咨询与建议

限定检索结果

文献类型

  • 18,207 篇 会议
  • 8,875 篇 期刊文献
  • 276 册 图书

馆藏范围

  • 27,358 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,437 篇 工学
    • 11,792 篇 计算机科学与技术...
    • 9,729 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 2,188 篇 控制科学与工程
    • 1,885 篇 电气工程
    • 1,873 篇 生物工程
    • 1,601 篇 电子科学与技术(可...
    • 1,472 篇 生物医学工程(可授...
    • 1,174 篇 光学工程
    • 1,070 篇 机械工程
    • 867 篇 化学工程与技术
    • 744 篇 仪器科学与技术
    • 720 篇 动力工程及工程热...
    • 686 篇 材料科学与工程(可...
    • 625 篇 安全科学与工程
    • 509 篇 建筑学
  • 8,420 篇 理学
    • 4,173 篇 数学
    • 2,339 篇 物理学
    • 2,208 篇 生物学
    • 1,282 篇 统计学(可授理学、...
    • 979 篇 化学
    • 956 篇 系统科学
  • 4,599 篇 管理学
    • 2,869 篇 管理科学与工程(可...
    • 1,904 篇 图书情报与档案管...
    • 1,466 篇 工商管理
  • 1,449 篇 医学
    • 1,232 篇 临床医学
    • 1,075 篇 基础医学(可授医学...
    • 653 篇 药学(可授医学、理...
  • 739 篇 法学
    • 588 篇 社会学
  • 638 篇 教育学
    • 604 篇 教育学
  • 500 篇 经济学
  • 315 篇 农学
  • 110 篇 文学
  • 67 篇 军事学
  • 40 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,262 篇 software enginee...
  • 1,155 篇 computer science
  • 467 篇 deep learning
  • 416 篇 application soft...
  • 412 篇 computational mo...
  • 385 篇 accuracy
  • 367 篇 machine learning
  • 362 篇 computer archite...
  • 358 篇 training
  • 342 篇 software
  • 315 篇 feature extracti...
  • 279 篇 internet of thin...
  • 279 篇 software systems
  • 261 篇 support vector m...
  • 260 篇 data mining
  • 231 篇 testing
  • 229 篇 programming
  • 216 篇 artificial intel...
  • 196 篇 semantics
  • 186 篇 optimization

机构

  • 355 篇 college of compu...
  • 197 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 state key labora...
  • 90 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 department of co...
  • 57 篇 department of co...
  • 57 篇 department of co...
  • 50 篇 department of co...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 45 篇 school of inform...
  • 41 篇 department of co...
  • 41 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 department of co...
  • 40 篇 school of comput...

作者

  • 56 篇 rajkumar buyya
  • 43 篇 man ka lok
  • 43 篇 baowen xu
  • 36 篇 stuckey peter j.
  • 36 篇 andrea alù
  • 34 篇 niyato dusit
  • 31 篇 kono junichiro
  • 30 篇 shen furao
  • 28 篇 ivan i. smalyukh
  • 25 篇 muhammad waseem ...
  • 25 篇 liu yang
  • 24 篇 wang lei
  • 24 篇 rehman attique u...
  • 22 篇 khomh foutse
  • 22 篇 jiacun wang
  • 21 篇 qusay h. mahmoud
  • 21 篇 dozier gerry
  • 21 篇 fattahi jaouhar
  • 20 篇 zhi-hui wang
  • 20 篇 kotagiri ramamoh...

语言

  • 25,982 篇 英文
  • 1,154 篇 其他
  • 211 篇 中文
  • 11 篇 日文
  • 9 篇 德文
  • 8 篇 土耳其文
  • 4 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Program Department of Computer Engineering"
27358 条 记 录,以下是4571-4580 订阅
排序:
A Light Field Image Quality Assessment Method Based on Stereo Vision
A Light Field Image Quality Assessment Method Based on Stere...
收藏 引用
2022 IEEE International Conference on Unmanned Systems, ICUS 2022
作者: Fu, Wei Shen, Xingfa Zhou, Wenhui Zhdanov, Andrei D. Geng, Chuntong Itmo Joint Institute Hangzhou Dianzi University Department of Computer Science Hangzhou China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Itmo University Faculty of Software Engineering and Computer Systems St.Petersburg Russia
Light field imaging is an important achievement in visual information exploration in recent years, which can capture more abundant visual information from the real world. However, most existing light field image quali... 详细信息
来源: 评论
An Improved Boolean Load Matrix-Based Frequent Pattern Mining
An Improved Boolean Load Matrix-Based Frequent Pattern Minin...
收藏 引用
3rd International Conference on Intelligent Computing and Optimization, ICO 2020
作者: Roy, Shaishab Akhtar, Mohammad Nasim Rahman, Mostafijur Department of Computer Science and Engineering Dhaka University of Engineering and Technology Gazipur Dhaka Bangladesh Department of Software Engineering Daffodil International University Dhaka Bangladesh
Frequent Pattern Mining (FPM) has been playing an essential role in data mining research. In literature, many algorithms have proposed to discover interesting association patterns. However, frequent pattern mining in ... 详细信息
来源: 评论
Cardinality and Representation of Stone Relation Algebras
arXiv
收藏 引用
arXiv 2023年
作者: Furusawa, Hitoshi Guttmann, Walter Department of Science Kagoshima University Kagoshima Japan Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
Previous work has axiomatised the cardinality operation in relation algebras, which counts the number of edges of an unweighted graph. We generalise the cardinality axioms to Stone relation algebras, which model weigh... 详细信息
来源: 评论
Enhancing Nurse Scheduling with User Preferences: Hybrid Genetic Algorithm and Variable Neighbourhood Search Approach
Enhancing Nurse Scheduling with User Preferences: Hybrid Gen...
收藏 引用
IEEE International Conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Kehinde Segun Atoyebi Adebayo Abayomi-Alli Dauda Wisdom Daniel Morolake Oladayo Lawrence Orobosade Adewunmi Alabi Bayo Olushola Omoyiola Department of Software Engineering University of Bolton Bolton United Kingdom Department of Computer Science Federal University of Agriculture Abeokuta Nigeria Department of Computer Science Baze University Abuja Nigeria Department of Computer Science University of the People California United States
The Nurse Scheduling Problem (NSP) assigns nurses to shifts while meeting constraints, making it an NP-hard problem. This study proposes GAV_NS 2 , a hybrid Genetic Algorithm (GA) and Variable Neighbourhood Search (VN... 详细信息
来源: 评论
Geometric Spanning Trees Minimizing the Wiener Index
arXiv
收藏 引用
arXiv 2023年
作者: Abu-Affash, A. Karim Carmi, Paz Luwisch, Ori Mitchell, Joseph S.B. Department of Software Engineering Shamoon College of Engineering Israel Computer Science Department Ben-Gurion University Israel Department of Applied Mathematics and Statistics Stony Brook University United States
The Wiener index of a network, introduced by the chemist Harry Wiener [30], is the sum of distances between all pairs of nodes in the network. This index, originally used in chemical graph representations of the non-h... 详细信息
来源: 评论
Anomaly-based network intrusion detection using Transfer learning
Anomaly-based network intrusion detection using Transfer lea...
收藏 引用
Multidisciplinary engineering and Applied Science (ICMEAS), International Conference on
作者: Similoluwa Ola-Obaado Muhammad Aliyu Suleiman Computer Science Department Nile University of Nigeria Abuja Nigeria Software Engineering Department Nile University of Nigeria Abuja Nigeria
The rapid development of computer networks and network applications, along with the present global increase in hacking and computer network attacks, has increased the demand for stronger intrusion detection and preven...
来源: 评论
STEIN LATENT OPTIMIZATION FOR GENERATIVE ADVERSARIAL NETWORKS  10
STEIN LATENT OPTIMIZATION FOR GENERATIVE ADVERSARIAL NETWORK...
收藏 引用
10th International Conference on Learning Representations, ICLR 2022
作者: Hwang, Uiwon Kim, Heeseung Jung, Dahuin Jang, Hyemi Lee, Hyungyu Yoon, Sungroh Department of Electrical and Computer Engineering AIIS ASRI INMC ISRC NSI and Interdisciplinary Program in Artificial Intelligence Seoul National University Seoul08826 Korea Republic of
Generative adversarial networks (GANs) with clustered latent spaces can perform conditional generation in a completely unsupervised manner. In the real world, the salient attributes of unlabeled data can be imbalanced... 详细信息
来源: 评论
Digital Technology in Health Education Trend Mapping through Bibliometrics Analysis  4
Digital Technology in Health Education Trend Mapping through...
收藏 引用
4th International Conference on Informatics, Multimedia, Cyber and Information System, ICIMCIS 2022
作者: Maulana, Fairuz Iqbal Lestari, Dian Widartha, Vandha Pradwiyasma Haidar, Nirwana Dirgantara, Wahyu School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Airlangga University Faculty of Medicine Surabaya60132 Indonesia Telkom University Information System of Industrial Engineering Faculty Bandung Indonesia University of Madura Informatics Engineering Study Program Pamekasan Indonesia University of Merdeka Malang Department of Electrical Engineering Malang Indonesia
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting... 详细信息
来源: 评论
Saccadic Detection in Virtual Gaming for Dyslexia Classification
Saccadic Detection in Virtual Gaming for Dyslexia Classifica...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Yih-Choung Yu Haki Shyntassov Padmanabh Kaushik Lisa Gabel Department of Electrical and Computer Engineering Lafayette College Easton PA USA Department of Psychology and the Neuroscience Program Lafayette College Easton PA USA
Dyslexia (aka reading disability) is the most common cause of learning disabilities. It affects children across language orthographies, despite adequate intelligence and educational opportunity. Studies have shown tha... 详细信息
来源: 评论
Improving Traffic Surveillance: Deep Learning Approach for Road Anomaly Detection in Videos
Improving Traffic Surveillance: Deep Learning Approach for R...
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: Sarfaraz Natha Muhammad Arif Syed Shahryar Jamil Fareed Ahmed Jokhio Muslim Jameel Syed Department of Software Engineering Sir Syed University of Engineering and Technology Karachi Pakistan Instituto Politécnico Nacional (IPN) Mexico MAJU Karachi Pakistan Department of Computer Systems Engineering Quaid-e-Awam University of Engineering and Technology Nawabshah Pakistan Department of Enterprise and Technology Atlantic Technological University Galway Ireland
In recent years, Closed-circuit Television (CCTV) cameras have been playing a vital role in the surveillance of both public and private areas. The primary objective of surveillance is to monitor human behavior and roa... 详细信息
来源: 评论