咨询与建议

限定检索结果

文献类型

  • 14,802 篇 会议
  • 6,303 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,915 篇 工学
    • 10,111 篇 计算机科学与技术...
    • 8,396 篇 软件工程
    • 2,629 篇 信息与通信工程
    • 1,747 篇 控制科学与工程
    • 1,392 篇 生物工程
    • 1,253 篇 电气工程
    • 974 篇 生物医学工程(可授...
    • 897 篇 电子科学与技术(可...
    • 842 篇 机械工程
    • 707 篇 光学工程
    • 529 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 440 篇 化学工程与技术
    • 405 篇 建筑学
    • 387 篇 交通运输工程
  • 5,781 篇 理学
    • 3,335 篇 数学
    • 1,567 篇 生物学
    • 1,086 篇 物理学
    • 949 篇 统计学(可授理学、...
    • 801 篇 系统科学
    • 463 篇 化学
  • 3,902 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,650 篇 图书情报与档案管...
    • 1,203 篇 工商管理
  • 946 篇 医学
    • 832 篇 临床医学
    • 742 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 618 篇 法学
    • 479 篇 社会学
  • 400 篇 经济学
    • 398 篇 应用经济学
  • 399 篇 教育学
  • 214 篇 农学
  • 105 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 385 篇 deep learning
  • 350 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 306 篇 machine learning
  • 289 篇 accuracy
  • 272 篇 software systems
  • 269 篇 data mining
  • 247 篇 training
  • 246 篇 internet of thin...
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 216 篇 support vector m...
  • 186 篇 artificial intel...
  • 185 篇 testing
  • 182 篇 optimization
  • 173 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 76 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry

语言

  • 20,611 篇 英文
  • 601 篇 其他
  • 159 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21365 条 记 录,以下是4981-4990 订阅
排序:
Combining goal-oriented and problem-oriented requirements engineering methods
Combining goal-oriented and problem-oriented requirements en...
收藏 引用
IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability, and Security in Information Systems and HCI, CD-ARES 2013
作者: Beckers, Kristian Faßbender, Stephan Heisel, Maritta Paci, Federica Paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen Germany Department and Information Engineering and Computer Science University Trento Italy
Several requirements engineering methods exist that differ in their abstraction level and in their view on the system-to-be. Two fundamentally different classes of requirements engineering methods are goal- and proble... 详细信息
来源: 评论
Fake view analytics in online video services
Fake view analytics in online video services
收藏 引用
24th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV 2014
作者: Chen, Liang Zhou, Yipeng Chiu, Dah Ming College of Computer Science and Software Engineer Shenzhen University China Department of Information Engineering Chinese University of Hong Kong Hong Kong
Online video-on-demand (VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the... 详细信息
来源: 评论
Multifocus Image Fusion Using Local Perceived Sharpness
Multifocus Image Fusion Using Local Perceived Sharpness
收藏 引用
第25届中国控制与决策会议
作者: Liang Xu Junping Du JangMyung Lee Qian Hu Zhenhong Zhang Ming Fang Qian Wang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Department of Electronics Engineering Pusan National University
Image fusion has become a valuable tool in many applications. In this paper, we propose a conceptually clear and intuitive algorithm for region-based image fusion. Our method considers the properties of multifocus ima... 详细信息
来源: 评论
Transformation technique for derivation of similarity scores for signatures
收藏 引用
Iran Journal of computer Science 2022年 第4期5卷 317-328页
作者: Adewuyi, Joel Adeyanju Iwasokun, Gabriel Babatunde Gabriel, Arome Junior Department of Computer Science Federal University of Technology Akure Nigeria Department of Software Engineering Federal University of Technology Akure Nigeria Department of Cyber Security Federal University of Technology Akure Nigeria
The human signature is a widely acceptable biometric characteristic that provides a very secure means for authorizing legal documents. However, signature-based authorization is characterized by problems of counterfeit... 详细信息
来源: 评论
Detecting noisy instances with the rule-based classification model
Detecting noisy instances with the rule-based classification...
收藏 引用
作者: Khoshgoftaar, Taghi M. Seliya, Naeem Gao, Kehan Empirical Software Engineering Laboratory Department of Computer Science and Enginnering Florida Atlantic University Boca Raton FL 33431 United States
The performance of a classification model is invariably affected by the characteristics of measurement data it is built upon. If quality of the data is generally poor, then the classification model will demonstrate po... 详细信息
来源: 评论
The Application of Blended Learning in the Teaching Design of computer Aided Design
The Application of Blended Learning in the Teaching Design o...
收藏 引用
2011 International Conference on Control, Automation and Systems engineering(CASE)
作者: Li Hongli Zhou Defu Fang Ligang Dai Minli Department of Computer Engineering Suzhou Vocational University Jiangsu Province Support Software Engineering R&D Center for Modern Information Technology Application in Enterprise Suzhou Vocational University
Blended learning is an improved teaching strategy based on internet environment. In traditional, it is defined as a new teaching philosophy combined with traditional classroom teaching mode and E-learning mode. For th... 详细信息
来源: 评论
DeepSmartFuzzer: Reward guided test generation for deep learning
DeepSmartFuzzer: Reward guided test generation for deep lear...
收藏 引用
2020 Workshop on Artificial Intelligence Safety, AISafety 2020
作者: Demir, Samet Eniser, Hasan Ferit Sen, Alper Department of Computer Engineering Bogaziçi University Turkey Max Planck Institute for Software Systems Germany Bogaziçi Uni Turkey
Testing Deep Neural Network (DNN) models has become more important than ever with the increasing usage of DNN models in safety-critical domains such as autonomous cars. Traditionally, DNN testing relies on the perform... 详细信息
来源: 评论
Image segmentation using an emergent complex system: Cellular automata
Image segmentation using an emergent complex system: Cellula...
收藏 引用
International Workshop on Systems, Signal Processing and Their Applications
作者: Safia, Djemame Chawki, Batouche Mohamed Computer Science Department Ferhat Abbes University Sétif Algeria Software Engineering Department CCIS King Saud University Riyadh Saudi Arabia
Cellular automata are simple models of computation which exhibit fascinatingly complex behavior. They have captured the attention of several generations of researchers, leading to an extensive body of work. The emphas... 详细信息
来源: 评论
A Novel Three Leg Inverter for High Power Hybrid Inductive and Capacitive Wireless Power Transfer System  45
A Novel Three Leg Inverter for High Power Hybrid Inductive a...
收藏 引用
45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019
作者: Vincent, Deepa Huynh, Phuoc Sang Williamson, Sheldon S. University of Ontario-Institute of Technology Faculty of Engineering and Applied Science Department of Electrical Computer and Software Engineering OshawaONL1G 0C5 Canada
A novel topology for hybrid wireless power transfer (HPT), which uses both capacitive and inductive action, for electric vehicle charging is proposed in this paper. A three leg inverter topology is used for HPT. Two l... 详细信息
来源: 评论
Role mining algorithm evaluation and improvement in large volume Android applications
Role mining algorithm evaluation and improvement in large vo...
收藏 引用
1st International Workshop on Security in Embedded Systems and Smartphones, SESP 2013
作者: Zhang, Xinyi Han, Weili Fang, Zheran Yin, Yuliang Mustafa, Hossen Software School Fudan University Shanghai China Department of Computer Science and Engineering University of South Carolina Columbia SC United States
Role mining is a very useful engineering method to help administrators set up the mechanism of role based access control for information systems, but not applied in the Android security framework so far. This paper us... 详细信息
来源: 评论