咨询与建议

限定检索结果

文献类型

  • 14,721 篇 会议
  • 9,588 篇 期刊文献
  • 436 册 图书

馆藏范围

  • 24,745 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,731 篇 工学
    • 9,872 篇 计算机科学与技术...
    • 7,974 篇 软件工程
    • 2,901 篇 信息与通信工程
    • 2,729 篇 控制科学与工程
    • 1,851 篇 电气工程
    • 1,546 篇 生物工程
    • 1,543 篇 电子科学与技术(可...
    • 1,152 篇 机械工程
    • 1,115 篇 生物医学工程(可授...
    • 1,040 篇 光学工程
    • 691 篇 仪器科学与技术
    • 673 篇 化学工程与技术
    • 620 篇 动力工程及工程热...
    • 565 篇 安全科学与工程
    • 561 篇 交通运输工程
    • 553 篇 材料科学与工程(可...
  • 7,977 篇 理学
    • 4,073 篇 数学
    • 2,065 篇 物理学
    • 1,856 篇 生物学
    • 1,295 篇 统计学(可授理学、...
    • 1,216 篇 系统科学
    • 778 篇 化学
  • 3,961 篇 管理学
    • 2,676 篇 管理科学与工程(可...
    • 1,473 篇 图书情报与档案管...
    • 1,290 篇 工商管理
  • 1,180 篇 医学
    • 992 篇 临床医学
    • 854 篇 基础医学(可授医学...
    • 510 篇 药学(可授医学、理...
  • 658 篇 法学
    • 557 篇 社会学
  • 473 篇 经济学
    • 468 篇 应用经济学
  • 324 篇 教育学
  • 255 篇 农学
  • 66 篇 文学
  • 46 篇 军事学
  • 41 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 905 篇 computer science
  • 508 篇 software enginee...
  • 474 篇 deep learning
  • 338 篇 computational mo...
  • 335 篇 machine learning
  • 298 篇 accuracy
  • 284 篇 feature extracti...
  • 280 篇 application soft...
  • 261 篇 computer archite...
  • 261 篇 artificial intel...
  • 260 篇 training
  • 242 篇 internet of thin...
  • 237 篇 systems engineer...
  • 199 篇 neural networks
  • 198 篇 support vector m...
  • 198 篇 optimization
  • 174 篇 reinforcement le...
  • 173 篇 data mining
  • 171 篇 image segmentati...
  • 161 篇 software

机构

  • 273 篇 college of compu...
  • 115 篇 school of comput...
  • 94 篇 state key labora...
  • 90 篇 school of comput...
  • 78 篇 graduate school ...
  • 71 篇 software enginee...
  • 69 篇 school of comput...
  • 67 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 40 篇 school of softwa...
  • 38 篇 school of comput...
  • 38 篇 inesc tec - inst...
  • 37 篇 department of co...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 graduate school ...
  • 32 篇 department of co...
  • 31 篇 school of automa...

作者

  • 46 篇 rajkumar buyya
  • 45 篇 niyato dusit
  • 42 篇 m. zahn
  • 31 篇 baowen xu
  • 31 篇 johansson karl h...
  • 30 篇 liu yang
  • 28 篇 zhou jie
  • 27 篇 mengchu zhou
  • 26 篇 jiang liu
  • 25 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 22 篇 shen linlin
  • 21 篇 zhang lei
  • 21 篇 liu xin
  • 20 篇 soni mukesh

语言

  • 20,837 篇 英文
  • 3,605 篇 其他
  • 307 篇 中文
  • 31 篇 日文
  • 19 篇 德文
  • 6 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24745 条 记 录,以下是1311-1320 订阅
排序:
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
收藏 引用
IEEE Transactions on Intelligent Transportation systems 2023年 第12期24卷 14536-14545页
作者: Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Ghaffar, Zahid Khan, Muhammad Khurram Das, Ashok Kumar National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan King Saud University Center of Excellence in Information Assurance Riyadh11653 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati... 详细信息
来源: 评论
A Classification Method for Satellite Imagery Utilizing Transfer Learning Techniques
A Classification Method for Satellite Imagery Utilizing Tran...
收藏 引用
IEEE International Conference on Signal Processing, Computing and Control (ISPCC)
作者: Jyotsana Gover Mansi Sharma Department of Computer Science and Information Systems WILP Birla Institute of Technology and Science Rajasthan Computer Science and Engineering Thapar Institute of Engineering & Technology Patiala Punjab India
This study focuses on land cover classification by determining the category of remote sensing images according to specific target class labels. The objective involves categorizing high-resolution satellite images from... 详细信息
来源: 评论
Building Modeling Tools Based on Metamodeling and Product Line Technologies
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 219-226页
作者: Zhiyi Ma Xiao He Software Institute School of Electronics Engineering and Computer Science Peking University Beijing China Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China
With the evolution of existing modeling languages and the emergence of more and more new modeling languages, it is necessary to rapidly build the corresponding software modeling tools with good quality. However, model... 详细信息
来源: 评论
Learning from Imperfect Data: Towards Efficient Knowledge Distillation of Autoregressive Language Models for Text-to-SQL
Learning from Imperfect Data: Towards Efficient Knowledge Di...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Zhong, Qihuang Chen, Kunfeng Ding, Liang Liu, Juhua Du, Bo Tao, Dacheng School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China The University of Sydney Australia Nanyang Technological University Singapore
Large Language Models (LLMs) have shown promising performance in text-to-SQL, which involves translating natural language questions into SQL queries. However, current text-to-SQL LLMs are computationally expensive and... 详细信息
来源: 评论
Google Scholar University Ranking Algorithm to Evaluate the Quality of Institutional Research
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4955-4972页
作者: Noor Ul Sabah Muhammad Murad Khan Ramzan Talib Muhammad Anwar Muhammad Sheraz Arshad Malik Puteri Nor Ellyza Nohuddin Department of Computer Science Government College UniversityFaisalabad 38000Pakistan Department of Information Sciences Division of Science and TechnologyUniversity of EducationLahore54000Pakistan Department of Software Engineering Government College UniversityFaisalabad 38000Pakistan Institute of IR4.0 Universiti Kebangsaan MalaysiaBangiSelangor43600Malaysia
Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertation... 详细信息
来源: 评论
Intelligent Gen: An Efficient On-Demand Access Protocol in MANETs using Network Simulator - 2  18
Intelligent Gen: An Efficient On-Demand Access Protocol in M...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Ganesan, T. Murali, N. Murugan, S. Palani Peter, M. Chandrakumar Raj, P. Anand Manikandan, S. E.G.S. Pillay Engineering College Department of Computer Science and Engineering Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Artificial Intelligence & Data Science Tamil Nadu Nagapattinam India Periyar Maniammai Institute of Science & Technology Department of Software Engineering Tamil Nadu Thanjavur India E.G.S. Pillay Engineering College Department of Computer Science and Business Systems Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Information Technology Tamil Nadu Nagapattinam India
Mobile Ad-Hoc network is a self-configuring and multi-hop collection of mobile devices for making successful communication. The wireless and mobile communication process are encountered based on bandwidth, process con... 详细信息
来源: 评论
AI-Driven Mobile Healthcare: Societal Impact, Workforce Adaptation, and Enhanced Predictive Modeling for Diabetes Risk Assessment
AI-Driven Mobile Healthcare: Societal Impact, Workforce Adap...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Hole, Shreyas Rajendra Kolluru, Vinothkumar Gangul, Ranita Kolekar, Sagar Chintakunta, Advaitha Naidu Mungara, Sudeep Bangalore India Institute of Technology Department of Data Science Stevens HobokenNJ07030 United States Delaware State University Computer Science & Engineering Bangalore India Department of Civil Engineering Pune India University of North Carolina at Charlotte Department of Computer Science CharlotteNC28223 United States Masters in Information Systems Stevens Institute of Technology HobokenNJ07030 United States
With advancements in artificial intelligence, it is natural for the health industry to focus on IOT devices. AI could promote a paradigm shift in how doctors and patients interact through immediate updates, predictive... 详细信息
来源: 评论
Dynamic Curing and Network Design in SIS Epidemic Processes  63
Dynamic Curing and Network Design in SIS Epidemic Processes
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Yi, Yuhao Shan, Liren Pare, Philip E. Johansson, Karl H. Sichuan University Institute of Clinical Pathology West China Hospital College of Computer Science Chengdu China Toyota Technological Institute at Chicago United States Purdue University School of Electrical and Computer Engineering West LafayetteIN United States Kth Royal Institute of Technology and They Are Also Affiliated with Digital Futures Division of Decision and Control Systems School of Electrical Engineering and Computer Science StockholmSE-100 44 Sweden
This paper studies efficient algorithms for dynamic curing policies and the corresponding network design problems to guarantee fast extinction of epidemic spread in a Markov process-based susceptible-infected-suscepti... 详细信息
来源: 评论
Development of a Model for Discriminating Electroencephalograms of Patients with Mild Cognitive Impairment and Healthy Individuals Using a Support Vector Machine  13
Development of a Model for Discriminating Electroencephalogr...
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Tanabe, Akifumi Nakatani, Kyosuke Harachi, Kento Yamamoto, Yusuke Muramatsu, Ayumi Nagahara, Hajime Takemura, Noriko Shimojo, Shinji Furihata, Daisuke Mizuno-Matsumoto, Yuko Kamae-Shigenobu, Kazue Shinosaki, Kazuhiro Graduate School of Information Science University of Hyogo Kobe Japan School of Life Science and Technology Tokyo Institute of Technology Yokohama Japan Aino University Department of Medical Engineering Ibaraki Japan Institute for Datability Science Osaka University Suita Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Aomori University Faculty of Software and Information Technology Aomori Japan Osaka University Cyber Media Center Suita Japan Asakayama General Hospital Sakai Japan
We performed machine learning using spectrum analysis and power spectra of electroencephalograms (EEGs) of patients with mild cognitive impairment (MCI). Spectrum analysis was performed on the EEGs of MCI patients and... 详细信息
来源: 评论
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle
收藏 引用
IEEE Transactions on Network science and engineering 2024年 第4期11卷 3495-3511页
作者: Chew, Chit-Jie Lee, Wei-Bin Chen, Tzu-Hao Lin, Iuon-Chang Lee, Jung-San Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan Hon Hai Research Institute Information Security Research Center Taipei236 Taiwan National Chung Hsing University Department of Management Information Systems Taichung402 Taiwan
The rise of cybercrime has led to an explosion of threats in recent years, resulting in the increasingly important of digital forensics. To achieve successful investigation and prosecution, the log preservation is a c... 详细信息
来源: 评论