咨询与建议

限定检索结果

文献类型

  • 2,274 篇 会议
  • 1,479 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,400 篇 工学
    • 1,886 篇 计算机科学与技术...
    • 1,554 篇 软件工程
    • 518 篇 信息与通信工程
    • 312 篇 控制科学与工程
    • 288 篇 生物工程
    • 260 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 159 篇 电子科学与技术(可...
    • 146 篇 机械工程
    • 140 篇 光学工程
    • 92 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 85 篇 安全科学与工程
    • 85 篇 网络空间安全
    • 79 篇 交通运输工程
  • 1,100 篇 理学
    • 609 篇 数学
    • 311 篇 生物学
    • 246 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 101 篇 化学
  • 725 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 162 篇 医学
    • 145 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 79 篇 公共卫生与预防医...
  • 97 篇 法学
  • 75 篇 教育学
    • 72 篇 教育学
  • 73 篇 经济学
    • 72 篇 应用经济学
  • 30 篇 农学
  • 12 篇 艺术学
  • 11 篇 军事学
  • 7 篇 文学
  • 1 篇 哲学

主题

  • 121 篇 software enginee...
  • 98 篇 training
  • 93 篇 semantics
  • 91 篇 feature extracti...
  • 89 篇 computational mo...
  • 79 篇 deep learning
  • 67 篇 machine learning
  • 65 篇 data models
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 data mining
  • 55 篇 cloud computing
  • 52 篇 computer science
  • 50 篇 predictive model...
  • 48 篇 optimization
  • 48 篇 security
  • 47 篇 computer archite...
  • 46 篇 visualization
  • 45 篇 internet of thin...
  • 45 篇 federated learni...

机构

  • 98 篇 college of compu...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 52 篇 institute of com...
  • 51 篇 school of softwa...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 42 篇 national enginee...
  • 40 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 school of softwa...
  • 36 篇 college of intel...
  • 35 篇 school of softwa...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 state key labora...

作者

  • 33 篇 hung chih-cheng
  • 30 篇 xu yuanping
  • 29 篇 shen linlin
  • 24 篇 yuanping xu
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 buyya rajkumar
  • 21 篇 chaolong zhang
  • 21 篇 xiaofei wang
  • 21 篇 chih-cheng hung
  • 19 篇 qi liu
  • 19 篇 xiaodong liu
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong
  • 18 篇 zhijie xu
  • 18 篇 liu jianxun
  • 17 篇 tao dacheng
  • 17 篇 li tukun
  • 17 篇 zhang chaolong
  • 16 篇 wang lei

语言

  • 3,632 篇 英文
  • 146 篇 其他
  • 34 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Software Engineering"
3807 条 记 录,以下是41-50 订阅
排序:
The Impact of Transformer Models and Regression Algorithms on Automated Short Answer Grading  5
The Impact of Transformer Models and Regression Algorithms o...
收藏 引用
5th IEEE International Conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Nampoothiri, Abhijith. N. Thushara, M.G. Pradeesh, N. Anand Krishna, K.R. Santhosh, Abhai Abhijith Kumar, S. Kumar, Suryan Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Applications Amritapuri India Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India Omnex Software Solutions Pvt. Ltd Thoraipakkam Chennai India
Grading short answer questions in higher education often poses significant challenges due to its subjective nature and time-consuming process. As educational institutions expand, the need for efficient and objective g... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Cost-Optimized Task Offloading for Dependent Applications in Collaborative Edge and Cloud computing
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12975-12988页
作者: Yuan, Haitao Hu, Qinglong Wang, Shen Bi, Jing Buyya, Rajkumar Lu, Jinhu Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Kowloon Tong Hong Kong Beijing University of Technology School of Software Engineering Faculty of Information Technology Beijing100124 China Laboratory School of Computing and Information Systems MelbourneVIC3010 Australia CSSC Systems Engineering Research Institute Beijing100036 China Southern Methodist University Lyle School of Engineering Department of Computer Science DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
A collaborative system that includes mobile devices (MDs), edge nodes (ENs), and the cloud is needed where ENs at the network edge can run offloaded tasks of MDs with limited resources and energy for timely processing... 详细信息
来源: 评论
Adaptive Occlusion Face Recognition Feature Fusion Network Based on Precise Guidance Mask Extraction
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2025年 1-12页
作者: Ye, Jihua Zhang, Lei Wang, Chao Tu, Qixuan Zheng, Rehua Huang, Huiyuan Jiang, Aiwen School of Computer and Information Engineering Jiangxi Normal University Nanchang330022 China Jiangxi Provincial Key Laboratory for High Performance Computing Jiangxi Normal University Nanchang330022 China State International Science & Technology Cooperation Base of Networked Supporting Software Jiangxi Normal University Nanchang330022 China
The uncertainty in the position and size of occluding objects greatly affects the extraction of identity features in facial recognition, which is a challenge that existing methods fail to effectively address. To tackl... 详细信息
来源: 评论
Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5280-5297页
作者: Zhao, Mingxiong Wang, Zirui Guo, Kun Zhang, Rongqian Quek, Tony Q. S. Yunnan University National Pilot School of Software Kunming650500 China Ministry of Education Engineering Research Center of Integration and Application of Digital Learning Technology Beijing100039 China Ministry of Education Engineering Research Center of Cyberspace Kunming650504 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China Yunnan University Yunnan Key Laboratory of Software Engineering Kunming650091 China East China Normal University Shanghai Key Laboratory of Multidimensional Information Processing School of Communications and Electronics Engineering Shanghai200241 China Yunnan University School of Information Science and Engineering Kunming650500 China Singapore University of Technology and Design Information Systems Technology and Design 487372 Singapore
In Uncrewed Aerial Vehicle (UAV)-assisted Mobile Edge computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of line-of-sight links and potential eavesdropping o... 详细信息
来源: 评论
Measuring biases in AI-generated co-authorship networks
收藏 引用
EPJ Data Science 2025年 第1期14卷 1-33页
作者: Kalhor, Ghazal Ali, Shiza Mashhadi, Afra School of Electrical and Computer Engineering College of Engineering University of Tehran Tehran Iran Computing and Software Systems University of Washington Bothell WA United States
Large Language Models (LLMs) have significantly advanced prompt-based information retrieval, yet their potential to reproduce or amplify social biases remains insufficiently understood. In this study, we investigate t... 详细信息
来源: 评论
Fine-Grained Features-based Code Search for Precise Query-Code Matching  31
Fine-Grained Features-based Code Search for Precise Query-Co...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Xinting Cheng, Mengqiu Wang, Mengzhen Gong, Songwen Cai, Yi Xie, Jiayuan Li, Qing Department of Computing The Hong Kong Polytechnic University Hong Kong School of Software Engineering South China University of Technology China Department of Mathematics The University of Hong Kong Hong Kong Guangdong Neusoft University China
Code search aims to quickly locate target code snippets from databases using natural language queries, which promotes code reusability. Existing methods can effectively obtain aligned token-level and query word-level ... 详细信息
来源: 评论
Towards Attention-Aware Interactive 360-Degree Video Streaming on Smartphones
收藏 引用
IEEE Network 2025年
作者: Zhang, Lei Zhou, Haobin Shen, Linfeng Liu, Jiangchuan Cui, Laizhong Shenzhen University College of Computer Science and Software Engineering China Simon Fraser University School of Computing Science Canada
Browsing 360-degree videos on smartphones is becoming increasingly popular, which is challenging due to heavy user interactions, limited hardware capabilities, and constrained batteries. To improve resource efficiency... 详细信息
来源: 评论
Evaluating software Development Agents: Patch Patterns, Code Quality, and Issue Complexity in Real-World GitHub Scenarios
Evaluating Software Development Agents: Patch Patterns, Code...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Zhi Chen Lingxiao Jiang Centre for Research on Intelligent Software Engineering School of Computing and Information Systems Singapore Management University
In recent years, AI-based software engineering has progressed from pre-trained models to advanced agentic workflows, with software Development Agents representing the next major leap. These agents, capable of reasonin... 详细信息
来源: 评论