咨询与建议

限定检索结果

文献类型

  • 8,574 篇 会议
  • 7,916 篇 期刊文献
  • 157 册 图书

馆藏范围

  • 16,647 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,897 篇 工学
    • 7,388 篇 计算机科学与技术...
    • 6,003 篇 软件工程
    • 2,590 篇 信息与通信工程
    • 1,419 篇 电气工程
    • 1,386 篇 控制科学与工程
    • 1,222 篇 电子科学与技术(可...
    • 1,176 篇 生物工程
    • 859 篇 光学工程
    • 743 篇 生物医学工程(可授...
    • 715 篇 机械工程
    • 480 篇 仪器科学与技术
    • 450 篇 动力工程及工程热...
    • 435 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 299 篇 安全科学与工程
    • 290 篇 交通运输工程
    • 288 篇 网络空间安全
  • 6,058 篇 理学
    • 2,964 篇 数学
    • 2,010 篇 物理学
    • 1,337 篇 生物学
    • 902 篇 统计学(可授理学、...
    • 653 篇 系统科学
    • 503 篇 化学
  • 2,846 篇 管理学
    • 1,795 篇 管理科学与工程(可...
    • 1,147 篇 图书情报与档案管...
    • 829 篇 工商管理
  • 764 篇 医学
    • 651 篇 临床医学
    • 543 篇 基础医学(可授医学...
    • 321 篇 药学(可授医学、理...
  • 451 篇 法学
    • 360 篇 社会学
  • 280 篇 经济学
  • 190 篇 教育学
  • 168 篇 农学
  • 70 篇 文学
  • 58 篇 军事学
  • 28 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 601 篇 computer science
  • 388 篇 laboratories
  • 364 篇 software enginee...
  • 315 篇 deep learning
  • 237 篇 computational mo...
  • 226 篇 data mining
  • 198 篇 machine learning
  • 192 篇 application soft...
  • 189 篇 optimization
  • 159 篇 semantics
  • 154 篇 computer archite...
  • 154 篇 feature extracti...
  • 150 篇 educational inst...
  • 146 篇 internet of thin...
  • 144 篇 bandwidth
  • 142 篇 quality of servi...
  • 140 篇 resource managem...
  • 137 篇 neural networks
  • 133 篇 support vector m...
  • 128 篇 wireless sensor ...

机构

  • 286 篇 faculty of scien...
  • 284 篇 department for p...
  • 283 篇 department of ph...
  • 281 篇 departamento de ...
  • 276 篇 department of ph...
  • 270 篇 department of ph...
  • 267 篇 department of ph...
  • 264 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 238 篇 fakultät für phy...
  • 231 篇 yerevan physics ...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 220 篇 institute of phy...
  • 215 篇 college of compu...
  • 215 篇 department of ph...
  • 214 篇 institut für ast...
  • 207 篇 department of ph...
  • 199 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 251 篇 d. guest
  • 251 篇 s. guindon

语言

  • 14,653 篇 英文
  • 1,752 篇 其他
  • 264 篇 中文
  • 6 篇 德文
  • 5 篇 法文
  • 5 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Information Engineering"
16647 条 记 录,以下是311-320 订阅
排序:
Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 573-592页
作者: Najib Ahmed Mohammed Ali Mohammed Mansoor Rodina Binti Ahmad Saaidal Razalli Bin Azzuhri Department of Software Engineering Faculty of Computer Science and Information TechnologyUniversity of Malaya50603Kuala Lumpur Malaysia 2Department of Computer System&TechnologyFaculty of Computer Science and Information TechnologyUniversity of Malaya50603Kuala LumpurMalaysia
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel... 详细信息
来源: 评论
A Secure and Efficient Framework for Multi-Round Data Trading Over the Internet of Artificially Intelligent Things
收藏 引用
IEEE Internet of Things Magazine 2022年 第1期5卷 119-124页
作者: Zheng, Xu Zhang, Lizong Hui, Bei Tian, Ling Cai, Zhipeng School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Information and Software Engineering University of Electronic Science and Technology of China China Georgia State University Department of Computer Science United States
IoT data trading has greatly benefited the popularization of both the Internet of Things (IoT) and Artificial Intelligence of Things (AIoT). Current solutions mainly treat the dataset owned by each device as a commodi... 详细信息
来源: 评论
Business Scenario Driven Reinforcement Learning Testing Method  26
Business Scenario Driven Reinforcement Learning Testing Meth...
收藏 引用
26th ACIS International Winter Conference on software engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Cai, Lizhi Wang, Jin School of Information Science and Engineering East China University of Science and Technology Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
Reinforcement learning has been successfully applied in software testing, but the existing testing methods cannot perform effective testing according to the characteristics of applications, and using outdated interact... 详细信息
来源: 评论
Transformer-based Text Classification on Unified Bangla Multi-class Emotion Corpus  25
Transformer-based Text Classification on Unified Bangla Mult...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Sourav, Md Sakib Ullah Mahmud, Mohammad Sultan Zheng, Hua Aljaidi, Mohammad Talukder, Md. Simul Hasan Bin Sulaiman, Rejwan Nur, Abdullah Hafez Al-Qerem, Ahmad Shandong University of Finance and Economics School of Management Science and Engineering Jinan China Shenzhen University College of Computer Science and Software Engineering Senzhen China Software Engineering Institute of Guangzhou Department of Software Engineering Guangzhou510990 China Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Dhaka University of Engineering and Technology Department of Electrical and Electronic Engineering Dhaka Bangladesh Northumbria University Newcastle Tayne School of Computer Science & Technology Northumbria United Kingdom International Islamic University Chittagong Department of Electronic and Telecommunication Engineering Chittagong Bangladesh Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan
Due to its importance in studying people's thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low... 详细信息
来源: 评论
Data Aggregation Point Placement and Subnetwork Optimization for Smart Grids
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 407-434页
作者: Tien-Wen Sung Wei Li Chao-Yang Lee Yuzhen Chen Qingjun Fang Fujian Provincial Key Laboratory of Big Data Mining and Applications College of Computer Science and MathematicsFujian University of TechnologyFuzhou350118China Department of Computer Science and Information Engineering National Yunlin University of Science and TechnologyYunlin640301TaiwanChina
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the *** number of DAPs installed and the installatio... 详细信息
来源: 评论
Optimal Production Capacity Matching for Blockchain-Enabled Manufacturing Collaboration With the Iterative Double Auction Method
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 550-562页
作者: Ying Chen Feilong Lin Zhongyu Chen Changbing Tang Cailian Chen the Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province Zhejiang Normal University the School of Computer Science and Technology Zhejiang Normal University IEEE the College of Physics and Electronic Information Engineering Zhejiang Normal University the Department of Automation Shanghai Jiao Tong University
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo... 详细信息
来源: 评论
Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4695-4711页
作者: Mohammed Altaf Ahmed Sara A Althubiti Dronamraju Nageswara Rao ELaxmi Lydia Woong Cho Gyanendra Prasad Joshi Sung Won Kim Department of Computer Engineering College of Computer Engineering&SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science and Engineering Chitkara University Institute of Engineering and TechnologyChitkara UniversityPunjab140401India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Software Convergence Daegu Catholic UniversityGyeongsan38430Korea Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siGyeongbuk-do38541Korea
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet... 详细信息
来源: 评论
An Evaluation System for Large Language Models based on Open-Ended Questions  11
An Evaluation System for Large Language Models based on Open...
收藏 引用
11th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2024
作者: Cao, Zhiyuan Ma, Zeyu Chen, Mingang Computer and Information Engineering College Shanghai Polytechnic University Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer software Technology Mathematical and Science College Shanghai Normal University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer software Technology Shanghai China
We designed a large language model evaluation system based on open-ended questions. The system accomplished multidimensional evaluation of LLMs using open-ended questions, and it presented evaluation results with eval... 详细信息
来源: 评论
A NAS-Based TinyML for Secure Authentication Detection on SAGVN-Enabled Consumer Edge Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 303-313页
作者: Chen, Xingchi Zhang, Shuanglong Li, Qing Zhu, Fa Feng, Ansong Nkenyereye, Lewis Rani, Shalli Pengcheng Laboratory Shenzhen518000 China Nanjing Forestry University College of Information Science and Technology China The College of Information Engineering Shenyang University of Chemical Technology Nanjing Shenyang China Nanjing Forestry University College of Information Science and Technology College of Artificial Intelligence Nanjing China Shenyang University of Chemical Technology College of Information Engineering Shenyang China Sejong University Department of Computer and Information Security Korea Republic of Chitkara University Department of Chitkara University Institute of Engineering and Technology Punjab 140401 India
Traditional authentication methods utilize a uniform model to verify all users, which has been proven to be ineffective for the authentication on consumer edge devices of space-air-ground integrated vehicular networks... 详细信息
来源: 评论
A modified grey wolf optimizer with multi-solution crossover integration algorithm for feature selection
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第1期16卷 329-345页
作者: Ihsan, Muhammad Din, Fakhrud Zamli, Kamal Z. Ghadi, Yazeed Yasin Alahmadi, Tahani Jaser Innab, Nisreen Faculty of IT Department of Computer Science and IT University of Malakand Khyber Pakhtunkhwa Chakdara18800 Pakistan Faculty of Computing College of Computing and Applied Sciences Universiti Malaysia Pahang Pahang Pekan26600 Malaysia Department of computer science and software engineering Al Ain University Abu Dhabi12555 United Arab Emirates Department of Information SystemsCollege of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh84428 Saudi Arabia Department of Computer Science and Information SystemsCollege of Applied Sciences Al-Maarefa University Diriyah Riyadh13713 Saudi Arabia
Feature selection helps eradicate redundant features which is essential to mitigate the curse of dimensionality when a machine-learning model deals with high-dimensional datasets. Grey Wolf Optimizer (GWO) is a swarm-... 详细信息
来源: 评论