咨询与建议

限定检索结果

文献类型

  • 11,288 篇 会议
  • 5,205 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,722 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,273 篇 工学
    • 8,183 篇 计算机科学与技术...
    • 6,802 篇 软件工程
    • 2,007 篇 信息与通信工程
    • 1,350 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 831 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 680 篇 机械工程
    • 605 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 414 篇 安全科学与工程
    • 350 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 325 篇 建筑学
  • 4,531 篇 理学
    • 2,653 篇 数学
    • 1,236 篇 生物学
    • 827 篇 物理学
    • 747 篇 统计学(可授理学、...
    • 632 篇 系统科学
    • 348 篇 化学
  • 3,156 篇 管理学
    • 1,914 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 714 篇 医学
    • 623 篇 临床医学
    • 554 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 485 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 173 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 316 篇 deep learning
  • 303 篇 application soft...
  • 299 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 243 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 201 篇 accuracy
  • 196 篇 feature extracti...
  • 196 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 169 篇 optimization
  • 169 篇 semantics
  • 168 篇 laboratories

机构

  • 356 篇 college of compu...
  • 197 篇 department of co...
  • 155 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 86 篇 department of co...
  • 80 篇 school of inform...
  • 72 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 software enginee...
  • 46 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 wang lei

语言

  • 15,874 篇 英文
  • 737 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16722 条 记 录,以下是4651-4660 订阅
排序:
A Simple Geometric-Aware Indoor Positioning Interpolation Algorithm Based on Manifold Learning
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Suorong Zhang, Geng Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Electronic Science and Engineering Nanjing University China
Interpolation methodologies have been widely used within the domain of indoor positioning systems. However, existing indoor positioning interpolation algorithms exhibit several inherent limitations, including reliance... 详细信息
来源: 评论
Security Risk Management Plan. Student Portal-Case Study  20
Security Risk Management Plan. Student Portal-Case Study
收藏 引用
2020 Asia Service sciences and software engineering Conference, ASSE 2020
作者: Mogos, Gabriela Xi'an Jiaotong-Liverpool University Computer Science and Software Engineering Department Suzhou China
A student portal is a regularly utilized expression to describe the login page where students can give a username and password to access an instruction association's projects and other learning related materials. ... 详细信息
来源: 评论
Security-based Safety Hazard Analysis using STAMP, STPA & HAZOP: A DAM Case Study
Security-based Safety Hazard Analysis using STAMP, STPA & HA...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Farooq Irum Inayat Maya Daneva Department of Software Engineering National University of Computer Emerging Sciences Islamabad Pakistan Department of Creative Technology Air University Islamabad Pakistan LERO University College Cork Cork Ireland Faulty of Electrical Engineering Mathematics and Computer Science (EEMCS) Services Cybersecurity & Safety (SCS) University of Twente Enschede The Netherlands
Security and safety emerged as an interconnected concept for Cyber-Physical Systems (CPS). In recent years, CPS witnessed an enormous cyber-attack that endorsed the significance of security over safety of the CPS. Man...
来源: 评论
Is GPT-4 conscious?
arXiv
收藏 引用
arXiv 2024年
作者: Tait, Izak Bensemann, Joshua Wang, Ziqi Computer Science and Software Engineering Department Auckland University of Technology 55 Wellesley Street East CBD Auckland1010 New Zealand The NAOInstitute The University of Auckland 314 Khyber Pass Road New Market Auckland1023 New Zealand
GPT-4 is often heralded as a leading commercial AI offering, sparking debates over its potential as a steppingstone toward artificial general intelligence. But does it possess consciousness? This paper investigates th... 详细信息
来源: 评论
SemLog: A Semantics-based Approach for Anomaly Detection in Big Data System Logs
SemLog: A Semantics-based Approach for Anomaly Detection in ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xiaoman Tan Ningning Han Siyang Lu Wu Chen Dongdong Wang College of Computer and Information Science College of Software Southwest University Chongqing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Civil Environmental and Construction Engineering University of Central Florida Orlando FL US
Syslog-based anomaly detection is crucial for protecting the systems from malicious attacks or malfunctions. System logs are semi-structured text messages printed by logging statements to record the system’s run-time...
来源: 评论
Secure digital databases using watermarking based on english-character attributes
收藏 引用
Recent Advances in computer science and Communications 2020年 第3期13卷 477-481页
作者: Khatatneh, Khalaf Odeh, Ashraf Mashaleh, Ashraf Hamadeen, Hind Department of Computer Science Al Balqa Applied University As-Salt Jordan Department of Science and Technology Computer Quality Society Jordan Computer Center Al Balqa Applied University As-Salt Jordan Department of Software Engineering Al-Balqa Applied University As-Salt Jordan
Introduction: The single space and the double space (DS). In this procedure, an image is used to watermark a digital database, where the image bytes are divided into binary strings that block the text attributes of th... 详细信息
来源: 评论
MOKD: Cross-domain Finetuning for Few-shot Classification via Maximizing Optimized Kernel Dependence
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Hongduan Liu, Feng Liu, Tongliang Du, Bo Cheung, Yiu-Ming Han, Bo TMLR Group Hong Kong Baptist University Hong Kong Department of Computer Science Hong Kong Baptist University Hong Kong TMLR Group University of Melbourne Australia Sydney AI Centre The University of Sydney Australia National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Wuhan Univeristy China
In cross-domain few-shot classification, nearest centroid classifier (NCC) aims to learn representations to construct a metric space where few-shot classification can be performed by measuring the similarities between... 详细信息
来源: 评论
Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channel... 详细信息
来源: 评论
F2A2: flexible fully-decentralized approximate actor-critic for cooperative multi-agent reinforcement learning
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 8447-8521页
作者: Wenhao Li Bo Jin Xiangfeng Wang Junchi Yan Hongyuan Zha School of Data Science The Chinese University of Hong Kong Shenzhen Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China School of Software Engineering Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China School of Computer Science and Technology Key Laboratory of Mathematics and Engineering Applications Ministry of Education East China Normal University Shanghai China Department of Computer Science and Engineering Key Laboratory of Artificial Intelligence Ministry of Education Shanghai Jiao Tong University Shanghai China
Traditional centralized multi-agent reinforcement learning (MARL) algorithms are sometimes unpractical in complicated applications due to non-interactivity between agents, the curse of dimensionality, and computation ... 详细信息
来源: 评论
The Minimum Covariance Determinant Technique for Insider Threat Detection in Communications and Network Security
SSRN
收藏 引用
SSRN 2024年
作者: Al-Shehari, Taher Kadri, Mohammed Al-Mhiqani, Mohammed Nasser Al-Razgan, Muna Alfakih, Taha Computer Skills Department of Self-Development Skill Common First Year Deanship King Saud University Riyadh11362 Saudi Arabia Department of Computer Science University of Huddersfield HuddersfieldHD1 3DH United Kingdom Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11345 Saudi Arabia Department of Information Systems College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia
Insider threats present a critical concern for network security of organizations, as malicious activities (data theft, hacking, security breaching, etc.) perpetrated by insiders with privileged access systems can resu... 详细信息
来源: 评论