of Protein Language Models in the Analysis of Membrane Proteins  19th
A Study on the Application of Protein Language Models in...
收藏 引用
19th International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2022
作者: Ghazikhani, Hamed Butler, Gregory Department of Computer Science and Software Engineering Concordia University Montreal Canada Centre for Structural and Functional Genomics Concordia University Montreal Canada
Membrane proteins make up around 30% of all proteins in a cell. These proteins are difficult to evaluate due to their hydrophobic surface and dependence on their original in vivo environment. There is a tremendous dem... 详细信息
来源: 评论
Meta Pattern Concern Score: A Novel Evaluation Measure with Human Values for Multi-classifiers
Meta Pattern Concern Score: A Novel Evaluation Measure with ...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Wang, Yanyun Du, Dehui Liu, Yuanhao The University of Hong Kong Department of Computer Science Hong Kong Software Engineering Institute East China Normal University Shanghai China
While advanced classifiers have been increasingly used in real-world safety-critical applications, how to properly evaluate the black-box models given specific human values remains a concern in the community. Such hum...
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Shafee, Ahmed Awaad, Tasneem A. Moro, Ahmed Adams State University Department of Engineering and Computer Science AlamosaCO United States Ain Shams University Faculty of Engineering Department of Computer and Systems Engineering Cairo Egypt Siemens Eda Cairo Egypt Siemens Digital Industries Software Integrated Electrical Systems Segment Cairo Egypt
Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论
A Scenario Based Approach for Context Query Generation  19
A Scenario Based Approach for Context Query Generation
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Silva, Ravindi De Zaslavsky, Arkady Loke, Seng W. Jayaraman, Prem Prakash Abken, Amin Medvedev, Alexey Deakin University School of Information Technology Melbourne Australia Swinburne University of Technology Department of Computer Sceince and Software Engineering Melbourne Australia
IoT hardware and application silos have achieved a significant progress in recent years. Yet, they have been unable to realize the full IoT potential, due to the lack of middleware platforms that provide horizontal Io... 详细信息
来源: 评论