咨询与建议

限定检索结果

文献类型

  • 3,719 篇 会议
  • 2,863 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,749 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,179 篇 工学
    • 3,015 篇 计算机科学与技术...
    • 2,446 篇 软件工程
    • 901 篇 信息与通信工程
    • 726 篇 控制科学与工程
    • 513 篇 电气工程
    • 484 篇 生物工程
    • 398 篇 电子科学与技术(可...
    • 362 篇 生物医学工程(可授...
    • 325 篇 机械工程
    • 274 篇 光学工程
    • 190 篇 动力工程及工程热...
    • 177 篇 安全科学与工程
    • 175 篇 仪器科学与技术
    • 162 篇 化学工程与技术
    • 149 篇 交通运输工程
  • 2,185 篇 理学
    • 1,101 篇 数学
    • 583 篇 生物学
    • 548 篇 物理学
    • 379 篇 统计学(可授理学、...
    • 314 篇 系统科学
    • 204 篇 化学
  • 1,212 篇 管理学
    • 835 篇 管理科学与工程(可...
    • 424 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 442 篇 医学
    • 387 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 184 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 222 篇 法学
    • 177 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 117 篇 教育学
  • 70 篇 农学
  • 25 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 188 篇 deep learning
  • 187 篇 machine learning
  • 151 篇 artificial intel...
  • 131 篇 accuracy
  • 130 篇 software enginee...
  • 115 篇 computational mo...
  • 115 篇 feature extracti...
  • 108 篇 internet of thin...
  • 96 篇 data mining
  • 95 篇 training
  • 87 篇 information syst...
  • 86 篇 wireless sensor ...
  • 80 篇 optimization
  • 77 篇 predictive model...
  • 75 篇 laboratories
  • 71 篇 support vector m...
  • 71 篇 cloud computing
  • 71 篇 convolutional ne...
  • 67 篇 computer archite...

机构

  • 44 篇 department of la...
  • 37 篇 college of compu...
  • 36 篇 sri lanka instit...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 school of comput...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 25 篇 sri lanka instit...
  • 25 篇 department of co...
  • 23 篇 institute of inf...
  • 23 篇 department of in...
  • 22 篇 computer science...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 ieee
  • 19 篇 concordia instit...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 41 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 21 篇 keshta ismail
  • 20 篇 pedrycz witold
  • 19 篇 soni mukesh
  • 19 篇 tao yang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 johansson karl h...
  • 16 篇 gjergji mino

语言

  • 6,286 篇 英文
  • 407 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 2 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6749 条 记 录,以下是261-270 订阅
排序:
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection  38
Suitable is the Best: Task-Oriented Knowledge Fusion in Vuln...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Li, Xiang Du, Qianjin Kong, Wei Deng, Huan Kuang, Xiaohui Institute of Systems Engineering Academy of Military Sciences PLA China Department of Computer Science and Technology Tsinghua University China School of Information Science and Engineering Zhejiang Sci-Tech University China
Deep learning technologies have demonstrated remarkable performance in vulnerability detection. Existing works primarily adopt a uniform and consistent feature learning pattern across the entire target set. While desi...
来源: 评论
A Comparison of Different Optimization Techniques in AlexNet for Plant Disease Classification: SGD, Adadelta, ASGD and Adagrad  5
A Comparison of Different Optimization Techniques in AlexNet...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Ponnila, P. Bazila Banu, A. Bannari Amman Institute of Technology Department of Information Technology Erode Tamilnadu Sathyamangalam India Kpr Institute of Engineering and Technology Department of Computer Science and Business Systems Tamilnadu Coimbatore India
Plant diseases are a biggest challenge for the farmers. Agriculture relies heavily on its production, and diagnosis of plant disease in an accurate manner will help in identification of the appropriate disease. If cor... 详细信息
来源: 评论
PLAME: Piecewise-Linear Approximate Measure for Additive Kernel SVM (Extended abstract)  40
PLAME: Piecewise-Linear Approximate Measure for Additive Ker...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Chan, Tsz Nam Li, Zhe Leong Hou, U. Cheng, Reynold Shenzhen University Department of Computer Science and Software Engineering China Alibaba Cloud University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China The University of Hong Kong Department of Computer Science and Musketeers Foundation Institute of Data Science Hong Kong
Additive Kernel SVM has been extensively used in many applications, including human activity detection and pedestrian detection. Since training an additive kernel SVM model is very time-consuming, which is not scalabl... 详细信息
来源: 评论
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1370-1379页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Illinois Institute of Technology Information Technology and Management ChicagoIL60616 United States
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Facial Emotion Recognition using Deep Learning (FERDL)  25
Facial Emotion Recognition using Deep Learning (FERDL)
收藏 引用
25th International Multi Topic Conference, INMIC 2023
作者: Ramzan, Hafiz Arslan Sohaib, Ahmed Ramzan, Sadia Kalsum, Tehmina Aqeel, Muhammad Majeed, Mohsin Khwaja Fareed University of Engineering and Information Technology Institute of Computer and Software Engineering Rahim Yar Khan Pakistan National University of Modern Languages Department of Computer Science Multan Pakistan University of Engineering & Technology Department of Software Engineering Taxila Pakistan
Facial Emotion Recognition is one of the in-demand and rapidly growing research topics in the domain of computer Vision (CV) and artificial intelligence (AI). The ability to identify or detect human emotions from real... 详细信息
来源: 评论
Unsupervised Domain Adaptation for Action Recognition via Self-Ensembling and Conditional Embedding Alignment  24
Unsupervised Domain Adaptation for Action Recognition via Se...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Ghosh, Indrajeet Chugh, Garvit Md Faridee, Abu Zaher Roy, Nirmalya University of Maryland Department of Information Systems Baltimore County United States Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India Amazon United States
Recent advancements in deep learning-based wearable human action recognition (wHAR) have improved the capture and classification of complex motions, but adoption remains limited due to the lack of expert annotations a... 详细信息
来源: 评论
Alzheimer's Disease Classification via Pre-trained Convolutional Neural Network Variants Utilizing Multi-level Thresholding based on Kapur's Entropy  2
Alzheimer's Disease Classification via Pre-trained Convoluti...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and information Technology, NMITCON 2024
作者: Mahendran, Nivedhitha Durai Raj Vincent, P.M. Srm Institute of Science and Technology School of Computing Technologies Department of Networking and Communications Kattankulathur Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Neurological diseases are the disorders of brain and the nerves that run throughout the human body. There is a range of symptoms that arise as a result of chemical, structural, or electrical modifications in the regio... 详细信息
来源: 评论
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Deep Ear Biometrics for Gender Classification  4th
Deep Ear Biometrics for Gender Classification
收藏 引用
4th International Conference on Communication, Devices and Computing (ICCDC 2023)
作者: Singh, Ritwiz Kashyap, Keshav Mukherjee, Rajesh Bera, Asish Chakraborty, Mamata Dalui Department of Computer Science and Engineering Haldia Institute of Technology WB Haldia India Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan Pilani Campus 333031 India Department of Computer Science and Engineering National Institute of Technology West Bengal Durgapur India
Human gender classification based on biometric features is a major concern for computer vision due to its vast variety of applications. The human ear is popular among researchers as a soft biometric trait, because it ... 详细信息
来源: 评论