咨询与建议

限定检索结果

文献类型

  • 11,449 篇 会议
  • 6,001 篇 期刊文献
  • 232 册 图书

馆藏范围

  • 17,682 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,679 篇 工学
    • 8,271 篇 计算机科学与技术...
    • 6,870 篇 软件工程
    • 2,070 篇 信息与通信工程
    • 1,376 篇 控制科学与工程
    • 1,104 篇 生物工程
    • 893 篇 电气工程
    • 743 篇 生物医学工程(可授...
    • 693 篇 机械工程
    • 647 篇 电子科学与技术(可...
    • 583 篇 光学工程
    • 431 篇 安全科学与工程
    • 417 篇 仪器科学与技术
    • 407 篇 化学工程与技术
    • 343 篇 动力工程及工程热...
    • 330 篇 建筑学
    • 322 篇 交通运输工程
  • 5,270 篇 理学
    • 2,728 篇 数学
    • 1,471 篇 物理学
    • 1,249 篇 生物学
    • 785 篇 统计学(可授理学、...
    • 637 篇 系统科学
    • 476 篇 化学
  • 3,209 篇 管理学
    • 1,951 篇 管理科学与工程(可...
    • 1,380 篇 图书情报与档案管...
    • 955 篇 工商管理
  • 739 篇 医学
    • 640 篇 临床医学
    • 565 篇 基础医学(可授医学...
    • 335 篇 药学(可授医学、理...
  • 499 篇 法学
    • 386 篇 社会学
  • 330 篇 经济学
    • 327 篇 应用经济学
  • 329 篇 教育学
  • 176 篇 农学
  • 73 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,077 篇 computer science
  • 1,024 篇 software enginee...
  • 328 篇 deep learning
  • 304 篇 application soft...
  • 290 篇 computational mo...
  • 265 篇 data mining
  • 253 篇 machine learning
  • 245 篇 computer archite...
  • 229 篇 software
  • 209 篇 accuracy
  • 202 篇 software systems
  • 193 篇 feature extracti...
  • 192 篇 training
  • 191 篇 internet of thin...
  • 190 篇 support vector m...
  • 181 篇 programming
  • 164 篇 educational inst...
  • 163 篇 semantics
  • 161 篇 optimization
  • 158 篇 laboratories

机构

  • 637 篇 department of ph...
  • 524 篇 infn sezione di ...
  • 513 篇 cavendish labora...
  • 509 篇 physikalisches i...
  • 499 篇 oliver lodge lab...
  • 482 篇 iccub universita...
  • 475 篇 fakultät physik ...
  • 456 篇 infn sezione di ...
  • 428 篇 university of ch...
  • 426 篇 infn sezione di ...
  • 420 篇 h.h. wills physi...
  • 419 篇 horia hulubei na...
  • 409 篇 infn sezione di ...
  • 406 篇 infn sezione di ...
  • 376 篇 van swinderen in...
  • 361 篇 infn laboratori ...
  • 358 篇 school of physic...
  • 358 篇 infn sezione di ...
  • 358 篇 nikhef national ...
  • 355 篇 institute of par...

作者

  • 290 篇 barter w.
  • 282 篇 brundu d.
  • 254 篇 blake t.
  • 252 篇 bellee v.
  • 246 篇 borsato m.
  • 245 篇 betancourt c.
  • 242 篇 beiter a.
  • 241 篇 bowcock t.j.v.
  • 222 篇 belin s.
  • 219 篇 amato s.
  • 210 篇 boettcher t.
  • 203 篇 atzeni m.
  • 202 篇 bencivenni g.
  • 202 篇 bay a.
  • 202 篇 artuso m.
  • 202 篇 amhis y.
  • 202 篇 albrecht j.
  • 198 篇 byczynski w.
  • 198 篇 campana p.
  • 196 篇 berezhnoy a.

语言

  • 15,370 篇 英文
  • 2,206 篇 其他
  • 135 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Software Engineering-CIT"
17682 条 记 录,以下是4891-4900 订阅
排序:
VIKOR decision making method based on multi-granularity hesitant fuzzy linguistic term sets
VIKOR decision making method based on multi-granularity hesi...
收藏 引用
Cyber-Physical Social Intelligence (ICCSI), International Conference on
作者: Jin Qian Wei Jin Xuanyuan Wang Ying Yu Mingchen Zheng Duoqian Miao School of Software East China Jiaotong University Nanchang Jiangxi School of Transportation Engineering East China Jiaotong University Nanchang Jiangxi Department Computer Science and Technology Tongji University Shanghai China
In the existing multi-attribute decision making researches, most of the hesitant fuzzy linguistic multi-attribute decision making methods assume the decision makers use the linguistic term set under the same granulari...
来源: 评论
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
AutoLog: A Log Sequence Synthesis Framework for Anomaly Dete...
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Yintong Huo Yichen Li Yuxin Su Pinjia He Zifan Xie Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China School of Software Engineering Sun Yat-sen University Zhuhai China School of Data Science The Chinese University of Hong Kong Shenzhen (CUHK Shenzhen) China Huazhong University of Science and Technology Wuhan China
The rapid progress of modern computing systems has led to a growing interest in informative run-time logs. Various log-based anomaly detection techniques have been proposed to ensure software reliability. However, the...
来源: 评论
An explainable deep learning approach for stock market trend prediction
收藏 引用
Heliyon 2024年 第21期10卷 e40095页
作者: Muhammad, Dost Ahmed, Iftikhar Naveed, Khwaja Bendechache, Malika CRT-AI and ADAPT Research Centres School of Computer Science University of Galway Ireland Department of Software Engineering University of Europe for Applied Sciences Potsdam Germany Swedish Center for Digital Innovation University of Gothenburg Sweden ADAPT Research Centre School of Computer Science University of Galway Ireland
Given the intricate nature of stock forecasting as well as the inherent risks and uncertainties, analysis of market trends is necessary to capitalize on optimal investment opportunities for profit maximization and tim... 详细信息
来源: 评论
Transportation Path Planning Model for Multi-Constraint Unmanned Aerial Vehicle in Healthcare  2
Transportation Path Planning Model for Multi-Constraint Unma...
收藏 引用
2nd IEEE International Conference on Innovations in High-Speed Communication and Signal Processing, IHCSP 2024
作者: Byeon, Haewon Kumar, Pramod Yogi, Kottala Sri Gudala, Leeladhar Soni, Mukesh Motagi, Samarth Inje University Department of Ai and Software Gimhae 50834 South Korea Ganga Institute of Technology and Management Haryana Jhajjar 124104 India A Constituent College of Symbiosis International University Dept of Operations Pune India Valparaiso University Department of Computer Science and Engineering West Godavari India D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Pune India Collins Aerospace Department of Aircraft Seating Winston-Salem NC United States
In response to the path planning problem of using Unmanned Aerial Vehicle (UAV) for blood transportation, with the objective of minimizing the total distance travelled by the UAV, a multi-constraint drone blood transp... 详细信息
来源: 评论
Mutual Graph Learning Network and Diffusion Probabilistic Model-based Medical Image Segmentation
Mutual Graph Learning Network and Diffusion Probabilistic Mo...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Huaqiang Su Haijun Lei Guoliang Chen Xin Chen Baiying Lei College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Radiology Guangzhou First People’s Hospital Guangzhou China School of Biomedical Engineering & Shenzhen University Medical School Shenzhen University Shenzhen China
Diffusion probabilistic models (DPM) can generate semantically valuable pixel-level representations and are widely used in medical image segmentation tasks. However, DPM faces challenges when dealing with medical imag...
来源: 评论
Deep Learning-Based E-Learning Solution for Identifying and Bridging the Knowledge Gap in Primary Education
Deep Learning-Based E-Learning Solution for Identifying and ...
收藏 引用
International Research Conference on Smart Computing and Systems engineering (SCSE)
作者: D.P.H Arunoda S.R Walpola S.M.I Piumira A.D.M.P Athukorala Thusithanjana Thilakarathna Sanjeevi Chandrasiri Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Educational teaching apps are primarily available in app stores to educate students in various contexts. Lack of educational resources, physical and mental health conditions, and poverty cause some students to skip sc...
来源: 评论
A Melting Pot of Evolution and Learning
arXiv
收藏 引用
arXiv 2023年
作者: Sipper, Moshe Elyasaf, Achiya Halperin, Tomer Haramaty, Zvika Lapid, Raz Segal, Eyal Tzruia, Itai Tamam, Snir Vitrack Department of Computer Science Ben-Gurion University of the Negev Beer-Sheva8410501 Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva8410501 Israel DeepKeep Tel-Aviv Israel
We survey eight recent works by our group, involving the successful blending of evolutionary algorithms with machine learning and deep learning: 1. Binary and Multinomial Classification through Evolutionary Symbolic R... 详细信息
来源: 评论
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Shuang Zhang, Tao Liu, Jiqiang Wang, Jiacheng Wu, Xuangou Zhu, Xiaoqiang Zhang, Ruichen Zhang, Weiting Yuan, Zhenhui Mao, Shiwen Kim, Dong In School of Software Engineering Beijing Jiaotong University Beijing100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Technology An hui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui University of Technology Anhui243002 China College of Computing and Data Science Nanyang Technological University Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering College of Information and Communication Engineering Sungkyunkwan University Suwon16419 Korea Republic of
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul... 详细信息
来源: 评论
Machine Learning Based Container Placement in On-Demand Clustered Fogs
Machine Learning Based Container Placement in On-Demand Clus...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Peter Farhat Sarhad Arisdakessian Omar Abdul Wahab Azzam Mourad Hakima Ould-Slimane Department of Computer Science Lebanese American University Beirut Lebanon Department of Computer Science &#x0026 Engineering Universit&#x00E9 du Quebec en Outaouais Gatineau Canada Division of Science New York University Abu Dhabi UAE Department of Software Engineering IT &#x00C9 cole de Technologie Sup&#x00E9 rieure Montreal Canada
Fog computing extends the concept of cloud computing by allowing services, embedded into virtual machines or containers, to be placed at the edge of the network in the proximity of the end devices. However, due to the... 详细信息
来源: 评论
Specific Emitter Identification Based on Joint Variational Mode Decomposition
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaofang Xu, Wenbo Wang, Yue Huang, Yan Key Laboratory of Universal Wireless Communication Beijing University of Posts and Telecommunications Beijing China Department of Computer Science Georgia State University AtlantaGA United States Department of Software Engineering and Game Development Kennesaw State University MariettaGA30060 United States
Specific emitter identification (SEI) technology is significant in device administration scenarios, such as self-organized networking and spectrum management, owing to its high security. For nonlinear and non-stationa... 详细信息
来源: 评论