咨询与建议

限定检索结果

文献类型

  • 30,879 篇 会议
  • 23,811 篇 期刊文献
  • 429 册 图书

馆藏范围

  • 55,119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,246 篇 工学
    • 19,676 篇 计算机科学与技术...
    • 15,935 篇 软件工程
    • 6,511 篇 信息与通信工程
    • 5,296 篇 电气工程
    • 5,148 篇 电子科学与技术(可...
    • 4,268 篇 控制科学与工程
    • 3,217 篇 生物工程
    • 3,216 篇 光学工程
    • 2,432 篇 生物医学工程(可授...
    • 2,230 篇 机械工程
    • 2,215 篇 化学工程与技术
    • 2,170 篇 材料科学与工程(可...
    • 1,813 篇 仪器科学与技术
    • 1,522 篇 动力工程及工程热...
    • 931 篇 力学(可授工学、理...
    • 868 篇 交通运输工程
    • 855 篇 安全科学与工程
  • 20,646 篇 理学
    • 8,767 篇 物理学
    • 8,753 篇 数学
    • 3,793 篇 生物学
    • 2,750 篇 统计学(可授理学、...
    • 2,464 篇 化学
    • 1,964 篇 系统科学
  • 7,423 篇 管理学
    • 4,648 篇 管理科学与工程(可...
    • 3,005 篇 图书情报与档案管...
    • 2,061 篇 工商管理
  • 2,236 篇 医学
    • 1,880 篇 临床医学
    • 1,541 篇 基础医学(可授医学...
    • 985 篇 药学(可授医学、理...
  • 1,084 篇 法学
    • 879 篇 社会学
  • 724 篇 经济学
  • 549 篇 教育学
  • 527 篇 农学
  • 189 篇 文学
  • 130 篇 军事学
  • 93 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,172 篇 computer science
  • 1,544 篇 laboratories
  • 1,131 篇 software enginee...
  • 924 篇 computational mo...
  • 651 篇 feature extracti...
  • 649 篇 machine learning
  • 614 篇 application soft...
  • 604 篇 deep learning
  • 595 篇 training
  • 532 篇 computer archite...
  • 524 篇 testing
  • 508 篇 semantics
  • 493 篇 accuracy
  • 481 篇 data mining
  • 470 篇 costs
  • 463 篇 artificial intel...
  • 429 篇 bandwidth
  • 399 篇 optimization
  • 366 篇 software
  • 358 篇 predictive model...

机构

  • 1,102 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 795 篇 university of ch...
  • 638 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 593 篇 fakultät physik ...
  • 589 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 524 篇 iccub universita...
  • 524 篇 department of ph...
  • 517 篇 h.h. wills physi...
  • 516 篇 imperial college...
  • 514 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 506 篇 physik-institut ...

作者

  • 267 篇 barter w.
  • 260 篇 a. gomes
  • 252 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 232 篇 g. spigo
  • 231 篇 blake t.
  • 231 篇 s. chen
  • 227 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 f. siegert
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.

语言

  • 52,628 篇 英文
  • 1,809 篇 其他
  • 683 篇 中文
  • 13 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Engineering"
55119 条 记 录,以下是31-40 订阅
排序:
Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1525-1545页
作者: Ali Hamid Farea Omar H.Alhazmi Kerem Kucuk Department of Computer Science Taibah UniversityMedina42315Saudi Arabia Department of Software Engineering Kocaeli UniversityKocaeli41001Turkey
While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its Security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
GTE: learning code AST representation efficiently and effectively
收藏 引用
science China(Information sciences) 2025年 第3期68卷 393-394页
作者: Yihao QIN Shangwen WANG Bo LIN Kang YANG Xiaoguang MAO College of Computer Science and Technology National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
来源: 评论
Adaptive Data Forwarding Scheme for Diverse Infotainment Services in Vehicular Named Data Networking
收藏 引用
IEEE Transactions on Vehicular Technology 2024年 第5期74卷 8012-8022页
作者: Khan, Sajjad Ahmad Lim, Huhnkuk Chaudhry, Shehzad Ashraf Kocaeli University Software Engineering Department Izmit41000 Turkey Hoseo University Computer Engineering Department Korea Republic of Abu Dhabi University Department of Computer Science and Information Technology Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering & Architecture Nisantasi University Istanbul Turkey
Providing diverse infotainment services is crucial for enhancing road safety and improving the overall driving experience in vehicular networks. However, delivering these services within Vehicular Named Data Networkin... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging:Comparative Analysis of 2D,2.5D,and 3D Approaches Using UNet Transformer
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 2351-2373页
作者: Mohammed A.Mahdi Shahanawaj Ahamad Sawsan A.Saad Alaa Dafhalla Alawi Alqushaibi Rizwan Qureshi Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PetronasSeri Iskandar32610Malaysia Center for Research in Computer Vision(CRCV) University of Central FloridaOrlandoFL 32816USA
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Competition for gradient-free tuning of large language models:approaches, results, current challenges and future directions
收藏 引用
National science Review 2023年 第6期10卷 16-19页
作者: Tingfeng Cao Liang Chen Dixiang Zhang Tianxiang Sun Zhengfu He Xipeng Qiu Xing Xu Hai Zhang School of Software Engineering South China University of Technology School of Computer Science Fudan University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural languag...
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论