咨询与建议

限定检索结果

文献类型

  • 21,257 篇 会议
  • 10,065 篇 期刊文献
  • 240 册 图书
  • 6 篇 专利
  • 1 篇 学位论文

馆藏范围

  • 31,569 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 19,725 篇 工学
    • 14,778 篇 计算机科学与技术...
    • 12,257 篇 软件工程
    • 3,995 篇 信息与通信工程
    • 2,661 篇 控制科学与工程
    • 2,027 篇 生物工程
    • 1,766 篇 电气工程
    • 1,477 篇 机械工程
    • 1,464 篇 电子科学与技术(可...
    • 1,217 篇 生物医学工程(可授...
    • 1,078 篇 光学工程
    • 958 篇 化学工程与技术
    • 784 篇 仪器科学与技术
    • 763 篇 动力工程及工程热...
    • 749 篇 安全科学与工程
    • 647 篇 交通运输工程
    • 631 篇 材料科学与工程(可...
    • 590 篇 建筑学
  • 9,233 篇 理学
    • 5,115 篇 数学
    • 2,283 篇 物理学
    • 2,197 篇 生物学
    • 1,496 篇 统计学(可授理学、...
    • 1,019 篇 系统科学
    • 882 篇 化学
  • 6,004 篇 管理学
    • 3,826 篇 管理科学与工程(可...
    • 2,483 篇 图书情报与档案管...
    • 1,656 篇 工商管理
  • 1,129 篇 医学
    • 985 篇 临床医学
    • 859 篇 基础医学(可授医学...
  • 875 篇 法学
    • 696 篇 社会学
  • 636 篇 经济学
    • 634 篇 应用经济学
  • 550 篇 教育学
  • 296 篇 农学
  • 94 篇 军事学
  • 91 篇 文学
  • 64 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 1,010 篇 software enginee...
  • 661 篇 feature extracti...
  • 647 篇 training
  • 627 篇 deep learning
  • 576 篇 computational mo...
  • 523 篇 software
  • 514 篇 computer science
  • 472 篇 accuracy
  • 445 篇 semantics
  • 389 篇 machine learning
  • 384 篇 data mining
  • 318 篇 internet of thin...
  • 306 篇 predictive model...
  • 304 篇 computer archite...
  • 296 篇 data models
  • 279 篇 application soft...
  • 275 篇 conferences
  • 267 篇 support vector m...
  • 267 篇 cloud computing
  • 264 篇 optimization

机构

  • 761 篇 school of inform...
  • 502 篇 state key labora...
  • 475 篇 college of compu...
  • 467 篇 school of softwa...
  • 341 篇 school of softwa...
  • 221 篇 school of comput...
  • 219 篇 school of softwa...
  • 152 篇 school of comput...
  • 146 篇 university of el...
  • 139 篇 school of softwa...
  • 101 篇 school of comput...
  • 100 篇 school of comput...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 88 篇 school of softwa...
  • 83 篇 software enginee...
  • 80 篇 school of big da...
  • 77 篇 beijing engineer...
  • 77 篇 national key lab...
  • 70 篇 department of co...

作者

  • 59 篇 wang lei
  • 55 篇 liu yang
  • 46 篇 lei wang
  • 46 篇 bieliková mária
  • 40 篇 li li
  • 40 篇 baowen xu
  • 38 篇 shen furao
  • 37 篇 xiong hu
  • 36 篇 wang jian
  • 36 篇 wei jun
  • 35 篇 sun xingming
  • 32 篇 wang hui
  • 32 篇 jun zhang
  • 30 篇 zhou zhi-hua
  • 30 篇 liu jinyuan
  • 30 篇 john grundy
  • 29 篇 niyato dusit
  • 29 篇 zhang tao
  • 29 篇 jian wang
  • 29 篇 stefan biffl

语言

  • 29,575 篇 英文
  • 1,504 篇 其他
  • 513 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Software Engineering and Technology"
31569 条 记 录,以下是341-350 订阅
排序:
Do Current Video LLMs Have Strong OCR Abilities? A Preliminary Study  31
Do Current Video LLMs Have Strong OCR Abilities? A Prelimina...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Fei, Yulin Gao, Yuhui Xian, Xingyuan Zhang, Xiaojin Wu, Tao Chen, Wei School of Software Engineering Huazhong University of Science and Technology China Information Hub Hongkong University of Science and Technology Guangzhou China
With the rise of multi-modal large language models, accurately extracting and understanding textual information from video content-referred to as video-based optical character recognition (Video OCR)-has become a cruc... 详细信息
来源: 评论
Privacy-Enhanced Data Sharing in Multi-Institutional Healthcare  9
Privacy-Enhanced Data Sharing in Multi-Institutional Healthc...
收藏 引用
9th International Conference on Cloud Computing and Big Data Analytics, ICCCBDA 2024
作者: Xiao, Jixiang Zeng, Shengke Zhou, Tiantian Feng, Yawen School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China School of Computer and Software Engineering Xihua University Chengdu China
In multi-institutional patient data sharing scenarios, maintaining fine-grained access control while safeguarding privacy and adapting to real-world environments is crucial. Traditional attribute-based encryption (ABE... 详细信息
来源: 评论
Brick by Brick - Findings of an of-the-Shelf Automation System Application for Building Block Component Group Disassembly  9
Brick by Brick - Findings of an of-the-Shelf Automation Syst...
收藏 引用
9th International Conference on Mechanical engineering and Robotics Research, ICMERR 2025
作者: Briechle, Dominique Geger, Tobias Schartow, Lena Rausch, Andreas Institute for Software and Systems Engineering Clausthal University of Technology Clausthal-Zellerfeld Germany
Automation is one of the key drivers in today's global economy. It ensures the conduction of a manifold of standardized processes which helps tackle the decreasing amount of skilled workers in certain areas as wel... 详细信息
来源: 评论
Core shift limitation in investment casting process of hollow turbine blade
收藏 引用
Chinese Journal of Aeronautics 2024年 第8期37卷 513-526页
作者: Kang CUI Lin JING Ruisong JIANG Longnv YU Xiao GAO Automation and Software Engineering Shanxi UniversityTaiyuan 030006China Key Laboratory of High Performance Manufacturing for Aero Engine Ministry of Industry and Information TechnologySchool of Mechanical EngineeringNorthwestern Polytechnical UniversityXi’an 710072China School of Mechanical Engineering Sichuan UniversityChengdu 610065China
The deviation in wall thickness caused by core shift during the investment casting process significantly impacts the strength and service life of hollow turbine *** address this issue,a core shift limitation method is... 详细信息
来源: 评论
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 43-57页
作者: Brou Bernard Ehui Chen CHEN Shirui WANG Hua GUO Jianwei LIU School of Cyber Sciences and Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Sino-French Engineering School Beihang University Beihang Hangzhou Innovation Institute Yuhang
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use... 详细信息
来源: 评论
Optimizing Power Allocation for D2D Communication with URLLC under Rician Fading Channel:A Learning-to-Optimize Approach
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 3193-3212页
作者: Owais Muhammad Hong Jiang Mushtaq Muhammad Umer Bilal Muhammad Naeem Muhammad Ahtsam School of Information Engineering Southwest University of Science and TechnologyMianyang621010China School of Software Engineering Northeastern UniversityShenyang110167China School of Information and Software Engineering University of Electronic Sciences and TechnologyChengdu610000China
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important... 详细信息
来源: 评论
BC-PC-Share:Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第9期136卷 2985-3010页
作者: Caihui Lan Haifeng Li School of Electronic and Information Engineering Lanzhou City UniversityLanzhou730070China School of Software Dalian University of Foreign LanguagesDalian116044China School of Software Dalian University of TechnologyDalian116024China
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare ***,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not... 详细信息
来源: 评论
Recent Challenges, Issues, and Initiatives for Cloud Computing Adoption in Healthcare: A Survey  9
Recent Challenges, Issues, and Initiatives for Cloud Computi...
收藏 引用
9th International Conference on Control, Decision and Information Technologies, CoDIT 2023
作者: Al-Tawara, Feda'a Khalifeh, Ala' Princess Sumaya University for Technology Department of Software Engineering Amman Jordan German Jordanian University Department of Software Engineering Amman Jordan
There are many opportunities and advantages that cloud computing adoption can bring to the healthcare field, as experts believe that it can help improve the level of healthcare services significantly and contribute to... 详细信息
来源: 评论
Evolution Analysis of Network Attack and Defense Situation Based on Game Theory
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1475-1494页
作者: Haiyan Sun Chenglong Shao Jianwei Zhang Kun Wang Wanwei Huang College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450007China Intelligent Computing Power Research Department Zhengzhou Xinda Advanced Technology Research InstituteZhengzhou450007China
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this pa... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论