咨询与建议

限定检索结果

文献类型

  • 4,493 篇 会议
  • 2,967 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,755 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,010 篇 软件工程
    • 1,056 篇 信息与通信工程
    • 595 篇 控制科学与工程
    • 581 篇 生物工程
    • 503 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 341 篇 电子科学与技术(可...
    • 318 篇 机械工程
    • 261 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 178 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 154 篇 仪器科学与技术
  • 2,251 篇 理学
    • 1,319 篇 数学
    • 635 篇 生物学
    • 428 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 190 篇 化学
  • 1,457 篇 管理学
    • 860 篇 管理科学与工程(可...
    • 640 篇 图书情报与档案管...
    • 344 篇 工商管理
  • 358 篇 医学
    • 301 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 157 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 206 篇 法学
    • 161 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 218 篇 training
  • 207 篇 deep learning
  • 205 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 123 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 122 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 82 篇 clustering algor...

机构

  • 1,220 篇 college of compu...
  • 156 篇 college of compu...
  • 129 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 93 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 72 篇 school of comput...
  • 66 篇 national enginee...
  • 62 篇 college of compu...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 57 篇 college of softw...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 53 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 lin qiuzhen
  • 32 篇 zhen ji
  • 32 篇 wang xingwei
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 26 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan
  • 24 篇 wu kaishun

语言

  • 7,091 篇 英文
  • 309 篇 其他
  • 132 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7527 条 记 录,以下是501-510 订阅
排序:
Real-World Wireless Network Modeling and Optimization:From Model/Data-Driven Perspective
收藏 引用
Chinese Journal of Electronics 2022年 第6期31卷 991-1012页
作者: LI Yang ZHANG Shutao REN Xiaohui ZHU Jianhang HUANG Jiajie HE Pengcheng SHEN Kaiming YAO Zhiqiang GONG Jie CHANG Tsunghui SHI Qingjiang LUO Zhiquan Shenzhen Research Institute of Big Data Pengcheng Lab School of Science and Engineering The Chinese University of Hong Kong (Shenzhen) College of Mathematics and Computational Sciences Xiangtan University School of Computer Science and Engineering Sun Yat-Sen University School of Software Engineering Tongji University
With the rapid development of the fifth-generation wireless communication systems, a profound revolution in terms of transmission capacity, energy efficiency, reliability, latency, and connectivity is highly expected ... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Siddiqi, Hafied Nur Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Department of Information Technology PO Box 84428 Riyadh11671 Saudi Arabia Shenzhen University College of Computer Science & Software Engineering Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Prince Sultan University EIAS Data Science and Blockchain Laboratory CCIS Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Automated computer Vision-based Detection of Solar Panel Defects Using a Thermal Camera Mobile Application  10
Automated Computer Vision-based Detection of Solar Panel Def...
收藏 引用
10th International Conference on Future Internet of Things and Cloud, FiCloud 2023
作者: Hajjdiab, Hassan Mohamed, Gasm ELbary Alzaabi, Salim Alhalabi, Marah Gad, Abdalla Yaghi, Maha Alkhedher, Mohammad Ghazal, Mohammed Concordia University Department of Computer Science and Software Engineering Montreal Canada Abu Dhabi University College of Engineering Abu Dhabi United Arab Emirates
Solar energy production has risen significantly globally in recent years. Solar Panels and Photovoltaic PV modules are the key components of solar energy production. Therefore, ensuring their health and efficiency and... 详细信息
来源: 评论
Improving Adaptive Runoff Forecasts in Data-Scarce Watersheds Through Personalized Federated Learning  27th
Improving Adaptive Runoff Forecasts in Data-Scarce Watershe...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xie, Zaipeng Zhang, Xiangqin Wang, Yunfei Jie, Xuanyao Fang, Wenhao Cai, Yanping Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China
Runoff forecasting plays a crucial role in water resource management and flood mitigation, but it often faces significant challenges due to data deficiency and decentralized datasets. Inadequate hydrological data in m... 详细信息
来源: 评论
Quantum software Models: Quantum Modules Tomography and Recovery Theorem  35
Quantum Software Models: Quantum Modules Tomography and Reco...
收藏 引用
35th International Conference on software engineering and Knowledge engineering, SEKE 2023
作者: Exman, Iaakov Zvulunov, Ariel School of Computer Science Faculty of Sciences HIT – Holon Institute of Technology Holon Israel Software Engineering The Jerusalem College of Engineering Azrieli Jerusalem Israel
Quantum Tomography partially measures and then recovers the remaining density matrix quantum state, in order to verify that a certain device – processor or detector – indeed outputs the intended quantum state. Howev... 详细信息
来源: 评论
Transformer-based multi-level attention integration network for video saliency prediction
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11833-11854页
作者: Tan, Rui Sun, Minghui Liang, Yanhua Software College Jilin University Qianjin Street Jilin Changchun130012 China College of Computer Science and Technology Jilin University Qianjin Street Jilin Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Qianjin Street Jilin Changchun130012 China
Most existing models for video saliency prediction heavily rely on 3D convolutional operations to extract spatio-temporal features. However, it is worth noting that 3D convolution produces a local receptive field, whi... 详细信息
来源: 评论
A Fractional Fourier Based Medical Image Authentication Approach
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3133-3150页
作者: Fayez Alqahtani Mohammed Amoon Walid El-Shafai Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11451Saudi Arabia Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical... 详细信息
来源: 评论
A Systematic Review of Approaches for Reviewing Security-Related Aspects in Agile Requirements Specification of Web Applications
A Systematic Review of Approaches for Reviewing Security-Rel...
收藏 引用
2023 Congress in computer science, computer engineering, and Applied Computing, CSCE 2023
作者: Munir, Aqsa Assiri, Mohammed Alam, Saba Naveed Khan, Muzna Butt, Wasi Haider Humayun, Mamoona Department of Computer and Software Engineering Islamabad Pakistan College of Sciences and Humanities Aflaj Prince Sattam Bin Abdulaziz University Department of Computer Science Saudi Arabia College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Department of Software Engineering Saudi Arabia College of Computer and Information Sciences Jouf University Department of Information Systems Al-Jouf Saudi Arabia
Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically... 详细信息
来源: 评论
Sensitive Information Protection Model Based on Bayesian Game
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 883-898页
作者: Yuzhen Liu Zhe Liu Xiaoliang Wang Qing Yang Guocai Zuo Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan411201China College of computer and information engineering Hunan University of Technology and BusinessChangshaChina School of Computer Science and Information Engineering Guangzhou Maritime UniversityGuangzhouChina Hunan Software Vocational and Technical University XiangtanChina School of Engineering and IT University of New South WalesNSWAustralia
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *... 详细信息
来源: 评论
Improved Cooperation by Balancing Exploration and Exploitation in Intertemporal Social Dilemma Tasks
Improved Cooperation by Balancing Exploration and Exploita...
收藏 引用
Chinese Intelligent Automation Conference, CIAC 2023
作者: Zhenbo, Cheng Xuesong, Xu Xingguang, Liu Leilei, Zhang Qihou, Chen Yuxin, Chen Xia, Zhang Gang, Xiao College of Computer Science and Technology and College of Software ZheJiang University of Technology Hang zhou China College of Mechanical Engineering ZheJiang University of Technology ZheJiang HangZhou China
When an individual’s behavior has rational characteristics, this may lead to irrational collective actions for the group. A wide range of organisms from animals to humans often evolve the social attribute of cooperat... 详细信息
来源: 评论