咨询与建议

限定检索结果

文献类型

  • 32,245 篇 会议
  • 24,631 篇 期刊文献
  • 439 册 图书

馆藏范围

  • 57,315 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,819 篇 工学
    • 20,896 篇 计算机科学与技术...
    • 16,771 篇 软件工程
    • 6,789 篇 信息与通信工程
    • 5,416 篇 电气工程
    • 5,268 篇 电子科学与技术(可...
    • 4,603 篇 控制科学与工程
    • 3,312 篇 生物工程
    • 3,275 篇 光学工程
    • 2,491 篇 生物医学工程(可授...
    • 2,312 篇 机械工程
    • 2,262 篇 化学工程与技术
    • 2,234 篇 材料科学与工程(可...
    • 1,869 篇 仪器科学与技术
    • 1,562 篇 动力工程及工程热...
    • 951 篇 力学(可授工学、理...
    • 895 篇 交通运输工程
    • 890 篇 安全科学与工程
  • 21,314 篇 理学
    • 9,131 篇 数学
    • 8,935 篇 物理学
    • 3,895 篇 生物学
    • 2,837 篇 统计学(可授理学、...
    • 2,537 篇 化学
    • 2,051 篇 系统科学
  • 7,759 篇 管理学
    • 4,845 篇 管理科学与工程(可...
    • 3,153 篇 图书情报与档案管...
    • 2,132 篇 工商管理
  • 2,298 篇 医学
    • 1,930 篇 临床医学
    • 1,580 篇 基础医学(可授医学...
    • 999 篇 药学(可授医学、理...
  • 1,123 篇 法学
    • 906 篇 社会学
  • 745 篇 经济学
  • 559 篇 教育学
  • 547 篇 农学
  • 195 篇 文学
  • 133 篇 军事学
  • 97 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,314 篇 computer science
  • 1,658 篇 laboratories
  • 1,169 篇 software enginee...
  • 969 篇 computational mo...
  • 682 篇 feature extracti...
  • 673 篇 machine learning
  • 656 篇 application soft...
  • 637 篇 deep learning
  • 611 篇 training
  • 574 篇 testing
  • 560 篇 computer archite...
  • 538 篇 semantics
  • 522 篇 accuracy
  • 515 篇 data mining
  • 506 篇 costs
  • 485 篇 artificial intel...
  • 433 篇 bandwidth
  • 430 篇 software
  • 419 篇 optimization
  • 388 篇 algorithm design...

机构

  • 1,104 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 977 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 825 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 602 篇 infn sezione di ...
  • 597 篇 fakultät physik ...
  • 585 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 522 篇 iccub universita...
  • 522 篇 department of ph...
  • 517 篇 h.h. wills physi...
  • 517 篇 imperial college...
  • 512 篇 nikhef national ...
  • 509 篇 state key labora...
  • 506 篇 stfc rutherford ...

作者

  • 266 篇 barter w.
  • 258 篇 a. gomes
  • 252 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 231 篇 g. spigo
  • 231 篇 blake t.
  • 229 篇 s. chen
  • 226 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 f. siegert
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.

语言

  • 53,775 篇 英文
  • 2,780 篇 其他
  • 762 篇 中文
  • 15 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Computer Science Department"
57315 条 记 录,以下是671-680 订阅
排序:
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews
Can end-user feedback in social media be trusted for softwar...
收藏 引用
作者: Khan, Javed Ali Ullah, Tahir Khan, Arif Ali Yasin, Affan Akbar, Muhammad Azeem Aurangzeb, Khursheed Department of Computer Science Faculty of Physics Engineering and Computer Science University of Hertfordshire Hatfield United Kingdom School of Computer & Technology Beijing Institute of Technology Beijing China M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland School of Software Northwestern Polytechnical University Shaanxi Xian China Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
End-user feedback in social media platforms, particularly in the app stores, is increasing exponentially with each passing day. software researchers and vendors started to mine end-user feedback by proposing text anal... 详细信息
来源: 评论
Incorporating metapath interaction on heterogeneous information network for social recommendation
收藏 引用
Frontiers of computer science 2024年 第1期18卷 33-48页
作者: Yanbin JIANG Huifang MA Xiaohui ZHANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541001China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph *** existing HIN-based recommend... 详细信息
来源: 评论
A survey of artificial intelligence models for wireless capsule endoscopy videos for superior automatic diagnosis: problems and solutions
收藏 引用
Multimedia Tools and Applications 2025年 1-35页
作者: El-Gammal, Eman M. El-Shafai, Walid Taha, Taha E. El-Fishawy, Adel S. Abd El-Samie, Fathi E. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Center of Advanced Software and Biomedical Clinical Engineering Consultations Faculty of Engineering Cairo University Giza Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University 84428 Riyadh11671 Saudi Arabia
Wireless Capsule Endoscopy (WCE) emerged as an innovative and patient-centric approach for non-invasive and painless examination of the gastrointestinal (GI) tract. It serves as a pivotal tool in helping medical pract... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI  10
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Li, Yanlu Xiao, Yufeng Gong, Yinyan Zhang, Ronglin Huo, Yingzi Wu, Yanbing Hunan Key Laboratory for Service Computing Novel Software Technology Xiangtan411201 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
A Deep Learning Approach for Prediction of Protein Secondary Structure
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3705-3718页
作者: Muhammad Zubair Muhammad Kashif Hanif Eatedal Alabdulkreem Yazeed Ghadi Muhammad Irfan Khan Muhammad Umer Sarwar Ayesha Hanif Department of Computer Science Government College UniversityFaisalabadPakistan Department of Computer Science College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Department of Software Engineering/Computer Science Al Ain UniversityAbu DhabiUnited Arab Emirates
The secondary structure of a protein is critical for establishing a link between the protein primary and tertiary *** this reason,it is important to design methods for accurate protein secondary structure *** of the e... 详细信息
来源: 评论
Challenges of Using Pre-trained Models: The Practitioners' Perspective  31
Challenges of Using Pre-trained Models: The Practitioners' P...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Tan, Xin Li, Taichuan Chen, Ruohe Liu, Fang Zhang, Li School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Economics and Management Beihang University Beijing China
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ... 详细信息
来源: 评论
Recognition of Fire Situation Using Graph Convolutional Network Model  15th
Recognition of Fire Situation Using Graph Convolutional Netw...
收藏 引用
15th International Conference on computer science and its Applications, CSA 2023 and 17th KIPS International Conference on Ubiquitous Information Technologies and Applications, CUTE 2023
作者: Kim, Si Jin Park, Ji Su Kang, Jungho Shon, Jin Gon Advanced Convergence Technology Laboratory Korea National Open University Seoul Korea Republic of Department of Computer Science and Engineering Jeonju University Jeonju-Si Korea Republic of Department of Software Engineering Baewha Woman University Seoul Korea Republic of Department of Computer Science Korea National Open University Seoul Korea Republic of
Fires cause a lot of casualties and economic losses. In order to prevent fire accidents in advance, it is necessary to find out the cause of the fire. Existing fire alarm systems detected fires with temperature, smoke... 详细信息
来源: 评论
Development of Area-Based Explosive Trace Detection Using Deep Transfer Learning  1
Development of Area-Based Explosive Trace Detection Using De...
收藏 引用
1st International Conference on Innovative engineering sciences and Technological Research, ICIESTR 2024
作者: Ohemu, Monday F. Azeta, Ambrose A. Adeyanju, Ibrahim A. Obasi, Chukwuemeka C. Airforce Institute of Technology Department of Electrical/Electronics Engineering Kaduna Nigeria Namibia University of Science and Technology Department of Software Engineering Namibia Federal University Department of Computer Engineering Oye-Ekiti Nigeria Edo State University Department of Computer Engineering Uzairue Nigeria
Terrorism poses a significant global threat, necessitating comprehensive security measures to protect people and critical infrastructure. With the increasing frequency of explosive-based attacks, there is a pressing n... 详细信息
来源: 评论
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts  31
Cryptcoder: An Automatic Code Generator for Cryptographic Ta...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Xia, Libin Zhang, Jiashuo Wang, Che Tan, Zezhong Gao, Jianbo Guan, Zhi Chen, Zhong Peking University MoE Key Laboratory of High Confidence Software Technologies Beijing China School of Computer Science Peking University Beijing China Peking University National Engineering Research Center for Software Engineering Beijing China
Cryptographic APIs provided by Ethereum are widely adopted in decentralized applications (DApps) for cryptographic operations. However, developers who lack expertise in cryptography frequently encounter difficulties w... 详细信息
来源: 评论