咨询与建议

限定检索结果

文献类型

  • 885 篇 期刊文献
  • 839 篇 会议
  • 11 册 图书

馆藏范围

  • 1,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,171 篇 工学
    • 859 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 201 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 138 篇 生物工程
    • 127 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 96 篇 电子科学与技术(可...
    • 73 篇 机械工程
    • 70 篇 化学工程与技术
    • 51 篇 材料科学与工程(可...
    • 51 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 41 篇 仪器科学与技术
    • 37 篇 建筑学
    • 37 篇 交通运输工程
  • 627 篇 理学
    • 322 篇 数学
    • 188 篇 物理学
    • 158 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 68 篇 化学
    • 56 篇 系统科学
  • 310 篇 管理学
    • 197 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 119 篇 医学
    • 102 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 42 篇 药学(可授医学、理...
  • 52 篇 法学
  • 30 篇 经济学
  • 25 篇 教育学
  • 19 篇 农学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 3 篇 文学

主题

  • 77 篇 computer science
  • 67 篇 software enginee...
  • 44 篇 deep learning
  • 35 篇 semantics
  • 29 篇 machine learning
  • 27 篇 feature extracti...
  • 24 篇 internet of thin...
  • 24 篇 accuracy
  • 23 篇 computational mo...
  • 21 篇 quality of servi...
  • 20 篇 application soft...
  • 20 篇 software testing
  • 20 篇 training
  • 19 篇 software systems
  • 19 篇 optimization
  • 18 篇 programming
  • 18 篇 image segmentati...
  • 18 篇 clustering algor...
  • 18 篇 software
  • 17 篇 computer archite...

机构

  • 33 篇 renewable and su...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 19 篇 national enginee...
  • 18 篇 center for soft ...
  • 18 篇 department of co...
  • 17 篇 department of ph...
  • 17 篇 national enginee...
  • 14 篇 school of comput...
  • 13 篇 renewable and su...
  • 13 篇 university of ch...
  • 13 篇 state key labora...
  • 12 篇 department of co...
  • 12 篇 collaborative in...
  • 12 篇 shanghai key lab...
  • 11 篇 school of softwa...
  • 11 篇 department of co...
  • 10 篇 school of softwa...
  • 10 篇 department of co...

作者

  • 35 篇 smalyukh ivan i.
  • 23 篇 ismail leila
  • 17 篇 du bo
  • 16 篇 ivan i. smalyukh
  • 12 篇 das ashok kumar
  • 12 篇 zhao hai
  • 12 篇 mahmood khalid
  • 12 篇 li zuchao
  • 12 篇 shen linlin
  • 12 篇 materwala huned
  • 11 篇 xu xiaolong
  • 10 篇 heidari arash
  • 10 篇 ashish ghosh
  • 10 篇 susmita ghosh
  • 10 篇 leung victor c.m...
  • 10 篇 shamshad salman
  • 9 篇 wang yasha
  • 9 篇 leila ismail
  • 9 篇 yao yao
  • 8 篇 seifedine kadry

语言

  • 1,620 篇 英文
  • 97 篇 其他
  • 17 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Software Engineering and Computer Science Soft Center"
1735 条 记 录,以下是211-220 订阅
排序:
Imitation learning from purified demonstrations  24
Imitation learning from purified demonstrations
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yunke Wang Minjing Dong Yukun Zhao Bo Du Chang Xu School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence and Wuhan Institute of Data Intelligence Wuhan University China Department of Computer Science City University of Hong Kong China School of Computer Science Faculty of Engineering The University of Sydney Australia
Imitation learning has emerged as a promising approach for addressing sequential decision-making problems, with the assumption that expert demonstrations are optimal. However, in real-world scenarios, most demonstrati...
来源: 评论
A Probabilistic Framework for Pruning Transformers Via a Finite Admixture of Keys  48
A Probabilistic Framework for Pruning Transformers Via a Fin...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Nguyen, Tan M. Nguyen, Tam Bui, Long Do, Hai Nguyen, Duy Khuong Le, Dung D. Tran-The, Hung Ho, Nhat Osher, Stan J. Baraniuk, Richard G. University of California Department of Mathematics Los Angeles United States Rice University Department of Electrical and Computer Engineering Houston United States Fpt Software Ai Center Ha Noi Viet Nam Vin University College of Engineering and Computer Science Viet Nam Deakin University Applied Artificial Intelligence Institute Geelong Australia The University of Texas Department of Statistics and Data Sciences Austin United States
Pairwise dot product-based self-attention is key to the success of transformers which achieve state-of-the-art performance across a variety of applications in language and vision, but are costly to compute. It has bee... 详细信息
来源: 评论
Socially-Critical software Systems: Is Extended Regulation Required?  1
收藏 引用
29th European Systems, software and Services Process Improvement, EuroSPI 2022
作者: Dagg, Niall Kostick, Conor Fallon, James O’Neill, Alex Yilmaz, Murat Messnarz, Richard Clarke, Paul M. School of Computing Dublin City University Dublin Ireland Department of Computer Engineering Gazi University Ankara Turkey ISCN the International Software Consulting Network Graz Austria Lero the Science Foundation Ireland Research Center for Software Limerick Ireland
Data has become a prevailing aspect of our daily lives, becoming ever more present since the beginning of the 21st century. It is a commodity in today’s world and the amount of data being produced has increased enorm... 详细信息
来源: 评论
Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network  8
Intrusion Detection System Using PSO and DE Algorithms with ...
收藏 引用
8th International Conference on Fuzzy Systems and Data Mining, FSDM 2022
作者: Wang, Ke Guan, Jingwei Luo, Song Guan, Zhi MoE Beijing China Department of Computer Science and Technology Eecs Peking University Beijing China Liangjiang International College Chongqing University of Technology Chongqing China School of Computer Science and Engineering Chongqing University of Technology Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
Intrusion detection system (IDS) combines software and hardware to detect network attacks. In this paper, we propose a new intrusion detection method based on an improved BP neural network algorithm. We improve the BP... 详细信息
来源: 评论
Playing the video games during COVID-19 pandemic and its effects on player's well-being  2
Playing the video games during COVID-19 pandemic and its eff...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Noaman, Samar Billi Ibrahim, Amer Ali, Liaqat Iqbal, M.W. Ashraf, Asma Haseeb, Usama Muneer, Salman Almajed, Rasah Hamid, K. Canadian University Dubai Faculty of Management Dubai United Arab Emirates American University in the Emirates College of Computer and Information Technology Dubai United Arab Emirates University of Science and Technology of Fujairah College of Engineering and Technology Fujairah United Arab Emirates Superior University Department of Software Engineering Lahore54000 Pakistan Superior University Department of Computer Science Lahore54000 Pakistan NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan American University in the Dubai College of Computer and Information Technology United Arab Emirates
COVID-19 affected our lives intensly. That state of affairs made humans helpless. They had been depressed and experienced loneliness. At that time many human beings were determined to play video games just to loosen u... 详细信息
来源: 评论
Comprehensive Analysis of Blackhole Attack on RPL in Static, Mobile and Hybrid Network Environment
Comprehensive Analysis of Blackhole Attack on RPL in Static,...
收藏 引用
IEEE International Conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Faisal Ali Garba Oluwakemi Oduwole Abubakar Balarabe Isa Abdulkadir Sarki Aliyu Rosemary Mrumun Dima Department of Computer Science Education Sa’Adatu Rimi University of Education Kano Nigeria Computer Science Programme National Mathematical Center Kwali-Sheda Abuja Nigeria Department of Software Engineering Federal University Dutsinma Katsina Nigeria
The Routing Protocol for Low-Power and Lossy Networks (RPL), extensively applied in IoT applications, is susceptible to the Blackhole attack, wherein hostile nodes discard packets without transmission, resulting in co... 详细信息
来源: 评论
Optimizing Gammatone Cepstral Coefficients for Gear Fault Detection
收藏 引用
IEEE Access 2025年 13卷 101711-101720页
作者: Zrar Kh Abdul Abdulbasit K. Al-Talabani Wisam Hazim Gwad Entisar Alkayal Halgurd S. Maghdid Safar Maghdid Asaad Computer Department College of Science Charmo University Sulaymaniyah Iraq Department of Software Engineering Faculty of Engineering Koya University Koya Iraq Department of Artificial Intelligence Engineering College of Engineering Alnoor University Ninavah Iraq Information Technology Department Faculty of Computing and Information Technology-Rabigh King Abdulaziz University Jeddah Saudi Arabia Department of Engineering Research Center Deanship of Research and Development Centers Koya University Erbil Governorate Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil Iraq
Cepstral features, such as Gammatone Cepstral Coefficients (GTCC), have recently been applied in fault detection and diagnosis. However, GTCC was originally designed for speech feature extraction rather than fault det... 详细信息
来源: 评论
Explainable AI for Healthcare: An Approach Towards Interpretable Healthcare Models
Explainable AI for Healthcare: An Approach Towards Interpret...
收藏 引用
Information Technology (ACIT)
作者: Kanwal Zahoor Narmeen Zakaria Bawany Usman Ghani Department of Computer Science and Software Engineering Center for Computing Research Jinnah University for Women Institute of Business Administration Karachi Pakistan
Artificial intelligence (AI) along with deep learning techniques has become an integral part of almost all aspects of life. One of the domains significantly impacted by this technological revolution is healthcare. Dee...
来源: 评论
Towards Cluster-Based Split Federated Learning Approach for Continuous User Authentication  7
Towards Cluster-Based Split Federated Learning Approach for ...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Wazzeh, Mohamad Arafeh, Mohamad Ould-Slimane, Hakima Talhi, Chamseddine Mourad, Azzam Otrok, Hadi Department of Software and It Engineering Montreal Canada Department of Mathematics and Computer Science Trois-Rivières Canada Cyber Security Systems and Applied Ai Research Center Lebanese American University Department of Csm Beirut Lebanon New York University Division of Science Abu Dhabi United Arab Emirates Khalifa University Department of Eecs Abu Dhabi United Arab Emirates
In today's rapidly evolving technological landscape, ensuring the security of systems requires continuous authentication over sessions and comprehensive access management during user interaction with a device. Wit... 详细信息
来源: 评论
Deep Reinforcement Learning for Multi-Objective Resource Allocation in Multi-Platoon Cooperative Vehicular Networks
Deep Reinforcement Learning for Multi-Objective Resource All...
收藏 引用
作者: Xu, Yuanyuan Zhu, Kun Xu, Hu Ji, Jiequ Hohai University College of Computer and Information Nanjing211100 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing211106 China University of Victoria Department of Electrical and Computer Engineering VictoriaV8P 5C2 Canada
Grouping vehicles into platoons is a promising cooperative driving scenario to enhance the traffic safety and capacity of future vehicular networks. However, fast changing channel conditions in multi-platoon vehicular... 详细信息
来源: 评论