咨询与建议

限定检索结果

文献类型

  • 14,718 篇 会议
  • 6,228 篇 期刊文献
  • 267 册 图书

馆藏范围

  • 21,213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,831 篇 工学
    • 10,053 篇 计算机科学与技术...
    • 8,371 篇 软件工程
    • 2,604 篇 信息与通信工程
    • 1,713 篇 控制科学与工程
    • 1,393 篇 生物工程
    • 1,234 篇 电气工程
    • 972 篇 生物医学工程(可授...
    • 877 篇 电子科学与技术(可...
    • 832 篇 机械工程
    • 705 篇 光学工程
    • 526 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 461 篇 动力工程及工程热...
    • 441 篇 化学工程与技术
    • 401 篇 建筑学
  • 5,761 篇 理学
    • 3,326 篇 数学
    • 1,559 篇 生物学
    • 1,078 篇 物理学
    • 947 篇 统计学(可授理学、...
    • 801 篇 系统科学
    • 461 篇 化学
  • 3,887 篇 管理学
    • 2,406 篇 管理科学与工程(可...
    • 1,647 篇 图书情报与档案管...
    • 1,193 篇 工商管理
  • 937 篇 医学
    • 824 篇 临床医学
    • 739 篇 基础医学(可授医学...
    • 460 篇 药学(可授医学、理...
  • 614 篇 法学
    • 476 篇 社会学
  • 402 篇 经济学
    • 399 篇 应用经济学
  • 392 篇 教育学
    • 378 篇 教育学
  • 210 篇 农学
  • 103 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,087 篇 computer science
  • 407 篇 application soft...
  • 362 篇 deep learning
  • 349 篇 computational mo...
  • 331 篇 computer archite...
  • 325 篇 software
  • 290 篇 machine learning
  • 273 篇 accuracy
  • 272 篇 software systems
  • 270 篇 data mining
  • 245 篇 training
  • 243 篇 internet of thin...
  • 233 篇 feature extracti...
  • 221 篇 programming
  • 213 篇 support vector m...
  • 192 篇 artificial intel...
  • 184 篇 testing
  • 176 篇 optimization
  • 174 篇 semantics

机构

  • 340 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 112 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 75 篇 school of inform...
  • 72 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 53 篇 department of co...
  • 53 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 software enginee...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 42 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 42 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 24 篇 xiao qin
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 23 篇 sheldon s. willi...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit

语言

  • 20,511 篇 英文
  • 549 篇 其他
  • 159 篇 中文
  • 10 篇 德文
  • 5 篇 法文
  • 5 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Software and Engineering"
21213 条 记 录,以下是11-20 订阅
排序:
DevDynaP: A Dynamic Local Community Detection Algorithm
收藏 引用
SN computer Science 2025年 第4期6卷 1-11页
作者: Bakhtar, Sahar Harutyunyan, Hovhannes A. Department of Computer Science and Software Engineering Concordia University Montreal Canada
Recent years have witnessed the rapid growth of social network services. Real-world social networks are huge and changing over time. Consequently, the problems in this area have become more complex. Community detectio... 详细信息
来源: 评论
Enhancing Voice Phishing Detection Using Multilingual Back-Translation and SMOTE: An Empirical Study
收藏 引用
IEEE Access 2025年 13卷 37946-37965页
作者: Boussougou, Milandu Keith Moussavou Hamandawana, Prince Park, Dong-Joo Soongsil University Department of Computer Science and Engineering Seoul06978 Korea Republic of Ajou University Department of Software and Computer Engineering Suwon16499 Korea Republic of Soongsil University School of Computer Science and Engineering Seoul06978 Korea Republic of
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
A reliable and secure video steganography method based on 4d-logistic mapping
收藏 引用
Multimedia Tools and Applications 2025年 1-31页
作者: Sha, Mohemmed Department of Software Engineering College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj16278 Saudi Arabia
Data security is becoming more and more crucial due to developments in communication and information technology, particularly when it comes to video transmission. This research provides a unique approach that combines... 详细信息
来源: 评论
Real-Time Anomaly Detection in IoMT Networks Using Stacking Model and a Healthcare- Specific Dataset
收藏 引用
IEEE Access 2025年 13卷 70352-70365页
作者: Goumidi, Hadjer Pierre, Samuel Department of Computer and Software Engineering MontrealQCH3T 1J4 Canada
The Internet of Medical Things (IoMT) connects medical devices to enable real-time monitoring and personalized care, significantly enhancing patient health and well-being. However, this connectivity also introduces su... 详细信息
来源: 评论
Dynamic Synergy: Leveraging RIS and Reinforcement Learning for Secure, Adaptive Underlay Cognitive Radio Networks  15
Dynamic Synergy: Leveraging RIS and Reinforcement Learning f...
收藏 引用
15th Global Information Infrastructure and Networking Symposium, GIIS 2025
作者: Tashman, Deemah H. Cherkaoui, Soumaya Polytechnique Montreal Department of Computer and Software Engineering Montreal Canada
Reconfigurable intelligent surfaces (RISs) have recently been employed to facilitate communication and improve performance by reflecting signals through configuring phase shifts toward the intended destination. This a... 详细信息
来源: 评论
Skeleton-Aware Graph-Based Adversarial Networks for Human Pose Estimation from Sparse IMUs
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2025年 第4期21卷 1-22页
作者: Chen, Kaixin Zhang, Lin Wang, Zhong Zhao, Shengjie Zhou, Yicong School of Software Engineering Tongji University Shanghai China Department of Computer and Information Science University of Macau Macau China
Recently, sparse-inertial human pose estimation (SI-HPE) with only a few IMUs has shown great potential in various fields. The most advanced work in this area achieved fairish results using only six IMUs. However, the... 详细信息
来源: 评论
Federated Blockchain-Based Clustering Protocol for Enhanced Security and Connectivity in FANETs With CF-mMIMO
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14016-14035页
作者: Pramitarini, Yushintia Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku Hongik University Graduate School Department of Software and Communications Engineering Sejong30016 Korea Republic of Hankyong National University School of Computer Engineering and Applied Mathematics Korea Republic of Hongik University Department of Software and Communications Engineering Sejong30016 Korea Republic of
In this paper, we propose a novel federated blockchain (FedChain)-based clustering protocol to enhance network security and connectivity in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO). By le... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
Science China(Information Sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
Science China(Information Sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论