咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 3,560 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 8,437 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,386 篇 工学
    • 3,809 篇 计算机科学与技术...
    • 3,145 篇 软件工程
    • 1,238 篇 信息与通信工程
    • 768 篇 控制科学与工程
    • 671 篇 电气工程
    • 515 篇 电子科学与技术(可...
    • 501 篇 生物工程
    • 389 篇 机械工程
    • 333 篇 光学工程
    • 311 篇 生物医学工程(可授...
    • 219 篇 动力工程及工程热...
    • 196 篇 仪器科学与技术
    • 187 篇 化学工程与技术
    • 148 篇 网络空间安全
    • 141 篇 交通运输工程
    • 136 篇 安全科学与工程
    • 134 篇 建筑学
  • 2,686 篇 理学
    • 1,463 篇 数学
    • 667 篇 物理学
    • 576 篇 生物学
    • 469 篇 统计学(可授理学、...
    • 364 篇 系统科学
    • 208 篇 化学
  • 1,486 篇 管理学
    • 934 篇 管理科学与工程(可...
    • 627 篇 图书情报与档案管...
    • 437 篇 工商管理
  • 303 篇 医学
    • 267 篇 临床医学
    • 221 篇 基础医学(可授医学...
  • 242 篇 法学
    • 189 篇 社会学
  • 135 篇 经济学
    • 135 篇 应用经济学
  • 120 篇 教育学
  • 88 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 152 篇 computational mo...
  • 149 篇 feature extracti...
  • 134 篇 information syst...
  • 134 篇 data mining
  • 134 篇 semantics
  • 122 篇 deep learning
  • 122 篇 quality of servi...
  • 115 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 88 篇 computer archite...
  • 88 篇 resource managem...
  • 88 篇 software
  • 88 篇 training
  • 87 篇 cloud computing
  • 84 篇 artificial intel...
  • 81 篇 protocols

机构

  • 150 篇 state key labora...
  • 114 篇 college of compu...
  • 82 篇 school of inform...
  • 52 篇 shandong provinc...
  • 50 篇 state key labora...
  • 47 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 shandong provinc...
  • 42 篇 state key labora...
  • 41 篇 state key labora...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 33 篇 department of el...
  • 33 篇 guangdong key la...
  • 32 篇 school of comput...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 82 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 41 篇 shen linlin
  • 39 篇 guo hong
  • 37 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 ismail leila
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 20 篇 lu dianjie
  • 19 篇 wei li
  • 19 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 17 篇 zhang lei
  • 17 篇 xu xiaolong

语言

  • 7,985 篇 英文
  • 331 篇 其他
  • 121 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8437 条 记 录,以下是41-50 订阅
排序:
Enhanced security framework for medical data embedding based on octonionic steganographic transforms and FPGA-accelerated integrity verification
收藏 引用
Alexandria engineering Journal 2025年 125卷 480-495页
作者: Tahiri, Mohamed Amine Karmouni, Ilham Mchichou, Ismail Bencherqui, Ahmed El Maloufy, Ahmed Karmouni, Hicham Moustabchir, Hassane Sayyouri, Mhamed Khafaga, Doaa Sami Aldakheel, Eman Abdullah Abouhawwash, Mohamed Engineering Systems and Applications Laboratory National School of Applied Sciences Sidi Mohamed Ben Abdellah University Fez Morocco Laboratory of Electronic Signals and Systems of Information Sidi Mohamed Ben Abdellah University Fez Morocco National School of Applied Sciences Cadi Ayyad University Marrakech Morocco Department of Computer Sciences College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia Department of Industrial and Systems Engineering King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia
This study suggests a novel approach that combines steganography with innovative image and signal processing techniques to enhance the security and integrity of medical images. We employ octonions, which offer a rich ... 详细信息
来源: 评论
A Novel Consensus Mechanism Based on Dynamic Sharding  20th
A Novel Consensus Mechanism Based on Dynamic Sharding
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Zhang, Jingyu Teng, Yilong Sun, Yongtao Zhu, Shi Yang, Fangliao Luo, Lailong School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China Science and Technology on Information Systems Engineering Laboratory School of Systems Engineering National University of Defense Technology Changsha China Data Operations Center State Grid Hunan Electric Power Information and Communication Corporation Hunan Changsha China
Blockchain, as an emerging technology, has been widely studied by the researchers from academia and industry. Alliance chain, as an important form of blockchain, is often applied to smart grids, smart city and the Int... 详细信息
来源: 评论
Laser Scribed CNTs/PEEK/TPU Composites Film for High-Performance Stretchable Electrodes
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 16666-16674页
作者: Jiang, Caiyun Tang, Lei Hou, Jian Ding, Guqiao Sheng, Bin University of Shanghai for Science and Technology College of Optical-Electrical and Computer Engineering Shanghai200093 China Shanghai Key Laboratory of Modern Optical Systems Engineering Research Center of Optical Instrument and System Shanghai200093 China Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences State Key Laboratory of Materials for Integrated Circuits Shanghai200050 China
In this article, an elastic composite material comprising carbon nanotubes (CNTs), polyether-ether-ketone (PEEK), and thermoplastic polyurethane (TPU) is presented, in which direct laser-induced graphitization was use... 详细信息
来源: 评论
Solving Overlapping Coalition Structure Generation in Task-Based Settings
收藏 引用
Journal of Artificial Intelligence Research 2025年 82卷 2125-2166页
作者: Zhang, Guofu Su, Zhaopin Song, Xiaoxiao Gao, Zixuan Li, Miqing Yao, Xin School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Intelligent Interconnected Systems Laboratory of Anhui Province Anhui Hefei China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Anhui Hefei China CERCIA School of Computer Science University of Birmingham Birmingham United Kingdom School of Data Science Lingnan University Hong Kong
The overlapping coalition structure generation problem (OCSGP) is a challenging computational problem in multi-agent systems. It focuses on selecting possibly overlapping coalitions from a set of agents to maximize th... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Segmentation of CAD models using hybrid representation
收藏 引用
虚拟现实与智能硬件(中英文) 2025年 第2期7卷 188-202页
作者: Claude UWIMANA Shengdi ZHOU Limei YANG Zhuqing LI Norbelt MUTAGISHA Edouard NIYONGABO Bin ZHOU State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peace-Bay Academy of Virtual Reality Shenyang 110004China China Aerospace Systems Engineering Corporation Beijing 100070China Department of Signal and Information Processing Beihang UniversityBeijing 100191China Department of Computer Science University of SherbrookeSherbrooke J1C0A1Canada
In this paper,we introduce an innovative method for computer-aided design(CAD)segmentation by concatenating meshes and CAD *** previous CAD segmentation methods have achieved impressive performance using single repres... 详细信息
来源: 评论
Guest Editorial: Special Issue on Human-Machine Fusion Decision-Making for Emergency Handling
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 4427-4433页
作者: Wu, Edmond Q. Li, Jianqiang Chen, Guimin Yuce, Mehmet R. Islam, Shafiqul Ser, Javier Del Yu, Hui Liu, Peter Xiaoping Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China College of Computer and Software Engineering Shenzhen University Shenzhen518060 China State Key Laboratory for Manufacturing Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Systems Engineering Monash University MelbourneVIC3800 Australia Xavier University of Louisiana New OrleansLA70125 United States Tecnalia Institute Bizkaia48160 Spain School of Creative Technologies University of Portsmouth PortsmouthPO1 2UP United Kingdom Department of Systems and Computer Engineering Carleton University OttawaONKIS 5B6 Canada
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Understanding and Identifying Technical Debt in the Co-Evolution of Production and Test Code
收藏 引用
IEEE Transactions on software engineering 2025年 第5期51卷 1415-1436页
作者: Guo, Yimeng Chen, Zhifei Xiao, Lu Chen, Lin Li, Yanhui Zhou, Yuming Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Stevens Institute of Technology Department of Systems and Enterprises Charles V. Schaefer Jr. School of Engineering and Science HobokenNJ07030 United States
The co-evolution of production and test code (PT co-evolution) has received increasing attention in recent years. However, we found that existing work did not comprehensively study various PT co-evolution scenarios, s... 详细信息
来源: 评论
When Crypto Fails: Demystifying Cryptographic Defects in Ethereum Smart Contracts
收藏 引用
IEEE Transactions on software engineering 2025年 第5期51卷 1381-1398页
作者: Zhang, Jiashuo Chen, Jiachi Shen, Yiming Zhang, Tao Wang, Yanlin Chen, Ting Gao, Jianbo Chen, Zhong Peking University School of Computer Science Beijing100871 China Sun Yat-sen University School of Software Engineering Zhuhai510275 China Macau University of Science and Technology School of Computer Science and Engineering 999078 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Kashi Institute of Electronics and Information Industry Kashi844000 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart contracts with cryptographic capabilities. These APIs have been utilized in over 13.8% of Ethereum transactions, motivating de... 详细信息
来源: 评论