咨询与建议

限定检索结果

文献类型

  • 28,411 篇 会议
  • 11,542 篇 期刊文献
  • 345 册 图书

馆藏范围

  • 40,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,675 篇 工学
    • 19,383 篇 计算机科学与技术...
    • 16,021 篇 软件工程
    • 5,066 篇 信息与通信工程
    • 3,218 篇 控制科学与工程
    • 2,581 篇 生物工程
    • 2,091 篇 电气工程
    • 1,633 篇 机械工程
    • 1,617 篇 电子科学与技术(可...
    • 1,597 篇 生物医学工程(可授...
    • 1,290 篇 光学工程
    • 896 篇 安全科学与工程
    • 891 篇 仪器科学与技术
    • 851 篇 化学工程与技术
    • 800 篇 动力工程及工程热...
    • 704 篇 建筑学
    • 704 篇 交通运输工程
  • 10,991 篇 理学
    • 6,403 篇 数学
    • 2,824 篇 生物学
    • 2,155 篇 物理学
    • 1,839 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,305 篇 管理学
    • 4,404 篇 管理科学与工程(可...
    • 3,231 篇 图书情报与档案管...
    • 2,023 篇 工商管理
  • 1,399 篇 医学
    • 1,225 篇 临床医学
    • 1,112 篇 基础医学(可授医学...
    • 698 篇 药学(可授医学、理...
  • 1,125 篇 法学
    • 885 篇 社会学
  • 695 篇 经济学
    • 693 篇 应用经济学
  • 694 篇 教育学
  • 383 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,819 篇 software enginee...
  • 1,653 篇 computer science
  • 880 篇 computational mo...
  • 868 篇 feature extracti...
  • 817 篇 training
  • 708 篇 software
  • 675 篇 semantics
  • 664 篇 deep learning
  • 640 篇 accuracy
  • 569 篇 machine learning
  • 553 篇 data mining
  • 507 篇 application soft...
  • 431 篇 computer archite...
  • 420 篇 predictive model...
  • 384 篇 internet of thin...
  • 376 篇 testing
  • 375 篇 software systems
  • 370 篇 optimization
  • 370 篇 data models
  • 341 篇 security

机构

  • 1,262 篇 college of compu...
  • 359 篇 school of comput...
  • 304 篇 state key labora...
  • 221 篇 school of comput...
  • 197 篇 department of co...
  • 195 篇 school of comput...
  • 160 篇 school of softwa...
  • 157 篇 college of compu...
  • 149 篇 state key labora...
  • 142 篇 school of inform...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 131 篇 national enginee...
  • 131 篇 school of comput...
  • 123 篇 school of softwa...
  • 121 篇 school of comput...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 100 篇 school of softwa...

作者

  • 67 篇 ruimin hu
  • 59 篇 liu yang
  • 55 篇 baowen xu
  • 53 篇 chen zhong
  • 47 篇 wang ping
  • 47 篇 hu ruimin
  • 45 篇 man ka lok
  • 45 篇 zhang lei
  • 44 篇 zhou jie
  • 44 篇 stuckey peter j.
  • 42 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 39 篇 shen linlin
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit

语言

  • 38,022 篇 英文
  • 1,776 篇 其他
  • 520 篇 中文
  • 11 篇 德文
  • 8 篇 朝鲜文
  • 7 篇 日文
  • 6 篇 土耳其文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Software and Computer Engineering"
40298 条 记 录,以下是4941-4950 订阅
排序:
Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion  23
Maat: Performance Metric Anomaly Anticipation for Cloud Serv...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Cheryl Lee Tianyi Yang Zhuangbin Chen Yuxin Su Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China School of Software Engineering Sun Yat-sen University Zhuhai China. School of Software Engineering Sun Yat-sen University Zhuhai China
Ensuring the reliability and user satisfaction of cloud services necessitates prompt anomaly detection followed by diagnosis. Existing techniques for anomaly detection focus solely on real-time detection, meaning that... 详细信息
来源: 评论
Idea23D: Collaborative LMM Agents Enable 3D Model Generation from Interleaved Multimodal Inputs  31
Idea23D: Collaborative LMM Agents Enable 3D Model Generation...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Chen, Junhao Li, Xiang Ye, Xiaojun Li, Chao Fan, Zhaoxin Zhao, Hao Tsinghua University China Tsinghua Shenzhen International Graduate School Tsinghua University China School of Software and Microelectronics Peking University China College of Computer Science Zhejiang University China College of Computer Science and Technology Harbin Engineering University China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing School of Artificial Intelligence Beihang University China
With the success of 2D diffusion models, 2D AIGC content has already transformed our lives. Recently, this success has been extended to 3D AIGC, with state-of-the-art methods generating textured 3D models from single ... 详细信息
来源: 评论
Accelerating the Task Activation and Data Communication for Dataflow Computing  22
Accelerating the Task Activation and Data Communication for ...
收藏 引用
Workshop Proceedings of the 51st International Conference on Parallel Processing
作者: Du Zheng Zhao Wenjie Wen Zhiwei Luo Qiuming Department of Computer Science and Technology Tsinghua University China College of Computer Science and Software Engineering Shenzhen University China
The hybrid dataflow/von-Neumann [1] architectures may differ in implementations but all follow similar principles: they harness the parallelism and data synchronization inherent to the dataflow model, yet maintain the... 详细信息
来源: 评论
Vim4Path: Self-Supervised Vision Mamba for Histopathology Images
Vim4Path: Self-Supervised Vision Mamba for Histopathology Im...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Ali Nasiri-Sarvi Vincent Quoc-Huy Trinh Hassan Rivaz Mahdi S. Hosseini Department of Computer Science and Software Engineering (CSSE) Concordia University Canada Institute for Research in Immunology and Cancer of the University of Montreal Canada Department of Electrical and Computer Engineering (ECE) Concordia University Canada
Representation learning from Gigapixel Whole Slide Images (WSI) poses a significant challenge in computational pathology due to the complicated nature of tissue structures and the scarcity of labeled data. Multi-insta... 详细信息
来源: 评论
A High-Gain DC-DC Boost Converter for Solar Microgrid Systems Using a Switching Inductor and a Capacitor  1
A High-Gain DC-DC Boost Converter for Solar Microgrid System...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Prasanth, S. Priyadarsini, S. Lakshmi, R. Sneha, G. Ajitha, S.S. Saravanakumar, R. Narendra, Konnaiah Gari Unnamalai Institute of Technology Department of Computer Science and Engineering Tamil Nadu Kovilpatti India PSR Engineering College Department of Computer Science and Engineering Tamil Nadu Sivakasi India Siddharth Institute of Engineering and Technology Department of Elecrical and Electroncis Engineering Puttur India St. Joseph's Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Iconix Software Solution Tamil Nadu Tirunelveli India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electonics and Communication Engineering Tamil Nadu Chennai India
This paper outlines the design and implementation of a solar microgrid-specific high-gain DC-DC booster converter that makes use of a variable inductor and capacitors. To improve the suitability of photovoltaic (PV) p... 详细信息
来源: 评论
LLMSecConfig: An LLM-Based Approach for Fixing software Container Misconfigurations
arXiv
收藏 引用
arXiv 2025年
作者: Ye, Ziyang Le, Triet Huynh Minh Babar, M. Ali CREST - The Centre for Research on Engineering Software Technologies Adelaide Australia School of Computer and Mathematical Sciences The University of Adelaide Adelaide Australia
Security misconfigurations in Container Orchestrators (COs) can pose serious threats to software systems. While Static Analysis Tools (SATs) can effectively detect these security vulnerabilities, the industry currentl... 详细信息
来源: 评论
AutoMESC: Automatic Framework for Mining and Classifying Ethereum Smart Contract Vulnerabilities and Their Fixes
AutoMESC: Automatic Framework for Mining and Classifying Eth...
收藏 引用
Euromicro Conference on software engineering and Advanced Applications (SEAA)
作者: Majd Soud Ilham Qasse Grischa Liebel Mohammad Hamdaqa Department of Computer Science Reykjavik University Reykjavik Iceland Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada
Due to the risks associated with vulnerabilities in smart contracts, their security has gained significant attention in recent years. However, there is a lack of open datasets on smart contract vulnerabilities and the...
来源: 评论
Wireless Charger Design of Robot Vacuum Cleaners with Power Repeaters for High Compatibility
收藏 引用
Journal of Electromagnetic Analysis and Applications 2022年 第5期14卷 47-64页
作者: Anglin Li Dariusz Kacprzak Aiguo Patrick Hu Department of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand
Curved coils constructed by flexible printed circuit board (PCB) or hand-wound Litz-wire have been steadily becoming popular due to its applicable potential on devices that have a curved body. Inductive Power Transfer... 详细信息
来源: 评论
Igniting Curiosity: Engaging Students in Electricity and Magnetism Through Visually Instructive STEM Activities
Igniting Curiosity: Engaging Students in Electricity and Mag...
收藏 引用
IEEE Education engineering (EDUCON)
作者: Dulsha Kularatna-Abeywardana Rajith Abeywardana Department of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand Little Engineers Limited Auckland New Zealand
This paper presents a series of hands-on workshops aimed at improving electricity education for high school students and teachers. The workshops address the common challenges of fear and misunderstanding surrounding t... 详细信息
来源: 评论
A Deep Intrusion Detection System in Lambda Architecture Based on Edge Cloud Computing for IoT  4
A Deep Intrusion Detection System in Lambda Architecture Bas...
收藏 引用
4th International Conference on Artificial Intelligence and Big Data, ICAIBD 2021
作者: Alghamdi, Rubayyi Bellaiche, Martine Ecole Polytechnique de Montreal Computer and Software Engineering Department Montreal Canada
IoT devices enable a massive amount of data to be aggregated and analyzed for anomaly detection. The nature of heterogeneous devices introduces the challenge of collecting and handling these massive datasets to perfor... 详细信息
来源: 评论