咨询与建议

限定检索结果

文献类型

  • 11,211 篇 会议
  • 5,131 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,571 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,140 篇 工学
    • 8,077 篇 计算机科学与技术...
    • 6,752 篇 软件工程
    • 1,980 篇 信息与通信工程
    • 1,290 篇 控制科学与工程
    • 1,093 篇 生物工程
    • 808 篇 电气工程
    • 724 篇 生物医学工程(可授...
    • 671 篇 机械工程
    • 595 篇 电子科学与技术(可...
    • 545 篇 光学工程
    • 412 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 336 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 319 篇 建筑学
  • 4,494 篇 理学
    • 2,638 篇 数学
    • 1,228 篇 生物学
    • 817 篇 物理学
    • 742 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 346 篇 化学
  • 3,139 篇 管理学
    • 1,907 篇 管理科学与工程(可...
    • 1,347 篇 图书情报与档案管...
    • 942 篇 工商管理
  • 707 篇 医学
    • 617 篇 临床医学
    • 547 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 481 篇 法学
    • 369 篇 社会学
  • 325 篇 教育学
    • 315 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 171 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 303 篇 application soft...
  • 300 篇 deep learning
  • 296 篇 computational mo...
  • 268 篇 data mining
  • 244 篇 machine learning
  • 242 篇 computer archite...
  • 226 篇 software
  • 202 篇 software systems
  • 194 篇 accuracy
  • 193 篇 feature extracti...
  • 193 篇 training
  • 188 篇 internet of thin...
  • 186 篇 support vector m...
  • 180 篇 programming
  • 171 篇 educational inst...
  • 171 篇 optimization
  • 169 篇 laboratories
  • 169 篇 semantics

机构

  • 344 篇 college of compu...
  • 196 篇 department of co...
  • 156 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 76 篇 school of inform...
  • 74 篇 department of co...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 school of softwa...
  • 49 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 49 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 16,004 篇 英文
  • 457 篇 其他
  • 118 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16571 条 记 录,以下是4901-4910 订阅
排序:
SCALABLE EDGE BLOCKING ALGORITHMS FOR DEFENDING ACTIVE DIRECTORY STYLE ATTACK GRAPHS :A PREPRINT
arXiv
收藏 引用
arXiv 2022年
作者: Guo, Mingyu Ward, Max Neumann, Aneta Neumann, Frank Nguyen, Hung School of Computer Science University of Adelaide Australia School of Physics Maths and Computing Computer Science and Software Engineering University of Western Australia Australia Department of Molecular and Cellular Biology Harvard University CambridgeMA United States
Active Directory (AD) is the default security management system for Windows domain networks. An AD environment naturally describes an attack graph where nodes represent computers/accounts/security groups, and edges re... 详细信息
来源: 评论
Symmetrical Supervision with Transformer for Few-shot Medical Image Segmentation
Symmetrical Supervision with Transformer for Few-shot Medica...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Niu Zhiming Luo Sheng Lian Lei Li Shaozi Li Haixin Song Department of Artificial Intelligence Xiamen University Fujian China College of Computer and Data Science Fuzhou University Fujian China Department of Software Engineering Xiamen University Fujian China
Few-shot learning can potentially learn the target knowledge in extremely few data regimes. Existing few-shot medical image segmentation methods fail to consider the global anatomy correlation between the support and ... 详细信息
来源: 评论
Transformers for 1D signals in Parkinson's disease detection from gait
arXiv
收藏 引用
arXiv 2022年
作者: Nguyen, Duc Minh Dimitri Miah, Mehdi Bilodeau, Guillaume-Alexandre Bouachir, Wassim Litiv Laboratory Dept. of Computer Engineering and Software Engineering Polytechnique Montréal Montréal Canada Téluq University Department of Science and Technology Montréal Canada
This paper focuses on the detection of Parkinson's disease based on the analysis of a patient's gait. The growing popularity and success of Transformer networks in natural language processing and image recogni... 详细信息
来源: 评论
Effects of term weighting approach with and without stop words removing on Arabic text classification
Effects of term weighting approach with and without stop wor...
收藏 引用
International Conference on Optimization and Applications (ICOA)
作者: Esra’a Alhenawi Ruba Abu Khurma Pedro A. Castillo Maribel G. Arenas Ayat Mahmoud Al-Hinawi Department of Software Engineering Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Department of Computer Science MEU Research Unit Faculty of Information Technology Middle East University Amman Jordan University of Granada Granada Spain Department of Allied Engineering Sciences Hashemite University Zarqa Jordan
Text classification is a technique for grouping articles into pre-defined categories. Prior to categorization, text documents have to be set up and organised in a form that is compatible with the data mining technique...
来源: 评论
Multi-block-Single-probe Variance Reduced Estimator for Coupled Compositional Optimization
arXiv
收藏 引用
arXiv 2022年
作者: Jiang, Wei Li, Gang Wang, Yibo Zhang, Lijun Yang, Tianbao National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science the University of Iowa Iowa City United States Department of Computer Science and Engineering Texas A&M University College Station United States
Variance reduction techniques such as SPIDER/SARAH/STORM have been extensively studied to improve the convergence rates of stochastic non-convex optimization, which usually maintain and update a sequence of estimators... 详细信息
来源: 评论
Exploring Issues of Story-Based Effort Estimation in Agile software Development
SSRN
收藏 引用
SSRN 2023年
作者: Iqbal, Muhammad Ijaz, Muhammad Mazhar, Tehseen Shahzad, Tariq Abbas, Qamar Ghadi, Yazeed Yasin Ahmed, Waseem Hamam, Habib Institute of Computing and Information Technology Gomal University Dera Ismail Khan KP Pakistan Department of Computer Science Virtual University of Pakistan Lahore55150 Pakistan Department of Computer Sciences COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Computer Science FCIT International Islamic University Islamabad Pakistan Department of computer science and software engineering Al Ain University Abu Dhabi15322 United Arab Emirates Department of Computer Science and Information Technology University of Malakand Pakistan Faculty of Engineering University of de Moncton MonctonNBE1A3E9 Canada Commune d'Akanda B.P. Libreville1989 Gabon School of Electrical Engineering Department of Electrical and Electronic Engineering. Science University of Johannesburg Johannesburg2006 South Africa Spectrum of Knowledge Production & Skills Development Sfax3027 Tunisia
Objctives This research delves into the domain of user story-based effort estimation in agile software development, aiming to explore the issues arising from inaccurate estimations. The primary goal is to uncover thes... 详细信息
来源: 评论
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
arXiv
收藏 引用
arXiv 2022年
作者: Iwaya, Leonardo Horn Ali Babar, M. Rashid, Awais Wijayarathna, Chamila Centre for Research on Engineering Software Technologies The University of Adelaide AdelaideSA5005 Australia Australia Department of Mathematics and Computer Science Karlstad University Karlstad Sweden Bristol Cyber Security Group Department of Computer Science University of Bristol United Kingdom
An increasing number of mental health services are offered through mobile systems, a paradigm called mHealth. Although there is an unprecedented growth in the adoption of mHealth systems, partly due to the COVID-19 pa... 详细信息
来源: 评论
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Shen, Li Fan, Qilin Xu, Tong Liu, Tongliang Xiong, Hui Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science University of Science and Technology of China Hefei230027 China The School of Big Data and Software Engineering Chongqing University ChinaScience Chongqing401331 China JD Explore Academy The UBTECH Sydney Artificial Intelligence Centre The School of Information Technologies Faculty of Engineering and Information Technologies The University of Sydney DarlingtonNSW2008 Australia Thrust of Artificial Intelligence Nansha Guangdong Guangzhou511400 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
As an essential resource management problem in network virtualization, virtual network embedding (VNE) aims to allocate the finite resources of physical network to sequentially arriving virtual network requests (VNRs)... 详细信息
来源: 评论
Application of Neural Networks for Network Traffic Monitoring and Analysis
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
作者: Oleksandr Kushnerov Pierre Murr Serhii Herasymov Stanislav Milevskyi Marharyta Melnyk Sergii Golovashych Department of Economic Cybernetics Sumy State University Sumy Ukraine Computer Engineering Department International University of Science and Technology in Kuwait Kuwait Kuwait Cybersecurity department National Technical University “Kharkiv polytechnic institute” Kharkiv Ukraine Department of Cyber Security and information protection SET University Kyiv Ukraine Department of Software Engineering and Management Intelligent Technologies National Technical University “Kharkiv polytechnic institute” Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
AdvMask: A Sparse Adversarial Attack Based Data Augmentation Method for Image Classification
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Suorong Li, Jinqiao Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China The State Key Laboratory for Novel Software Technology School of Electronic Science and Engineering Nanjing University Nanjing210023 China
Data augmentation is a widely used technique for enhancing the generalization ability of convolutional neural networks (CNNs) in image classification tasks. Occlusion is a critical factor that affects on the generaliz... 详细信息
来源: 评论