咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是341-350 订阅
排序:
Moving Object Recognition and Tracking Based on Image-fusion Frame Differencing and Differential Translational Transform  4
Moving Object Recognition and Tracking Based on Image-fusion...
收藏 引用
4th IEEE International Conference on Human-Machine Systems, ICHMS 2024
作者: Chen, Minghui Ji, Yingjun Wang, Aoyuan Wang, Jiacun Liaoning University College Of Information Shenyang China Monmouth University Department Of Computer Science And Software Engineering West Long BranchNJ United States
To address the issue of sensitivity to external interference and noise in traditional moving object recognition and tracking algorithms, this paper proposes a novel algorithm that combines Image Fusion-based Frame Dif... 详细信息
来源: 评论
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2023年 第1期19卷 1-19页
作者: Xiong, Lizhi Han, Xiao Yang, Ching-Nung Xia, Zhihua Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Nanjing University of Information Science and Technology No. 219 Ningliu Road Nanjing Jiangsu210044 China Department of Computer Science and Information Engineering National Dong Hwa University No. 1 Sec. 2 Da Hsueh Rd. Hualien974301 Taiwan
Reversible Data Hiding in Encrypted Image (RDHEI) schemes may redistribute the data hiding procedure to other parties and can preserve privacy of the cover image. Recently, cloud computing technology has led to the ra... 详细信息
来源: 评论
Learning Age of information-Oriented Energy-Efficient Scheduling with Non-Orthogonal Multiple Access  13
Learning Age of Information-Oriented Energy-Efficient Schedu...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Li, Jinhua Cao, Yi Chan, Tse-Tin Pan, Haoyuan Shenzhen University College of Computer Science and Software Engineering Shenzhen China The Education University of Hong Kong Department of Mathematics and Information Technology Hong Kong
We propose a deep Q-network (DQN)-based user scheduling scheme aimed at low network-wide age of information (AoI) in a non-orthogonal multiple access (NOMA) uplink status update system. In our system, end users can ha... 详细信息
来源: 评论
An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing  10
An Empirical Evaluation of the Effectiveness of Spider and P...
收藏 引用
10th International Conference on Dependable Systems and Their Applications, DSA 2023
作者: Chiu, Kuan-Wei Yang, Shih-Sheng Lee, Shin-Jie Lee, Wen-Tin National Cheng Kung University Department of Computer Science and Information Engineering Taiwan National Kaohsiung Normal University Department of Software Engineering and Management Taiwan
Spider and proxy modes are two commonly employed methods supported by dynamic application security testing (DAST) software. Despite efforts to enhance the automated spider's efficiency, deep exploration of web app... 详细信息
来源: 评论
Project Assessment in Offshore software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
Towards Gradient Equalization and Feature Diversification for Long-Tailed Multi-Label Image Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3489-3500页
作者: Chen, Zhao-Min Cui, Quan Zhang, Xiaoqin Deng, Ruoxi Xia, Chaoqun Lu, Shijian Nanjing University National Key Laboratory for Novel Software Technology Nanjing210093 China Waseda University Graduate School of Information Production and Systems Fukuoka169-8050 Japan Wenzhou University College of Computer Science and Artificial Intelligence Wenzhou325060 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore
Multi-label image recognition with convolutional neural networks has achieved remarkable progress in the past few years. However, most existing multi-label image recognition methods suffer from the long-tailed data di... 详细信息
来源: 评论
Comp-RPKI: A Decentralized Protocol for Full Route Origin Validation  9
Comp-RPKI: A Decentralized Protocol for Full Route Origin Va...
收藏 引用
9th International Conference on Big Data Computing and Communications, BigCom 2023
作者: Wu, Yanwei Wang, Yun Dejulius, Jack Abboud, Riad Woitel, Melvin Osadchyy, Bohdan Richardson, Kyree University of Wisconsin Computer Science and Software Engineering PlattevilleWI United States Bradley University Computer Science and Information Systems PeoriaIL United States
The Resource Public Key Infrastructure (RPKI) is an essential technology for securing the Border Gateway Protocol (BGP) routing on the Internet. Although the global RPKI-ROV (Route Origin Validation) rate of unique Pr... 详细信息
来源: 评论
Towards Improving the Quality of Requirement and Testing Process in Agile software Development:An Empirical Study
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3761-3784页
作者: Irum Ilays Yaser Hafeez Nabil Almashfi Sadia Ali Mamoona Humayun Muhammad Aqib Ghadah Alwakid University Institute of Information Technology Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindi46000Pakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia School of Arts Humanities and Social Sciences University of RoehamptonLondonSW155PJUK Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia
software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification,which affect the testing ***,it is difficult to identify all faults in *** requirement changes cont... 详细信息
来源: 评论
MESH-POLYPDET: SURFACE MESHES BASED POLYP DETECTION IN VIRTUAL COLONOSCOPY  18
MESH-POLYPDET: SURFACE MESHES BASED POLYP DETECTION IN VIRTU...
收藏 引用
18th International Conference on Interfaces and Human computer Interaction 2024, IHCI 2024, the 17th International Conference on Game and Entertainment Technologies 2024, GET 2024 and the 18th International Conference on computer Graphics, Visualization, computer Vision and Image Processing 2024, CGVCVIP 2024, Part of the 18th Multi Conference on computer science and information Systems 2024, MCCSIS 2024
作者: Ma, Ming Sun, Chenyang Lei, Na Department of Graduate Computer Science and Engineering Katz School of Science and Health Yeshiva University United States School of Software Technology Dalian University of Technology China International School of Information Science & Engineering Dalian University of Technology China
Colorectal polyps can evolve into colon cancer over time. Early screening or detection of colon polyps using computer-aided detection (CAD) techniques along with removal of the polyps can lower the risk of colon cance... 详细信息
来源: 评论
On the Adversarial Robustness of Hierarchical Classification
On the Adversarial Robustness of Hierarchical Classification
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Ran Zeng, Simeng Wu, Wenhui Jia, Yuheng Ng, Wing W. Y. Wang, Xizhao School of Mathematical Sciences Shenzhen University Shenzhen518060 China College of Electronic and Information Engineering Shenzhen University Shenzhen518060 China School of Computer Science and Engineering Southeast University Nanjing211189 China School of Computer Science and Engineering South China University of Technology Guangzhou510006 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Deep neural networks (DNNs) have demonstrated remarkable success on various learning problems, but they face a formidable challenge in the form of adversarial attacks. Especially, when dealing with complex classificat... 详细信息
来源: 评论