咨询与建议

限定检索结果

文献类型

  • 4,799 篇 会议
  • 3,498 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,321 篇 工学
    • 3,764 篇 计算机科学与技术...
    • 3,111 篇 软件工程
    • 1,222 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 626 篇 电气工程
    • 500 篇 生物工程
    • 498 篇 电子科学与技术(可...
    • 385 篇 机械工程
    • 327 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 194 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 142 篇 网络空间安全
    • 137 篇 交通运输工程
    • 134 篇 建筑学
    • 133 篇 安全科学与工程
  • 2,652 篇 理学
    • 1,449 篇 数学
    • 651 篇 物理学
    • 570 篇 生物学
    • 460 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 208 篇 化学
  • 1,479 篇 管理学
    • 931 篇 管理科学与工程(可...
    • 622 篇 图书情报与档案管...
    • 437 篇 工商管理
  • 297 篇 医学
    • 264 篇 临床医学
    • 217 篇 基础医学(可授医学...
  • 240 篇 法学
    • 189 篇 社会学
  • 133 篇 经济学
    • 133 篇 应用经济学
  • 117 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 156 篇 computational mo...
  • 146 篇 feature extracti...
  • 134 篇 information syst...
  • 134 篇 semantics
  • 133 篇 data mining
  • 122 篇 deep learning
  • 122 篇 quality of servi...
  • 112 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 89 篇 computer archite...
  • 89 篇 software
  • 89 篇 training
  • 87 篇 resource managem...
  • 86 篇 cloud computing
  • 85 篇 artificial intel...
  • 84 篇 protocols

机构

  • 150 篇 state key labora...
  • 112 篇 college of compu...
  • 85 篇 school of inform...
  • 53 篇 shandong provinc...
  • 49 篇 state key labora...
  • 48 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 state key labora...
  • 42 篇 state key labora...
  • 40 篇 shandong provinc...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 35 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 guangdong key la...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 84 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 18 篇 choo kim-kwang r...
  • 18 篇 buyya rajkumar
  • 17 篇 xu xiaolong

语言

  • 7,951 篇 英文
  • 313 篇 其他
  • 122 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8387 条 记 录,以下是171-180 订阅
排序:
Yolo Based License Plate Detection of Triple Riders and Violators
Yolo Based License Plate Detection of Triple Riders and Viol...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Nandhakumar, R.G. Devi, K. Nirmala Krishnamoorthy, N. Shanthi, S. Pranesh, V.R. Nikhalyaa, S. Kongu Enginering College Perundurai Department of Computer Science and Engineering Tamilnadu Erode India Vellore Institutte of Technology School of Information and Engineering Department of Software Systems and Engineering Vellore India
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr... 详细信息
来源: 评论
Enhancing Intrusion Detection systems Using RNN, LSTM, and Hybrid RNN-LSTM Models  2
Enhancing Intrusion Detection Systems Using RNN, LSTM, and H...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Ebadinezhad, Sahar Nia, Nooshin Nooraei Shirzad, Nasratullah Osemeha, Nwabueze Kenneth Near East University Department of Computer Information Systems Nicosia99138 Cyprus Artificial Intelligence Near East University Nicosia Cyprus Near East University Software Engineering Department Nicosia Cyprus
Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class imbalances in complex network datasets, represe... 详细信息
来源: 评论
A Systematic Review of Approaches for Reviewing Security-Related Aspects in Agile Requirements Specification of Web Applications
A Systematic Review of Approaches for Reviewing Security-Rel...
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Munir, Aqsa Assiri, Mohammed Alam, Saba Naveed Khan, Muzna Butt, Wasi Haider Humayun, Mamoona Department of Computer and Software Engineering Islamabad Pakistan College of Sciences and Humanities Aflaj Prince Sattam Bin Abdulaziz University Department of Computer Science Saudi Arabia College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Department of Software Engineering Saudi Arabia College of Computer and Information Sciences Jouf University Department of Information Systems Al-Jouf Saudi Arabia
Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Formal Verification Based Synthesis for Behavior Trees  9th
Formal Verification Based Synthesis for Behavior Trees
收藏 引用
9th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2023
作者: Hong, Weijiang Chen, Zhenbang Li, Minglong Li, Yuhan Huang, Peishan Wang, Ji College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China
Behavior trees (BTs) have been extensively applied in the area of both computer games and robotics, as the control architectures. However, the construction of BTs is labor-expensive, time-consuming, and even impossibl... 详细信息
来源: 评论
A Deep Learning Method for Statistical Downscaling of CLDAS Relative Humidity with Different Sources of Data:Sensitivity Analysis
收藏 引用
Journal of Meteorological Research 2023年 第6期37卷 878-895页
作者: Bin BAI Chunxiang SHI Ling YANG Lingling GE Luhui YUE Guangyu LIU College of Electronic Engineering Chengdu University of Information TechnologyChengdu610225China Key Laboratory of Atmospheric Sounding of China Meteorological Administration Chengdu610225China National Meteorological Information Centre China Meteorological AdministrationBeijing100081China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China
High-resolution relative humidity(RH)data are essential in studies of climate change and in numerical meteorological ***,because high-resolution meteorological grid data require a large number of stations,the sparse d... 详细信息
来源: 评论
Audio2AB:Audio-driven collaborative generation of virtual character animation
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第1期6卷 56-70页
作者: Lichao NIU Wenjun XIE Dong WANG Zhongrui CAO Xiaoping LIU School of Computer Science and Information Engineering Hefei University of TechnologyHeifei 230009China School of Software Hefei University of TechnologyHeifei 230009China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of TechnologyHefei 230601China
Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of ***,few methods exist for generating full-body animations,and the po... 详细信息
来源: 评论
Cooperative Selection and Communications in 6G Ultra-mMTC IoV Networks  4
Cooperative Selection and Communications in 6G Ultra-mMTC Io...
收藏 引用
4th International Symposium on Electrical, Electronics and information engineering, ISEEIE 2024
作者: Huang, He Huang, Wei College of Communication Technology Chengdu China School of Computer Science and Information Engineering Hefei China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei China
Although Cooperative Communications (CC) already exists in 4G/5G, performance improvement is just not enough. As 5G standard has gradually established recently, CC has been one of most critical communication technolog... 详细信息
来源: 评论
Business Scenario Driven Reinforcement Learning Testing Method  26
Business Scenario Driven Reinforcement Learning Testing Meth...
收藏 引用
26th ACIS International Winter Conference on software engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Cai, Lizhi Wang, Jin School of Information Science and Engineering East China University of Science and Technology Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
Reinforcement learning has been successfully applied in software testing, but the existing testing methods cannot perform effective testing according to the characteristics of applications, and using outdated interact... 详细信息
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech Technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论