咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,370 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,501 篇 工学
    • 1,967 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 82 篇 accuracy
  • 80 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,671 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and software Engineering"
4105 条 记 录,以下是531-540 订阅
排序:
Depth3DSketch: Freehand Sketching Out of Arm’s Reach in Virtual Reality
Depth3DSketch: Freehand Sketching Out of Arm’s Reach in Vir...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Bashar, Mohammad Raihanul Amini, Mohammadreza Stuerzlinger, Wolfgang Sarac, Mine Pfeuffer, Ken Machuca, Mayra Donaji Barrera Batmaz, Anil Ufuk Department of Computer Science & Software Engineering Concordia University MontrealQC Canada Simon Fraser University VancouverBC Canada Kadir Has University Istanbul Turkey Department of Computer Science Aarhus University Aarhus Denmark Faculty of Computer Science Dalhousie University HalifaxNS Canada
Due to the increasing availability and popularity of virtual reality (VR) systems, 3D sketching applications have also boomed. Most of these applications focus on peripersonal sketching, e.g., within arm’s reach. Yet... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
IEEE Communication Strategies in Digital Society Workshop (ComSDS)
作者: Mohamed Saber Natalia Gusarova Vladimir Bogatyrev Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论
An Efficient Detection Model for Brain Stroke Based on Transfer Learning
An Efficient Detection Model for Brain Stroke Based on Trans...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Faroq H. M. Mohammed Abdulfattah Ba Alawi Ferhat Bozkurt M. Dilruba Geyikoğlu Electrical and Electronic Engineering Dept. Faculty of Engineering Ataturk University Erzurum Turkey Computer Engineering Dept. Faculty of Engineering Ataturk University Erzurum Turkey Software Engineering Dept. Faculty of Engineering & IT Taiz University Taiz Yemen
Brain stroke is one of the most common causes of death, ranking as the second leading cause worldwide. With the advancements of deep learning, the detection of brain strokes from CT images becomes possible. In this st... 详细信息
来源: 评论
Service Migration for Delay-Sensitive IoT Applications in Edge Networks
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1782-1797页
作者: Li, Xiaocui Zhou, Zhangbing Wang, Yasha Deng, Shuiguang Hung, Patrick C. K. School of Information Engineering Beijing100083 China Peking University National Research & Engineering Center of Software Engineering Beijing100871 China Peking University New Generation Information Technology Research Institute Tianjin300380 China School of Information Engineering Frontiers Science Center for Deep-Time Digital Earth Beijing100083 China Institut Polytechnique de Paris Télécom SudParis Palaiseau91120 France Zhejiang University College of Computer Science and Technology Hangzhou310012 China Ontario Tech University Faculty of Business and Information Technology Oshawa Canada
The proliferation of Internet of Things (IoT) applications prompts extraordinary demands for the collaboration of large amounts of computational resources provided by IoT devices in edge networks, and these applicatio... 详细信息
来源: 评论
An Approach for Early Detection of Schizophrenia
An Approach for Early Detection of Schizophrenia
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Sachin Paranagama Isiwara Uditha Pamodya Daundasekara Shehani Hettiarachchi Lokesha Weerasinghe Dharshana Kasthurirathna Department of Computer Science and Software Engineering Faculty Of Computing Sri Lanka Institue Of Information Technology Malabe Sri Lanka
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Konstantin Babushkin Nikolai Timofeev Ivan Filianin Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
2025 International Russian Smart Industry Conference, SmartIndustryCon 2025
作者: Babushkin, Konstantin Timofeev, Nikolai Filianin, Ivan ITMO University Faculty of Infocommunication Technologies St. Petersburg Russia ITMO University Faculty of Software Engineering and Computer Systems St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
Offline Handwriting Signature Verification: A Transfer Learning and Feature Selection Approach
arXiv
收藏 引用
arXiv 2024年
作者: Özyurt, Fatih Majidpour, Jafar Rashid, Tarik A. Koç, Canan Department of Software Engineering Faculty of Engineering Firat University Elazig23119 Turkey Department of Software and Informatics Engineering University of Raparin Kurdistan Region Rania Iraq Department of Computer Science Faculty of Science Soran University Kurdistan Region Soran Iraq Computer Science and Engineering Department University of Kurdistan Hewlêr Erbil Iraq
Handwritten signature verification poses a formidable challenge in biometrics and document authenticity. The objective is to ascertain the authenticity of a provided handwritten signature, distinguishing between genui... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & Sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
2025 Communication Strategies in Digital Society Seminar, ComSDS 2025
作者: Saber, Mohamed Gusarova, Natalia Bogatyrev, Vladimir Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论