咨询与建议

限定检索结果

文献类型

  • 50,716 篇 会议
  • 32,192 篇 期刊文献
  • 893 册 图书
  • 10 篇 学位论文

馆藏范围

  • 83,811 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52,790 篇 工学
    • 35,413 篇 计算机科学与技术...
    • 28,711 篇 软件工程
    • 13,174 篇 信息与通信工程
    • 8,613 篇 控制科学与工程
    • 6,564 篇 电气工程
    • 6,248 篇 电子科学与技术(可...
    • 5,703 篇 生物工程
    • 4,168 篇 机械工程
    • 3,885 篇 生物医学工程(可授...
    • 3,838 篇 光学工程
    • 2,967 篇 仪器科学与技术
    • 2,498 篇 化学工程与技术
    • 2,448 篇 动力工程及工程热...
    • 1,995 篇 交通运输工程
    • 1,887 篇 安全科学与工程
    • 1,755 篇 材料科学与工程(可...
    • 1,751 篇 网络空间安全
  • 28,460 篇 理学
    • 15,241 篇 数学
    • 7,931 篇 物理学
    • 6,427 篇 生物学
    • 4,971 篇 统计学(可授理学、...
    • 3,437 篇 系统科学
    • 2,680 篇 化学
  • 14,451 篇 管理学
    • 9,029 篇 管理科学与工程(可...
    • 5,993 篇 图书情报与档案管...
    • 3,950 篇 工商管理
  • 3,850 篇 医学
    • 3,161 篇 临床医学
    • 2,768 篇 基础医学(可授医学...
    • 1,653 篇 药学(可授医学、理...
  • 2,316 篇 法学
    • 1,903 篇 社会学
  • 1,506 篇 经济学
  • 987 篇 教育学
  • 934 篇 农学
  • 325 篇 文学
  • 232 篇 军事学
  • 185 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,941 篇 computer science
  • 1,837 篇 feature extracti...
  • 1,514 篇 deep learning
  • 1,465 篇 computational mo...
  • 1,423 篇 training
  • 1,413 篇 accuracy
  • 1,295 篇 machine learning
  • 1,103 篇 data mining
  • 1,072 篇 optimization
  • 991 篇 semantics
  • 909 篇 artificial intel...
  • 906 篇 educational inst...
  • 853 篇 predictive model...
  • 774 篇 neural networks
  • 758 篇 internet of thin...
  • 714 篇 support vector m...
  • 677 篇 wireless sensor ...
  • 638 篇 data models
  • 601 篇 security
  • 586 篇 image segmentati...

机构

  • 651 篇 school of comput...
  • 540 篇 school of comput...
  • 479 篇 maharishi school...
  • 476 篇 school of inform...
  • 406 篇 school of comput...
  • 275 篇 department of ph...
  • 264 篇 school of comput...
  • 257 篇 faculté des scie...
  • 251 篇 department of ph...
  • 237 篇 school of comput...
  • 225 篇 school of comput...
  • 224 篇 faculty of scien...
  • 219 篇 department of ph...
  • 216 篇 school of comput...
  • 215 篇 physics division...
  • 196 篇 department of ph...
  • 187 篇 departamento de ...
  • 180 篇 department of ph...
  • 176 篇 school of comput...
  • 162 篇 department for p...

作者

  • 274 篇 niyato dusit
  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 260 篇 g. spigo
  • 258 篇 h. a. gordon
  • 255 篇 f. siegert
  • 254 篇 a. c. könig
  • 249 篇 m. klein
  • 247 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 237 篇 h. sakamoto
  • 214 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 199 篇 n. orlando
  • 192 篇 s. jin
  • 190 篇 d. guest

语言

  • 79,275 篇 英文
  • 3,105 篇 其他
  • 1,293 篇 中文
  • 169 篇 日文
  • 12 篇 德文
  • 10 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science Engineering and Information Systems"
83811 条 记 录,以下是4891-4900 订阅
排序:
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
收藏 引用
China Communications 2018年 第2期15卷 190-208页
作者: Jin Li Jinfu Chen Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang National key laboratory of science and technology on information system security Beijing institute of system engineering School of Computer Science and Communication Engineering Jiangsu University
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... 详细信息
来源: 评论
Development of Elliptical Cryptography Technique to Watermark Embedded and Extrusion for Healthcare Records  2nd
Development of Elliptical Cryptography Technique to Watermar...
收藏 引用
2nd International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024
作者: Hegde, N. Prajwal Sivaraman, R. Dharmamoorthy, G. Dubey, Ankit Kumar Patro, Pramoda Mary, S. Suma Christal Department of Artificial Intelligence and Data Science NMAM Institute of Technology Nitte Deemed to be University Karkala India Department of Mathematics Dwaraka Doss Goverdhan Doss Vaishnav College Arumbakkam Tamil Nadu Chennai India Department of Pharmaceutical Analysis MB School of Pharmaceutical Sciences Mohan Babu University Tirupati Rangampeta India Department of Computer Science and Engineering Baderia Global Institute of Engineering and Management MP Jabalpur India Department of Mathematics Koneru Lakshmaiah Education Foundation Hyderabad India Department of Information Technology Panimalar Engineering College Poonamalle Chennai India
An application of E-healthcare watermarking method based on a hybridization of encryption as well as compression algorithms is proposed as the primary goal of this work. One step involves inserting a watermark into th... 详细信息
来源: 评论
YOLO-CORE: Contour Regression for Efficient Instance Segmentation
收藏 引用
Machine Intelligence Research 2023年 第5期20卷 716-728页
作者: Haoliang Liu Wei Xiong Yu Zhang School of Computer Science and Engineering and the Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast UniversityNanjing 211189China
Instance segmentation has drawn mounting attention due to its significant ***,high computational costs have been widely acknowledged in this domain,as the instance mask is generally achieved by pixel-level *** this pa... 详细信息
来源: 评论
Identification of Suspect Using Transformer and Cosine Similarity Model for Forensic Voice Comparison
收藏 引用
Security and Privacy 2025年 第3期8卷
作者: Kruthika, S.G. Nagavi, Trisiladevi C. Mahesha, P. Chethana, H.T. Ravi, Vinayakumar Al Mazroa, Alanoud Department of Computer Science and Engineering S. J. College of Engineering JSS Science and Technology University Karnataka Mysore India Department of Computer Science & Engineering Vidyavardhaka College of Engineering Mysore India Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia
Forensic voice comparison (FVC) is a crucial area within forensic science, focused on analyzing and comparing voice recordings to identify speakers. Traditional FVC methods often involve manual analysis and subjective... 详细信息
来源: 评论
A V2I communication-based pipeline model for adaptive urban traffic light scheduling
收藏 引用
Frontiers of computer science 2019年 第5期13卷 929-942页
作者: Libing WU Lei NIE Samee U. KHAN Osman KHALID Dan WU School of Cyber Science and Engineering Wuhan University Wuhan 430072 China School of Computer Science Wuhan University Wuhan 430072 China School of Computer Science and Technology Wuhan University of Science and Technology Wuhan 430065 China Department of Electrical and Computer Engineering North Dakota State University Fargo USA COMS ATS Institute of Information Technology Islamabad Pakistan School of Computer Science University of Windsor Windsor Ontario Canada
Adaptive traffic light scheduling based on realtime traffic information processing has proven effective for urban traffic congestion management. However, fine-grained information regarding individual vehicles is diffi... 详细信息
来源: 评论
Universal enzymatic numerical P systems with small number of enzymatic variables
收藏 引用
science China(information sciences) 2018年 第9期61卷 38-49页
作者: Zhiqiang ZHANG Tingfang WU ANDrei P■UN Linqiang PAN Key Laboratory of Image Information Processing and Intelligent Control of Education Ministry of China School of Automation Huazhong University of Science and Technology Department of Computer Science Faculty of Mathematics and Computer ScienceUniversity of Bucharest Bioinformatics Department National Institute of Research and Development for Biological Sciences School of Electric and Information Engineering Zhengzhou University of Light Industry
Numerical P systems(for short, NP systems) are distributed and parallel computing models inspired from the structure of living cells and economics. Enzymatic numerical P systems(for short, ENP systems) are a variant o... 详细信息
来源: 评论
Multi-view dimensionality reduction via canonical random correlation analysis
收藏 引用
Frontiers of computer science 2016年 第5期10卷 856-869页
作者: Yanyan ZHANG Jianchun ZHANG Zhisong PAN Daoqiang ZHANG College of Command Information Systems PLA University of Science and Technology Nanjing 210007 China Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing 210016 China
Canonical correlation analysis (CCA) is one of the most well-known methods to extract features from multi- view data and has attracted much attention in recent years. However, classical CCA is unsupervised and does ... 详细信息
来源: 评论
Progressive secret image sharing based on Boolean operations and polynomial interpolations
收藏 引用
Multimedia systems 2024年 第4期30卷 1-14页
作者: Chen, Hao Xiong, Lizhi Yang, Ching-Nung School of Computer Science Nanjing University of Information Science and Technology Jiangsu Nanjing China Department of Computer Science & amp Information Engineering National Dong Hwa University Hualien Taiwan
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing... 详细信息
来源: 评论
Nonnegative Matrix Tri-Factorization Based Clustering in a Heterogeneous information Network with Star Network Schema
收藏 引用
Tsinghua science and Technology 2022年 第2期27卷 386-395页
作者: Juncheng Hu Yongheng Xing Mo Han Feng Wang Kuo Zhao Xilong Che the College of Computer Science and Technology Jilin UniversityChangchun 130012China the School of Intelligent Systems Science and Engineering Jinan UniversityZhuhai 519070China
Heterogeneous information Networks(HINs)contain multiple types of nodes and edges;therefore,they can preserve the semantic information and structure *** analysis using an HIN has obvious advantages over a transformati... 详细信息
来源: 评论
Improving students’programming quality with the continuous inspection process:a social coding perspective
收藏 引用
Frontiers of computer science 2020年 第5期14卷 43-60页
作者: Yao Lu Xinjun Mao Tao Wang Gang Yin Zude Li College of Computer National University of Defense TechnologyChangsha410073China Key Laboratory of Software Engineering for Complex Systems Changsha410073China School of Information Science and Engineering Central South UniversityChangsha410012China
College students majoring in computer science and software engineering need to master skills for high-quality ***,rich research has shown that both the teaching and learning of high-quality programming are challenging... 详细信息
来源: 评论