咨询与建议

限定检索结果

文献类型

  • 11,348 篇 会议
  • 5,222 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,312 篇 工学
    • 8,215 篇 计算机科学与技术...
    • 6,824 篇 软件工程
    • 2,044 篇 信息与通信工程
    • 1,365 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 862 篇 电气工程
    • 736 篇 生物医学工程(可授...
    • 686 篇 机械工程
    • 610 篇 电子科学与技术(可...
    • 560 篇 光学工程
    • 431 篇 安全科学与工程
    • 355 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 336 篇 动力工程及工程热...
    • 329 篇 建筑学
    • 321 篇 交通运输工程
  • 4,551 篇 理学
    • 2,652 篇 数学
    • 1,234 篇 生物学
    • 842 篇 物理学
    • 746 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 359 篇 化学
  • 3,190 篇 管理学
    • 1,942 篇 管理科学与工程(可...
    • 1,370 篇 图书情报与档案管...
    • 951 篇 工商管理
  • 726 篇 医学
    • 628 篇 临床医学
    • 555 篇 基础医学(可授医学...
    • 330 篇 药学(可授医学、理...
  • 496 篇 法学
    • 384 篇 社会学
  • 329 篇 教育学
  • 328 篇 经济学
    • 325 篇 应用经济学
  • 172 篇 农学
  • 72 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,023 篇 software enginee...
  • 326 篇 deep learning
  • 303 篇 application soft...
  • 292 篇 computational mo...
  • 268 篇 data mining
  • 250 篇 machine learning
  • 245 篇 computer archite...
  • 229 篇 software
  • 205 篇 accuracy
  • 202 篇 software systems
  • 202 篇 feature extracti...
  • 192 篇 training
  • 189 篇 internet of thin...
  • 189 篇 support vector m...
  • 181 篇 programming
  • 170 篇 educational inst...
  • 169 篇 semantics
  • 164 篇 laboratories
  • 164 篇 optimization

机构

  • 358 篇 college of compu...
  • 199 篇 department of co...
  • 147 篇 state key labora...
  • 118 篇 department of co...
  • 116 篇 department of co...
  • 108 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 84 篇 school of inform...
  • 79 篇 department of co...
  • 74 篇 department of co...
  • 74 篇 department of co...
  • 74 篇 department of co...
  • 66 篇 school of comput...
  • 53 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 school of softwa...
  • 46 篇 department of co...
  • 46 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 shen furao
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 niyato dusit
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 14,696 篇 英文
  • 1,999 篇 其他
  • 132 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering and Computer Science Department"
16799 条 记 录,以下是4371-4380 订阅
排序:
A Spatial Explicit Method Combining Hysplit and Random Forest for Predicting the Next-Day Pollen Concentration at Urban Scale
SSRN
收藏 引用
SSRN 2024年
作者: Huang, Zihang Fei, Teng Bian, Meng School of Resource and Environmental Sciences Wuhan University Wuhan430079 China Computer Science and Software Engineering department Auckland University of Technology Auckland92006 New Zealand School of Remote Sensing and Information Engineering Wuhan University Wuhan92006 China
Airborne pollen is a significant cause of allergies, leading to various discomforting symptoms. Many cities worldwide, including Beijing, face challenges related to airborne pollen. Accurate forecasting of pollen conc... 详细信息
来源: 评论
A Federated and Explainable Approach for Insider Threat Detection in IoT
SSRN
收藏 引用
SSRN 2022年
作者: Amiri-Zarandi, Mohammad Karimipour, Hadis Dara, Rozita A. School of Computer Science University of Guelph Guelph Canada Department of Electrical and Software Engineering University of Calgary Alberta Canada
An insider threat is a malicious action launched by authorized personnel inside the organization. Since insider actions may only leave a small digital footprint in the system, it is considered a major cybersecurity ch... 详细信息
来源: 评论
CompanyName2Vec: Company Entity Matching based on Job Ads
CompanyName2Vec: Company Entity Matching based on Job Ads
收藏 引用
International Conference on Data science and Advanced Analytics (DSAA)
作者: Ran Ziv Ilan Gronau Michael Fire Efi Arazi School of Computer Science Reichman University Department of Software and Information Systems Engineering Ben-Gurion University
Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources. Typically no common key is available for connecting records. Massive data cle... 详细信息
来源: 评论
A Proposal for a New E-Waste Image Dataset Based on the UNU-KEYS Classification
A Proposal for a New E-Waste Image Dataset Based on the UNU-...
收藏 引用
International Symposium on Electrical Apparatus and Technologies (SIELA)
作者: Dimitar I. Iliev Marin B. Marinov Frank Ortmeier Faculty of German Engineering and Industrial Management Technical University of Sofia Sofia Bulgaria Department of Electronics Faculty of Electronic Engineering and Technologies Technical University of Sofia Sofia Bulgaria Faculty of Computer Science Chair of Software Engineering Otto-von-Guericke- University Magdeburg Magdeburg Germany
This paper introduces the largest and most diverse e-waste dataset to date, consisting of 19,613 pictures, 28,941 annotations, and 77 classes, where each class represents one visually distinctive type of electronic de... 详细信息
来源: 评论
An Improved Marine Predators Algorithm Based on Group Learning
An Improved Marine Predators Algorithm Based on Group Learni...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Liying Li Jian Zhao Jiacun Wang Xiwang Guo School of Science University of Science and Technogly Liaoning Anshan China Department of Computer Science and Software Engineering Monmouth University USA Computer and Communication Engineering College Liaoning Petrochemical University Monmouth University Fushun China
To address the shortcomings of the marine predators algorithm (MPA) in solving complex problems, such as low optimization accuracy and easily falling into local optimization, this paper proposes an improved marine pre... 详细信息
来源: 评论
A survey of Intel SGX and its applications
收藏 引用
Frontiers of computer science 2021年 第3期15卷 191-205页
作者: Wei ZHENG Ying WU Xiaoxue WU Chen FENG Yulei SUI Xiapu LUO Yajin ZHOU School of Software and Microelectronics Northwestern Polytechnical UniversityXi'an 710129China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China College of Computer Science and Technology Zhejiang UniversityHangzhou 310027China
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are... 详细信息
来源: 评论
Collaborative Three-Stream Transformers for Video Captioning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Hao Zhang, Libo Fan, Heng Luo, Tiejian School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China Institute of Software Chinese Academy of Sciences Beijing100190 China Department of Computer Science and Engineering University of North Texas DentonTX76203 United States
As the most critical components in a sentence, subject, predicate and object require special attention in the video captioning task. To implement this idea, we design a novel framework, named COllaborative three-Strea... 详细信息
来源: 评论
An Efficient Distributed Framework for Secured Multimedia Content Using Cloud Storage
An Efficient Distributed Framework for Secured Multimedia Co...
收藏 引用
computer Technologies (ICCTech), International Conference on
作者: Yunus Parvej Faniband Iskandar Ishak Fatimah Sidi Marzanah A. Jabar Deloria Shaniska Razin C. H. Yap Center for Communication & IT Research Research Institute King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia UPM Serdang Selangor Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Putra Malaysia UPM Serdang Selangor Malaysia
Applications that support multimedia data such as medical pictures and videos, video broadcasting, and secure video conferencing consume vast quantities of information that require large numbers of servers to provide ...
来源: 评论
Kepler codebook  24
Kepler codebook
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Junrong Lian Ziyue Dong Pengxu Wei Wei Ke Chang Liu Qixiang Ye Xiangyang Ji Liang Lin School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Software Engineering Xi'an Jiaotong University Xi'an China Department of Automation Tsinghua University Beijing China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and Peng Cheng Laboratory Shenzhen China
A codebook designed for learning discrete distributions in latent space has demonstrated state-of-the-art results on generation tasks. This inspires us to explore what distribution of codebook is better. Following the...
来源: 评论
Secure Audio Steganography with Reversible Data Hiding and Encryption
Secure Audio Steganography with Reversible Data Hiding and E...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: P. S. Arthy K. Sanjai Kumar S. Vinson Joshua G. Sahaana R. Kalpana D. David Neels Ponkumar S. Siamala Devi S. Jeya Lakshmi Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai Tamil Nadu India Department of Artificial Intelligence and Data Science Dhanalakshmi College of Engineering Chennai Tamil Nadu India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering (Cyber Security) Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
This research study enhances secure data transmission by embedding sensitive information within audio files. Using Python for the frontend and PHP with MySQL as the backend, this approach employs reversible data hidin... 详细信息
来源: 评论