咨询与建议

限定检索结果

文献类型

  • 14,813 篇 会议
  • 6,183 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,797 篇 工学
    • 10,017 篇 计算机科学与技术...
    • 8,334 篇 软件工程
    • 2,586 篇 信息与通信工程
    • 1,709 篇 控制科学与工程
    • 1,394 篇 生物工程
    • 1,189 篇 电气工程
    • 970 篇 生物医学工程(可授...
    • 880 篇 电子科学与技术(可...
    • 831 篇 机械工程
    • 700 篇 光学工程
    • 523 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 437 篇 化学工程与技术
    • 407 篇 建筑学
  • 5,742 篇 理学
    • 3,323 篇 数学
    • 1,557 篇 生物学
    • 1,070 篇 物理学
    • 946 篇 统计学(可授理学、...
    • 800 篇 系统科学
    • 457 篇 化学
  • 3,884 篇 管理学
    • 2,408 篇 管理科学与工程(可...
    • 1,638 篇 图书情报与档案管...
    • 1,201 篇 工商管理
  • 933 篇 医学
    • 823 篇 临床医学
    • 736 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 612 篇 法学
    • 474 篇 社会学
  • 398 篇 经济学
    • 396 篇 应用经济学
  • 396 篇 教育学
    • 381 篇 教育学
  • 208 篇 农学
  • 102 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,244 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 378 篇 deep learning
  • 355 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 301 篇 machine learning
  • 291 篇 accuracy
  • 272 篇 software systems
  • 271 篇 data mining
  • 261 篇 training
  • 245 篇 internet of thin...
  • 242 篇 feature extracti...
  • 222 篇 programming
  • 217 篇 support vector m...
  • 187 篇 artificial intel...
  • 185 篇 testing
  • 183 篇 optimization
  • 176 篇 semantics

机构

  • 344 篇 college of compu...
  • 196 篇 department of co...
  • 124 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 112 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 75 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 53 篇 department of co...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 49 篇 department of co...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 24 篇 kotagiri ramamoh...
  • 24 篇 mian ajmal
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 22 篇 sheldon s. willi...
  • 22 篇 zhao jian
  • 21 篇 qusay h. mahmoud

语言

  • 20,548 篇 英文
  • 556 篇 其他
  • 158 篇 中文
  • 8 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Software and Computer Engineering"
21256 条 记 录,以下是101-110 订阅
排序:
Unlocking the black box: an in-depth review on interpretability, explainability, and reliability in deep learning
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 859-965页
作者: ŞAHiN, Emrullah Arslan, Naciye Nur Özdemir, Durmuş Department of Software Engineering Kütahya Dumlupınar University Kütahya43100 Turkey Department of Computer Engineering Kütahya Dumlupınar University Kütahya43100 Turkey
Deep learning models have revolutionized numerous fields, yet their decision-making processes often remain opaque, earning them the characterization of "black-box" models due to their lack of transparency an... 详细信息
来源: 评论
PDIFT++: System-Wide Memory Tracking Using a Single-Process Memory Tracker
收藏 引用
SN computer Science 2024年 第2期5卷 226页
作者: Kiperberg, Michael Zaidenberg, Nezer Department of Software Engineering Shamoon College of Engineering Beer-Sheva Israel Department of Computer Sciences Ariel University Ariel Israel
Information-flow tracking is useful for preventing malicious code execution and sensitive information leakage. Unfortunately, the performance penalty of the currently available solutions is too high for real-world app... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Critical Thermal Characterization of Next-Generation Solid-State Batteries for Automotive Battery Management Systems  14
Critical Thermal Characterization of Next-Generation Solid-S...
收藏 引用
14th Annual IEEE Applied Power Electronics Conference and Exposition, APEC 2025
作者: Chetri, Chandan Williamson, Sheldon Group Department of Electrical Computer and Software Engineering Oshawa Canada
Solid-state batteries (SSBs) are at the forefront of next-generation energy storage technologies, promising enhanced safety, energy density, and longevity compared to traditional lithium-ion batteries. However, managi... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
DocTTT: Test-Time Training for Handwritten Document Recognition Using Meta-Auxiliary Learning
DocTTT: Test-Time Training for Handwritten Document Recognit...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Gu, Wenhao Gu, Li Wang, Ziqiang Suen, Ching Yee Wang, Yang Concordia University Department of Computer Science and Software Engineering Canada
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r... 详细信息
来源: 评论
How far are we to GPT-4V?Closing the gap to commercial multimodal models with open-source suites
收藏 引用
Science China(Information Sciences) 2024年 第12期67卷 5-22页
作者: Zhe CHEN Weiyun WANG Hao TIAN Shenglong YE Zhangwei GAO Erfei CUI Wenwen TONG Kongzhi HU Jiapeng LUO Zheng MA Ji MA Jiaqi WANG Xiaoyi DONG Hang YAN Hewei GUO Conghui HE Botian SHI Zhenjiang JIN Chao XU Bin WANG Xingjian WEI Wei LI Wenjian ZHANG Bo ZHANG Pinlong CAI Licheng WEN Xiangchao YAN Min DOU Lewei LU Xizhou ZHU Tong LU Dahua LIN Yu QIAO Jifeng DAI Wenhai WANG State Key Laboratory for Novel Software Technology Nanjing University Shanghai AI Laboratory School of Computer Science Fudan University SenseTime Research Department of Information Engineering The Chinese University of Hong Kong Department of Electronic Engineering Tsinghua University
In this paper, we introduce InternVL 1.5, an open-source multimodal large language model(MLLM) to bridge the capability gap between open-source and proprietary commercial models in multimodal understanding. We introdu... 详细信息
来源: 评论
Machine Learning Based Phishing Attacks Detection Using Multiple Datasets
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第5期17卷 71-83页
作者: Aljammal, Ashraf H. taamneh, Salah Qawasmeh, Ahmad Salameh, Hani Bani Department of Computer Science and Applications The Hashemite University Zarqa Jordan Department of Software Engineering The Hashemite University Zarqa Jordan
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so an accurate phishing detection system is required. Therefore, many phishing detection techniques have been proposed as well as ... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Prediction of software quality with Machine Learning-Based ensemble methods
收藏 引用
Materials Today: Proceedings 2023年 81卷 18-25页
作者: Ceran, A. Ayberk Ar, Yilmaz Tanrıöver, Ö. Özgür Seyrek Ceran, Sinem Department of Computer Engineering Ankara University Ankara 06830 Turkey Department of Software Engineering Turkish Aeronautical Association University Ankara 06790 Turkey
software quality prediction is used at various stages of projects. There are several metrics that provide the quality measure with respect to different types of software. In this study, defect density is used as the f... 详细信息
来源: 评论