咨询与建议

限定检索结果

文献类型

  • 11,288 篇 会议
  • 5,205 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,722 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,273 篇 工学
    • 8,183 篇 计算机科学与技术...
    • 6,802 篇 软件工程
    • 2,007 篇 信息与通信工程
    • 1,350 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 831 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 680 篇 机械工程
    • 605 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 414 篇 安全科学与工程
    • 350 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 325 篇 建筑学
  • 4,531 篇 理学
    • 2,653 篇 数学
    • 1,236 篇 生物学
    • 827 篇 物理学
    • 747 篇 统计学(可授理学、...
    • 632 篇 系统科学
    • 348 篇 化学
  • 3,156 篇 管理学
    • 1,914 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 714 篇 医学
    • 623 篇 临床医学
    • 554 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 485 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 173 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 316 篇 deep learning
  • 303 篇 application soft...
  • 299 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 243 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 201 篇 accuracy
  • 196 篇 feature extracti...
  • 196 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 169 篇 optimization
  • 169 篇 semantics
  • 168 篇 laboratories

机构

  • 356 篇 college of compu...
  • 197 篇 department of co...
  • 155 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 86 篇 department of co...
  • 80 篇 school of inform...
  • 72 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 software enginee...
  • 46 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 wang lei

语言

  • 15,874 篇 英文
  • 737 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16722 条 记 录,以下是4811-4820 订阅
排序:
Study and Evaluation of Quality of Services in Mobile Internet Protocol v6 Using IEEE802.11e
收藏 引用
Wireless Communications and Mobile Computing 2022年 第1期2022卷
作者: Alwer, Abdulkader O. Rasheed, Jawad Abu-Mahfouz, Adnan M. Shams, Parvaneh Department of Electrical Engineering Istanbul Aydin University 34295 Turkey Department of Software Engineering Nisantasi University 34398 Turkey Pretoria South Africa Department of Electrical and Electronic Engineering Science University of Johannesburg Johannesburg2006 South Africa Department of Computer Engineering Istanbul Aydin University 34295 Turkey
Mobile Internet Protocol v6 (MIPv6) is a protocol that allows a mobile node (MN) to transparently maintain connections while moving from one subnet to another. Using the route optimization (RO) method in MIPv6 gives o... 详细信息
来源: 评论
EpiTESTER: Testing Autonomous Vehicles with Epigenetic Algorithm and Attention Mechanism
arXiv
收藏 引用
arXiv 2023年
作者: Lu, Chengjie Ali, Shaukat Yue, Tao The Department of Engineering Complex Software Systems Simula Research Laboratory Oslo0258 Norway Simula Research Laboratory Norway Oslo Metropolitan University Oslo0258 Norway The School of Computer Science and Engineering Beihang University Beijing100191 China
Testing autonomous vehicles (AVs) under various environmental scenarios that lead the vehicles to unsafe situations is known to be challenging. Given the infinite possible environmental scenarios, it is essential to f... 详细信息
来源: 评论
An adaptive e-learning system using justification based truth maintenance system
arXiv
收藏 引用
arXiv 2021年
作者: Ali, Tahir Mohammad Rehman, Attique Ur Nawaz, Ali Butt, Wasi Haider Department of Computer Science Gulf University of Science and Technology Kuwait Department of Computer and Software Engineering CEME NUST Islamabad Pakistan
In most E-learning systems, educational activities are presented in a static way without bearing in mind the particulars or student levels and skills. Personalization and adaptation of an E-learning management system ... 详细信息
来源: 评论
Sparse Training Data-Based Hyperspectral Image Super Resolution Via ANFIS Interpolation
Sparse Training Data-Based Hyperspectral Image Super Resolut...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Jing Yang Changjing Shang Lu Chen Pan Su Qiang Shen School of Automation and Software Engineering Shanxi University Taiyuan China Department of Computer Science Aberystwyth University Aberystwyth UK Insti. of Big Data Science & Industry Shanxi University Taiyuan China Department of Computer Hebei Key Laboratory of Knowledge Computing for Energy & Power Baoding North China Electric Power University China
Hyperspectral image super resolution aims to improve the spatial resolution of given hyperspectral images, which has become a highly attractive topic in the field of image processing. Existing techniques typically foc...
来源: 评论
Mixture of Knowledge Minigraph Agents for Literature Review Generation
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Zhi Liu, Yan Zhong, Sheng-Hua Chen, Gong Yang, Yu Cao, Jiannong The Hong Kong Polytechnic University the Department of Computing 999077 Hong Kong Shenzhen University the College of Computer Science and Software Engineering Guangdong Shenzhen518052 China The Education University of Hong Kong Centre for Learning Teaching and Technology 999077 Hong Kong
Literature reviews play a crucial role in scientific research for understanding the current state of research, identifying gaps, and guiding future studies on specific topics. However, the process of conducting a comp... 详细信息
来源: 评论
P1AC: Revisiting Absolute Pose From a Single Affine Correspondence
P1AC: Revisiting Absolute Pose From a Single Affine Correspo...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Jonathan Ventura Zuzana Kukelova Torsten Sattler Dániel Baráth Department of Computer Science & Software Engineering Cal Poly San Luis Obispo Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Czech Institute of Informatics Robotics and Cybernetics Czech Technical University in Prague Computer Vision and Geometry Group ETH Zürich
Affine correspondences have traditionally been used to improve feature matching over wide baselines. While recent work has successfully used affine correspondences to solve various relative camera pose estimation prob...
来源: 评论
Role of masks in mitigating viral spread on networks
收藏 引用
Physical Review E 2023年 第1期108卷 014306-014306页
作者: Yurun Tian Anirudh Sridhar Chai Wah Wu Simon A. Levin Kathleen M. Carley H. Vincent Poor Osman Yağan Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh Pennsylvania 15213 USA Department of Electrical and Computer Engineering Princeton University Princeton New Jersey 08544 USA Thomas J. Watson Research Center IBM Yorktown Heights New York 10598 USA Department of Ecology & Evolutionary Biology Princeton University Princeton New Jersey 08544 USA Software and Societal Systems School of Computer Science Carnegie Mellon University Pittsburgh Pennsylvania 15213 USA
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive... 详细信息
来源: 评论
TL-CLIP: A Power-specific Multimodal Pre-trained Visual Foundation Model for Transmission Line Defect Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ke Zheng, Zhaoye Guo, Yurong Wang, Jiacun Yang, Jiyuan Xiao, Yangjie Department of Electronic and Communication Engineering North China Electric Power University Hebei071003 China Hebei Key Laboratory of Power Internet of Things Technology North China Electric Power University Hebei Baoding071003 China Computer Science and Software Engineering Department Monmouth University West Long Branch07764 United States
Transmission line defect recognition models have traditionally used general pre-trained weights as the initial basis for their training. These models often suffer weak generalization capability due to the lack of doma... 详细信息
来源: 评论
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 597-616页
作者: Lejun Zhang Zhijie Zhang Weizheng Wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen College of Information Engineering Yangzhou UniversityYangzhou225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou362000China University of Aizu Aizu Wakamatsu9658580Japan College of Information and Communication Engineering Harbin Engineering UniversityHarbin150001China Department of Computer Software Engineering Soonchunhyang UniversityAsanKorea Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou325035China
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually *** blockch... 详细信息
来源: 评论
A Framework for Secure Communication on Internet of Things (IoT)  5th
A Framework for Secure Communication on Internet of Things (...
收藏 引用
5th International Conference on Advanced Computing and Intelligent engineering, ICACIE 2020
作者: Hosenkhan, Mohammad Reza Pattanayak, Binod Kumar Department of Software Engineering Faculty of Information and Communication Technology Universite Des Mascareignes Beau Bassin-Rose Hill Mauritius Department of Computer Science and Engineering Institute of Technical Education and Research Siksha ‘O’ Anusandhan Deemed to be University Bhubaneswar Odisha India
Internet of things (IoT) encompasses millions of resource constrained wirelessly connected devices that are very often prone to external malicious attacks. Hence, there arises a need for protecting these devices from ... 详细信息
来源: 评论