咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 3,600 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,114 篇 工学
    • 4,785 篇 计算机科学与技术...
    • 3,974 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 720 篇 控制科学与工程
    • 689 篇 生物工程
    • 543 篇 电气工程
    • 419 篇 机械工程
    • 402 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 203 篇 安全科学与工程
    • 200 篇 仪器科学与技术
    • 198 篇 网络空间安全
    • 172 篇 建筑学
  • 2,795 篇 理学
    • 1,567 篇 数学
    • 758 篇 生物学
    • 615 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 221 篇 化学
  • 1,896 篇 管理学
    • 1,166 篇 管理科学与工程(可...
    • 799 篇 图书情报与档案管...
    • 515 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 321 篇 法学
    • 243 篇 社会学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 173 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 239 篇 software enginee...
  • 197 篇 deep learning
  • 196 篇 feature extracti...
  • 185 篇 computational mo...
  • 182 篇 machine learning
  • 162 篇 data mining
  • 149 篇 semantics
  • 145 篇 training
  • 136 篇 cloud computing
  • 130 篇 software
  • 127 篇 accuracy
  • 125 篇 internet of thin...
  • 121 篇 optimization
  • 119 篇 authentication
  • 116 篇 predictive model...
  • 107 篇 artificial intel...
  • 104 篇 security
  • 101 篇 educational inst...
  • 100 篇 servers

机构

  • 297 篇 college of compu...
  • 267 篇 school of comput...
  • 266 篇 school of inform...
  • 143 篇 school of comput...
  • 117 篇 state key labora...
  • 87 篇 school of softwa...
  • 84 篇 school of inform...
  • 55 篇 school of comput...
  • 52 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 42 篇 sri lanka instit...
  • 42 篇 shandong provinc...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of comput...

作者

  • 51 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 29 篇 susilo willy
  • 28 篇 huang min
  • 25 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 liu yang
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 21 篇 wang wei
  • 20 篇 lu dianjie
  • 20 篇 mahmood khalid

语言

  • 8,749 篇 英文
  • 494 篇 其他
  • 146 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9375 条 记 录,以下是4961-4970 订阅
排序:
A new parallel simulation method for massive crowd
收藏 引用
Procedia computer science 2019年 147卷 283-287页
作者: Xiukai Zhao Lei Lyu Chen Lyu Cun Ji School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China
With the advent of multi-core and even many-core processors, massively parallel computing processing has presented a trend of low cost and popularity. It provides new technical means and feasible solutions for the rap... 详细信息
来源: 评论
Developing an Effective Graph Based Block Chain Framework
收藏 引用
Journal of Physics: Conference Series 2021年 第4期1964卷
作者: B Ravi Prasad Swapnil Saurav A Sangeerani Devi Venkateshwaran Loganathan Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology Dundigal Telangana India Department of Problem Management Service Now Software India Pvt. Ltd Hyderabad Telangana India Department of Computer Science and Engineering Sri Sairam Engineering College Chennai Tamil Nadu India Department of Information Technology KGiSL Institute of Technology Coimbatore Tamil Nadu India
Blockchain's decentralized characteristic is recognized as a potential technology to deliver secure and safe resources. However, the existing blockchain networks cannot fulfil the transaction given the limited ban...
来源: 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
Analysis and modeling of sequential circuits in QCA nano computing: RAM and SISO register study
收藏 引用
Solid State Electronics Letters 2019年 第2期1卷 73-83页
作者: Md. Abdullah-Al-Shafi Rahman Ziaur Institute of Information Technology (IIT) University of Dhaka Dhaka 1000 Bangladesh School of Computer Science and Software Engineering RMIT University 414-418 Swanston Street Melbourne VIC 3000 Australia
Quantum-dot cellular automata (QCA) is a foremost archetype of field-coupled nanoscale devices. It is a non-von-Neumann, minimal energy dissipated model for conventional nano computing by transistor free logic. The fi... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Supervised Nonnegative Tucker Decomposition for Computational Phenotyping
Supervised Nonnegative Tucker Decomposition for Computationa...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Kai Yang Wenqi Sun Junfeng Zhao Yasha Wang Bing Xie Key Laboratory of High Confdence Software Technologies Ministry of Education Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Beida(Binhai) Information Research Tianjing National Engineering Research Center of Software Engineering Beijing China
With the availability of Electronic Health Records (EHR) data, lots of predictive tasks in medical practice seem solvable by building predictive models. However, EHR data always contains various medical concepts (e.g.... 详细信息
来源: 评论
FUTURE-AI: International consensus guideline for trustworthy and deployable artificial intelligence in healthcare
arXiv
收藏 引用
arXiv 2023年
作者: Lekadir, Karim Feragen, Aasa Fofanah, Abdul Joseph Frangi, Alejandro F. Buyx, Alena Emelie, Anais Lara, Andrea Porras, Antonio R. Chan, An-Wen Navarro, Arcadi Glocker, Ben Botwe, Benard O. Khanal, Bishesh Beger, Brigit Wu, Carol C. Cintas, Celia Langlotz, Curtis P. Rueckert, Daniel Mzurikwao, Deogratias Fotiadis, Dimitrios I. Zhussupov, Doszhan Ferrante, Enzo Meijering, Erik Weicken, Eva González, Fabio A. Asselbergs, Folkert W. Prior, Fred Krestin, Gabriel P. Collins, Gary S. Tegenaw, Geletaw S. Kaissis, Georgios Misuraca, Gianluca Tsakou, Gianna Dwivedi, Girish Kondylakis, Haridimos Jayakody, Harsha Woodruf, Henry C. Mayer, Horst Joachim Aerts, Hugo JWL Walsh, Ian Chouvarda, Ioanna Buvat, Irène Tributsch, Isabell Rekik, Islem Duncan, James Kalpathy-Cramer, Jayashree Zahir, Jihad Park, Jinah Mongan, John Gichoya, Judy W. Schnabel, Julia A. Kushibar, Kaisar Riklund, Katrine Mori, Kensaku Marias, Kostas Amugongo, Lameck M. Fromont, Lauren A. Maier-Hein, Lena Alberich, Leonor Cerdá Rittner, Leticia Phiri, Lighton Marrakchi-Kacem, Linda Donoso-Bach, Lluís Martí-Bonmatí, Luis Cardoso, M. Jorge Bobowicz, Maciej Shabani, Mahsa Tsiknakis, Manolis Zuluaga, Maria A. Bielikova, Maria Fritzsche, Marie-Christine Camacho, Marina Linguraru, Marius George Wenzel, Markus De Bruijne, Marleen Tolsgaard, Martin G. Ghassemi, Marzyeh Ashrafuzzaman, Md Goisauf, Melanie Yaqub, Mohammad Abadía, Mónica Cano Mahmoud, Mukhtar M.E. Elattar, Mustafa Rieke, Nicola Papanikolaou, Nikolaos Lazrak, Noussair Díaz, Oliver Salvado, Olivier Pujol, Oriol Sall, Ousmane Guevara, Pamela Gordebeke, Peter Lambin, Philippe Brown, Pieta Abolmaesumi, Purang Dou, Qi Lu, Qinghua Osuala, Richard Nakasi, Rose Zhou, S. Kevin Napel, Sandy Colantonio, Sara Albarqouni, Shadi Joshi, Smriti Carter, Stacy Klein, Stefan Petersen, Steffen E. Aussó, Susanna Awate, Suyash Raviv, Tammy Riklin Cook, Tessa Mutsvangwa, Tinashe E.M. Rogers, Wendy A. Niessen, Wiro J. Puig-Bosch, Xènia Zeng, Yi Mohammed, Yunusa G. Aquino, Yves Saint James Salahuddin, Zohaib Starmans, Martijn P.A. Department de Matemàtiques i Informàtica Universitat de Barcelona Barcelona Spain Barcelona Spain DTU Compute Technical University of Denmark Kgs Lyngby Denmark Department of Mathematics and Computer Science Faculty of Science and Technology Milton Margai Technical University Freetown Sierra Leone Center for Computational Imaging & Simulation Technologies in Biomedicine Schools of Computing and Medicine University of Leeds Leeds United Kingdom Cardiovascular Science and Electronic Engineering Departments KU Leuven Leuven Belgium Institute of History and Ethics in Medicine Technical University of Munich Munich Germany Faculty of Engineering of Systems Informatics and Sciences of Computing Galileo University Guatemala City Guatemala Department of Biostatistics and Informatics Colorado School of Public Health University of Colorado Anschutz Medical Campus AuroraCO United States Department of Medicine Women’s College Research Institute University of Toronto Toronto Canada Universitat Pompeu Fabra BarcelonaBeta Brain Research Center Barcelona Spain Department of Computing Imperial College London London United Kingdom School of Biomedical & Allied Health Sciences University of Ghana Accra Ghana Department of Midwifery & Radiography School of Health & Psychological Sciences City University of London United Kingdom Kathmandu Nepal European Heart Network Brussels Belgium Department of Thoracic Imaging University of Texas MD Anderson Cancer Center Houston United States IBM Research Africa Nairobi Kenya Departments of Radiology Medicine and Biomedical Data Science Stanford University School of Medicine Stanford United States Institute for AI and Informatics in Medicine Klinikum rechts der Isar Technical University Munich Munich Germany Department of Computing Imperial College London London United Kingdom Muhimbili University of Health and Allied Sciences Dar es Salaam Tanzania United Republic of Ioannina Greece Almaty AI Lab Almaty Kazakhstan
Background: Despite major advances in artificial intelligence (AI) research for healthcare, the deployment and adoption of AI technologies remain limited in clinical practice. In recent years, concerns have been raise... 详细信息
来源: 评论
Consent Verification Under Evolving Privacy Policies
Consent Verification Under Evolving Privacy Policies
收藏 引用
IEEE International Conference on Requirements engineering
作者: Marco Robol Travis D. Breaux Elda Paja Paolo Giorgini Information Engineering and Computer Science Department University of Trento Trento Italy Institute of Software Research Carnegie Mellon University Pittsburgh USA Computer Science Department IT University of Copenhagen Copenhagen Denmark
Personal data provides important business value, for example, in the personalization of services. In addition, companies are moving toward new business models, in which products and services are offered without charge... 详细信息
来源: 评论
A embedding model for text classification
收藏 引用
Expert Systems 2019年 第6期36卷 e12460-e12460页
作者: Liu, Wenfeng Liu, Peiyu Yang, Yuzhen Yi, Jing Zhu, Zhenfang School of Information Science and Engineering Shandong Normal University Jinan China School of Computer Heze University Heze China Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China School of Computer Science and Technology Shandong Jianzhu University Jinan China School of Information Science and Electrical Engineering Shandong Jiaotong University Jinan China
Existing word embeddings learning algorithms only employ the contexts of words, but different text documents use words and their relevant parts of speech very differently. Based on the preceding assumption, in order t... 详细信息
来源: 评论
Multi-Dimension Projection for Non-Linear Data Via Spearman Correlation Analysis (MD-SCA)
Multi-Dimension Projection for Non-Linear Data Via Spearman ...
收藏 引用
International Conference on information and Communication Technologies (ICICT)
作者: Muhammad Saddam Khokhar Keyang Cheng Misbah Ayoub Zakria Lubamba Kasangu Eric School of Computer Science and Communications Engineering Jiangsu University Zhenjiang China Xi'an Jiaotong-Liverpool University Suzhou China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
This paper introduces an algorithm of multidimensional informative projection or view of multiple variable and more than two random variables via Spearman correlation analysis (SCA). The proposed algorithm is an exten... 详细信息
来源: 评论