咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是491-500 订阅
排序:
Research on Entity Recognition Method for Quality Standards of Concrete Prefabricated Components  1
Research on Entity Recognition Method for Quality Standards ...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Zhang, Tingshu Tu, Ming Wang, Gefan Chen, Bingyong Zhao, Yishi Shang, Jianga School of Computer Science China University of Geosciences Wuhang China Intelligent Construction System Research Institute China Construction Third Engineering Buerau Group Co.L Wuhang China Engineering Research Center of Natural Resource Information Management and Digital Twin Engineering Software Ministry of Education School of Computer Science China University of Geosciences Wuhang China
In recent years, the country has released a large number of standard documents related to prefabricated concrete components. Due to the dispersion and complexity of these standards, it is difficult for industry manage... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection  25
Bridging Machine Learning and Formal Concept Analysis for Ef...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Al-Oraiqat, Anas M. Drieiev, Oleksandr Samara, Ghassan Almatarneh, Sattam Al-Oraiqat, Karim A. Alrawashdeh, Hazim Drieieva, Hanna Elrashidi, Ali Hasan, Yassin M. Y. Zarqa University Faculty of Information Technology Department of Computer Science Jordan Central Ukrainian National Technical University Department of Cybersecurity and Software Kropyvnytskyi Ukraine Zarqa University Faculty of Information Technology Department of Data Science and Artificial Intelligence Jordan Zarqa University Faculty of Information Technology Department of Software Engineering Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Assiut University Electrical Engineering Department Egypt
Crowd detection and prevention systems have become essential for managing densely populated areas. Modern systems leverage the combined power of machine learning, data mining, and image processing to extract and analy... 详细信息
来源: 评论
Analysis of the Spatio-Temporal Characteristics of Winter Surface Urban Heat Island:A Case Study in Beijing,China
收藏 引用
Journal of Earth science 2024年 第5期35卷 1640-1653页
作者: Shanshan Lu Fujiang Liu Yunshuang Ye Jiayu Tang Peng Li Weihua Lin Yan Guo Ruqiang Ma Jun Wang School of Geography and Information Engineering China University of GeosciencesWuhan 430074China AutoNavi Software Co. Ltd.Beijing 100102China School of Computer Science China University of GeosciencesWuhan 430078China Yantai Geological Survey of Coastal Resources Center Yantai 264000China
This study reveals the temporal and spatial evolution characteristics of the winter nighttime urban heat island(UHI)effect in the case of Beijing,*** land surface temperature(LST)is retrieved by radiative transfer equ... 详细信息
来源: 评论
OpenCML: An Open Customizable Modeling Language for Directed Acyclic Graphs  22
OpenCML: An Open Customizable Modeling Language for Directed...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wei, Zhenjie Xing, Weiwei Liu, Weibin Zou, Zhiyuan Chen, Genxiang Beijing Jiaotong University School of Software Engineering Beijing China Beijing Jiaotong University Institute of Information Science Beijing China Beijing Information Science and Technology University Computer School Beijing China Minzu University of China College of Science Beijing China
Directed Acyclic Graphs (DAGs) are widely utilized across various domains for tasks such as graph algorithms, data flow analysis, program optimization, and machine learning. Representing DAGs using General-purpose Pro... 详细信息
来源: 评论
Empowering Deaf Children with Sinhala Sign Language, Emotion Detection, and Sound Recognition  5
Empowering Deaf Children with Sinhala Sign Language, Emotion...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Fernando, W.H.K. Perera, P.L.D.N. Fernando, M.I.N. Gunasekara, P.T.E.W. Fernando, Harinda De Zoysa, Rivoni Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Science Software Engineering Malabe Sri Lanka
This study describes a broad endeavor to use cutting-edge technologies to empower deaf primary school students in Sri Lanka. Three key elements make up the study: a sound recognition and classification system, an Andr... 详细信息
来源: 评论
Evaluating LoRaWAN performance in intentional and unintentional DoS attacks by legacy 900MHz network devices  6
Evaluating LoRaWAN performance in intentional and unintentio...
收藏 引用
6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023
作者: Bang, Seokhyeon Jang, Junyoung Ro, Minju Choi, Yuseon Kwon, Doyong Lee, Kangyeon Smith, Anthony Chung-Ang University School of Computer Science and Engineering Seoul Korea Republic of Chonnam National University Department of Software Engineering Gwangju Korea Republic of Kyungpook National University School of Computer Science and Engineering Daegu Korea Republic of Purdue University Department of Computer and Information Technology IN United States
The deployment of LoRaWAN on the Internet of Things (IoT) has increased since its advent and LoRaWAN now predominates the IoT market over other Low Powered Wide Area Networks (LPWAN). However, since LoRaWAN uses Chirp... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论
PLAME: Piecewise-Linear Approximate Measure for Additive Kernel SVM (Extended abstract)  40
PLAME: Piecewise-Linear Approximate Measure for Additive Ker...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Chan, Tsz Nam Li, Zhe Leong Hou, U. Cheng, Reynold Shenzhen University Department of Computer Science and Software Engineering China Alibaba Cloud University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China The University of Hong Kong Department of Computer Science and Musketeers Foundation Institute of Data Science Hong Kong
Additive Kernel SVM has been extensively used in many applications, including human activity detection and pedestrian detection. Since training an additive kernel SVM model is very time-consuming, which is not scalabl... 详细信息
来源: 评论
Expert System for Kubernetes Cluster Autoscaling and Resource Management  4
Expert System for Kubernetes Cluster Autoscaling and Resourc...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Hettiarachchi, Lasal Sandeepa Jayadeva, Senura Vihan Bandara, Rusiru Abhisheak Vikum Palliyaguruge, Dilmi Samaratunge Arachchillage, Udara Srimath S. Kasthurirathna, Dharshana Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Sri Lanka
The importance of orchestration tools such as Kubernetes has become paramount with the popularity of software architectural styles such as microservices. Furthermore, advancements in containerization technologies such... 详细信息
来源: 评论