咨询与建议

限定检索结果

文献类型

  • 18,232 篇 会议
  • 8,871 篇 期刊文献
  • 277 册 图书

馆藏范围

  • 27,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,418 篇 工学
    • 11,750 篇 计算机科学与技术...
    • 9,689 篇 软件工程
    • 3,214 篇 信息与通信工程
    • 2,179 篇 控制科学与工程
    • 1,888 篇 电气工程
    • 1,869 篇 生物工程
    • 1,616 篇 电子科学与技术(可...
    • 1,470 篇 生物医学工程(可授...
    • 1,166 篇 光学工程
    • 1,066 篇 机械工程
    • 863 篇 化学工程与技术
    • 743 篇 仪器科学与技术
    • 721 篇 材料科学与工程(可...
    • 716 篇 动力工程及工程热...
    • 623 篇 安全科学与工程
    • 507 篇 建筑学
  • 8,389 篇 理学
    • 4,167 篇 数学
    • 2,332 篇 物理学
    • 2,206 篇 生物学
    • 1,290 篇 统计学(可授理学、...
    • 978 篇 化学
    • 953 篇 系统科学
  • 4,586 篇 管理学
    • 2,861 篇 管理科学与工程(可...
    • 1,900 篇 图书情报与档案管...
    • 1,462 篇 工商管理
  • 1,441 篇 医学
    • 1,227 篇 临床医学
    • 1,071 篇 基础医学(可授医学...
    • 656 篇 药学(可授医学、理...
  • 737 篇 法学
    • 586 篇 社会学
  • 636 篇 教育学
    • 602 篇 教育学
  • 501 篇 经济学
  • 314 篇 农学
  • 109 篇 文学
  • 67 篇 军事学
  • 40 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,264 篇 software enginee...
  • 1,154 篇 computer science
  • 472 篇 deep learning
  • 417 篇 application soft...
  • 417 篇 computational mo...
  • 390 篇 accuracy
  • 369 篇 machine learning
  • 364 篇 computer archite...
  • 351 篇 training
  • 345 篇 software
  • 317 篇 feature extracti...
  • 283 篇 internet of thin...
  • 278 篇 software systems
  • 261 篇 support vector m...
  • 260 篇 data mining
  • 231 篇 testing
  • 229 篇 programming
  • 212 篇 artificial intel...
  • 195 篇 semantics
  • 183 篇 optimization

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 department of co...
  • 110 篇 school of softwa...
  • 101 篇 state key labora...
  • 90 篇 department of co...
  • 70 篇 department of co...
  • 69 篇 department of co...
  • 57 篇 department of co...
  • 57 篇 department of co...
  • 50 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 45 篇 school of inform...
  • 41 篇 department of co...
  • 41 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 department of co...
  • 40 篇 renewable and su...

作者

  • 55 篇 rajkumar buyya
  • 44 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 andrea alù
  • 36 篇 stuckey peter j.
  • 34 篇 niyato dusit
  • 30 篇 kono junichiro
  • 29 篇 shen furao
  • 28 篇 ivan i. smalyukh
  • 25 篇 muhammad waseem ...
  • 24 篇 wang lei
  • 24 篇 rehman attique u...
  • 24 篇 liu yang
  • 22 篇 khomh foutse
  • 22 篇 jiacun wang
  • 21 篇 qusay h. mahmoud
  • 21 篇 fattahi jaouhar
  • 20 篇 zhi-hui wang
  • 20 篇 dozier gerry
  • 20 篇 kotagiri ramamoh...

语言

  • 24,645 篇 英文
  • 2,524 篇 其他
  • 217 篇 中文
  • 12 篇 德文
  • 11 篇 日文
  • 7 篇 土耳其文
  • 4 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Program Department of Computer Engineering"
27380 条 记 录,以下是901-910 订阅
排序:
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
Real-Time Road Signs Detection and Recognition for Enhanced Road Safety  15
Real-Time Road Signs Detection and Recognition for Enhanced ...
收藏 引用
15th International Conference on Innovations in Information Technology, IIT 2023
作者: Teklesenbet, Hermon B. Demoz, Nahom H. Jabiro, Igor H. Tesfay, Yonatan R. Badidi, Elarbi UAE University CIT Department of Computer Science and Software Engineering Al-Ain United Arab Emirates
Road sign detection and recognition play a critical role in improving driver safety and awareness in the modern traffic era. This paper describes the development and evaluation of a Road Sign Detection and Recognition... 详细信息
来源: 评论
MA-MFIF: When misaligned multi-focus Image fusion meets deep homography estimation
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10877-10898页
作者: Zhao, Baojun Luo, Fei Fuentes, Joel Ding, Weichao Gu, Chunhua School of Information Science and Engineering East China University of Science and Technology Shanghai200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Department of Computer Science and Information Technologies Universidad del Bio-Bio Chillán3780000 Chile
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning... 详细信息
来源: 评论
Graph-Aware Unsupervised Feature Scoring Using Reconstruction Errors in GNN Embeddings
Graph-Aware Unsupervised Feature Scoring Using Reconstructio...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Sehee Kim, So Yeon Sohn, Kyung-Ah Ajou University Department of Artificial Intelligence Suwon Korea Republic of Ajou University Department of Artificial Intelligence Department of Software and Computer Engineering Suwon Korea Republic of
Graph neural networks (GNNs) have recently gained significant attention for their ability to model and analyze complex relationships, leading to numerous applications in a variety of fields. In line with this, explain... 详细信息
来源: 评论
Maximum Weight Convex Polytope  34
Maximum Weight Convex Polytope
收藏 引用
34th Canadian Conference on Computational Geometry, CCCG 2022
作者: Abam, Mohammad Ali Lavasani, Ali Mohammad Pankratov, Denis Department of Computer Engineering Sharif University of Technology Iran Department of Computer Science and Software Engineering Concordia University Canada
We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
来源: 评论
A Novel Approach Detection for False Data Injection, and Man in the Middle Attacks in IoT and IIoT
A Novel Approach Detection for False Data Injection, and Man...
收藏 引用
2023 IEEE PES Generation, Transmission and Distribution International Conference and Exposition, GTD 2023
作者: Gonen, Serkan Bariskan, Mehmet Ali Kaplan, Derya Yiltas Yilmaz, Ercan Nurcan Cetin, Aydin Istanbul Gelişim University Department of Computer and Software Engineering Istanbul Turkey Istanbul University-Cerrahpasa Department of Computer Engineering Istanbul Turkey Gazi University Faculty of Technology Ankara Turkey
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a... 详细信息
来源: 评论
An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platforms
收藏 引用
computer Systems Science & engineering 2023年 第12期47卷 2869-2894页
作者: Jebran Khan Kashif Ahmad Kyung-Ah Sohn Department of Artificial Intelligence Ajou UniversitySuwonKorea Department of Computer Science Munster Technological UniversityCorkIreland Department of Software and Computer Engineering Ajou UniversitySuwonKorea
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversari... 详细信息
来源: 评论
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
收藏 引用
computer Systems Science & engineering 2022年 第11期43卷 833-847页
作者: A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and Engineering University College of Engineering AriyalurAriyalur621705India Department of Mathematics University College of Engineering AriyalurAriyalur621705India Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoT School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***... 详细信息
来源: 评论
Performance Improvement in Blood Cell Segmentation with Deep Learning-based Image Fusion Approach  8
Performance Improvement in Blood Cell Segmentation with Deep...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Dogu, Fatma Tuana Dogan, Hulya Dogan, Ramazan Ozgur Sezen, F. Sena Karadeniz Technical University Faculty of Engineering Department of Electrical and Electronics Engineering Trabzon Turkey Karadeniz Technical University Faculty of Engineering Department of Software Engineering Trabzon Turkey Trabzon University Faculty of Computer and Information Sciences Department of Artificial Intelligence Engineering Trabzon Turkey Karadeniz Technical University Faculty of Pharmacy Department of Pharmacology Trabzon Turkey
To overcome the limitations of examining blood cells under a microscope, several investigations have been carried out using artificial intelligence techniques. These investigations aim to automate the processes of det... 详细信息
来源: 评论
Detecting Code Smell with a Deep Learning System
Detecting Code Smell with a Deep Learning System
收藏 引用
2023 Innovations in Intelligent Systems and Applications Conference, ASYU 2023
作者: Nizam, Ali Avar, Muhammed Yahya Adas, Omer Kaan Yanik, Ahmet Fatih Sultan Mehmet Vakif University Department of Software Engineering İstanbul Turkey Fatih Sultan Mehmet Vakif University Department of Computer Engineering İstanbul Turkey
Code smell detection is one of the most significant issues in the software industry. Metric-based static code analysis tools are used to detect undesirable coding practices known as code smells and guide refactoring r... 详细信息
来源: 评论