咨询与建议

限定检索结果

文献类型

  • 4,791 篇 会议
  • 352 册 图书
  • 80 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,220 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 3,591 篇 工学
    • 3,090 篇 计算机科学与技术...
    • 2,585 篇 软件工程
    • 586 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 341 篇 电气工程
    • 231 篇 机械工程
    • 199 篇 电子科学与技术(可...
    • 194 篇 生物工程
    • 141 篇 安全科学与工程
    • 137 篇 生物医学工程(可授...
    • 107 篇 建筑学
    • 99 篇 动力工程及工程热...
    • 95 篇 土木工程
    • 82 篇 材料科学与工程(可...
    • 82 篇 交通运输工程
    • 81 篇 仪器科学与技术
  • 990 篇 理学
    • 556 篇 数学
    • 219 篇 生物学
    • 172 篇 系统科学
    • 169 篇 物理学
    • 151 篇 统计学(可授理学、...
    • 76 篇 化学
  • 802 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 302 篇 工商管理
    • 289 篇 图书情报与档案管...
  • 142 篇 医学
    • 119 篇 临床医学
    • 109 篇 基础医学(可授医学...
  • 129 篇 教育学
    • 126 篇 教育学
  • 111 篇 经济学
    • 111 篇 应用经济学
  • 108 篇 法学
    • 79 篇 社会学
  • 41 篇 农学
  • 11 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 374 篇 software enginee...
  • 223 篇 software
  • 173 篇 artificial intel...
  • 154 篇 computer archite...
  • 143 篇 information syst...
  • 143 篇 application soft...
  • 129 篇 computer communi...
  • 114 篇 computer science
  • 109 篇 hardware
  • 109 篇 computer softwar...
  • 107 篇 software enginee...
  • 102 篇 real-time system...
  • 94 篇 control systems
  • 89 篇 computer aided s...
  • 73 篇 software systems
  • 72 篇 computational mo...
  • 71 篇 software archite...
  • 71 篇 software design
  • 61 篇 software testing
  • 61 篇 logics and meani...

机构

  • 21 篇 college of compu...
  • 10 篇 school of softwa...
  • 9 篇 univ york dept c...
  • 9 篇 dublin city univ...
  • 8 篇 department of co...
  • 8 篇 state key labora...
  • 7 篇 school of comput...
  • 7 篇 faculty of compu...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 shanghai key lab...
  • 6 篇 college of compu...
  • 6 篇 university of ne...
  • 6 篇 faculty of compu...
  • 6 篇 carleton univ de...
  • 6 篇 univ haifa dept ...
  • 6 篇 school of inform...
  • 5 篇 univ chinese aca...
  • 5 篇 hebrew universit...
  • 5 篇 nanjing univ sta...

作者

  • 14 篇 kupferman orna
  • 14 篇 labiche yvan
  • 12 篇 david lo
  • 8 篇 mylopoulos john
  • 8 篇 yilmaz murat
  • 8 篇 reinhartz-berger...
  • 8 篇 sturm arnon
  • 8 篇 xin xia
  • 8 篇 paige richard f.
  • 7 篇 o'connor rory v.
  • 7 篇 vardi moshe y.
  • 7 篇 clarke paul m.
  • 7 篇 biffl stefan
  • 7 篇 briand lionel c.
  • 7 篇 exman iaakov
  • 6 篇 katz guy
  • 6 篇 maoz shahar
  • 6 篇 sulaiman shahida
  • 6 篇 lakhmi c. jain
  • 5 篇 bernady o. apduh...

语言

  • 5,089 篇 英文
  • 107 篇 其他
  • 34 篇 中文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"任意字段=5th Israel Conference on Computer Systems and Software Engineering"
5224 条 记 录,以下是91-100 订阅
排序:
FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs  18th
FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Le...
收藏 引用
18th International conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Zhang, Chengxi Hu, Chunqiang College of Big Data and Software Engineering Chongqing University Chongqing China
Federated graph learning (FGL) has demonstrated great potential in collaboratively training graph neural network (GNN) models under the federated learning (FL) framework, benefiting from its advantage of privacy prese... 详细信息
来源: 评论
Child and Women Safety Measures using iBeacon Technology
Child and Women Safety Measures using iBeacon Technology
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), International conference on
作者: Shanker Shalini Keerthana E Nishanthi P Dept. of Computer Science and Engineering St. Joseph’s Institute of Technology Chennai
A smart real-time tracking system featuring a compact wearable device is designed to enhance the safety of children and women by utilizing IoT-driven technology and a secure database for efficient movement monitoring.... 详细信息
来源: 评论
LLMClean: Context-Aware Tabular Data Cleaning via LLM-Generated OFDs  5th
LLMClean: Context-Aware Tabular Data Cleaning via LLM-Gener...
收藏 引用
5th Workshop on Intelligent Data - From Data to Knowledge, DOING 2024, 3rd Workshop on Knowledge Graphs Analysis on a Large Scale, K-GALS 2024, 6th Workshop on Modern Approaches in Data engineering and Information System Design, MADEISD 2024 and 3rd Workshop on Personalization and Recommender systems, PERS 2024 held in conjunction with 28th European conference on Advances in Databases and Information systems, ADBIS 2024
作者: Biester, Fabian Abdelaal, Mohamed Del Gaudio, Daniel University of Stuttgart Stuttgart Germany Software AG Darmstadt Germany
Data cleaning tools, particularly those that exploit functional dependencies within ontological frameworks or context models, are instrumental in augmenting data quality. Nevertheless, crafting these context models is...
来源: 评论
the Design of GBDT-based Anomaly Detection for O-RAN Near-RT RIC
The Design of GBDT-based Anomaly Detection for O-RAN Near-RT...
收藏 引用
International conference on Computing, Networking and Communications (ICNC)
作者: Chih-Cheng Tseng Hsin-Cheng Wu Shao-Yu Lien Jiun-Chi You Chang-Yi Liu Rui-En You Department of Electrical Engineering National Ilan University Yilan City Taiwan College of Artificial Intelligence National Yang Ming Chiao Tung University Tainan City Taiwan
With the increasing demand for the 5th Generation (5G) Base Stations (BSs), the global telecommunications industry is promoting technologies with open interfaces and open software and hardware designs, driving the 5G ... 详细信息
来源: 评论
Customizable DDoS Attack Data Generation in SDN Environments for Enhanced Machine Learning Detection Models
Customizable DDoS Attack Data Generation in SDN Environments...
收藏 引用
Advanced Research in Computing (ICARC), International conference on
作者: Nadeera Gayantha Chathura Rajapakse Janaka Senanayake Dept. of Industrial Management University of Kelaniya Sri Lanka School of Computing Engineering and Technology Robert Gordon University Aberdeen United Kingdom
Distributed Denial of Service (DDoS) attacks are a critical threat to the security and reliability of software-Defined Networking (SDN) environments. Existing datasets for training machine learning (ML) models, such a... 详细信息
来源: 评论
Optimizing Bevy-ECS Using Predictive JSSP Approach
Optimizing Bevy-ECS Using Predictive JSSP Approach
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE International conference on
作者: Benchi Ma Yugen Du Software Engineering Institution East China Normal University Shanghai China Shanghai Key Laboratory of Trustworthy Computing Shanghai China
Entity-Component-System (ECS) is a fundamental architecture of game engines. It consists of entities (identities), components (data), and systems (logical units). It schedules the system graph to drive the update loop... 详细信息
来源: 评论
International conference on computer Safety, Reliability, and Security, SAFECOMP 2016 and International Workshop on Assurance Cases for software-Intensive systems, ASSURE 2016, Workshop on Dependable Embedded and Cyber-physical systems and systems-of-systems, DECSoS 2016, 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical systems, SASSUR 2016, and 1st International Workshop on the Timing Performance in Safety engineering, TIPS 2016
International Conference on Computer Safety, Reliability, an...
收藏 引用
International conference on computer Safety, Reliability, and Security, SAFECOMP 2016 and International Workshop on Assurance Cases for software-Intensive systems, ASSURE 2016, Workshop on Dependable Embedded and Cyber-physical systems and systems-of-systems, DECSoS 2016, 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical systems, SASSUR 2016, and 1st International Workshop on the Timing Performance in Safety engineering, TIPS 2016
the proceedings contain 30 papers. the special focus in this conference is on computer Safety, Reliability and Security. the topics include: Systematic maintenance of safety cases to reduce risk;on using results of co...
来源: 评论
Investigation on Existing Blockchain Based Architecture, AI/ML Driven for Boosting IoT Security and Privacy  5th
Investigation on Existing Blockchain Based Architecture, AI/...
收藏 引用
5th International conference on Artificial Intelligence and Speech Technology, AIST 2023
作者: Moid, Abdul Sharma, Narendra Department of Computer Science and Engineering Sri Satya Sai University of Technology and Medical Sciences Sehore MP Bhopal India
In the social world, the Internet of things (IoT) can assimilate the physical as well as computational procedures as services. the quantity of administrations at the IoT edge is rising quickly because of the predomina... 详细信息
来源: 评论
the Concept of Genetic Reverse-engineering to Restore the Program’s Source Code from a Binary Code: theory and Applying Practice
The Concept of Genetic Reverse-Engineering to Restore the Pr...
收藏 引用
International Communication systems and Networks and Workshops, COMSNETS
作者: Konstantin Izrailov Igor Kotenko Computer Security Problems Laboratory St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint-Petersburg Russia
the work is devoted to solving the problem of restoring the representation of the source code of a program (and in the future, algorithms, architecture, etc.) in the form of a binary code, which will allow searching f... 详细信息
来源: 评论
An IoT-Enabled Condition Monitoring Device: Integrating Vibration Analysis and Environmental Sensing
An IoT-Enabled Condition Monitoring Device: Integrating Vibr...
收藏 引用
Advanced Research in Computing (ICARC), International conference on
作者: Randeera Liyanage Buddhika Annasiwaththa Faculty of Engineering and Technology CINEC Campus Sri Lanka Faculty of Engineering University of Ruhuna Sri Lanka
Condition monitoring (CM) devices are crucial for predictive maintenance (PdM) across industries. Despite their commercial availability, the use of CM devices in small-to medium-scale industries remains low because of... 详细信息
来源: 评论