咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,599 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,085 篇 工学
    • 4,762 篇 计算机科学与技术...
    • 3,949 篇 软件工程
    • 1,322 篇 信息与通信工程
    • 717 篇 控制科学与工程
    • 689 篇 生物工程
    • 530 篇 电气工程
    • 416 篇 机械工程
    • 397 篇 电子科学与技术(可...
    • 381 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 197 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,887 篇 管理学
    • 1,160 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 199 篇 经济学
    • 197 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 241 篇 software enginee...
  • 200 篇 deep learning
  • 198 篇 feature extracti...
  • 187 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 146 篇 training
  • 138 篇 cloud computing
  • 132 篇 software
  • 131 篇 accuracy
  • 128 篇 internet of thin...
  • 122 篇 authentication
  • 121 篇 optimization
  • 117 篇 predictive model...
  • 106 篇 artificial intel...
  • 105 篇 security
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 115 篇 state key labora...
  • 89 篇 school of inform...
  • 88 篇 school of softwa...
  • 57 篇 school of comput...
  • 55 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 43 篇 shandong provinc...
  • 42 篇 sri lanka instit...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 36 篇 university of el...
  • 36 篇 state key labora...

作者

  • 52 篇 shen linlin
  • 38 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 27 篇 susilo willy
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,329 篇 英文
  • 931 篇 其他
  • 152 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9388 条 记 录,以下是4681-4690 订阅
排序:
Privacy Preservation of Users in P2P E-Payment System  3
Privacy Preservation of Users in P2P E-Payment System
收藏 引用
3rd IEEE International Conference on Electrical, computer and Communication Technologies: computer science and engineering, ICECCT 2019
作者: Kwansah Ansah, Albert Kofi Adu-Gyamfi, Daniel Anokye, Stephen School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan611731 China University of Mines and Technology Ghana School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu Sichuan610054 China Universityy of Energy and Natural Resources Ghana
Bitcoin ecosystem is supposed to be anonymous and untraceable. Nonetheless, Bitcoin offers weak anonymity in practice. The linkable pseudonymity of Bitcoin system raises privacy concerns for users. There are inputs an... 详细信息
来源: 评论
Fast Network Alignment via Graph Meta-Learning
Fast Network Alignment via Graph Meta-Learning
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Fan Zhou Chengtai Cao Goce Trajcevski Kunpeng Zhang Ting Zhong Ji Geng School of Information and Software Engineering University of Electronic Science and Technology of China Department of Electrical and Computer Engineering Iowa State University Ames IA Robert H. Smith School of Business University of Maryland College park MD
Network alignment (NA) - i.e., linking entities from different networks (also known as identity linkage) - is a fundamental problem in many application domains. Recent advances in deep graph learning have inspired var... 详细信息
来源: 评论
Plot2API: Recommending graphic API from plot via semantic parsing guided neural network
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Zeyu Huang, Sheng Liu, Zhongxin Yan, Meng Xia, Xin Wang, Bei Yang, Dan Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Hangzhou China Faculty of Information Technology Monash University Australia Pengcheng Laboratory Shenzhen China
Plot-based Graphic API recommendation (Plot2API) is an unstudied but meaningful issue, which has several important applications in the context of software engineering and data visualization, such as the plotting guida... 详细信息
来源: 评论
Adversarial Learning with Cost-Sensitive Classes
arXiv
收藏 引用
arXiv 2021年
作者: Shen, Haojing Chen, Sihong Wang, Ran Wang, Xizhao Big Data Institute College of Computer Science and Software Engineering Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China The College of Mathematics and Statistics Shenzhen University Shenzhen518060 China The Shenzhen Key Laboratory of Advanced Machine Learning and Applications Shenzhen University Shenzhen518060 China
It is necessary to improve the performance of some special classes or to particularly protect them from attacks in adversarial learning. This paper proposes a framework combining cost-sensitive classification and adve... 详细信息
来源: 评论
A Fuzzy Neural Network Based Dynamic Data Allocation Model on Heterogeneous Multi-GPUs for Large-scale Computations
收藏 引用
International Journal of Automation and computing 2018年 第2期15卷 181-193页
作者: Chao-Long Zhang Yuan-Ping Xu Zhi-Jie Xu Jia He Jing Wang Jian-Hua Adu School of Software Engineering Chengdu University of Information Technology School of Computing & Engineering University of Huddersfield School of Computer Science Chengdu University of Information Technology Department of Computing Sheffield Hallam University
The parallel computation capabilities of modern graphics processing units (GPUs) have attracted increasing attention from researchers and engineers who have been conducting high computational throughput studies. How... 详细信息
来源: 评论
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network
A Multivariate Time Series Prediction Schema based on Multi-...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Xiang Yin Yanni Han Hongyu Sun Zhen Xu Haibo Yu Xiaoyu Duan Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Software and Electrical Engineering Swinburne University of Technology Melbourne Australia School of Computer Science Wuhan University Wuhan China
In the past decades, various approaches have been proposed to address the time series prediction problem, among which nonlinear autoregressive exogenous (NARX) models achieve great progresses in one-step time predicti...
来源: 评论
Identity-aware attribute recognition via real-time distributed inference in mobile edge clouds
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zichuan Zhou, Pan Wu, Jiangkai Ren, Jiankang Xia, Qiufen Liang, Huizhi Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Software Dalian University of Technology Dalian China School of Computer Science Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science University of Reading Reading United Kingdom
With the development of deep learning technologies, attribute recognition and person re-identification (re-ID) have attracted extensive attention and achieved continuous improvement via executing computing-intensive d... 详细信息
来源: 评论
Performance and energy-aware bi-objective tasks scheduling for cloud data centers
arXiv
收藏 引用
arXiv 2021年
作者: Materwala, Huned Ismail, Leila Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates National Water and Energy Center United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates
Cloud computing enables remote execution of users' tasks. The pervasive adoption of cloud computing in smart cities' services and applications requires timely execution of tasks adhering to Quality of Services... 详细信息
来源: 评论
[Retracted] Cyber Security against Intrusion Detection Using Ensemble-Based Approaches
收藏 引用
Security and Communication Networks 2023年 第1期2023卷
作者: Mohammed Naif Alatawi Najah Alsubaie Habib Ullah Khan Tariq Sadad Hathal Salamah Alwageed Shaukat Ali Islam Zada Information Technology Department Faculty of Computing and Information Technology University of Tabuk Tabuk Saudi Arabiaut.edu.sa Department of Computer Sciences College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh 11671 Saudi Arabiapnu.edu.sa Department of Accounting and Information Systems College of Business and Economics Qatar University Doha Qatarqu.edu.qa Department of Computer Science University Engineering and Technology Mardan Khyber Pakhtunkhwa Pakistan College of Computer and Information Sciences Jouf University Sakakah Saudi Arabiaju.edu.sa Department of Computer Science University of Peshawar Peshawar Khyber Pakhtunkhwa Pakistanuop.edu.pk Department of Software Engineering Faculty of Computing & Information Technology International Islamic University Islamabad Pakistaniiu.edu.pk
The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers. Furthermore, cyber security is demanding day by day, as cybercriminals are performing cyberattacks in this digital world. So, ...
来源: 评论
Toward accurate link between code and software documentation
收藏 引用
science China(information sciences) 2018年 第5期61卷 72-86页
作者: Yingkui CAO Yanzhen ZOU Yuxiang LUO Bing XIE Junfeng ZHAO Key Laboratory of High Confidence Software Technologies Ministry of Education School of Electronics Engineering and Computer Science Peking University Beida (Binhai) Information Research
Recovering traceability links between source code and software documentation is an important research topic in software maintenance and software reuse. There have been a lot of research efforts in recovering traceabil... 详细信息
来源: 评论