咨询与建议

限定检索结果

文献类型

  • 14,450 篇 会议
  • 9,414 篇 期刊文献
  • 435 册 图书

馆藏范围

  • 24,299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,453 篇 工学
    • 9,682 篇 计算机科学与技术...
    • 7,885 篇 软件工程
    • 2,818 篇 信息与通信工程
    • 2,600 篇 控制科学与工程
    • 1,771 篇 电气工程
    • 1,539 篇 生物工程
    • 1,498 篇 电子科学与技术(可...
    • 1,115 篇 机械工程
    • 1,113 篇 生物医学工程(可授...
    • 1,021 篇 光学工程
    • 676 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 599 篇 动力工程及工程热...
    • 539 篇 材料科学与工程(可...
    • 527 篇 安全科学与工程
    • 525 篇 交通运输工程
  • 7,874 篇 理学
    • 4,039 篇 数学
    • 2,027 篇 物理学
    • 1,839 篇 生物学
    • 1,285 篇 统计学(可授理学、...
    • 1,212 篇 系统科学
    • 758 篇 化学
  • 3,889 篇 管理学
    • 2,615 篇 管理科学与工程(可...
    • 1,449 篇 图书情报与档案管...
    • 1,269 篇 工商管理
  • 1,159 篇 医学
    • 978 篇 临床医学
    • 850 篇 基础医学(可授医学...
    • 508 篇 药学(可授医学、理...
  • 646 篇 法学
    • 547 篇 社会学
  • 469 篇 经济学
    • 465 篇 应用经济学
  • 318 篇 教育学
  • 255 篇 农学
  • 65 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 905 篇 computer science
  • 504 篇 software enginee...
  • 450 篇 deep learning
  • 331 篇 machine learning
  • 325 篇 computational mo...
  • 280 篇 application soft...
  • 267 篇 feature extracti...
  • 267 篇 accuracy
  • 256 篇 computer archite...
  • 250 篇 training
  • 247 篇 artificial intel...
  • 240 篇 systems engineer...
  • 233 篇 internet of thin...
  • 198 篇 support vector m...
  • 198 篇 neural networks
  • 190 篇 optimization
  • 175 篇 data mining
  • 165 篇 image segmentati...
  • 162 篇 reinforcement le...
  • 158 篇 laboratories

机构

  • 258 篇 college of compu...
  • 113 篇 school of comput...
  • 92 篇 state key labora...
  • 85 篇 school of comput...
  • 76 篇 graduate school ...
  • 68 篇 software enginee...
  • 65 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 41 篇 school of softwa...
  • 38 篇 department of co...
  • 37 篇 school of comput...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 36 篇 inesc tec - inst...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 32 篇 department of co...

作者

  • 47 篇 rajkumar buyya
  • 43 篇 niyato dusit
  • 41 篇 m. zahn
  • 31 篇 liu yang
  • 30 篇 baowen xu
  • 29 篇 mengchu zhou
  • 29 篇 johansson karl h...
  • 28 篇 zhou jie
  • 26 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 21 篇 bo du
  • 21 篇 e. rogers
  • 21 篇 liu xin
  • 21 篇 bentahar jamal
  • 20 篇 zhang lei
  • 20 篇 li yang

语言

  • 23,101 篇 英文
  • 876 篇 其他
  • 304 篇 中文
  • 31 篇 日文
  • 10 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24299 条 记 录,以下是221-230 订阅
排序:
Bayes and Biased Estimators Without Hyper-Parameter Estimation: Comparable Performance to the Empirical-Bayes-Based Regularized Estimator
收藏 引用
IEEE Control systems Letters 2025年 9卷 294-299页
作者: Yue Ju Bo Wahlberg Håkan Hjalmarsson Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden Division of Decision and Control Systems and the Competence Centre for Advanced BioProduction by Continuous Processing AdBIOPRO School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden
Regularized system identification has become a significant complement to more classical system identification. It has been numerically shown that kernel-based regularized estimators often perform better than the maxim... 详细信息
来源: 评论
Enhancing Data Security and Privacy in Cloud Computing: A Survey of Modern Techniques  3
Enhancing Data Security and Privacy in Cloud Computing: A Su...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Suganya, N. Gouthami, P. Sathiya, R. Sivaranjani, S. Murugesan, M. Department of Computer Science and Business Systems Dr. N.G.P. Institute of Technology Coimbatore India Department of Information Technology Thangavelu Engineering College Chennai India Departement of Electrical and Electronics Engineering Sri Krishna College of Engineering and Technology Coimbatore India Departement of Electrical and Electronics Engineering Karpagam Institute of Technology Coimbatore India
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p... 详细信息
来源: 评论
Research on Tumor Images Segmentation based on Improved Convolutional Neural Network  24
Research on Tumor Images Segmentation based on Improved Conv...
收藏 引用
5th International Symposium on Artificial Intelligence for Medicine science, ISAIMS 2024
作者: Wan, Yajie Diao, Su Jiang, Gaozhe Song, Chaoda Department of Computer Science Brown University ProvidenceRI United States Department of Industrial & Systems Engineering Auburn University AuburnAL United States Institute of Operations Research and Analytics National University of Singapore Singapore Singapore School of Engineering Department of Computer and Data Sciences ClevelandOH United States
Tumors are one of the most common tumors in humans, and the main treatment at present is surgical removal. Preoperative planning of tumors usually requires a professional doctor to manually segment the images, but thi... 详细信息
来源: 评论
Adaptive Deep Reinforcement Learning-based Resource Management for Complex Decision Making in Industry Internet of Things Applications  4
Adaptive Deep Reinforcement Learning-based Resource Manageme...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karne, Niharika Ramagundam, Chandra Shekar Patnala, Ranga Rao Ramagundam, Shashishekhar Tadiboina, Sai Nitisha Sr. Principal Systems Engineer in C&RS Platform Services University of South Alabama Department of Electrical Engineering Masters in Electrical Engineering Amtrak DT United States Software Engineer in Cloud Platform Services City of Philadelphia Pennsylvania United States Vice President Neuberger Berman United States Software Development & Engineering in Content Discovery & AI Troy University Department of Computer Science Masters in Computer Science AL Comcast Montgomery Campus United States Department of Information Technology GEICO - Chevy Chase Chevy ChaseMD20815 United States
An independent industrial system may transform into a connected network through the assistance of Industrial Internet of Things (IIoT). The deployed sensors in the IIoT maintain surveillance of the industrial machiner... 详细信息
来源: 评论
The Cost of Balanced Training-Data Production in an Online Data Market  25
The Cost of Balanced Training-Data Production in an Online D...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Chaintreau, Augustin Maio, Roland Ziani, Juba Columbia University Computer Science Department New YorkNY United States Georgia Institute of Technology Industrial and Systems Engineering AtlantaGA United States
Many ethical issues in machine learning are connected to the training data. Online data markets are an important source of training data, facilitating both production and distribution. Recently, a trend has emerged of... 详细信息
来源: 评论
Ethiopic Cryptography: An Efficient Hybrid Encryption Algorithm for Reducing Cybersecurity Attack  11th
Ethiopic Cryptography: An Efficient Hybrid Encryption Algori...
收藏 引用
11th EAI International Conference on Advancement of science and Technology, ICAST 2023
作者: Akele, Tadesse Birara Bahiru, Tadesse Kebede Molla, Tibebu Legesse Fentie, Shambel Dessale Belay, Tadesse Destaw Marye, Almaz Yemataw Getaneh, Mersha Derese Department of Information System Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Information Technology Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Deparment of Software Engineering Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Computer Science Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia
Cryptography is an essential tool in ensuring the security of data during network communication. Network and service providers prioritize data security to ensure secure data exchanges. Ethiopic cryptography is a uniqu... 详细信息
来源: 评论
Analysis of converting -circuit into -circuit
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-14页
作者: Luo, Qing-bin Ding, Lang Yang, Guo-wu Li, Xiao-yu College of Intelligent Systems Science and Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
A $\mathfrak{C^{*}}$ -circuit, which was proposed in Asiacypt 2022 by Huang and Sun (Advances in cryptology – ASIACRYPT 2022, pp. 614–644, 2022), can directly perform calculations with the existing quantum ...
来源: 评论
Security Aspects of Container Orchestration in Kubernetes Environments
Security Aspects of Container Orchestration in Kubernetes En...
收藏 引用
International Symposium on INFOTEH-JAHORINA (INFOTEH)
作者: Sava Stanišić Milan Vesković Olga Ristić Borislav Đorđević Department of Computer and Software Engineering Faculty of Technical Sciences Čačak Republic of Serbia IMP Computer Systems Mihajlo Pupin Institute Belgrade Republic of Serbia
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernete... 详细信息
来源: 评论
LLGS: Illuminating Gaussian Splatting via absorptance Modulation
LLGS: Illuminating Gaussian Splatting via absorptance Modula...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Gan, Jianwen Li, Wenxin Zheng, Bo Wang, Chengliang Wu, Yingbo National Elite Institute of Engineering Chongqing University Chongqing China AI Lab Chongqing Changan Automobile Co. Ltd. Chongqing China College of Computer Science Chongqing University Chongqing China School of Big Data & Software Engineering Chongqing University Chongqing China
Low-light images are typically characterized by low pixel intensity and color distortion, presenting a significant challenge for accurate 3D reconstruction with 3D Gaussian Splatting (3DGS). Traditional 2D enhancement... 详细信息
来源: 评论
Automated Image Captioning systems
Automated Image Captioning Systems
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Aman Swaraj Ravi Raj Aniket Shaw Richa Dubey Prianka Dey Sagarika Chowdhury Computer Science and Business Systems Narula Institute of Technology Kolkata India Computer Science & Engineering (AI& ML) Narula Institute of Technology Kolkata India
The objective of the project is to design a system that leverages live camera feeds to detect objects in real time and generate concise, meaningful descriptions of the scene. The system processes the visual input, ide... 详细信息
来源: 评论