咨询与建议

限定检索结果

文献类型

  • 2,284 篇 会议
  • 1,452 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,374 篇 工学
    • 1,862 篇 计算机科学与技术...
    • 1,532 篇 软件工程
    • 507 篇 信息与通信工程
    • 304 篇 控制科学与工程
    • 289 篇 生物工程
    • 240 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 154 篇 电子科学与技术(可...
    • 144 篇 机械工程
    • 141 篇 光学工程
    • 92 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 84 篇 安全科学与工程
    • 83 篇 网络空间安全
    • 77 篇 交通运输工程
  • 1,092 篇 理学
    • 606 篇 数学
    • 310 篇 生物学
    • 244 篇 物理学
    • 193 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 100 篇 化学
  • 726 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 161 篇 医学
    • 144 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
  • 95 篇 法学
  • 74 篇 教育学
    • 71 篇 教育学
  • 73 篇 经济学
    • 72 篇 应用经济学
  • 29 篇 农学
  • 12 篇 艺术学
  • 11 篇 军事学
  • 7 篇 文学
  • 1 篇 哲学

主题

  • 121 篇 software enginee...
  • 101 篇 training
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 computational mo...
  • 77 篇 deep learning
  • 67 篇 machine learning
  • 65 篇 data models
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 data mining
  • 55 篇 cloud computing
  • 52 篇 predictive model...
  • 51 篇 computer science
  • 49 篇 optimization
  • 48 篇 security
  • 46 篇 computer archite...
  • 46 篇 visualization
  • 45 篇 internet of thin...
  • 43 篇 federated learni...

机构

  • 99 篇 college of compu...
  • 53 篇 department of co...
  • 53 篇 school of inform...
  • 52 篇 institute of com...
  • 50 篇 school of softwa...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 42 篇 national enginee...
  • 40 篇 state key labora...
  • 38 篇 school of comput...
  • 38 篇 school of softwa...
  • 35 篇 college of intel...
  • 35 篇 school of softwa...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of softwa...
  • 31 篇 school of softwa...
  • 31 篇 school of softwa...
  • 30 篇 state key labora...

作者

  • 33 篇 hung chih-cheng
  • 30 篇 xu yuanping
  • 29 篇 shen linlin
  • 24 篇 yuanping xu
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 21 篇 chaolong zhang
  • 21 篇 xiaofei wang
  • 21 篇 buyya rajkumar
  • 20 篇 chih-cheng hung
  • 19 篇 qi liu
  • 19 篇 xiaodong liu
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong
  • 18 篇 zhijie xu
  • 18 篇 liu jianxun
  • 18 篇 zhang chaolong
  • 17 篇 tao dacheng
  • 17 篇 li tukun
  • 17 篇 muhammad adnan k...

语言

  • 3,619 篇 英文
  • 142 篇 其他
  • 34 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Software Engineering"
3790 条 记 录,以下是11-20 订阅
排序:
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Web applications testing techniques: a systematic mapping study
收藏 引用
International Journal of Web engineering and Technology 2023年 第4期17卷 372-412页
作者: Hanna, Samer Ahmad, Amro Al-Said Department of Software Engineering Faculty of Information Technology Philadelphia University Jordan School of Computing and Mathematics University of Keele United Kingdom
Due to the importance of web application testing techniques for detecting faults and assessing quality attributes, many research papers were published in this field. For this reason, it became essential to analyse, cl... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Design of a Secured and Trusted E-Voting System Using Blockchain Technology
Design of a Secured and Trusted E-Voting System Using Blockc...
收藏 引用
2024 IEEE SmartBlock4Africa, SmartBlock4Africa 2024
作者: Elegba Jeremiah, O. Agbelusi, O. Olutayo Victor, A. Akintola Kolawole, G. School of Computing The Federal University of Technology Department of Software Engineering Akure Nigeria School of Computing The Federal University of Technology Department of Computer Science Akure Nigeria
The state of election in Nigeria is worrisome. Electoral malpractices have been a major challenge to the Nigerian government in recent times. Government has made frantic efforts to tackle these electoral challenges bu... 详细信息
来源: 评论
Integrating Private and Accountable Threshold Signature Into Ciphertext-Policy Attribute-Based Encryption Supporting Collaboration Decryption
Integrating Private and Accountable Threshold Signature Into...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Meixin School of Software Engineering East China Normal University Shanghai Key Laboratory of Trustworthy Computing China
Cloud services are becoming increasingly popular in social life. Collaboration in the cloud is critical for teams in different locations and organizations. However, the current collaborative decryption scheme requires... 详细信息
来源: 评论
Enhanced Detection of Glass Insulator Defects Using Improved Generative Modeling and Faster RCNN  18
Enhanced Detection of Glass Insulator Defects Using Improved...
收藏 引用
18th CIRP Conference on Computer Aided Tolerancing, CAT 2024
作者: Ning, Pin Jin, Jin Xu, Yuanping Kong, Chao Zhang, Chaolong Tang, Dan Huang, Jian Xu, Zhijie Li, Tukun School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield Queensgate Huddersfield United Kingdom
The precise defect detections for glass insulators are of utmost importance to ensure their safety and functionality. Therefore, this study proposes an improved defect detection algorithm based on the optimized deep l... 详细信息
来源: 评论
An Improved PointNet++ Based Method for 3D Point Cloud Geometric Features Segmentation in Mechanical Parts  18
An Improved PointNet++ Based Method for 3D Point Cloud Geome...
收藏 引用
18th CIRP Conference on Computer Aided Tolerancing, CAT 2024
作者: Zhang, Peng Kong, Chao Xu, Yuanping Zhang, Chaolong Jin, Jin Li, Tukun Jiang, Xiangqian Tang, Dan School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield Queensgate Huddersfield United Kingdom
The extraction of geometric features such as holes, arcs, and surfaces of mechanical parts is crucial for quality control. The existing methods for geometrical feature segmentations on 3D point clouds still have limit... 详细信息
来源: 评论
Huffman Tree Compression and Lempel-Ziv Coding Using Java
Huffman Tree Compression and Lempel-Ziv Coding Using Java
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Nuha, Hilal H. Rizky Putra Sailellah, Hassan Abo Absa, Ahmed School of Computing Telkom University Bandung Indonesia University of Palestine Software Engineering Gaza Strip Palestine
Lossless data compression is necessary to reduce transmission costs while maintaining data integrity. This paper describes Kompressor as a Huffman and Lempel Ziv (LZ) compression algorithm project using Java. All majo... 详细信息
来源: 评论
Redactable Blockchain From Decentralized Chameleon Hash Functions, Revisited
收藏 引用
IEEE Transactions on Computers 2025年 第6期74卷 1911-1920页
作者: Li, Cong Shen, Qingni Wu, Zhonghai Peking University School of Software and Microelectronics Beijing100871 China Peking University National Engineering Research Center for Software Engineering Beijing100871 China Peking University Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing100871 China Peking University PKU-OCTA Laboratory for Blockchain and Privacy Computing Beijing100871 China
Recently, redactable blockchains have attracted attention owing to enabling the contents of blocks to be re-written. The existing redactable blockchain solutions can be classified as two categories, the centralized on... 详细信息
来源: 评论
ALGIN: Adaptive Local and Global Interests Network for Click-Through Rate Prediction
ALGIN: Adaptive Local and Global Interests Network for Click...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Xiang, Yingjia Lu, Xuanyu Zhou, Wei Wen, Junhao School of Big Data and Software Engineering Chongqing University Chongqing China School of Computing China University of Geosciences Wuhan China
User behavior sequence modeling represents users' interests and preferences, which has a crucial impact on click-through rate (CTR) prediction models and recommendation systems. In practical scenarios, multiple ty... 详细信息
来源: 评论