咨询与建议

限定检索结果

文献类型

  • 4,844 篇 会议
  • 3,520 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 8,453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,362 篇 工学
    • 3,782 篇 计算机科学与技术...
    • 3,114 篇 软件工程
    • 1,224 篇 信息与通信工程
    • 768 篇 控制科学与工程
    • 629 篇 电气工程
    • 505 篇 生物工程
    • 500 篇 电子科学与技术(可...
    • 393 篇 机械工程
    • 325 篇 光学工程
    • 313 篇 生物医学工程(可授...
    • 219 篇 动力工程及工程热...
    • 192 篇 仪器科学与技术
    • 190 篇 化学工程与技术
    • 143 篇 网络空间安全
    • 140 篇 交通运输工程
    • 139 篇 建筑学
    • 136 篇 安全科学与工程
  • 2,665 篇 理学
    • 1,452 篇 数学
    • 660 篇 物理学
    • 575 篇 生物学
    • 464 篇 统计学(可授理学、...
    • 361 篇 系统科学
    • 209 篇 化学
  • 1,481 篇 管理学
    • 931 篇 管理科学与工程(可...
    • 625 篇 图书情报与档案管...
    • 440 篇 工商管理
  • 301 篇 医学
    • 268 篇 临床医学
    • 219 篇 基础医学(可授医学...
  • 242 篇 法学
    • 192 篇 社会学
  • 133 篇 经济学
    • 133 篇 应用经济学
  • 120 篇 教育学
  • 84 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 282 篇 laboratories
  • 192 篇 computer science
  • 175 篇 software enginee...
  • 155 篇 computational mo...
  • 148 篇 feature extracti...
  • 135 篇 data mining
  • 134 篇 information syst...
  • 131 篇 semantics
  • 129 篇 deep learning
  • 121 篇 quality of servi...
  • 112 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 92 篇 software
  • 90 篇 cloud computing
  • 89 篇 training
  • 88 篇 resource managem...
  • 87 篇 computer archite...
  • 83 篇 optimization
  • 83 篇 accuracy

机构

  • 143 篇 state key labora...
  • 121 篇 college of compu...
  • 87 篇 school of inform...
  • 56 篇 shandong provinc...
  • 52 篇 state key labora...
  • 49 篇 school of comput...
  • 46 篇 university of ch...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 state key labora...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 35 篇 department of co...
  • 34 篇 school of comput...
  • 31 篇 department of el...
  • 31 篇 school of inform...
  • 31 篇 guangdong key la...
  • 31 篇 peng cheng labor...

作者

  • 87 篇 xi zhang
  • 58 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 39 篇 guo hong
  • 33 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 25 篇 zhang zhao
  • 22 篇 ismail leila
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 20 篇 lu dianjie
  • 20 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 19 篇 xu xiaolong
  • 18 篇 wei li
  • 17 篇 li yang
  • 17 篇 hong liu
  • 16 篇 zhou jie
  • 16 篇 zhang lei

语言

  • 7,511 篇 英文
  • 829 篇 其他
  • 120 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8453 条 记 录,以下是781-790 订阅
排序:
The Future of Mobile Payments: Blockchain-Based Solutions
The Future of Mobile Payments: Blockchain-Based Solutions
收藏 引用
information Technology (ACIT)
作者: Mahmoud Obaid Allam Abumwais Rami Hodrob Suhail Odeh Murad Obaid Computer Systems Engineering Arab American University Jenin Palestine Software Engineering Bethlehem University Bethlehem Palestine Management Information Systems Cyprus International University Northern Cyprus Turkey
Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts...
来源: 评论
Intermodal interference based refractive index sensor employing elliptical core photonic crystal fiber
收藏 引用
Optoelectronics Letters 2021年 第5期17卷 271-275页
作者: WU Xu-jie SONG Bin-bin WU Ji-xuan HUANG Wei The Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China Tianjin Key Laboratory of Optoelectronic Detection Technology and Systems College of Electronic and Information EngineeringTiangong UniversityTianjin 300387China
A refractive index(RI)sensor based on elliptical core photonic crystal fiber(EC-PCF)has been *** asymmetric elliptical core introduces the polarization-dependent characteristics of the fiber core *** performances of i... 详细信息
来源: 评论
UW-Adapter: Adapting Monocular Depth Estimation Model in Underwater Scenes
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Ye, Xinchen Chang, Yue Xu, Rui Li, Haojie DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Liaoning China Shandong University of Science and Technology College of Computer Science and Engineering China
Estimating depth maps from monocular underwater images poses one of the most challenging problems in underwater applications. Due to the lack of large-scale paired underwater color-depth datasets for effective trainin... 详细信息
来源: 评论
Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning
Large Language Models are Few-Shot Summarizers: Multi-Intent...
收藏 引用
International Conference on software engineering (ICSE)
作者: Mingyang Geng Shangwen Wang Dezun Dong Haotian Wang Ge Li Zhi Jin Xiaoguang Mao Xiangke Liao College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Key Lab of High Confidence Software Technology Peking University Beijing China
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for exist... 详细信息
来源: 评论
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 288-298页
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kandiy, Sergey Smirnov, Oleksii Ulianovska, Yuliia Kobylianska, Olena Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security Faculty of Comupter Science V. N. Karazin Kharkiv National University 4 Svobody Sq Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Cybersecurity & Software Academic Department Central Ukrainian National Technical University 8 University Avenue Kropyvnytskyi25006 Ukraine Department of Computer Science and Software Engineering University of Customs and Finance Vernadskogo Street 2/4 Dnipro49000 Ukraine
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o... 详细信息
来源: 评论
Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24644-24655页
作者: Liu, Shuying Xie, Rongpeng Miao, Yinbin Peng, Jinye Leng, Tao Liu, Zhiquan Choo, Kim-Kwang Raymond Northwest University School of Information Science and Technology Xi’an710119 China Xian Yang Normal University Department of Computer Xian Yang712000 China Xidian University School of Cyber Engineering Xi’an710071 China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Luzhou646000 China Jinan University College of Cyber Security Guangzhou510632 China Technology Ltd Beijing100020 China The University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In the era of Internet of Things (IoT) and Federated Learning (FL), where distributed training models are essential, the FL paradigm has come into the spotlight for researchers. However, the inconsistency in the sourc... 详细信息
来源: 评论
Towards a Smart Home : An Intelligent Approach to Environment Monitoring and Anti-Theft Alarming
Towards a Smart Home : An Intelligent Approach to Environmen...
收藏 引用
International Conference on Awareness Science and Technology (iCAST)
作者: Ravitha Wathsala Malith Silva Ravindu Kodikara Sadev Ekanayake Narmada Gamage Poojani Gunathilake Department of Computer Systems Engineering Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka Department of Computer Science & Software Engineering Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitor...
来源: 评论
Learning good state and action representations for Markov decision process via tensor decomposition
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 5157-5209页
作者: Chengzhuo Ni Yaqi Duan Munther Dahleh Mengdi Wang Anru R. Zhang Department of Electrical & Computer Engineering Princeton University Laboratory for Information & Decision Systems Massachusetts Institute of Technology Electrical Engineering & Computer Science Department Massachusetts Institute of Technology Department of Biostatistics & Bioinformatics Duke University
The transition kernel of a continuous-state-action Markov decision process (MDP) admits a natural tensor structure. This paper proposes a tensor-inspired unsupervised learning method to identify meaningful low-dimensi...
来源: 评论
COVID-19 Detection System: A Comparative Analysis of System Performance Based on Acoustic Features of Cough Audio Signals
arXiv
收藏 引用
arXiv 2023年
作者: Shati, Asmaa Hassan, Ghulam Mubashar Datta, Amitava Department of Computer Science and Software Engineering University of Western Australia Australia Department of Information Systems King Khalid University Saudi Arabia
A wide range of respiratory diseases, such as cold and flu, asthma, and COVID-19, affect people’s daily lives worldwide. In medical practice, respiratory sounds are widely used in medical services to diagnose various... 详细信息
来源: 评论
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
Innovations in Intelligent systems and Applications Conference
作者: Elif Kanca Tolgahan Gulsoy Arda Ustubioglu Beste Ustubioglu Selen Ayas Elif Baykal Kablan Guzin Ulutas Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论