咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 3,046 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,890 篇 工学
    • 3,765 篇 计算机科学与技术...
    • 3,055 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,275 篇 理学
    • 1,328 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,000 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7675 条 记 录,以下是4461-4470 订阅
排序:
Extreme Hourly Rainfall in the Middle and Lower Reaches of the Yangtze River Basin - Spatiotemporal Transition and Causality Analysis
SSRN
收藏 引用
SSRN 2023年
作者: Gu, Haoting He, Guangxin Li, Zhongliang Zhang, Ping Cheng, Yuexuan Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters Nanjing University of Information Science and Technology Nanjing210044 China Guangzhou Institute of Tropical Marine Meteorology China Meteorological Administration Guangzhou510080 China Key Laboratory of Meteorology and Ecological Environment of Hebei Province Hebei Provincial Institute of Meteorological Sciences Shijiazhuang050021 China College of Computer and Software Nanjing Vocational University of Industry Technology Nanjing210046 China School of Information Management & Engineering Shanghai University of Finance and Economics Shanghai Shanghai200433 China
This study employs ground observation data and hourly ERA5 data from 1980 to 2020, utilizing methods such as trend analysis and M-K tests, to explore the spatiotemporal evolution characteristics and difference analysi... 详细信息
来源: 评论
Fault detection capabilities of combinatorial testing and random testing for Boolean-specifications
收藏 引用
International Journal of Performability engineering 2019年 第11期15卷 2952-2961页
作者: Wang, Ziyuan Li, Yang Gu, Xueqing Zheng, Xiaojia Yu, Min School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing210023 China Software Testing Engineering Laboratory of Jiangsu Province Nanjing211169 China Tongda College Nanjing University of Posts and Telecommunications Yangzhou225127 China
The problem of fault detection capability of combinatorial testing has drawn a lot of attention. People conducted many experiments on different subjects to compare fault detection capabilities of combinatorial testing... 详细信息
来源: 评论
Conceptual Design of a Generic Nodal Abstraction (GNA) for a Human-Agent Collaboration Systems
Conceptual Design of a Generic Nodal Abstraction (GNA) for a...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Abbas Mohammed, Khudhair Abdul Majid, Mazlina Sharifuddin Ahmad, Mohd Faculty of Computer Systems and Software Engineering University Malaysia Pahang Pahang Kuantan Malaysia College of Computer Science and Information Technology Universiti Tenaga Nasional Selangor Kajang43000 Malaysia
The issues of modelling software agents in collaborative systems present some problems and difficulties caused by the diversity of tasks and the procedures attached to them. Consequently, such diversity poses a critic... 详细信息
来源: 评论
A hybrid steganography framework using DCT and GAN for secure data communication in the big data era
收藏 引用
Scientific reports 2025年 第1期15卷 19630页
作者: Kaleem Razzaq Malik Muhammad Sajid Ahmad Almogren Tauqeer Safdar Malik Ali Haider Khan Ayman Altameem Ateeq Ur Rehman Seada Hussen Department of Computer Science Air University Islamabad 44230 Pakistan. Chair of Cyber Security Department of Computer Science College of Computer and Information Sciences King Saud University Riyadh 11633 Saudi Arabia. ahalmogren@ksu.edu.sa. Department of Information and Communication Technology Bahauddin Zakariya University Multan 60800 Punjab Pakistan. Department of Software Engineering Faculty of Computer Science Lahore Garrison University Lahore 54000 Punjab Pakistan. College of Computer Science Beijing University of Technology Beijing 100124 China. Chair of Cyber Security Department of Computer Science College of Computer and Information Sciences King Saud University Riyadh 11633 Saudi Arabia. School of Computing Gachon University Seongnam-si 13120 Republic of Korea. 202411144@gachon.ac.kr. Department of Electrical Power Adama Science and Technology University Adama 1888 Ethiopia. seada.hussen@aastu.edu.et.
The growth of the internet and big data has spurred the demand for more extensive information hoarding to store and distribute information. In today's digital era, ensuring the security of data transmission is par... 详细信息
来源: 评论
Approximate Cartesian Tree Matching with One Difference
arXiv
收藏 引用
arXiv 2025年
作者: Auvray, Bastien David, Julien Ghazawi, Samah Groult, Richard Landau, Gad M. Lecroq, Thierry Univ Rouen Normandie INSA Rouen Normandie Université Le Havre Normandie Normandie Univ LITIS UR 4108 Rouen76000 France Normandie University UNICAEN ENSICAEN CNRS GREYC Caen France CNRS NormaSTIC FR 3638 Caen Le Havre Rouen France Department of Software Engineering Braude College of Engineering Karmiel Israel Department of Computer Science University of Haifa Haifa Israel Department of Computer Science and Engineering NYU Tandon New York United States
Cartesian tree pattern matching consists of finding all the factors of a text that have the same Cartesian tree than a given pattern. There already exist theoretical and practical solutions for the exact case. In this... 详细信息
来源: 评论
Dense networks with scale-free feature
收藏 引用
Physical Review E 2020年 第5期101卷 052317-052317页
作者: Fei Ma Xiaomin Wang Ping Wang Xudong Luo School of Electronics Engineering and Computer Science Peking University Beijing 100871 China National Engineering Research Center for Software Engineering Peking University Beijing 100871 China School of Software and Microelectronics Peking University Beijing 102600 China and Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education Beijing 100871 China College of Mathematics and Statistics Northwest Normal University Lanzhou 730070 China
While previous works have shown that an overwhelming number of scale-free networks are sparse, there still exist some real-world networks including social networks, urban networks, information networks, which are by o... 详细信息
来源: 评论
Employing derivatives for creating texture masks for digital images
收藏 引用
AIP Conference Proceedings 2024年 第1期2898卷
作者: Taha Basheer Taha Ruzelita Ngadiran Dujan B. Taha IT Department Faculty of Applied Science Tishk International University Erbil Kurdistan Region Iraq Faculty of Electronic Engineering Technology Universiti Malaysia Perlis 02600 Arau Perlis Malaysia Centre of Excellence Advanced Computing (AdvComp) Universiti Malaysia Perlis 02600 Arau Perlis Malaysia Software Engineering Department College of Computer Science and Mathematics Mosul University Mosul Iraq
Texture masking has been used as a significant factor in creating perceptual maps that simulates human vision system in observing noise in digital images. In this paper, the possibility of creating texture masks using...
来源: 评论
RETRACTED: Emerging research trends in artificial intelligence for cancer diagnostic systems: A comprehensive review
收藏 引用
Heliyon 2024年 第17期10卷
作者: Sagheer Abbas Muhammad Asif Abdur Rehman Meshal Alharbi Muhammad Adnan Khan Nouh Elmitwally Department of Computer Science Prince Mohammad Bin Fahd University Al-Khobar KSA Department of Computer Science Education University Lahore Attock Campus Pakistan School of Computer Science National College of Business Administration and Economics Lahore 54000 Pakistan Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University 11942 Alkharj Saudi Arabia Riphah School of Computing & Innovation Faculty of Computing Riphah International University Lahore Campus Lahore 54000 Pakistan School of Computing Skyline University College University City Sharjah 1797 Sharjah United Arab Emirates Department of Software Faculty of Artificial Intelligence and Software Gachon University Seongnam-si 13120 Republic of Korea Department of Computer Science Faculty of Computers and Artificial Intelligence Cairo University Giza 12613 Egypt School of Computing and Digital Technology Birmingham City University Birmingham B4 7XG UK
This article has been retracted: please see Elsevier policy on article withdrawal (https://***/about/policies-and-standards/article-withdrawal).This article has been retracted at the request of the ***-publication, an...
来源: 评论
Adversarial Learning with Cost-Sensitive Classes
arXiv
收藏 引用
arXiv 2021年
作者: Shen, Haojing Chen, Sihong Wang, Ran Wang, Xizhao Big Data Institute College of Computer Science and Software Engineering Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China The College of Mathematics and Statistics Shenzhen University Shenzhen518060 China The Shenzhen Key Laboratory of Advanced Machine Learning and Applications Shenzhen University Shenzhen518060 China
It is necessary to improve the performance of some special classes or to particularly protect them from attacks in adversarial learning. This paper proposes a framework combining cost-sensitive classification and adve... 详细信息
来源: 评论
Improving Data Utility Through Game Theory in Personalized Differential Privacy
收藏 引用
Journal of computer science & Technology 2019年 第2期34卷 272-286页
作者: Lei Cui Youyang Qu Mohammad Reza Nosouhi Shui Yu Jian-Wei Niu Gang Xie College of Information and Computer Taiyuan University of Technology Taiyuan 030024 China School of Information Technology Deakin University Melbourne VIC 3125 Australia School of Software University of Technology Sydney Sydney NSW 2007 Australia School of Computer Science and Engineering Beihang University Beijing 100191 China Shanxi Key Laboratory of Advanced Control and Intelligent Information System Taiyuan University of Science and Technology Taiyuan 030024 China
Due to dramatically increasing information published in social networks,privacy issues have given rise to public *** the presence of differential privacy provides privacy protection with theoretical foundations,the tr... 详细信息
来源: 评论