咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,366 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,511 篇 工学
    • 1,974 篇 计算机科学与技术...
    • 1,650 篇 软件工程
    • 488 篇 信息与通信工程
    • 366 篇 控制科学与工程
    • 275 篇 生物工程
    • 225 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 195 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 96 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,195 篇 理学
    • 646 篇 数学
    • 318 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 160 篇 系统科学
    • 93 篇 化学
  • 817 篇 管理学
    • 508 篇 管理科学与工程(可...
    • 332 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 211 篇 医学
    • 177 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 127 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 76 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 82 篇 software
  • 82 篇 accuracy
  • 78 篇 artificial intel...
  • 72 篇 training
  • 65 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 41 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,874 篇 英文
  • 189 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4097 条 记 录,以下是1071-1080 订阅
排序:
SAMMS: Multi-modality Deep Learning with the Foundation Model for the Prediction of Cancer Patient Survival
SAMMS: Multi-modality Deep Learning with the Foundation Mode...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Wen Zhu Yiwen Chen Shanling Nie Hai Yang Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Center for Continuing and Lifelong Education National University of Singapore Singapore Faculty of Engineering The University of Sydney Australia
Cancer survival prediction is pivotal in tailoring individualized treatment strategies and guiding clinician decision-making. Yet, existing methodologies grapple with efficiently harnessing the intricate distribution ...
来源: 评论
Reliability of a Reconfigurable Network with Segment Switching
Reliability of a Reconfigurable Network with Segment Switchi...
收藏 引用
Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)
作者: Le Anh Tu V. A. Bogatyrev E. A. Abramova Faculty of Software Engineering and Computer Technology ITMO University Saint Peterburg Russia Department Information Systems Security Saint-Petersburg State University of Aerospace Instrumentation Saint Petersburg Russia
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ...
来源: 评论
Efficient Byzantine-Robust Federated Learning Based on the Multi-Message Shuffle Protocol for Consumer Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jin, Chunhua Li, Lulu Wang, Jiahao Li, Jinbiao Liu, Junyi Chen, Guanhua Zhang, Hao Weng, Jian Faculty of Computer Software Engineering with Huaiyin Institute of Technology Huai’an China Huaiyin Institute of Technology Faculty of Computer Software Engineering Huai’an China Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huaian China Jinan University College of Information Science and Technology China
The accelerated advancement of consumer Internet of Things (CIoT) devices has resulted in their pervasive integration into the fabric of contemporary lifestyles. As these devices are capable of collecting vast quantit... 详细信息
来源: 评论
Emotional Kansei Words for Digital and Pervasive Product Design
Emotional Kansei Words for Digital and Pervasive Product Des...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Nik Azlina Nik Ahmad Anitawati Mohd Lokman Munaisyah Abdullah Ahmad Iqbal Hakim Suhaimi Software Engineering Section Universiti Kuala Lumpur Malaysian Institute of Information Technology Kuala Lumpur Malaysia Faculty of Computer and Mathematical Sciences Universiti Teknologi MARA Shah Alam Malaysia
The explosive growth of pervasive and diverse digital products demands the importance of addressing emotional design within the sphere of product development. As a result, there has been a significant focus from both ...
来源: 评论
An Overview of the Approaches for Generating Test Data in the Context of the Quality Assurance of Big Data Applications
An Overview of the Approaches for Generating Test Data in th...
收藏 引用
International IEEE Conference on Signal-Image Technologies and Internet-Based System
作者: Daniel Staegemann Matthias Pohl Christian Haertel Christian Daase Mohammad Abdallah Klaus Turowski Faculty of Computer Science Magdeburg Research and Competence Cluster VLBA Otto-von-Guericke University Magdeburg Germany Department of Software Engineering Al-Zaytoonah University of Jordan Amman Jordan
With society’s increasing data production and the corresponding demand for systems that are capable of utilizing them, the big data domain has gained significant importance. However, besides the systems’ actual impl...
来源: 评论
An Efficient Hardware Accelerator For Lossless Data Compression
An Efficient Hardware Accelerator For Lossless Data Compress...
收藏 引用
International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
作者: Adel Mahmoud Samuel Medhat Mark Maged Othman Mohamed Reham Karam Khaled Salah M. Watheq El-Kharashi Department of computer and systems Faculty of engineering Ain Shams University Cairo Egypt Siemens Digital Industries Software Fremont USA
Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must ... 详细信息
来源: 评论
Reliability of Multipath Networks with Optimization of the Location of Inter-Path Communication Nodes
Reliability of Multipath Networks with Optimization of the L...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Vladimir A. Bogatyrev Anh Tu Le Evgenia A. Abramova Department Information Systems Security Saint-Petersburg State University of Aerospace Instrumentation Saint Petersburg Russia Faculty of Software Engineering and Computer Technology University ITMO Saint Peterburg Russia
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p... 详细信息
来源: 评论
Heterogeneous Deniable Authenticated Encryption Protocol  3rd
Heterogeneous Deniable Authenticated Encryption Protocol
收藏 引用
3rd International Conference on Frontiers in Cyber Security, FCS 2020
作者: Jin, Chunhua Kan, Ge Chen, Guanhua Yu, Changhui Xu, Chengjie Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an233003 China
Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the cost of ... 详细信息
来源: 评论
Induced Matching below Guarantees: Average Paves the Way for Fixed-Parameter Tractability
arXiv
收藏 引用
arXiv 2022年
作者: Koana, Tomohiro Technische Universität Berlin Faculty IV Institute of Software Engineering and Theoretical Computer Science Algorithmics and Computational Complexity Germany
In this work, we study the Induced Matching problem: Given an undirected graph G and an integer , is there an induced matching M of size at least ? An edge subset M is an induced matching in G if M is a matching such ... 详细信息
来源: 评论
Identity-based proxy signing key insulated signature in the standard model
Identity-based proxy signing key insulated signature in the ...
收藏 引用
2020 International Symposium on Electronic Information Technology and Communication engineering, ISEITCE 2020
作者: Chen, Jianhong Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian223003 China
The first signer arranges for an agent to generate a proxy private key using an identity based proxy signature (IBPS) scheme. The agent outputs the proxy signature for the first signer can generate the signature for t... 详细信息
来源: 评论