咨询与建议

限定检索结果

文献类型

  • 11,297 篇 会议
  • 5,157 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,213 篇 工学
    • 8,122 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,984 篇 信息与通信工程
    • 1,310 篇 控制科学与工程
    • 1,096 篇 生物工程
    • 814 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 676 篇 机械工程
    • 598 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 325 篇 建筑学
    • 323 篇 动力工程及工程热...
  • 4,508 篇 理学
    • 2,646 篇 数学
    • 1,232 篇 生物学
    • 828 篇 物理学
    • 752 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 349 篇 化学
  • 3,144 篇 管理学
    • 1,908 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 946 篇 工商管理
  • 709 篇 医学
    • 620 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 371 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 319 篇 经济学
    • 318 篇 应用经济学
  • 171 篇 农学
  • 70 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,019 篇 software enginee...
  • 310 篇 deep learning
  • 304 篇 application soft...
  • 291 篇 computational mo...
  • 267 篇 data mining
  • 254 篇 machine learning
  • 243 篇 computer archite...
  • 229 篇 software
  • 206 篇 accuracy
  • 202 篇 software systems
  • 194 篇 feature extracti...
  • 190 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 172 篇 educational inst...
  • 167 篇 laboratories
  • 166 篇 semantics
  • 163 篇 wireless sensor ...

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 143 篇 state key labora...
  • 118 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 84 篇 department of co...
  • 82 篇 school of inform...
  • 75 篇 department of co...
  • 73 篇 department of co...
  • 64 篇 school of comput...
  • 53 篇 department of co...
  • 53 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 software enginee...
  • 46 篇 department of co...
  • 46 篇 school of softwa...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 21 篇 wang wei
  • 20 篇 dozier gerry

语言

  • 15,132 篇 英文
  • 1,447 篇 其他
  • 130 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16683 条 记 录,以下是4431-4440 订阅
排序:
TJCCT: A Two-timescale Approach for UAV-assisted Mobile Edge Computing
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Zemin Sun, Geng Wu, Qingqing He, Long Liang, Shuang Pan, Hongyang Niyato, Dusit Yuen, Chau Leung, Victor C.M. The College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The School of Information Science and Technology Northeast Normal University Changchun130024 China The School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The School of Electrical and Electronics Engineering Nanyang Technological University Singapore639798 Singapore The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) is emerging as a promising paradigm to provide aerial-terrestrial computing services in close proximity to mobile devices (MDs). However, meeting the ... 详细信息
来源: 评论
Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms
收藏 引用
Procedia computer science 2023年 230卷 90-99页
作者: Dharini N Jeevaa Katiravan Sruthi Priya D M Sakthi Sneghaa V A Associate Professor Department of Computer Science Engineering(Cyber Security) R.M.K. College of Engineering and Technology Thiruvallur 601206 Professor Department of Information Technology Velammal Engineering College Surapet Chennai 600066 Software Engineer embedUR Chennai 600013 Jr. Customer Service Executive Tata Communications Transformation Services Chennai 600037
Security poses a substantial challenge in the context of wireless sensor networks (WSNs). WSNs, which are frequently employed for real-time monitoring in various Internet of Things (IoT)-based applications, are partic... 详细信息
来源: 评论
Explaining Model Overfitting in CNNS Via GMM Clustering
SSRN
收藏 引用
SSRN 2024年
作者: Dou, Hui Mu, Xinyu Yi, Mengjun Han, Feng Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology China Department of Computer Science and Technology Nanjing University Nanjing210023 China School of Electronic Science and Engineering Nanjing University Nanjing210023 China School of Artificial Intelligence Nanjing University Nanjing210023 China
Convolutional Neural Networks (CNNs) have demonstrated remarkable prowess in the field of computer vision. However, their opaque decision-making processes pose significant challenges for practical applications. In thi... 详细信息
来源: 评论
Explaining Model Overfitting in CNNs via GMM Clustering
arXiv
收藏 引用
arXiv 2024年
作者: Dou, Hui Mu, Xinyu Yi, Mengjun Han, Feng Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology China Department of Computer Science and Technology Nanjing University Nanjing210023 China School of Electronic Science and Engineering Nanjing University Nanjing210023 China School of Artificial Intelligence Nanjing University Nanjing210023 China
Convolutional Neural Networks (CNNs) have demonstrated remarkable prowess in the field of computer vision. However, their opaque decision-making processes pose significant challenges for practical applications. In thi... 详细信息
来源: 评论
NIV-Detector: An Automated Approach for Detecting Next- Intent Security Vulnerability in Android Applications
NIV-Detector: An Automated Approach for Detecting Next- Inte...
收藏 引用
International Conference on software Defined Systems (SDS)
作者: Zakarea Alshara Anas Shatnawi Yaser Jararweh Software Engineering Department Jordan University of Science and Technology Irbid Jordan DRIT Berger-Levrault Montpellier France Computer Science Department Jordan University of Science and Technology Irbid Jordan
In Android inter-process communication, any component can start another public component using an Intent messaging object nevertheless the components belong to different processes or applications. Besides, the private... 详细信息
来源: 评论
The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges - A Systematic Literature Review (SLR)
收藏 引用
Computational Intelligence and Neuroscience 2022年 2022卷 8303504页
作者: Hassan, Junaid Shehzad, Danish Habib, Usman Aftab, Muhammad Umar Ahmad, Muhammad Kuleev, Ramil Mazzara, Manuel Department of Computer Science National University of Computer and Emerging Sciences Islamabad Chiniot-Faisalabad Campus Chiniot35400 Pakistan Department of Computer Science Superior University Lahore54000 Pakistan Faculty of Computer Sciences and Engineering GIK Institute of Engineering Sciences and Technology Topi Swabi Khyber Pakhtunkhwa23640 Pakistan Institute of Software Development and Engineering Innopolis University Innopolis420500 Russia
Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable c... 详细信息
来源: 评论
Multi-Hierarchy Metamorphic Testing for Hyphenated Words in Machine Translation  31
Multi-Hierarchy Metamorphic Testing for Hyphenated Words in ...
收藏 引用
31st Asia-Pacific software engineering Conference, APSEC 2024
作者: Zhu, Rui Tao, Chuanqi Gao, Jerry College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Nanjing University of Aeronautics and Astronautics Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China San Jose State University Computer Engineering Department San Jose United States
With the advancement of deep neural networks, machine translation has seen rapid progress in recent years. Individuals often rely on machine translation software to facil-itate various tasks. However, the intricacies ... 详细信息
来源: 评论
Addressing Multi-Core Timing Interference using Co-Runner Locking  42
Addressing Multi-Core Timing Interference using Co-Runner Lo...
收藏 引用
42nd IEEE Real-Time Systems Symposium, RTSS 2021
作者: Kim, Hyoseung de Niz, Dionisio Andersson, Bjorn Klein, Mark Lehoczky, John Electrical and Computer Engineering University of California Riverside United States Software Engineering Institute Carnegie Mellon University United States Department of Statistics and Data Science Carnegie Mellon University United States
This paper presents a task synchronization mechanism, called co-runner locking, to address the timing interference problem in multi-core real-time systems. It prevents certain subsets of tasks from executing simultane... 详细信息
来源: 评论
Self-Supervised Learning Using Noisy-Latent Augmentation
Self-Supervised Learning Using Noisy-Latent Augmentation
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Rasa Khosrowshahli Shahryar Rahnamayan Azam Asilian Bidgoli Masoud Makrehchi Department of Electrical Computer and Software Engineering Nature-Inspired Computational Intelligence (NICI) Lab Ontario Tech University Oshawa ON Canada Engineering Department Nature-Inspired Computational Intelligence (NICI) Lab Brock University St. Catharines ON Canada Nature-Inspired Computational Intelligence (NICI) Lab Faculty of Science Wilfrid Laurier University Waterloo ON Canada Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa ON Canada
Generally speaking, labeled data is difficult and expensive to provide for applications in machine learning and data mining. One of the earliest approaches to tackle this problem is semi-supervised self-training to ta...
来源: 评论
HoloLens 2 Technical Evaluation as Mixed Reality Guide
arXiv
收藏 引用
arXiv 2022年
作者: Guo, Hung-Jui Prabhakaran, Balakrishnan Software Engineering Department The Univerity of Texas DallasTX United States Computer Science Department The Univerity of Texas DallasTX United States
Mixed Reality (MR) is an evolving technology lying in the continuum spanned by related technologies such as Virtual Reality (VR) and Augmented Reality (AR), and creates an exciting way of interacting with people and t... 详细信息
来源: 评论