咨询与建议

限定检索结果

文献类型

  • 21,639 篇 会议
  • 9,606 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,547 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,523 篇 工学
    • 15,489 篇 计算机科学与技术...
    • 12,927 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,369 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,518 篇 电气工程
    • 1,302 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,154 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 577 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,719 篇 理学
    • 5,149 篇 数学
    • 2,272 篇 生物学
    • 1,661 篇 物理学
    • 1,489 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,861 篇 管理学
    • 3,484 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,586 篇 工商管理
  • 1,062 篇 医学
    • 919 篇 临床医学
    • 828 篇 基础医学(可授医学...
  • 889 篇 法学
    • 695 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 548 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 635 篇 feature extracti...
  • 628 篇 training
  • 601 篇 computational mo...
  • 542 篇 deep learning
  • 536 篇 semantics
  • 473 篇 software
  • 419 篇 accuracy
  • 416 篇 application soft...
  • 410 篇 machine learning
  • 386 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 282 篇 predictive model...
  • 276 篇 software systems
  • 258 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,224 篇 college of compu...
  • 354 篇 school of comput...
  • 274 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 170 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 122 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 90 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 51 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,260 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=the Computer Science and Software Engineering"
31547 条 记 录,以下是161-170 订阅
排序:
Theoretical Analysis of an Adaptive Closeness Centrality-Based Algorithm for Dynamic Optimization of Transportation Networks
Theoretical Analysis of an Adaptive Closeness Centrality-Bas...
收藏 引用
2024 International Conference on engineering Management of Communication and Technology, EMCTECH 2024
作者: Mann, Michael Afeka - the Academic College of Engineering School of Software Engineering and Computer Science Tel Aviv Israel
Purpose: This paper presents a theoretical analysis of the DynaTrans algorithm, a novel approach for dynamic optimization of urban transportation networks. Design/methodology/approach: We introduce an Adaptive Closene... 详细信息
来源: 评论
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management
DECAY: Dynamic Evaluation and Component Analysis for Enhanci...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Samuel Ginn College of Engineering Computer Science and Software Engineering United States
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o... 详细信息
来源: 评论
Identification of software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4379-4397页
作者: Qazi Mazhar ul Haq Fahim Arif Khursheed Aurangzeb Noor ul Ain Javed Ali Khan Saddaf Rubab Muhammad Shahid Anwar Department of Computer Science and Engineering and International Bachelor’s Program in Informatics Yuan Ze UniversityZhongliTaoyuan320315Taiwan Department of Computer Science National University of PakistanRawalpindiPunjab46000Pakistan Department of Computer Software Engineering MCSNational University of Sciences and TechnologyIslamabad44000Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Department of Computer Science School of PhysicsEngineering and Computer ScienceUniversity of HertfordshireHatfieldAL109ABUK Department of Computer Engineering College of Computing and InformaticsUniversity of SharjahSharjah27272United Arab Emirates Department of AI and Software Gachon UniversitySeongnam-SI13120South Korea
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa... 详细信息
来源: 评论
A Global-Local Probsparse Self-Attention Transformer for LEO Satellite Orbit Prediction  23
A Global-Local Probsparse Self-Attention Transformer for LEO...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Huang, Guan Shu, Tao Auburn University Department of Computer Science and Software Engineering Auburn United States
In recent years, the proliferation of LEO (Low-Earth Orbit) satellites and the accumulation of space debris have made Near-Earth space more and more crowded, and hence significantly increased the risk of collisions in... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Computer Science and Software Engineering Samuel Ginn College of Engineering United States
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a... 详细信息
来源: 评论
Invisible Fingerprint-based Copyright Protection for Generated Medical Image  2
Invisible Fingerprint-based Copyright Protection for Generat...
收藏 引用
2nd IEEE International Conference on Control, Electronics and computer Technology, ICCECT 2024
作者: Yang, Nan Jia, Wenjun Deng, Peng Yang, Wen School of Computer Science and Software Engineering Southwest Petroleum University Nanchong China
In the recent years, the development of generative models has stimulated the health care progress, specially medical image generation. The synthetic medical images can be applied to several fields and have many utiliz... 详细信息
来源: 评论
Cooperation among Multiple Medical Institutions on Retinal Disease Identification Based on Federated Learning and Unlearning  4
Cooperation among Multiple Medical Institutions on Retinal D...
收藏 引用
4th Asia-Pacific Conference on Communications Technology and computer science, ACCTCS 2024
作者: Deng, Peng Jia, Wenjun Yang, Nan Xiao, Liwen School of Computer Science and Software Engineering Southwest Petroleum University Nanchong China
Due to the aging of the world's population, the incidence of retinal diseases is on the rise. Machine learning is expected to have a crucial role in identifying retinal disease. Multiple medical institutions coope... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
DeSAM2: Detection-Driven SAM2 for Hyperspectral Object Tracking  14
DeSAM2: Detection-Driven SAM2 for Hyperspectral Object Track...
收藏 引用
14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, WHISPERS 2024
作者: He, Wangquan Ren, Qi Zhang, Hongtao Mo, Ziqian Li, Nanying Xu, Meng Jia, Sen College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Hyperspectral object tracking (HOT) captures subtle object features, enabling precise identification and tracking in complex backgrounds. However, the high-dimensional nature of data and rapid object changes in dynami... 详细信息
来源: 评论
Location Enhancement and Multi-template Fusion for Fast Long-Term Tracking  5
Location Enhancement and Multi-template Fusion for Fast Long...
收藏 引用
5th International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2024
作者: Chen, Shixin Software Engineering Institute of Guangzhou Department of Computer Science Guangzhou510980 China
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea... 详细信息
来源: 评论