咨询与建议

限定检索结果

文献类型

  • 5,706 篇 会议
  • 3,631 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,151 篇 工学
    • 4,817 篇 计算机科学与技术...
    • 3,978 篇 软件工程
    • 1,355 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 692 篇 生物工程
    • 571 篇 电气工程
    • 420 篇 机械工程
    • 410 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 350 篇 光学工程
    • 235 篇 动力工程及工程热...
    • 213 篇 安全科学与工程
    • 213 篇 网络空间安全
    • 210 篇 化学工程与技术
    • 208 篇 仪器科学与技术
    • 177 篇 交通运输工程
  • 2,810 篇 理学
    • 1,571 篇 数学
    • 759 篇 生物学
    • 621 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 308 篇 系统科学
    • 228 篇 化学
  • 1,917 篇 管理学
    • 1,185 篇 管理科学与工程(可...
    • 811 篇 图书情报与档案管...
    • 513 篇 工商管理
  • 399 篇 医学
    • 335 篇 临床医学
    • 300 篇 基础医学(可授医学...
    • 187 篇 公共卫生与预防医...
  • 326 篇 法学
    • 247 篇 社会学
  • 201 篇 经济学
    • 199 篇 应用经济学
  • 175 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 242 篇 software enginee...
  • 205 篇 deep learning
  • 203 篇 feature extracti...
  • 190 篇 computational mo...
  • 188 篇 machine learning
  • 165 篇 data mining
  • 151 篇 semantics
  • 143 篇 training
  • 137 篇 cloud computing
  • 136 篇 accuracy
  • 132 篇 software
  • 128 篇 internet of thin...
  • 124 篇 optimization
  • 122 篇 authentication
  • 119 篇 predictive model...
  • 108 篇 artificial intel...
  • 106 篇 security
  • 102 篇 servers
  • 101 篇 neural networks

机构

  • 305 篇 college of compu...
  • 272 篇 school of inform...
  • 267 篇 school of comput...
  • 144 篇 school of comput...
  • 114 篇 state key labora...
  • 89 篇 school of softwa...
  • 88 篇 school of inform...
  • 55 篇 school of comput...
  • 50 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 44 篇 shandong provinc...
  • 43 篇 college of compu...
  • 42 篇 college of infor...
  • 41 篇 sri lanka instit...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of big da...

作者

  • 52 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 30 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 26 篇 qi liu
  • 26 篇 susilo willy
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 23 篇 zhang zhao
  • 22 篇 liu yang
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,096 篇 英文
  • 1,223 篇 其他
  • 156 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9449 条 记 录,以下是371-380 订阅
排序:
Sankalpa - Interactive Digital Learning Platform to Enrich Students with Special Needs  5
Sankalpa - Interactive Digital Learning Platform to Enrich S...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Basnayaka, A.I. Epitakaduwa, E.K.G.D. Jayawardena, C.P.U. Zoysa, Ashan Dharmakeerthi, Uditha Jayawardena, Sanath Sri Lanka Institute of Information Technology Dept of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept of Computer Science and Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept of Computer Science and Network Engineering Malabe Sri Lanka
The term special needs mean the special educational needs that the students who suffer from learning disabilities must have due to several reasons. Learning impairment is a condition of the neurological system that im... 详细信息
来源: 评论
UAV Communication and Localization Network Deployment for Content Distribution in Emergency Scenarios  6
UAV Communication and Localization Network Deployment for Co...
收藏 引用
6th International Conference on Electronics and Communication, Network and computer Technology, ECNCT 2024
作者: Wang, Kailiang Yu, Ran Zhang, Donghui Zhang, Yuhao Lu, Jie Yu, Xinyu Men, Baoxia Zhang, Yi Ji, Yutong State Grid Jibei Information & Telecommunication Company Beijing China School of Computer Science National Pilot Software Engineering School Bupt Beijing China
Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their potential to revolutionize emergency response communications and localization, especially when traditional infrastructure is damaged or non-existen... 详细信息
来源: 评论
From Data to Action: CTI Analysis and ATT&CK Technique Correlation  23
From Data to Action: CTI Analysis and ATT&CK Technique Corre...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Nguyen, Khanh-Duy Chu, Hsi-Ching Nguyen, Quoc-Viet Sun, Min-Te Sakai, Kazuya Ku, Wei-Shinn National Central University Computer Science and Information Engineering Taoyuan Taiwan Tokyo Metropolitan University Electrical Engineering and Computer Science Hino Tokyo Japan Auburn University Computer Science and Software Engineering Auburn AL United States
Cyber Threat Intelligence (CTI) significantly enhances organizational cybersecurity defenses by providing actionable insights from diverse data sources. This research studies the correlation between CTI analysis and t... 详细信息
来源: 评论
Moving Object Recognition and Tracking Based on Image-fusion Frame Differencing and Differential Translational Transform  4
Moving Object Recognition and Tracking Based on Image-fusion...
收藏 引用
4th IEEE International Conference on Human-Machine Systems, ICHMS 2024
作者: Chen, Minghui Ji, Yingjun Wang, Aoyuan Wang, Jiacun Liaoning University College Of Information Shenyang China Monmouth University Department Of Computer Science And Software Engineering West Long BranchNJ United States
To address the issue of sensitivity to external interference and noise in traditional moving object recognition and tracking algorithms, this paper proposes a novel algorithm that combines Image Fusion-based Frame Dif... 详细信息
来源: 评论
Incorporating metapath interaction on heterogeneous information network for social recommendation
收藏 引用
Frontiers of computer science 2024年 第1期18卷 33-48页
作者: Yanbin JIANG Huifang MA Xiaohui ZHANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541001China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph *** existing HIN-based recommend... 详细信息
来源: 评论
Bluetooth Vulnerabilities and Security  7
Bluetooth Vulnerabilities and Security
收藏 引用
7th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2025
作者: Mareeswari, V. Vijayan, R. Shukla, Ashish Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Project Assessment in Offshore software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing  10
An Empirical Evaluation of the Effectiveness of Spider and P...
收藏 引用
10th International Conference on Dependable Systems and Their Applications, DSA 2023
作者: Chiu, Kuan-Wei Yang, Shih-Sheng Lee, Shin-Jie Lee, Wen-Tin National Cheng Kung University Department of Computer Science and Information Engineering Taiwan National Kaohsiung Normal University Department of Software Engineering and Management Taiwan
Spider and proxy modes are two commonly employed methods supported by dynamic application security testing (DAST) software. Despite efforts to enhance the automated spider's efficiency, deep exploration of web app... 详细信息
来源: 评论
Learning Age of information-Oriented Energy-Efficient Scheduling with Non-Orthogonal Multiple Access  13
Learning Age of Information-Oriented Energy-Efficient Schedu...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Li, Jinhua Cao, Yi Chan, Tse-Tin Pan, Haoyuan Shenzhen University College of Computer Science and Software Engineering Shenzhen China The Education University of Hong Kong Department of Mathematics and Information Technology Hong Kong
We propose a deep Q-network (DQN)-based user scheduling scheme aimed at low network-wide age of information (AoI) in a non-orthogonal multiple access (NOMA) uplink status update system. In our system, end users can ha... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论