咨询与建议

限定检索结果

文献类型

  • 11,297 篇 会议
  • 5,157 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,213 篇 工学
    • 8,122 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,984 篇 信息与通信工程
    • 1,310 篇 控制科学与工程
    • 1,096 篇 生物工程
    • 814 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 676 篇 机械工程
    • 598 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 325 篇 建筑学
    • 323 篇 动力工程及工程热...
  • 4,508 篇 理学
    • 2,646 篇 数学
    • 1,232 篇 生物学
    • 828 篇 物理学
    • 752 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 349 篇 化学
  • 3,144 篇 管理学
    • 1,908 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 946 篇 工商管理
  • 709 篇 医学
    • 620 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 371 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 319 篇 经济学
    • 318 篇 应用经济学
  • 171 篇 农学
  • 70 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,019 篇 software enginee...
  • 310 篇 deep learning
  • 304 篇 application soft...
  • 291 篇 computational mo...
  • 267 篇 data mining
  • 254 篇 machine learning
  • 243 篇 computer archite...
  • 229 篇 software
  • 206 篇 accuracy
  • 202 篇 software systems
  • 194 篇 feature extracti...
  • 190 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 172 篇 educational inst...
  • 167 篇 laboratories
  • 166 篇 semantics
  • 163 篇 wireless sensor ...

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 143 篇 state key labora...
  • 118 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 84 篇 department of co...
  • 82 篇 school of inform...
  • 75 篇 department of co...
  • 73 篇 department of co...
  • 64 篇 school of comput...
  • 53 篇 department of co...
  • 53 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 software enginee...
  • 46 篇 department of co...
  • 46 篇 school of softwa...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 21 篇 wang wei
  • 20 篇 dozier gerry

语言

  • 15,132 篇 英文
  • 1,447 篇 其他
  • 130 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Engineering Software"
16683 条 记 录,以下是611-620 订阅
排序:
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Cyber Attack Detection with Encrypted Network Connection Analysis  12th
Cyber Attack Detection with Encrypted Network Connection Ana...
收藏 引用
12th International Symposium on Intelligent Manufacturing and Service Systems, IMSS 2023
作者: Gonen, Serkan Karacayilmaz, Gokce Artuner, Harun Bariskan, Mehmet Ali Yilmaz, Ercan Nurcan Software Engineering Department Istanbul Gelisim University Istanbul Turkey Hacettepe University Institute of Science Ankara Turkey Computer Engineering Department Hacattepe University Ankara Turkey Computer Engineering Department Istanbul Gelisim University Istanbul Turkey Electrical – Electronic Engineering Department Gazi University Ankara Turkey
The evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption h... 详细信息
来源: 评论
VCApather: A Network as a Service Solution for Video Conference Applications  34
VCApather: A Network as a Service Solution for Video Confere...
收藏 引用
34th Workshop on Network and Operating System Support for Digital Audio and Video, NOSSDAV 2024
作者: He, Dongbiao Lin, Canshu Yu, Xian Westphal, Cedric Ming, Zhongxing Cui, Laizhong Zhou, Xu Garcia-Luna-Aceves, J.J. Sangfor Technologies Inc China College of Computer Science and Software Engineering Shenzhen University China Computer Network Information Center Chinese Academy of Sciences China China Electrical and Computer Engineering Department University of Toronto Canada Futurewei
We propose a network service as a solution for video conference applications by constructing network layer routing strategies. Our approach takes into account the characteristics of conferencing flows, addresses vario... 详细信息
来源: 评论
A Fractional Fourier Based Medical Image Authentication Approach
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3133-3150页
作者: Fayez Alqahtani Mohammed Amoon Walid El-Shafai Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11451Saudi Arabia Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical... 详细信息
来源: 评论
TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User Reviews  22
TTAG+R: A Dataset of Google Play Store's Top Trending Androi...
收藏 引用
22nd IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2022
作者: Chand, Raheela Rehman Khan, Saif Ur Hussain, Shahid Wang, Wenli Department of Computer Science Islamabad Pakistan School of Engineering Penn State University Department of Computer Science and Software Engineering United States
Context: Android games are gaining wide attention from users in recent years. However, the existing literature reports alarming statistics about banning popular and top-trending Android apps. The popular gaming apps h... 详细信息
来源: 评论
Diabetes Prediction Using Machine Learning Techniques: A Case Study from Jordan  25
Diabetes Prediction Using Machine Learning Techniques: A Cas...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Alazaidah, Raed Batyha, Radwan Samara, Ghassan Al Henawi, Esraa Al-Safarini, Maram Y. Samhan, Ahmad A. Elrashidi, Ali Alluwaici, Mo'Ath Al-Omari, Deana It Zarqa University Department of Data Science Ai Faculty Zarqa Jordan Private University Department of Computer Science Faculty of It Applied Science Amman Jordan Zarqa University Department of Computer Science Faculty of It Zarqa Jordan Zarqa University Department of Software Engineering Faculty of It Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Diabetes is one of the most common diseases in Jordan. It is the main reason of death among Jordanian adult citizens. Worldwide, 48% of all deaths are due to Diabetes occurred before the age of 70 years. Hence, this r... 详细信息
来源: 评论
Revolutionizing Image Recognition: Next-Generation CNN Architectures for Handwritten Digits and Objects  8
Revolutionizing Image Recognition: Next-Generation CNN Archi...
收藏 引用
8th IEEE Symposium on Wireless Technology and Applications, ISWTA 2024
作者: Absur, Md Nurul Nasif, Kazi Fahim Ahmad Saha, Sourya Nova, Sifat Nawrin Department of Computer Science City University of New York New York United States College of Computing and Software Engineering Kennesaw State University GA United States Department of Computer Science Chalmers University of Technology Gothenburg Sweden
This study addresses the pressing need for computer systems to interpret digital media images with a level of sophistication comparable to human visual perception. By leveraging Convolutional Neural Networks (CNNs), w... 详细信息
来源: 评论
Masked Image Self-Learning and Knowledge Distillation for Source-Free Unsupervised Domain Adaptation in Crowd Counting  2
Masked Image Self-Learning and Knowledge Distillation for So...
收藏 引用
2nd International Conference on Image Processing, computer Vision and Machine Learning, ICICML 2023
作者: Zeng, Jia Ma, Chaoqun Shao, Penghui Qing, Anyong Wang, Yang Southwest Jiaotong University School of Electrical Engineering Chengdu China Concordia University Department of Computer Science and Software Engineering Montreal Canada
Unsupervised Domain Adaptation (UDA) techniques leverage labeled data from a source domain to adapt to unlabeled data from a target domain, offering a primary solution for addressing cross-domain challenges in crowd c... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
A Scheme Library-Based Ant Colony Optimization with 2-Opt Local Search for Dynamic Traveling Salesman Problem
收藏 引用
computer Modeling in engineering & sciences 2023年 第5期135卷 1209-1228页
作者: Chuan Wang Ruoyu Zhu Yi Jiang Weili Liu Sang-Woon Jeon Lin Sun Hua Wang College of Software Henan Normal UniversityXinxiang453007China College of Computer and Information Engineering Henan Normal UniversityXinxiang453007China School of Computer Science and Engineering South China University of TechnologyGuangzhou510006China School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhou510665China Department of Military Information Engineering Hanyang UniversityAnsan15588South Korea College of Engineering and Science Institute for Sustainable Industries and Liveable CitiesVictoria UniversityMelbourneVIC 8001Australia
The dynamic traveling salesman problem(DTSP)is significant in logistics distribution in real-world applications in smart cities,but it is uncertain and difficult to *** paper proposes a scheme library-based ant colony... 详细信息
来源: 评论