咨询与建议

限定检索结果

文献类型

  • 14,721 篇 会议
  • 9,588 篇 期刊文献
  • 436 册 图书

馆藏范围

  • 24,745 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,731 篇 工学
    • 9,872 篇 计算机科学与技术...
    • 7,974 篇 软件工程
    • 2,901 篇 信息与通信工程
    • 2,729 篇 控制科学与工程
    • 1,851 篇 电气工程
    • 1,546 篇 生物工程
    • 1,543 篇 电子科学与技术(可...
    • 1,152 篇 机械工程
    • 1,115 篇 生物医学工程(可授...
    • 1,040 篇 光学工程
    • 691 篇 仪器科学与技术
    • 673 篇 化学工程与技术
    • 620 篇 动力工程及工程热...
    • 565 篇 安全科学与工程
    • 561 篇 交通运输工程
    • 553 篇 材料科学与工程(可...
  • 7,977 篇 理学
    • 4,073 篇 数学
    • 2,065 篇 物理学
    • 1,856 篇 生物学
    • 1,295 篇 统计学(可授理学、...
    • 1,216 篇 系统科学
    • 778 篇 化学
  • 3,961 篇 管理学
    • 2,676 篇 管理科学与工程(可...
    • 1,473 篇 图书情报与档案管...
    • 1,290 篇 工商管理
  • 1,180 篇 医学
    • 992 篇 临床医学
    • 854 篇 基础医学(可授医学...
    • 510 篇 药学(可授医学、理...
  • 658 篇 法学
    • 557 篇 社会学
  • 473 篇 经济学
    • 468 篇 应用经济学
  • 324 篇 教育学
  • 255 篇 农学
  • 66 篇 文学
  • 46 篇 军事学
  • 41 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 905 篇 computer science
  • 508 篇 software enginee...
  • 474 篇 deep learning
  • 338 篇 computational mo...
  • 335 篇 machine learning
  • 298 篇 accuracy
  • 284 篇 feature extracti...
  • 280 篇 application soft...
  • 261 篇 computer archite...
  • 261 篇 artificial intel...
  • 260 篇 training
  • 242 篇 internet of thin...
  • 237 篇 systems engineer...
  • 199 篇 neural networks
  • 198 篇 support vector m...
  • 198 篇 optimization
  • 174 篇 reinforcement le...
  • 173 篇 data mining
  • 171 篇 image segmentati...
  • 161 篇 software

机构

  • 273 篇 college of compu...
  • 115 篇 school of comput...
  • 94 篇 state key labora...
  • 90 篇 school of comput...
  • 78 篇 graduate school ...
  • 71 篇 software enginee...
  • 69 篇 school of comput...
  • 67 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 40 篇 school of softwa...
  • 38 篇 school of comput...
  • 38 篇 inesc tec - inst...
  • 37 篇 department of co...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 graduate school ...
  • 32 篇 department of co...
  • 31 篇 school of automa...

作者

  • 46 篇 rajkumar buyya
  • 45 篇 niyato dusit
  • 42 篇 m. zahn
  • 31 篇 baowen xu
  • 31 篇 johansson karl h...
  • 30 篇 liu yang
  • 28 篇 zhou jie
  • 27 篇 mengchu zhou
  • 26 篇 jiang liu
  • 25 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 22 篇 shen linlin
  • 21 篇 zhang lei
  • 21 篇 liu xin
  • 20 篇 soni mukesh

语言

  • 20,837 篇 英文
  • 3,605 篇 其他
  • 307 篇 中文
  • 31 篇 日文
  • 19 篇 德文
  • 6 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24745 条 记 录,以下是1071-1080 订阅
排序:
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech Technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论
Optimally Scheduling Single-Arm Multicluster Tools for Manufacturing Hybrid-Type Wafers
Optimally Scheduling Single-Arm Multicluster Tools for Manuf...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Wang, Genghong Zhu, Qinghua Hou, Yan Qiao, Yan Wu, Naiqi Zhou, Mengchu School of Computer Science and Technology Guangdong University of Technology Guangzhou China Institute of Systems Engineering Macau University of Science and Technology Macau China New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07920 United States
In semiconductor manufacturing, multicluster tools are widely employed for many wafer fabrication processes. With the demand for high-mix integrated circuit chips and shrinkage of circuit width, a scheme in which mult... 详细信息
来源: 评论
Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4695-4711页
作者: Mohammed Altaf Ahmed Sara A Althubiti Dronamraju Nageswara Rao ELaxmi Lydia Woong Cho Gyanendra Prasad Joshi Sung Won Kim Department of Computer Engineering College of Computer Engineering&SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science and Engineering Chitkara University Institute of Engineering and TechnologyChitkara UniversityPunjab140401India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Software Convergence Daegu Catholic UniversityGyeongsan38430Korea Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siGyeongbuk-do38541Korea
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet... 详细信息
来源: 评论
Content based Image Retrieval using K-Nearest Neighbours and Convolutional Neural Networks  15
Content based Image Retrieval using K-Nearest Neighbours and...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kumar, C. Siva Bhaskaru, O. Komatlapalli, Bhargavi Areddula, Phani Sai Kumar Maddali, Manikanta Reddy, Busa Rajasekhar Tirupati India Dept. of CSE Gates Institute of Technology Gooty A.P Ananthapur India Department of Computer Science and Systems Engineering Sree Vidyanikethan Engineering College Tirupati India
Today, there is a lot of digital image material on the Internet. As the need for better image search tools grows, new waysmust be found to solve the problem of telling the difference betweenquestion pictures and recei... 详细信息
来源: 评论
Noisy Node Classification by Bi-level Optimization Based Multi-Teacher Distillation  39
Noisy Node Classification by Bi-level Optimization Based Mul...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Yujing Wu, Zongqian Lu, Zhengyu Nie, Ci Wen, Guoqiu Zhu, Yonghua Zhu, Xiaofeng School of Computer Science and Engineering Guangxi Normal University Guilin China Guangxi Key Lab of Multisource Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Information Engineering Anyang Institute of Technology Anyang China Information Systems Technology Design Pillar Singapore University of Technology and Design Singapore
Previous graph neural networks (GNNs) usually assume that the graph data is with clean labels for representation learning, but it is not true in real applications. In this paper, we propose a new multi-teacher distill... 详细信息
来源: 评论
TizenRT OS Based Data Compression Algorithms for IoT Devices  4
TizenRT OS Based Data Compression Algorithms for IoT Devices
收藏 引用
4th IEEE International Conference on Computing, Communication, and Intelligent systems, ICCCIS 2023
作者: Chamak, Tanmoy Roy Kaushik, Sachi Singhal, Shiven Dadheech, Aditya Anitha, Prof. A. Jenicka, Prof. S. Thapa, Vidisha School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Samsung Research Institute Karnataka Bangalore India
The paper investigates the integration and adaptation of the LZ4 compression algorithm within the context of TizenRT, in addition to existing algorithms Miniz and LZMA. TizenRT, a real-Time operating system tailored f... 详细信息
来源: 评论
Locating What You Need: Towards Adapting Diffusion Models to OOD Concepts In-the-Wild  38
Locating What You Need: Towards Adapting Diffusion Models to...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Yang, Jianan Gao, Chenchao Xiao, Zhiqing Zhao, Junbo Wu, Sai Chen, Gang Wang, Haobo College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China School of Software Technology Zhejiang University China International School of Information Science and Engineering Dalian University of Technology China
The recent large-scale text-to-image generative models have attained unprecedented performance, while people established adaptor modules like LoRA and DreamBooth to extend this performance to even more unseen concept ...
来源: 评论
CASKA-CRT: Chinese Remainder Theorem Empowered Certificateless Aggregate Signcryption Scheme with Key Agreement in IoVs
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第11期9卷 1-16页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu Sun, Zhili Mumtaz, Shahid Tian, Daxin School of Cyber Science and Engineering Wuhan University Wuhan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Institute of Communication Systems University of Surrey Guildford U.K Department of Applied Informatics Silesian University of Technology Akademicka Gliwice Poland State Key Laboratory of Vehicle-Infrastructure Integrated ITS the State Key Laboratory of Intelligent Transportation System and the School of Transportation Science and Engineering Beihang University Beijing China
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ... 详细信息
来源: 评论
Motion path planning method based on map reference points
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Yu, Wenbin Fan, Cheng Zhang, Chengjun Chen, Yadang Li, Yangsong Zhang, Yifan Yin, Na Cen, Xiaolin School of Software Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China Wuxi Institute of Technology Nanjing University of Information Science and Technology Jiangsu Wuxi214000 China Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China School of Computer Science Northeastern University Boston02101 United States Computer Science and Engineering The University of New South Wales SydneyNSW02101 Australia
In recent years, significant progress has been made in the development of the Rapidly-exploring Random Trees (RRT) algorithm, a probabilistic sampling-based search approach. This algorithm effectively addresses comple... 详细信息
来源: 评论
Catalyzing EEG signal analysis: unveiling the potential of machine learning-enabled smart K nearest neighbor outlier detection
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-12页
作者: Aymen, Abid Khediri, Salim El Thaljaoui, Adel Miladi, Moahmed Kachouri, Abdennaceur Computer & amp Embedded Systems Lab National Engineering School of Sfax University of Sfax Sfax Tunisia Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Science of Gafsa University of Gafsa Gafsa Tunisia Preparatory Institute for Engineering Studies of Gafsa Gafsa Tunisia Department of Computer Science and Information College of Science at Zulfi Majmaah University Al-Majmaah 11952 Saudi Arabia Higher Institute of Computer Science and Multimedia of Sfax University of Sfax Sfax Tunisia Advanced Fluid Dynamics Energetics and Environment Lab National Engineering School of Sfax University of Sfax Sfax Tunisia
Electroencephalogram (EEG) data are susceptible to artifacts, such as lapses in concentration or poor imagination, which can significantly impact the accuracy of disease diagnosis in e-health applications. To mitigate... 详细信息
来源: 评论