咨询与建议

限定检索结果

文献类型

  • 12,922 篇 会议
  • 6,011 篇 期刊文献
  • 265 册 图书

馆藏范围

  • 19,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,677 篇 工学
    • 9,170 篇 计算机科学与技术...
    • 7,611 篇 软件工程
    • 2,402 篇 信息与通信工程
    • 1,569 篇 控制科学与工程
    • 1,279 篇 生物工程
    • 1,012 篇 电气工程
    • 882 篇 生物医学工程(可授...
    • 764 篇 机械工程
    • 747 篇 电子科学与技术(可...
    • 650 篇 光学工程
    • 517 篇 安全科学与工程
    • 430 篇 化学工程与技术
    • 414 篇 动力工程及工程热...
    • 409 篇 仪器科学与技术
    • 396 篇 网络空间安全
    • 388 篇 交通运输工程
  • 5,421 篇 理学
    • 3,038 篇 数学
    • 1,433 篇 生物学
    • 1,191 篇 物理学
    • 895 篇 统计学(可授理学、...
    • 699 篇 系统科学
    • 455 篇 化学
  • 3,601 篇 管理学
    • 2,198 篇 管理科学与工程(可...
    • 1,532 篇 图书情报与档案管...
    • 1,064 篇 工商管理
  • 883 篇 医学
    • 745 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 397 篇 药学(可授医学、理...
    • 396 篇 公共卫生与预防医...
  • 572 篇 法学
    • 445 篇 社会学
  • 374 篇 经济学
  • 349 篇 教育学
  • 216 篇 农学
  • 99 篇 文学
  • 54 篇 军事学
  • 31 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,092 篇 computer science
  • 1,028 篇 software enginee...
  • 409 篇 deep learning
  • 335 篇 computational mo...
  • 330 篇 accuracy
  • 322 篇 application soft...
  • 299 篇 machine learning
  • 275 篇 data mining
  • 259 篇 computer archite...
  • 244 篇 software
  • 244 篇 training
  • 242 篇 support vector m...
  • 234 篇 feature extracti...
  • 230 篇 internet of thin...
  • 206 篇 software systems
  • 187 篇 optimization
  • 183 篇 programming
  • 180 篇 artificial intel...
  • 171 篇 wireless sensor ...
  • 164 篇 educational inst...

机构

  • 345 篇 college of compu...
  • 192 篇 department of co...
  • 130 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 university of sp...
  • 123 篇 università di to...
  • 121 篇 infn sezione di ...
  • 121 篇 academy of scien...
  • 120 篇 indian institute...
  • 114 篇 department of co...
  • 112 篇 charles universi...
  • 111 篇 department of ph...
  • 110 篇 department of co...
  • 108 篇 state key labora...
  • 104 篇 zhejiang univers...
  • 103 篇 imperial college...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 94 篇 a. babaev
  • 94 篇 d. eliseev
  • 93 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 17,189 篇 英文
  • 1,881 篇 其他
  • 154 篇 中文
  • 11 篇 德文
  • 4 篇 日文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Application Department of Computer Science"
19198 条 记 录,以下是4811-4820 订阅
排序:
Study of Various Techniques for the Classification of Hateful Memes  6
Study of Various Techniques for the Classification of Hatefu...
收藏 引用
6th International Conference on Recent Trends on Electronics, Information, Communication and Technology, RTEICT 2021
作者: Sethi, Anushka Kuchhal, Utkarsh Anjum Katarya, Rahul Delhi Technological University Department of Software Engineering Delhi India Delhi Technological University Department of Electronics and Communication Engineering Delhi India Delhi Technological University Department of Computer Science and Engineering Delhi India
An Internet meme is a catchphrase, concept, or piece of media that is spread by means of the Internet, regularly through online media platforms and particularly for comical purposes. Detection of Online Hateful speech... 详细信息
来源: 评论
Preserving Location Privacy of IoT Devices in Heterogeneous Edge Computing Architecture Through Deniability-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ali, Ikram Li, Jianqiang Chen, Jie Chen, Yong Ullah, Shamsher Wakeel, Abdul Shenzhen University National Engineering Laboratory of Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Automation Engineering Chengdu611731 China National University of Sciences and Technology Military College of Signals Department of Electrical Engineering Islamabad Pakistan
Edge computing moves cloud services closer to consumer Internet of Things (IoT) devices, reducing latency and bandwidth usage. This setup enables faster responses but also introduces new security challenges, particula... 详细信息
来源: 评论
An Image Classification Approach to Pre-Determine Extent of Development of Post-Operative Necrosis in Skin Flaps
An Image Classification Approach to Pre-Determine Extent of ...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: G. Spacagna T. Fevens J. Barralet Department of Surgery McGill University Montreal Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada Faculty of Dentistry McGill University Montreal Canada
Purpose - Clinicians and care workers currently cannot determine the final extent of necrosis once it begins. If the area is relatively small, it may heal like a normal wound, whereas re-operation may be the only opti...
来源: 评论
Multiobjective Vehicle Routing Optimization with Time Windows: A Hybrid Approach Using Deep Reinforcement Learning and NSGA-II
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Rixin Wang, Ran Hao, Jie Wu, Qiang Wang, Ping Niyato, Dusit The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China The Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing Jiangsu210038 China The Department of Electrical Engineering and Computer Science Lassonde School of Engineering York University M3J 1P3 Canada The School of Computer Science and Engineering Nanyang Technological University 639798 Singapore
This paper proposes a weight-aware deep reinforcement learning (WADRL) approach designed to address the multiobjective vehicle routing problem with time windows (MOVRPTW), aiming to use a single deep reinforcement lea... 详细信息
来源: 评论
Discovering Authorization Business Rules toward Detecting Web applications Logic Flaws
Discovering Authorization Business Rules toward Detecting We...
收藏 引用
Information Technology (ACIT)
作者: Hamza Alkofahi David Umphress Heba Alawneh Department of Software Engineering Jordan University of Science and Technology Irbid Jordan Department of Computer Science and Software Engineering Auburn University Auburn USA Department of Cybersecurity Al Hussein Technical University Amman Jordan
Aggressive integration of validation checks into web framework software has altered the attack surface of web applications by reducing the opportunity for traditional injection flaws. The hacking community's react... 详细信息
来源: 评论
Fine feature reconstruction in point clouds by adversarial domain translation
Fine feature reconstruction in point clouds by adversarial d...
收藏 引用
Graphics Interface 2020, GI 2020
作者: Raina, Prashant Popa, Tiberiu Mudur, Sudhir Department of Computer Science and Software Engineering Concordia University
Point cloud neighborhoods are unstructured and often lacking in fine details, particularly when the original surface is sparsely sampled. This has motivated the development of methods for reconstructing these fine geo... 详细信息
来源: 评论
Main Confidentiality Challenges in Network Security: A Literature Review
Main Confidentiality Challenges in Network Security: A Liter...
收藏 引用
Information Technology (ACIT)
作者: Mahmoud Asassfeh Mohammad Rasmi Al-Mousa Waleed Amer Adai Mohammad Almomani Ala’a Al-Shaikh Suha Afaneh Mohammed Nayef Alrefai Ali Elrashidi Ghassan Samara Department of Cybersecurity Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Software Enginereeing Zarqa University Zarqa Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
Nowadays, a big challenge is how to protect information from unwanted accesses. It constitutes a big challenge when we have different ways to access data. That is, a lot of information today travels through networks a... 详细信息
来源: 评论
Personalized Federated Learning with Enhanced Implicit Generalization
Personalized Federated Learning with Enhanced Implicit Gener...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Heping Liu Songbai Liu Junkai Ji Qiuzhen Lin Jianyong Chen Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University
Integrating personalization into federated learning is crucial for addressing data heterogeneity and surpassing the limitations of a single aggregated model. Personalized federated learning excels at capturing inter-c... 详细信息
来源: 评论
Flying sensor network optimization using bee intelligence for internet of things
Flying sensor network optimization using bee intelligence fo...
收藏 引用
Intelligent Systems Conference, IntelliSys 2020
作者: Salam, Abdu Javaid, Qaisar Ali, Gohar Ahmad, Fahad Ahmad, Masood Wahid, Ishtiaq Department of Computer Science and Software Engineering International Islamic University Islamabad Islamabad Pakistan Department of Information System and Technology Sur University Sur Oman Department of Computer Science Abdul Wali Khan University Mardan Mardan Pakistan
Flynig sensor network (FSN) for internet of things (IoT) consist of flying nodes called sensors and ground segments. The flying nodes may be operated manually or it may be automated devices. The flying segment of IoT ... 详细信息
来源: 评论
Hierarchical Continual Learning for Domain-Knowledge Retention in Healthcare Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Iqbal, Saeed Zhong, Xiaopin Khan, Muhammad Attique Wu, Zongze AlHammadi, Dina Abdulaziz Liu, Weixiang Choudhry, Imran Arshad Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China Prince Mohammad Bin Fahd University Department of AI Alkhobar Saudi Arabia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Systems Riyadh11671 Saudi Arabia University of Central Punjab Faculty of Information Technology and Computer Science Department of Software Engineering Lahore Pakistan
Internet of Medical Things (IoMT) applications encounter issues with data protection, continual adaptation, and domain-specific knowledge retention, especially in consumer-centric IoMT scenarios. We overcome these obs... 详细信息
来源: 评论