咨询与建议

限定检索结果

文献类型

  • 14,488 篇 会议
  • 9,466 篇 期刊文献
  • 437 册 图书

馆藏范围

  • 24,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,485 篇 工学
    • 9,695 篇 计算机科学与技术...
    • 7,884 篇 软件工程
    • 2,818 篇 信息与通信工程
    • 2,602 篇 控制科学与工程
    • 1,777 篇 电气工程
    • 1,539 篇 生物工程
    • 1,501 篇 电子科学与技术(可...
    • 1,116 篇 机械工程
    • 1,113 篇 生物医学工程(可授...
    • 1,021 篇 光学工程
    • 677 篇 仪器科学与技术
    • 662 篇 化学工程与技术
    • 601 篇 动力工程及工程热...
    • 540 篇 材料科学与工程(可...
    • 527 篇 安全科学与工程
    • 525 篇 交通运输工程
  • 7,881 篇 理学
    • 4,041 篇 数学
    • 2,027 篇 物理学
    • 1,843 篇 生物学
    • 1,285 篇 统计学(可授理学、...
    • 1,212 篇 系统科学
    • 759 篇 化学
  • 3,894 篇 管理学
    • 2,618 篇 管理科学与工程(可...
    • 1,449 篇 图书情报与档案管...
    • 1,268 篇 工商管理
  • 1,164 篇 医学
    • 981 篇 临床医学
    • 851 篇 基础医学(可授医学...
    • 508 篇 药学(可授医学、理...
  • 647 篇 法学
    • 548 篇 社会学
  • 468 篇 经济学
    • 464 篇 应用经济学
  • 320 篇 教育学
  • 256 篇 农学
  • 65 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 906 篇 computer science
  • 502 篇 software enginee...
  • 456 篇 deep learning
  • 333 篇 machine learning
  • 330 篇 computational mo...
  • 280 篇 application soft...
  • 274 篇 feature extracti...
  • 272 篇 accuracy
  • 257 篇 computer archite...
  • 256 篇 training
  • 251 篇 artificial intel...
  • 238 篇 systems engineer...
  • 234 篇 internet of thin...
  • 198 篇 support vector m...
  • 198 篇 neural networks
  • 193 篇 optimization
  • 175 篇 data mining
  • 166 篇 image segmentati...
  • 162 篇 reinforcement le...
  • 157 篇 laboratories

机构

  • 259 篇 college of compu...
  • 113 篇 school of comput...
  • 92 篇 state key labora...
  • 84 篇 school of comput...
  • 75 篇 graduate school ...
  • 70 篇 software enginee...
  • 65 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 41 篇 school of softwa...
  • 38 篇 department of co...
  • 37 篇 school of comput...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 36 篇 inesc tec - inst...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 32 篇 department of co...

作者

  • 45 篇 rajkumar buyya
  • 43 篇 niyato dusit
  • 41 篇 m. zahn
  • 32 篇 liu yang
  • 30 篇 baowen xu
  • 29 篇 johansson karl h...
  • 28 篇 zhou jie
  • 28 篇 mengchu zhou
  • 26 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 e. rogers
  • 21 篇 liu xin
  • 21 篇 bentahar jamal
  • 20 篇 zhang lei
  • 20 篇 li yang

语言

  • 23,191 篇 英文
  • 876 篇 其他
  • 306 篇 中文
  • 31 篇 日文
  • 11 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24391 条 记 录,以下是431-440 订阅
排序:
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
Blockchain driven Evidence Management System  3
Blockchain driven Evidence Management System
收藏 引用
3rd International Conference on Artificial Intelligence and Signal Processing, AISP 2023
作者: Mehta, Shyam Kumari, K. Shantha Jain, Paras Raikwar, Harshal Gore, Shubham SRM Institute of Science & Technology Data Science and Business Systems Chennai India SRM Institute of Science & Technology Computer Science and Engineering Chennai India
When a cognizable violation like murder, abduction, rape, theft, etc. is committed, a victim or someone acting on their behalf must submit an electronic first information report (e-FIR) to the police station. Due to t... 详细信息
来源: 评论
Large Language Model-Based Optimization for System-Level Test Program Generation  37
Large Language Model-Based Optimization for System-Level Tes...
收藏 引用
37th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology systems, DFT 2024
作者: Schwachhofer, Denis Domanski, Peter Becker, Steffen Wagner, Stefan Sauer, Matthias Pfluger, Dirk Polian, Ilia Institute of Computer Engineering and Computer Architecture University of Stuttgart Stuttgart Germany Institute of Software Engineering University of Stuttgart Stuttgart Germany Institute for Parallel and Distributed Systems University of Stuttgart Stuttgart Germany Technical University of Munich Heilbronn Germany Advantest Europe Boeblingen Germany
System-Level Test (SLT) is essential for testing integrated circuits, focusing on functional and non-functional properties of the Device under Test (DUT). Traditionally, test engineers manually create tests with comme... 详细信息
来源: 评论
A New Method of Search Engine Optimization Based on Semantic Kernel Idea
A New Method of Search Engine Optimization Based on Semantic...
收藏 引用
作者: Orekhov, Sergey Godlevsky, Michail Malyhon, Hennadiy Goncharenko, Tetiana Computer Science and Software Engineering Department National Technical University Kharkiv Polytechnical Institute Kharkiv61002 Ukraine
The results of more than 30 projects in the field of search engine optimization on the Internet show that the effectiveness of existing approaches is catastrophically reduced. Paid promotion methods no longer guarante... 详细信息
来源: 评论
Dynamic Evolutionary Game-based Modeling,Analysis and Performance Enhancement of Blockchain Channels
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 188-202页
作者: PeiYun Zhang MengChu Zhou ChenXi Li Abdullah Abusorrah IEEE the School of Computer Science Nanjing University of Information Science&TechnologyNanjing 210044China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA the School of Computer and Information Anhui Normal UniversityWuhu 241003China the Department of Electrical and Computer Engineering Faculty of Engineeringand Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz UniversityJeddah 21481Saudi Arabia
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi... 详细信息
来源: 评论
An Energy Efficient Hybrid Communication Protocol for Large Area Wireless Sensor Networks  4
An Energy Efficient Hybrid Communication Protocol for Large ...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karthigeyan, Shreyas Bhol, Sampark Jain, Akshat Yadav, Karthik Sinha, Akash Padma Priya, R. School of Computer Science and Information Systems Vellore Institute of Technology Vellore Campus Tamil Nadu Vellore632014 India School of Computer Science and Engineering Vellore Institute of Technology Vellore Campus Tamil Nadu Vellore632014 India Department of Computer Science and Engineering Maulana Azad National Institute of Technology Madhya Pradesh Bhopal462003 India
Energy conservation is an indispensable aspect of the protocols designed for Wireless Sensor Networks (WSNs). The communication protocols for WSN fall mainly under two categories: centralized and distributed. Centrali... 详细信息
来源: 评论
Driving Simulator Study to Explore the Situational Acceptance and the Objective Indication Under Automated Driving  27
Driving Simulator Study to Explore the Situational Acceptanc...
收藏 引用
27th IEEE International Conference on Intelligent Transportation systems, ITSC 2024
作者: Li, Chenchang Yang, Bo Guan, Muhua Nakano, Kimihiko Institute of Industrial Science The University of Tokyo Tokyo153-8505 Japan School of Computer Science and Systems Engineering Kyushu Institute of Technology Fukuoka820-8502 Japan
Acceptance poses a significant challenge in deploying Level 4 and higher automated driving systems. To address this, the study introduces and validates the concept of situational acceptance, specifically focusing on h... 详细信息
来源: 评论
Apply Deep Learning-based CNN and LSTM for Visual Image Caption Generator  3
Apply Deep Learning-based CNN and LSTM for Visual Image Capt...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Indumathi, N. Divyalakshmi, R.J. Stalin, J. Ramachandran, V. Rajaram, P. Srm Institute of Science and Technology Computer Science and Applications Chennai India Sethu Institute of Technology Computer Science and Business Systems Virudhunagar India Computer Science and Engineering Gitam School of Computing Bengaluru India
Implemented Image captioning is becoming a need. Deep neural network models enable integrated applications to generate and caption images. Image captioning describes an image. It requires identifying an image's ma... 详细信息
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Shafee, Ahmed Awaad, Tasneem A. Moro, Ahmed Adams State University Department of Engineering and Computer Science AlamosaCO United States Ain Shams University Faculty of Engineering Department of Computer and Systems Engineering Cairo Egypt Siemens Eda Cairo Egypt Siemens Digital Industries Software Integrated Electrical Systems Segment Cairo Egypt
Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 4762-4778页
作者: Liu, Tao Vairagar, Shubhangi Adagale, Sushadevi Karthick, T. Karunya, Catherine Esther Blesswin, A. John Mary, G. Selva Tianjin Sino-German University of Applied Sciences Tianjin300350 China Department of Artificial Intelligence and Data Science Dr. D. Y. Patil Institute of Technology Pimpri Pune411018 India Department of Computer Engineering KJEI's Trinity Academy of Engineering Pune411048 India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Computer Science and Engineering School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Directorate of Learning and Development SRM Institute of Science and Technology Kattankulathur603203 India
The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and f... 详细信息
来源: 评论