咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是731-740 订阅
排序:
Enhancing Deep Reinforcement Learning with Scenario-Based Modeling
收藏 引用
SN computer science 2023年 第2期4卷 1-13页
作者: Yerushalmi, Raz Amir, Guy Elyasaf, Achiya Harel, David Katz, Guy Marron, Assaf Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100 Israel School of Computer Science and Engineering The Hebrew University of Jerusalem Jerusalem 91904 Israel Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva 8410501 Israel
Deep reinforcement learning agents have achieved unprecedented results when learning to generalize from unstructured data. However, the “black-box” nature of the trained DRL agents makes it difficult to ensure that ... 详细信息
来源: 评论
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 263-280页
作者: Waseem Akram Khalid Mahmood Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon Graduate School of Engineering Science and Technology National Yunlin University of Science and TechnologyYunlin64002TaiwanChina Future Technology Research Center National Yunlin University of Science and TechnologyYunlin64002TaiwanChina Department of Computer Science Lahore Garrison UniversityLahore54920Pakistan Department of Computer Science and Information Technology College of EngineeringAbu Dhabi UniversityAbu Dhabi69911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbul34398Turkey Department of Cybersecurity Ajou UniversitySuwon16499Republic of Korea
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl... 详细信息
来源: 评论
TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User Reviews  22
TTAG+R: A Dataset of Google Play Store's Top Trending Androi...
收藏 引用
22nd IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2022
作者: Chand, Raheela Rehman Khan, Saif Ur Hussain, Shahid Wang, Wenli Department of Computer Science Islamabad Pakistan School of Engineering Penn State University Department of Computer Science and Software Engineering United States
Context: Android games are gaining wide attention from users in recent years. However, the existing literature reports alarming statistics about banning popular and top-trending Android apps. The popular gaming apps h... 详细信息
来源: 评论
Knowledge Distillation With Fast CNN for License Plate Detection
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2023年 1-7页
作者: Tian, Chunwei Zhang, Xuanyu Liang, Xu Li, Bo Sun, Yougang Zhang, Shichao School of Software Northwestern Polytechnical University Xi'an Shaanxi China School of Software Northwestern Polytechnical University Xi'an China School of Electronics and Information Northwestern Polytechnical University Xi'an Shaanxi China Institute of Rail Transit National Maglev Transportation Engineering R&D Center Tongji university Shanghai China School of Computer Science and Engineering Central South University Changsha Hunan China
Deep convolutional neural networks (CNNs) can improve recognition rate in license plate to improve traffic. However, these methods may refer to big computational costs and a lot of parameters. In this paper, we propos... 详细信息
来源: 评论
Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 195-212页
作者: Xiaoli He Yu Song Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng School of Computer Science Sichuan University of Science and EngineeringZigong643000China Department of Network Information Management Center Sichuan University of Science and EngineeringZigong643000China School of Information Engineering South West University of Science and TechnologyMianyang621010China School of Computer and Software Nanjing University of Information Science and TechnologyJiangsu210044China Alhamd Islamic University Airport Road Quetta BalochistanPakistan
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti... 详细信息
来源: 评论
Lake Water Level Forecasting Using LSTM and GRU: A Deep Learning Approach  9th
Lake Water Level Forecasting Using LSTM and GRU: A Deep Lear...
收藏 引用
9th Future Technologies Conference, FTC 2024
作者: Du, Yuxin Fan, Jing Happonen, Ari Paulraj, Dassan Tuape, Micheal Department of Software Engineering School of Engineering Sciences Lappeenranta-Lahti University of Technology Mukkulankatu 19 Lahti15210 Finland Department of Software Engineering School of Engineering Sciences Lappeenranta-Lahti University of Technology Yliopistonkatu 34 Lappeenranta53850 Finland Department of Computer Science and Engineering R.M.K. Engineering College Chennai India
Artificial Intelligence and Deep Learning-based methods show constant promise in addressing time series forecasting challenges. Lake water level forecasting is an essential & significant environmental and societal... 详细信息
来源: 评论
A study on the impact of pre-trained model on Just-In-Time defect prediction  23
A study on the impact of pre-trained model on Just-In-Time d...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Guo, Yuxiang Gao, Xiaopeng Zhang, Zhenyu Chan, W.K. Jiang, Bo Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China City University of Hong Kong Department of Computer Science Hong Kong
Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained m... 详细信息
来源: 评论
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)  2nd
Analysis of Techniques for Detection and Removal of Zero-Day...
收藏 引用
2nd International Conference on Ubiquitous Security, UbiSec 2022
作者: Hamid, Khalid Iqbal, Muhammad Waseem Aqeel, Muhammad Liu, Xiangyong Arif, Muhammad Department of Software Engineering The Superior University Lahore54000 Pakistan Department of Computer Science The Superior University Lahore54000 Pakistan School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China
Zero-day attacks (ZDAs) are previously unknown flaws and errors in operating systems, networks, and general-purpose software. ZDAs are the cause to open security breach holes for external users or hackers for illegal ... 详细信息
来源: 评论
PESTA: An Elastic Motion Capture Data Retrieval Method
收藏 引用
Journal of computer science & Technology 2023年 第4期38卷 867-884页
作者: 蒋子飞 李伟 黄艳 尹义龙 郭宗杰 彭京亮 School of Software Shandong UniversityJinan 250101China Ming Hsieh Department of Electrical and Computer Engineering University of Southern California Los Angeles 90089U.S.A Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan 250022China School of Information Science and Engineering University of JinanJinan 250022China
Prevalent use of motion capture(MoCap)produces large volumes of data and MoCap data retrieval becomes crucial for efficient data *** clips may not be neatly segmented and labeled,increasing the difficulty of *** order... 详细信息
来源: 评论
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论