咨询与建议

限定检索结果

文献类型

  • 7,964 篇 会议
  • 4,398 篇 期刊文献
  • 163 册 图书

馆藏范围

  • 12,525 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,919 篇 工学
    • 6,173 篇 计算机科学与技术...
    • 5,031 篇 软件工程
    • 1,616 篇 信息与通信工程
    • 1,060 篇 控制科学与工程
    • 770 篇 生物工程
    • 737 篇 电气工程
    • 564 篇 电子科学与技术(可...
    • 530 篇 机械工程
    • 517 篇 生物医学工程(可授...
    • 398 篇 光学工程
    • 318 篇 仪器科学与技术
    • 286 篇 安全科学与工程
    • 282 篇 动力工程及工程热...
    • 258 篇 化学工程与技术
    • 217 篇 交通运输工程
  • 3,584 篇 理学
    • 2,127 篇 数学
    • 856 篇 生物学
    • 722 篇 物理学
    • 576 篇 统计学(可授理学、...
    • 507 篇 系统科学
    • 283 篇 化学
  • 2,416 篇 管理学
    • 1,551 篇 管理科学与工程(可...
    • 959 篇 图书情报与档案管...
    • 687 篇 工商管理
  • 569 篇 医学
    • 489 篇 临床医学
    • 433 篇 基础医学(可授医学...
    • 266 篇 药学(可授医学、理...
    • 230 篇 公共卫生与预防医...
  • 372 篇 法学
    • 291 篇 社会学
  • 250 篇 经济学
    • 248 篇 应用经济学
  • 182 篇 教育学
  • 132 篇 农学
  • 52 篇 文学
  • 36 篇 军事学
  • 27 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 523 篇 computer science
  • 335 篇 software enginee...
  • 233 篇 deep learning
  • 226 篇 data mining
  • 218 篇 computational mo...
  • 208 篇 machine learning
  • 178 篇 feature extracti...
  • 177 篇 application soft...
  • 176 篇 laboratories
  • 158 篇 optimization
  • 157 篇 wireless sensor ...
  • 156 篇 computer archite...
  • 150 篇 software
  • 148 篇 accuracy
  • 145 篇 internet of thin...
  • 137 篇 educational inst...
  • 131 篇 semantics
  • 124 篇 algorithm design...
  • 123 篇 monitoring
  • 119 篇 software systems

机构

  • 483 篇 state key labora...
  • 379 篇 department of co...
  • 253 篇 department of co...
  • 230 篇 school of softwa...
  • 169 篇 college of compu...
  • 160 篇 school of softwa...
  • 107 篇 state key labora...
  • 98 篇 school of comput...
  • 76 篇 school of inform...
  • 68 篇 department of co...
  • 66 篇 department of co...
  • 63 篇 department of co...
  • 51 篇 state key labora...
  • 49 篇 national key lab...
  • 46 篇 school of softwa...
  • 45 篇 tsinghua nationa...
  • 45 篇 school of softwa...
  • 45 篇 university of ch...
  • 41 篇 school of comput...
  • 40 篇 national key lab...

作者

  • 43 篇 xiang-yang li
  • 40 篇 baowen xu
  • 39 篇 yunhao liu
  • 31 篇 shen furao
  • 28 篇 zhao jian
  • 27 篇 aichholzer oswin
  • 26 篇 qi lianyong
  • 25 篇 zhou zhi-hua
  • 25 篇 yang tianbao
  • 24 篇 vogtenhuber birg...
  • 24 篇 zhang yan
  • 23 篇 rehman attique u...
  • 23 篇 xuandong li
  • 23 篇 wang wei
  • 22 篇 wang jianmin
  • 22 篇 jiacun wang
  • 22 篇 gao yang
  • 22 篇 sun fuchun
  • 22 篇 guihai chen
  • 21 篇 jun zhang

语言

  • 11,974 篇 英文
  • 355 篇 其他
  • 209 篇 中文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer and Software Technology"
12525 条 记 录,以下是4991-5000 订阅
排序:
Retinal recognition: Personal identification using blood vessels
Retinal recognition: Personal identification using blood ves...
收藏 引用
International Conference for Internet technology and Secured Transactions (ICITST)
作者: M. Usman Akram Anam Tariq Shoab A. Khan Department of Computer & Software Engineering Bahria University Islamabad Pakistan Department of Computer Engineering National University of Sciences and Technology Islamabad Pakistan
Biometrics are used for personal recognition based on some physiologic or behavioral characteristics. In this era, biometric security systems are widely used which mostly include fingerprint recognition, face recognit... 详细信息
来源: 评论
How and How Much Should We Disclose?
How and How Much Should We Disclose?
收藏 引用
International Conference on Pervasive Computing and Applications (ICPCA)
作者: Kai Dong Wentian Lu Zhen Qin Yu Huang Xianping Tao Jian Lu State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. H... 详细信息
来源: 评论
A Cost Sensitive Approach for Virtual Network Reconfiguration
A Cost Sensitive Approach for Virtual Network Reconfiguratio...
收藏 引用
2014 IEEE computers,Communications and IT Applications Conference(ComComAp)
作者: Li Xu Guozhen Tan Xia Zhang Department of Computer Science and Technology Dalian University of Technology State Key Laboratory of Software Architecture(Neusoft Corporation)
Network Virtualization paves the way for sharing the physical infrastructure with many service providers and enables resources in physical substrate network being applied and provisioned as a form of Virtual Network(V... 详细信息
来源: 评论
Differential evolution enhanced with evolution path vector
Differential evolution enhanced with evolution path vector
收藏 引用
15th Annual Conference on Genetic and Evolutionary Computation, GECCO 2013
作者: Li, Yuan-Long Zhan, Zhi-Hui Zhang, Jun Department of Computer Science Sun Yat-sen University Guangzhou 510275 China Key Laboratory of Digital Life Ministry of Education China Education Dept. of Guangdong Province Key Laboratory of Software Technology China
and centralized model (CM) offspring generation models, this paper proposes to use the differential evolution (DE) algorithm as the base population reproduction method and enhance its DM scheme with one of the key CM ... 详细信息
来源: 评论
Robust Stability Region of PI Controllers for an Interval Time Delayed Load Frequency Control
Robust Stability Region of PI Controllers for an Interval Ti...
收藏 引用
IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe)
作者: Majid Ghorbani Komeil Nosrati Aleksei Tepljakov Juri Belikov Eduard Petlenkov The Department of Computer Systems Tallinn University of Technology Tallinn Estonia Department of Software Science Tallinn University of Technology Tallinn Estonia
Transmission delays, load fluctuations, and intermittent output power of renewable energy sources will all have a substantial impact on frequency stability in microgrids (MGs). In response, various types of advanced c... 详细信息
来源: 评论
A Novel ROI-Based Rate Control Scheme for H.264
A Novel ROI-Based Rate Control Scheme for H.264
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Shaoyuan Yue Baocai Yin Yunhui Shi Yi Huo Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer Scienc Department of Computer Science and Technology College of Career Technology HeBei Normal University
For the limited bandwidth and other limiting factors in the video coding, the visual quality always cannot satisfy the clients, especially the subjective visual quality. This paper proposes a novel ROI-based rate cont... 详细信息
来源: 评论
A community evolution model based on visibility graph  34
A community evolution model based on visibility graph
收藏 引用
34th Chinese Control Conference, CCC 2015
作者: Hong, Wang Yan-Shen, Sun School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Department of Earth Sciences Zhejiang University Hangzhou China
One of the most important work to analyze networks is community detection. We present a dynamic community discovery method based on Visibility Graph. Firstly, we put forward related definitions of Visibility Graph for... 详细信息
来源: 评论
Towards a holistic approach to redesigning legacy applications for the Web with UWAT+
Towards a holistic approach to redesigning legacy applicatio...
收藏 引用
(CSMR) European Conference on software Maintenance and Reengineering
作者: D. Distante S. Tilley G. Canfora Research Centre on Software Technology University of Sannio Italy Department of Computer Sciences Florida Institute of Technology USA
Web applications design methodologies hold the promise of engineering high-quality and long-lived Web systems and rich Internet applications. However, many such methodologies focus solely on green-field development, a... 详细信息
来源: 评论
Online Neural Fiber Classification Method based on Lightweight Neural Network  7
Online Neural Fiber Classification Method based on Lightweig...
收藏 引用
7th International Conference on Image, Vision and Computing, ICIVC 2022
作者: Xu, Baolei Li, Xiaojie Shi, Canghong Sichuan University of Arts and Sciences Key Laboratory of Exploitation and Study of Distinctive Plants in Education Department of Sichuan Province Dazhou China Chengdu University of Information Technology School of Computer Science Chengdu China Xihua University School of Computer Science and Software Engineering Chengdu China
Traditional neural fiber classification methods are generally difficult to balance classification accuracy and algorithm complexity, and there is a problem of relying on manual intervention, mainly including manual dr... 详细信息
来源: 评论
AI-Enhanced Multi-Cloud Security Management: Ensuring Robust Cybersecurity in Hybrid Cloud Environments
AI-Enhanced Multi-Cloud Security Management: Ensuring Robust...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Srimathi, J. Kanagasabapathi, K. Mahajan, Kirti Ahamad, Shahanawaj Soumya, E. Barthwal, Shivangi KPR College of Arts Science and Research Department of Information Technology Covai Arasur641407 India Karpagam College of Engineering Computer Science and Technology Coimbatore India Bharati Vidyapeeth Deemed University Institute of Management & Entrepreneurship Development Department of Information Technology Pune411030 India University of Hail College of Computer Science and Engineering Department of Software Engineering Hail City Saudi Arabia St. Martins Engineering College Department of Computer Science and Engineering Telangana Secunderabad India Graphic Era Deemed to Be University Department of Electronics & Communication Engineering Uttarakhand Dehradun248002 India
The complex landscape of multi-cloud settings is the result of the fast growth of cloud computing and the ever-changing needs of contemporary organizations. Strong cyber defenses are of fundamental importance in this ... 详细信息
来源: 评论