咨询与建议

限定检索结果

文献类型

  • 11,201 篇 会议
  • 5,227 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,236 篇 工学
    • 8,155 篇 计算机科学与技术...
    • 6,801 篇 软件工程
    • 2,015 篇 信息与通信工程
    • 1,326 篇 控制科学与工程
    • 1,091 篇 生物工程
    • 860 篇 电气工程
    • 726 篇 生物医学工程(可授...
    • 681 篇 机械工程
    • 607 篇 电子科学与技术(可...
    • 550 篇 光学工程
    • 418 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 339 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 317 篇 建筑学
  • 4,524 篇 理学
    • 2,648 篇 数学
    • 1,237 篇 生物学
    • 828 篇 物理学
    • 744 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 351 篇 化学
  • 3,153 篇 管理学
    • 1,915 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 944 篇 工商管理
  • 715 篇 医学
    • 622 篇 临床医学
    • 550 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 486 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 316 篇 教育学
  • 322 篇 经济学
    • 320 篇 应用经济学
  • 175 篇 农学
  • 74 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 304 篇 deep learning
  • 303 篇 application soft...
  • 290 篇 computational mo...
  • 268 篇 data mining
  • 248 篇 machine learning
  • 242 篇 computer archite...
  • 225 篇 software
  • 202 篇 software systems
  • 193 篇 accuracy
  • 191 篇 feature extracti...
  • 189 篇 internet of thin...
  • 185 篇 support vector m...
  • 185 篇 training
  • 180 篇 programming
  • 170 篇 educational inst...
  • 169 篇 laboratories
  • 169 篇 optimization
  • 168 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 82 篇 department of co...
  • 77 篇 school of inform...
  • 73 篇 department of co...
  • 71 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 50 篇 school of softwa...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 16,058 篇 英文
  • 489 篇 其他
  • 119 篇 中文
  • 7 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16657 条 记 录,以下是301-310 订阅
排序:
Design and Implementation of a Comprehensive RAG-Driven Dashboard Within the ILO System for Data Visualization and Query Support: A Case Study of the University of Petra
Design and Implementation of a Comprehensive RAG-Driven Dash...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Abu-Arqoub Abed Alkarim Banna Nuha El-Khalili Mohammad Al-Shaikh Hasan Department of Computer Science University of Petra Amman Jordan Data Science & Artificial Intelligence Dept. University of Petra Amman Jordan Software Engineering Department University of Petra Amman Jordan Computer Science Department Brunel University London London UK
This article presents a comprehensive study on designing and implementing a dashboard for enhanced data visualization and query support at the University of Petra. The system leverages retrieval-augmented generation (... 详细信息
来源: 评论
Emotionally Challenging Games Can Satisfy Older Adults' Psychological Needs: From Empirical Study to Design Guidelines  25
Emotionally Challenging Games Can Satisfy Older Adults' Psyc...
收藏 引用
Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems
作者: Min Zhou Xiaolan Peng Binjie Liu Alena Denisova Soumya C. Barathi Zhuying Li Xurong Xie Jin Huang Feng Tian Institute of Software Chinese Academy of Sciences Beijing China Institute of software Chinese Academy of Sciences Beijing China Department of Computer Science University of York York United Kingdom School of Computer Science and Informatics Cardiff University Cardiff United Kingdom School of Computer Science and Engineering Southeast University Nanjing China Institue of Software Chinese Academy of Sciences Beijing China Institute of Software Institue of Software Chinese Academy of Sciences Beijing China
来源: 评论
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Question Selection for Multi-Modal Code Search Synthesis using Probabilistic Version Spaces
收藏 引用
IEEE Transactions on software engineering 2025年
作者: Wu, Jiarong Jiang, Yanyan Wei, Lili Xu, Congying Cheung, Shing-Chi Xu, Chang The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong McGill University Department of Electrical and Computer Engineering Montreal Canada Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing China
Searching the occurrences of specific code patterns (code search) is a common task in software engineering, and programming by example (PBE) techniques have been applied to ease customizing code patterns. However, pre... 详细信息
来源: 评论
Robust Training in Multiagent Deep Reinforcement Learning Against Optimal Adversary
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年
作者: Guo, Weiran Liu, Guanjun Zhou, Ziyuan Wang, Jiacun Tang, Ying Wang, Miaomiao Tongji University School of Computer Science and Technology Shanghai201804 China Monmouth University Department of Computer Science and Software Engineering West Long BranchNJ07764 United States Rowan University Department of Electrical and Computer Engineering GlassboroNJ08028 United States Beijing Institute of Control Engineering Space Optoelectronic Measurement and Perception Lab Beijing100190 China
Industry 5.0 enhances manufacturing ability through efficient human-machine interaction, combining human resources and robots to complete tasks more accurately and effectively. Artificial intelligence (AI) plays an es... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
A Survey on Anomaly Detection with Few-Shot Learning  8th
A Survey on Anomaly Detection with Few-Shot Learning
收藏 引用
8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Chen, Junyang Wang, Changbo Hong, Yifan Mi, Rui Zhang, Liang-Jie Wu, Yirui Wang, Huan Zhou, Yue College of Computer Science and Software Engineering Shenzhen University Shenzhen China Center of Health Administration and Development Studies Hubei University of Medicine Shiyan China College of Informatics Huazhong Agricultural University Wuhan China Hohai University Nanjing China Department of Obstetrics and Gynecology Tianyou Hospital Affiliated to Wuhan University of Science and Technology Wuhan China
The primary objective of anomaly detection is to identify abnormal or unusual patterns within a dataset, where the number of normal samples typically exceeds that of abnormal samples. Due to the scarcity of labeled ab... 详细信息
来源: 评论
A Real-Time Anomaly Detection Method for Industrial Control Systems Based on Long-Short Period Deterministic Finite Automaton
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14599-14621页
作者: Lin, Xaioli Yao, Yu Hu, Bo Yang, Wei Zhou, Xiaoming Li, Guangao Zhang, Wenjie Northeastern University Department of Computer Science and Engineering Shenyang110167 China State Grid Liaoning Electric Power Supply Company Ltd. Dalian Power Supply Company Dalian234643 China Northeastern University Software Department Shenyang110169 China State Grid Liaoning Electric Power Supply Company Ltd. Shenyang110002 China State Grid Liaoning Electric Power Supply Company Ltd. Information and Communication Branch Shenyang110002 China
Anomaly detection has proven effective in detecting cyber-attacks in industrial control systems (ICS). However, most existing anomaly detection methods suffer from low accuracy because they ignore the effects of packe... 详细信息
来源: 评论
FDC: Feature Dropout Consistency for unsupervised domain adaptation semantic segmentation
收藏 引用
Neural Networks 2025年 189卷 107527页
作者: Rao, Chaoyu Fan, Wanshu Wang, Cong Yang, Xin Wei, Xiaopeng Zhou, Dongsheng National and Local Joint Engineering Laboratory of Computer Aided Design School of Software Engineering Dalian University China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Computer Science and Technology Dalian University of Technology China
In Unsupervised Domain Adaptation Semantic Segmentation (UDASS), while self-training techniques have become one of the most effective methods to date, the absence of target labels makes models susceptible to overfitti... 详细信息
来源: 评论
Enhanced Multi-Head Self-Attention Transformer-Based Method for Prediction of Drug-Drug Interactions
Enhanced Multi-Head Self-Attention Transformer-Based Method ...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Semih Cal Ramazan Ozgur Dogan Hulya Dogan Department of Engineering Computer Science & Physics Otterbein University Westerville OH USA Department of Artificial Intelligence Engineering Faculty of Computer and Information Sciences Trabzon University Trabzon Türkiye Department of Software Engineering Faculty of Engineering Karadeniz Technical University Trabzon Türkiye
The usage of various drugs has increased significantly in recent years, leading to a higher possibility of drug-drug interactions (DDIs). The concurrent usage of multiple drugs can result in potentially hazardous inte... 详细信息
来源: 评论