咨询与建议

限定检索结果

文献类型

  • 11,282 篇 会议
  • 5,179 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,690 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,241 篇 工学
    • 8,155 篇 计算机科学与技术...
    • 6,808 篇 软件工程
    • 1,996 篇 信息与通信工程
    • 1,319 篇 控制科学与工程
    • 1,098 篇 生物工程
    • 822 篇 电气工程
    • 729 篇 生物医学工程(可授...
    • 679 篇 机械工程
    • 600 篇 电子科学与技术(可...
    • 555 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 338 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 326 篇 建筑学
  • 4,527 篇 理学
    • 2,655 篇 数学
    • 1,233 篇 生物学
    • 827 篇 物理学
    • 749 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 345 篇 化学
  • 3,153 篇 管理学
    • 1,913 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 948 篇 工商管理
  • 711 篇 医学
    • 622 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 484 篇 法学
    • 373 篇 社会学
  • 329 篇 教育学
    • 319 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 172 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 312 篇 deep learning
  • 303 篇 application soft...
  • 296 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 242 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 200 篇 accuracy
  • 195 篇 feature extracti...
  • 195 篇 training
  • 188 篇 support vector m...
  • 187 篇 internet of thin...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 168 篇 laboratories
  • 168 篇 optimization
  • 167 篇 semantics

机构

  • 355 篇 college of compu...
  • 197 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 80 篇 school of inform...
  • 73 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 48 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 30 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 21 篇 lin qiuzhen

语言

  • 15,871 篇 英文
  • 708 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16690 条 记 录,以下是1081-1090 订阅
排序:
Streamlining Classroom and Laboratory Management in University: Enhancing Problem Reporting Processes
Streamlining Classroom and Laboratory Management in Universi...
收藏 引用
Computing and Information Technology (ICCIT-1441), 2020 International Conference on
作者: Qamar H. Naith Department of Software Engineering College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
Managing the classroom and lab activities in the university and reporting process for the problems that occur during lectures is a hard process that needs more consideration. This study addresses challenges faced by t... 详细信息
来源: 评论
W-restrained Bidirectional Bounded-Suboptimal Heuristic Search  33
W-restrained Bidirectional Bounded-Suboptimal Heuristic Sear...
收藏 引用
33rd International Conference on Automated Planning and Scheduling, ICAPS 2023
作者: Atzmon, Dor Shperberg, Shahaf S. Sabah, Netanel Felner, Ariel Sturtevant, Nathan R. Department of Computer Science Royal Holloway University of London United Kingdom Department of Software and Information Systems Engineering Ben-Gurion University Israel University of Alberta Canada
In this paper, we develop theoretical foundations for bidirectional bounded-suboptimal search (BiBSS) based on recent advancements in optimal bidirectional search. In addition, we introduce a BiBSS variant of the prom... 详细信息
来源: 评论
Multi Layered Rule-Based Technique for Explicit Aspect Extraction from Online Reviews
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4641-4656页
作者: Mubashar Hussain Toqir A.Rana Aksam Iftikhar M.Usman Ashraf Muhammad Waseem Iqbal Ahmed Alshaflut Abdullah Alourani School of Systems and Technology University of Management and TechnologyLahore54770Pakistan Department of Computer Science and It The University of LahoreLahore54000Pakistan School of Computer Sciences Universiti Sains Malaysia(USM)Penang11800Malaysia Department of Computer Science Comsats University IslamabadLahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Software Engineering The Superior UniversityLahore53700Pakistan Faculty of Computing and It Albaha UniversityAlbahaSaudi Arabia Department of Computer Science Majmaah UniversitySaudi Arabia
In the field of sentiment analysis,extracting aspects or opinion targets fromuser reviews about a product is a key *** the polarity of an opinion is much more useful if we also know the targeted Aspect or *** based ap... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Prioritization of Risks in Agile software Projects Through an Analytic Hierarchy Process Approach  5
Prioritization of Risks in Agile Software Projects Through a...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Ayesha Ziana, M. Charles, J. Department of Computer Science Noorul Islam Centre for Higher Education Tamil Nadu Kumaracoil629180 India Department of Software Engineering Noorul Islam Centre for Higher Education Tamil Nadu Kumaracoil629180 India
Risk management is often overlooked in the software industry, especially in agile methodology-based projects, which can have negative impacts on the schedule, budget, and quality of a project, eventually leading to cu... 详细信息
来源: 评论
A Stealthy Backdoor Attack Method Based on Generative Adversarial Networks  5
A Stealthy Backdoor Attack Method Based on Generative Advers...
收藏 引用
5th Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2024
作者: Tan, Yayue Yu, Gao Zhang, Yaqi Tang, Yongqing Southwest University College of Computer and Information Science School of Software Chongqing China Payment core platform Ant Group Co. Ltd Department of Payment Platform Technology Chengdu China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu China
Deep neural networks have been widely and successfully applied to many critical tasks, such as image pattern recognition, natural language processing and autonomous driving, and large amounts of training data and incr... 详细信息
来源: 评论
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems
收藏 引用
computer Modeling in engineering & sciences 2022年 第4期131卷 23-26页
作者: Qi Liu Xiaodong Liu Radu Grosu Ching-Nung Yang School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Computing Edinburgh Napier UniversityEdinburgh018373UK Institute of Computer Engineering Vienna University of TechnologyWien1040Austria Department of Computer Science and Information Engineering National Dong Hwa UniversityHualien97401Taiwan
Cyber Physical Systems(CPS)have been appealing in recent years as a result of the rapid emergence of unique hardware and software compositions that create smart,autonomously behaving ***-to-end procedures and new type... 详细信息
来源: 评论
Low-Quality Ultrasound Image Enhancement Using Spatially Variable Neural Implicit Network
Low-Quality Ultrasound Image Enhancement Using Spatially Var...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Xiaojie Xia, Jing Wu, Mei Gao, Shanshan Zhou, Yuanfeng Shandong University School of Software Jinan China Nanyang Technological University School of Computer Science and Engineering Singapore Singapore The Second Hospital of Shandong University Ultrasound Department Jinan China Shandong University of Finance and Economics School of Computer Science and Technology Jinan China
Ultrasound images are widely used because they are easy to use and non-invasive. However, differences in acquisition equipment and frequency settings can result in varying image quality. To address this issue, we prop... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论
Radiology Report Generation via Structured Knowledge-Enhanced Multi-modal Attention and Contrastive Learning
Radiology Report Generation via Structured Knowledge-Enhance...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Xu, Dexuan Chen, Yanyuan Zhang, Jiayu Lou, Yiwei Wang, Hanpin He, Jing Huang, Yu Peking University National Engineering Research Center for S.E. School of Software & Micro. China Peking University School of Computer Science China School of Computer Science China Peking University People's Hospital Department of Rheumatology and Immunology China Peking University National Engineering Research Center for Software Engineering China
The automated generation of radiology reports has attracted significant attention in the field of bioinformatics. Currently, the main limitations of this task include insufficient utilization of prior medical knowledg... 详细信息
来源: 评论