咨询与建议

限定检索结果

文献类型

  • 11,200 篇 会议
  • 5,142 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,571 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,158 篇 工学
    • 8,091 篇 计算机科学与技术...
    • 6,767 篇 软件工程
    • 1,983 篇 信息与通信工程
    • 1,293 篇 控制科学与工程
    • 1,093 篇 生物工程
    • 818 篇 电气工程
    • 724 篇 生物医学工程(可授...
    • 672 篇 机械工程
    • 594 篇 电子科学与技术(可...
    • 546 篇 光学工程
    • 413 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 336 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 319 篇 建筑学
  • 4,501 篇 理学
    • 2,640 篇 数学
    • 1,230 篇 生物学
    • 820 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 348 篇 化学
  • 3,143 篇 管理学
    • 1,911 篇 管理科学与工程(可...
    • 1,348 篇 图书情报与档案管...
    • 945 篇 工商管理
  • 709 篇 医学
    • 619 篇 临床医学
    • 548 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 483 篇 法学
    • 370 篇 社会学
  • 328 篇 教育学
    • 317 篇 教育学
  • 321 篇 经济学
    • 319 篇 应用经济学
  • 171 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 303 篇 application soft...
  • 295 篇 deep learning
  • 295 篇 computational mo...
  • 267 篇 data mining
  • 246 篇 machine learning
  • 242 篇 computer archite...
  • 226 篇 software
  • 202 篇 software systems
  • 191 篇 feature extracti...
  • 191 篇 accuracy
  • 188 篇 internet of thin...
  • 186 篇 support vector m...
  • 183 篇 training
  • 180 篇 programming
  • 171 篇 educational inst...
  • 169 篇 laboratories
  • 169 篇 optimization
  • 167 篇 semantics

机构

  • 342 篇 college of compu...
  • 196 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 89 篇 department of co...
  • 83 篇 department of co...
  • 75 篇 school of inform...
  • 73 篇 department of co...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 50 篇 school of softwa...
  • 48 篇 department of co...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 15,998 篇 英文
  • 463 篇 其他
  • 118 篇 中文
  • 7 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16571 条 记 录,以下是291-300 订阅
排序:
Trauma-Informed Insights from Co-Design of Self-Disclosure Robots with Domestic Abuse Survivors  25
Trauma-Informed Insights from Co-Design of Self-Disclosure R...
收藏 引用
ACM/IEEE International Conference on Human-Robot Interaction (HRI)
作者: Nyomi Carrine Morris Tom Williams Ben Jelen MIRRORLab Colorado School of Mines Golden CO USA Department of Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre Haute IN USA
Survivors of domestic abuse face significant challenges securing recovery resources, such as housing, mental health care, and social connections. Accessing these resources requires survivors to disclose their status a... 详细信息
来源: 评论
Enhanced adaptive data rate strategies for energy-efficient Internet of Things communication in LoRaWAN
收藏 引用
International Journal of Communication Systems 2025年 第2期38卷
作者: Ali Lodhi, Muhammad Wang, Lei Mahmood, Khalid Farhad, Arshad Chen, Jenhui Kumari, Saru School of Software Technology Dalian University of Technology Dalian China Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Douliu Taiwan Department of Computer Science FAST-National University of Computer and Emerging Sciences Islamabad Pakistan Department of Computer Science and Information Engineering Chang Gung University Taoyuan Taiwan Department of Mathematics Chaudhary Charan Singh University Meerut India School of Chemical Engineering and Physical Sciences Lovely Professional University Jalandhar India
The long-range wide area network (LoRaWAN) is a standard for the Internet of Things (IoT) because it has low cost, long range, not energy-intensive, and capable of supporting massive end devices (EDs). The adaptive da... 详细信息
来源: 评论
Multiview Point Cloud Registration Based on Minimum Potential Energy for Free-Form Blade Measurement
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zijie Wang, Yaonan Mo, Yang Zhu, Qing Xie, He Wu, Haotian Feng, Mingtao Mian, Ajmal College of Electrical and Information Engineering Hunan University Changsha410082 China School of Computer Science and Technology Xidian University Xi’an710071 China Department of Computer Science and Software Engineering The University of Western Australia Crawley PerthWA6009 Australia
Point cloud registration is an essential step for free-form blade reconstruction in industrial measurement. Nonetheless, measuring defects of the 3D acquisition system unavoidably result in noisy and incomplete point ... 详细信息
来源: 评论
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective
Rethinking Adversarial Attacks in Reinforcement Learning fro...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Tianyang Duan Zongyuan Zhang Zheng Lin Yue Gao Ling Xiong Yong Cui Hongbin Liang Xianhao Chen Heming Cui Dong Huang Department of Computer Science The University of Hong Kong Hong Kong China Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong China School of Computer Science Fudan University China School of Computer and Software Engineering Xihua University Chengdu China Department of Computer Science and Technology Tsinghua University Beijing China School of Transportation and Logistics Southwest Jiaotong University Chengdu China
Deep Reinforcement Learning (DRL) suffers from uncertainties and inaccuracies in the observation signal in real-world applications. Adversarial attack is an effective method for evaluating the robustness of DRL agents... 详细信息
来源: 评论
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Duan, Tianyang Zhang, Zongyuan Lin, Zheng Gao, Yue Xiong, Ling Cui, Yong Liang, Hongbin Chen, Xianhao Cui, Heming Huang, Dong Department of Computer Science The University of Hong Kong Hong Kong Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong School of Computer Science Fudan University Shanghai China School of Computer and Software Engineering Xihua University Chengdu China Department of Computer Science and Technology Tsinghua University Beijing China School of Transportation and Logistics Southwest Jiaotong University Chengdu China
Deep Reinforcement Learning (DRL) suffers from uncertainties and inaccuracies in the observation signal in real-world applications. Adversarial attack is an effective method for evaluating the robustness of DRL agents... 详细信息
来源: 评论
Towards Fully-Automated Materials Discovery via Large-Scale Synthesis Dataset and Expert-Level LLM-as-a-Judge
arXiv
收藏 引用
arXiv 2025年
作者: Kim, Heegyu Jeon, Taeyang Choi, Seungtaek Hong, Jihoon Jeon, Dongwon Baek, Ga-Yeon Kwak, Kyung-Won Lee, Dong-Hee Bae, Jisu Lee, Chihoon Kim, Yunseo Choi, Sun-Jin Park, Jinsung Cho, Sungbum Cho, Hyunsouk Department of Artificial Intelligence Korea Republic of Department of Software and Computer Engineering Korea Republic of Department of Materials Science and Engineering Department of Energy Systems Research Ajou University Suwon16499 Korea Republic of Division of Materials Science and Engineering Hanyang University Seoul04763 Korea Republic of
Materials synthesis is vital for innovations such as energy storage, catalysis, electronics, and biomedical devices. Yet, the process relies heavily on empirical, trial-and-error methods guided by expert intuition. Ou... 详细信息
来源: 评论
Exploratory Data Analysis and Predicting Indian Crime Against Women Using Machine Learning Approaches
Exploratory Data Analysis and Predicting Indian Crime Agains...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: N. Srinivasa Gupta B. Valarmathi K. Santhi T.Chellatamilan Sameeksha Nanda Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India
Crime forecasting is a critical endeavor aimed at preventing future criminal actions, specifically the rising rate of violence against women in India. This study proposes the model to predict crimes committed against ... 详细信息
来源: 评论
Identify the potential pathways and candidate biomarkers of stroke associated with bipolar disorder: Bioinformatics and system biology approach
收藏 引用
Journal of Proteins and Proteomics 2025年 第2期16卷 141-159页
作者: Hosen, Md. Faruk Basar, Md. Abul Yasmin, Mst. Farjana Hasan, Md. Rakibul Uddin, Muhammad Shahin Department of Information and Communication Technology (ICT) Mawlana Bhashani Science and Technology University (MBSTU) Tangail Bangladesh Department of Computing and Information System (CIS) Daffodil International University (DIU) Dhaka Bangladesh Department of Computer Science and Engineering (CSE) Uttara University Dhaka Bangladesh Department of Software Engineering (SWE) Daffodil International University (DIU) Dhaka Bangladesh
The field of computational bioinformatics and systems biology analysis is rapidly expanding due to advancements in bioinformatics tools. Bipolar disorder (BD) is a severe psychiatric condition affecting both adults an...
来源: 评论
LED there be DoS: Exploiting variable bitrate IP cameras for network DoS
arXiv
收藏 引用
arXiv 2025年
作者: Goldberg, Emmanuel Brodt, Oleg Elyashar, Aviad Puzis, Rami Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Cyber Labs@BGU Ben-Gurion University of the Negev Israel Department of Computer Science Shamoon College of Engineering Israel
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling high-quality video streaming while conserving network bandwidth. However, as the name suggests, variable-bitrate IP cameras can g... 详细信息
来源: 评论
A Lightweight and Robust Access Control Protocol for IoT-based e-Healthcare Network
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ghaffar, Zahid Kuo, Wen-Chung Mahmood, Khalid Tariq, Tayyaba Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J.F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University Department of Computer Science and Engineering College of Informatics 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Internet of Things (IoT) devices are crucial components in e-healthcare networks. It enables remote patient health monitoring and facilitates seamless communication among medical sensors, wearable devices, and healthc... 详细信息
来源: 评论