咨询与建议

限定检索结果

文献类型

  • 4,784 篇 会议
  • 3,476 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 8,261 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,308 篇 工学
    • 3,754 篇 计算机科学与技术...
    • 3,115 篇 软件工程
    • 1,223 篇 信息与通信工程
    • 755 篇 控制科学与工程
    • 630 篇 电气工程
    • 500 篇 生物工程
    • 494 篇 电子科学与技术(可...
    • 386 篇 机械工程
    • 327 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 193 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 142 篇 网络空间安全
    • 137 篇 交通运输工程
    • 134 篇 建筑学
    • 134 篇 安全科学与工程
  • 2,657 篇 理学
    • 1,452 篇 数学
    • 652 篇 物理学
    • 570 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 208 篇 化学
  • 1,480 篇 管理学
    • 933 篇 管理科学与工程(可...
    • 621 篇 图书情报与档案管...
    • 437 篇 工商管理
  • 296 篇 医学
    • 263 篇 临床医学
    • 217 篇 基础医学(可授医学...
  • 242 篇 法学
    • 189 篇 社会学
  • 133 篇 经济学
    • 133 篇 应用经济学
  • 118 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 151 篇 computational mo...
  • 147 篇 feature extracti...
  • 146 篇 software enginee...
  • 134 篇 information syst...
  • 134 篇 data mining
  • 132 篇 semantics
  • 122 篇 quality of servi...
  • 121 篇 deep learning
  • 111 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 97 篇 training
  • 93 篇 cloud computing
  • 92 篇 software
  • 88 篇 computer archite...
  • 87 篇 resource managem...
  • 84 篇 protocols
  • 80 篇 optimization

机构

  • 148 篇 state key labora...
  • 111 篇 college of compu...
  • 87 篇 school of inform...
  • 53 篇 shandong provinc...
  • 48 篇 state key labora...
  • 47 篇 school of comput...
  • 44 篇 university of ch...
  • 43 篇 state key labora...
  • 42 篇 state key labora...
  • 41 篇 shandong provinc...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 school of comput...
  • 35 篇 department of co...
  • 35 篇 school of comput...
  • 32 篇 guangdong key la...
  • 31 篇 department of el...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 85 篇 xi zhang
  • 51 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 23 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 19 篇 buyya rajkumar
  • 18 篇 li yang
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 17 篇 zhang lei
  • 17 篇 wei li

语言

  • 7,822 篇 英文
  • 317 篇 其他
  • 122 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8261 条 记 录,以下是61-70 订阅
排序:
software Defect Prediction Using Ensemble Technique  9
Software Defect Prediction Using Ensemble Technique
收藏 引用
9th International Conference on information Management and Technology, ICIMTech 2024
作者: Wicaksono, Pandu Arisaputra, Panji Yunanda, Rezky Kristian, Willy Mujhid, Almuzhidul School of Computer Science Bina Nusantara University Software Engineering Department Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia
software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces ... 详细信息
来源: 评论
Intelligent Daycare: Enhancing Child Safety with IoT and Machine Learning Innovations  9
Intelligent Daycare: Enhancing Child Safety with IoT and Mac...
收藏 引用
9th International Conference on Communication and Electronics systems, ICCES 2024
作者: Prathyanga, Amisha Shyaminda, Pasindu Chamikara, Pasan Lakshan, Sachin Thelijjagoda, Samantha Kasthurirathna, Dharshana Sri Lanka Institute of Information Technology Department of Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Systems Engineering Malabe Sri Lanka
Child safety and well-being in daycare settings are important, thus it is vital that the persons in charge be attentive to them. This research tries to solve the problem by introducing a smart and detailed monitoring ... 详细信息
来源: 评论
WIP: An Engaging Undergraduate Intro to Model Checking in software engineering Using TLA+  54
WIP: An Engaging Undergraduate Intro to Model Checking in So...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Läufer, Konstantin Mertin, Gunda Thiruvathukal, George K. Loyola University Software and Systems Laboratory Department of Computer Science Chicago United States Institute for Software Engineering and Programming Languages University of Lübeck Germany
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com... 详细信息
来源: 评论
Enhancing Soft Skills in Autistic Children: The Next Generation of Mind Champ's Technological Approach  6
Enhancing Soft Skills in Autistic Children: The Next Generat...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Peiris, Kalna Nelaka, Ruchira Manathunga, Kalpani Department of Computer Systems Engineering Sri Lanka Institute of Information and Technology Sri Lanka Department of Information Technology Sri Lanka Institute of Information and Technology Sri Lanka Department of Computer Science and Software Engineering Sri Lanka Institute of Information and Technology Sri Lanka
Autism Spectrum Disorder (ASD) significantly impacts a child's ability to navigate social interactions, regulate emotions, and develop adaptive skills crucial for daily functioning. While various interventions exi... 详细信息
来源: 评论
Towards Privacy-Aware Causal Structure Learning in Federated Setting
收藏 引用
IEEE Transactions on Big Data 2023年 第6期9卷 1525-1535页
作者: Huang, Jianli Guo, Xianjie Yu, Kui Cao, Fuyuan Liang, Jiye Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University Taiyuan030006 China
Causal structure learning has been extensively studied and widely used in machine learning and various applications. To achieve an ideal performance, existing causal structure learning algorithms often need to central... 详细信息
来源: 评论
Additive Noise Model Structure Learning Based on Spatial Coordinates
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 3858-3871页
作者: Yang, Jing Lu, Ting Zhu, Youjie Hefei University of Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China
Discovering causal relationships from a large amount of observational data is an important research direction in data mining. To address the challenges of discovering and constructing causal networks on nonlinear and ... 详细信息
来源: 评论
Optimisation of sparse deep autoencoders for dynamic network embedding
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1361-1376页
作者: Huimei Tang Yutao Zhang Lijia Ma Qiuzhen Lin Liping Huang Jianqiang Li Maoguo Gong College of Computer Science and Software Engineering Shenzhen UniversityShenzhenChina Institute for Infocomm Research Agency for Science Technology and ResearchSingaporeSingapore Key Laboratory of Collaborative Intelligence Systems Ministry of EducationXidian UniversityXi'anChina
Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature ***,the existing deep learningbased NE methods are time-consuming as they need to train a dense... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence Computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论