咨询与建议

限定检索结果

文献类型

  • 28,411 篇 会议
  • 11,542 篇 期刊文献
  • 345 册 图书

馆藏范围

  • 40,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,675 篇 工学
    • 19,383 篇 计算机科学与技术...
    • 16,021 篇 软件工程
    • 5,066 篇 信息与通信工程
    • 3,218 篇 控制科学与工程
    • 2,581 篇 生物工程
    • 2,091 篇 电气工程
    • 1,633 篇 机械工程
    • 1,617 篇 电子科学与技术(可...
    • 1,597 篇 生物医学工程(可授...
    • 1,290 篇 光学工程
    • 896 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 851 篇 化学工程与技术
    • 800 篇 动力工程及工程热...
    • 704 篇 建筑学
    • 704 篇 交通运输工程
  • 10,991 篇 理学
    • 6,403 篇 数学
    • 2,824 篇 生物学
    • 2,155 篇 物理学
    • 1,839 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,305 篇 管理学
    • 4,404 篇 管理科学与工程(可...
    • 3,231 篇 图书情报与档案管...
    • 2,023 篇 工商管理
  • 1,399 篇 医学
    • 1,225 篇 临床医学
    • 1,112 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,125 篇 法学
    • 885 篇 社会学
  • 695 篇 经济学
    • 693 篇 应用经济学
  • 694 篇 教育学
  • 383 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,819 篇 software enginee...
  • 1,653 篇 computer science
  • 880 篇 computational mo...
  • 868 篇 feature extracti...
  • 817 篇 training
  • 708 篇 software
  • 675 篇 semantics
  • 664 篇 deep learning
  • 640 篇 accuracy
  • 569 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 431 篇 computer archite...
  • 420 篇 predictive model...
  • 384 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 370 篇 optimization
  • 370 篇 data models
  • 341 篇 security

机构

  • 1,262 篇 college of compu...
  • 359 篇 school of comput...
  • 304 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 160 篇 school of softwa...
  • 157 篇 college of compu...
  • 149 篇 state key labora...
  • 142 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of softwa...
  • 121 篇 school of comput...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 100 篇 school of softwa...

作者

  • 67 篇 ruimin hu
  • 59 篇 liu yang
  • 55 篇 baowen xu
  • 53 篇 chen zhong
  • 47 篇 wang ping
  • 47 篇 hu ruimin
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,022 篇 英文
  • 1,776 篇 其他
  • 520 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Software and Computer Engineering"
40298 条 记 录,以下是241-250 订阅
排序:
The Bifurcation Method: White-Box Observation Perturbation Attacks on Reinforcement Learning Agents on a Cyber Physical System  23
The Bifurcation Method: White-Box Observation Perturbation A...
收藏 引用
23rd International Conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Broda-Milian, Kiernan Dagdougui, Hanane Mallah, Ranwa Al Royal Military College of Canada Electrical and Computer Engineering Kingston Canada Polytechnique Montreal Computer and Software Engineering Quebec Canada
Components of cyber physical systems, which affect real-world processes, are often exposed to the internet. Replacing conventional control methods with Deep Reinforcement Learning (DRL) in energy systems is an active ... 详细信息
来源: 评论
Taming diffusion model for exemplar-based image translation
收藏 引用
Computational Visual Media 2024年 第6期10卷 1031-1043页
作者: Ma, Hao Yang, Jingyuan Huang, Hui Shenzhen University Visual Computing Research Center College of Computer Science and Software Engineering Shenzhen China (GRID:grid.263488.3) (ISNI:0000 0001 0472 9649)
Exemplar-based image translation involves converting semantic masks into photorealistic images that adopt the style of a given ***,most existing GAN-based translation methods fail to produce photorealistic *** this st... 详细信息
来源: 评论
A study on dynamic group signature scheme with threshold traceability for blockchain
收藏 引用
High-Confidence Computing 2024年 第2期4卷 73-81页
作者: Hyo-jin Song Teahoon Kim Yong-Woon Hwang Daehee Seo Im-Yeong Lee Department of Software Convergence Soonchunhyang UniversityAsan 31538Republic of Korea Faculty of Artificial Intelligence and Data Engineering Sangmyung UniversitySeoul 03016Republic of Korea Department of Computer Software Engineering Soonchunhyang UniversityAsan 31538Republic of Korea
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user i... 详细信息
来源: 评论
Theoretical Analysis of an Adaptive Closeness Centrality-Based Algorithm for Dynamic Optimization of Transportation Networks
Theoretical Analysis of an Adaptive Closeness Centrality-Bas...
收藏 引用
2024 International Conference on engineering Management of Communication and Technology, EMCTECH 2024
作者: Mann, Michael Afeka - the Academic College of Engineering School of Software Engineering and Computer Science Tel Aviv Israel
Purpose: This paper presents a theoretical analysis of the DynaTrans algorithm, a novel approach for dynamic optimization of urban transportation networks. Design/methodology/approach: We introduce an Adaptive Closene... 详细信息
来源: 评论
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management
DECAY: Dynamic Evaluation and Component Analysis for Enhanci...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Samuel Ginn College of Engineering Computer Science and Software Engineering United States
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Computer Science and Software Engineering Samuel Ginn College of Engineering United States
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a... 详细信息
来源: 评论
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
收藏 引用
Frontiers of computer Science 2023年 第3期17卷 161-175页
作者: Xiaoling HUANG Youxia DONG Guodong YE Yang SHI Faculty of Mathematics and Computer Science Guangdong Ocean UniversityZhanjiang 524088China School of Software Engineering Tongji UniversityShanghai 200092China
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and... 详细信息
来源: 评论
swSpAMM:optimizing large-scale sparse approximate matrix multiplication on Sunway Taihulight
收藏 引用
Frontiers of computer Science 2023年 第4期17卷 29-41页
作者: Xiaoyan LIU Yi LIU Bohong YIN Hailong YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
Although matrix multiplication plays an essential role in a wide range of applications,previous works only focus on optimizing dense or sparse matrix *** Sparse Approximate Matrix Multiply(SpAMM)is an algorithm to acc... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Low-shot Video Object Segmentation
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5538-5555页
作者: Yan, Kun Wei, Fangyun Dai, Shuyu Wu, Minghui Wang, Ping Xu, Chang Peking University School of Computer Science Beijing100871 China University of Sydney School of Computer Science DarlingtonNSW2008 Australia Peking University School of Software and Microelectronics Beijing100871 China Shanghai Artificial Intelligence Laboratory and Mininglamp Technology China Peking University National Engineering Research Center for Software Engineering Beijing100871 China Peking University School of Software and Microelectronics China China
Prior research in video object segmentation (VOS) predominantly relies on videos with dense annotations. However, obtaining pixel-level annotations is both costly and time-intensive. In this work, we highlight the pot... 详细信息
来源: 评论