咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 118 册 图书
  • 17 篇 期刊文献

馆藏范围

  • 1,964 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 657 篇 计算机科学与技术...
    • 484 篇 软件工程
    • 178 篇 信息与通信工程
    • 114 篇 材料科学与工程(可...
    • 101 篇 控制科学与工程
    • 68 篇 电气工程
    • 48 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 23 篇 建筑学
    • 22 篇 生物工程
    • 20 篇 土木工程
    • 19 篇 生物医学工程(可授...
    • 17 篇 网络空间安全
    • 16 篇 安全科学与工程
    • 15 篇 化学工程与技术
    • 12 篇 光学工程
  • 160 篇 理学
    • 92 篇 数学
    • 27 篇 系统科学
    • 26 篇 生物学
    • 23 篇 物理学
    • 22 篇 统计学(可授理学、...
  • 150 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 55 篇 工商管理
    • 49 篇 图书情报与档案管...
  • 25 篇 教育学
    • 25 篇 教育学
  • 17 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 15 篇 法学
    • 12 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 10 篇 文学
    • 10 篇 新闻传播学
  • 5 篇 军事学
  • 4 篇 农学
  • 1 篇 艺术学

主题

  • 309 篇 application soft...
  • 268 篇 software enginee...
  • 234 篇 computer science
  • 166 篇 software systems
  • 161 篇 computer archite...
  • 138 篇 computer aided s...
  • 116 篇 computer softwar...
  • 106 篇 programming
  • 93 篇 hardware
  • 90 篇 control systems
  • 87 篇 artificial intel...
  • 76 篇 costs
  • 71 篇 software
  • 63 篇 information syst...
  • 59 篇 prototypes
  • 58 篇 real time system...
  • 57 篇 computational mo...
  • 56 篇 systems engineer...
  • 56 篇 testing
  • 55 篇 humans

机构

  • 10 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of el...
  • 7 篇 weizmann inst sc...
  • 6 篇 technion israel ...
  • 6 篇 department of co...
  • 6 篇 department of so...
  • 6 篇 state key labora...
  • 5 篇 the moise and fr...
  • 5 篇 hebrew universit...
  • 5 篇 department of el...
  • 5 篇 ben gurion univ ...
  • 5 篇 computer science...
  • 5 篇 hebrew univ jeru...
  • 4 篇 tel aviv univers...
  • 4 篇 israel aircraft ...
  • 4 篇 tel aviv univ sc...
  • 4 篇 technion haifa
  • 4 篇 university of ha...
  • 4 篇 rafael advanced ...

作者

  • 10 篇 kupferman orna
  • 8 篇 exman iaakov
  • 7 篇 maoz shahar
  • 7 篇 harel david
  • 6 篇 vardi moshe y.
  • 6 篇 winokur michael
  • 6 篇 j.z. lavi
  • 6 篇 ringert jan oliv...
  • 6 篇 a. yehudai
  • 6 篇 mordechai guri
  • 6 篇 yingxu wang
  • 6 篇 rumpe bernhard
  • 6 篇 tyszberowicz shm...
  • 5 篇 david harel
  • 5 篇 shahar maoz
  • 5 篇 goldstein moshe
  • 5 篇 rajkumar buyya
  • 5 篇 pnina soffer
  • 5 篇 balaban mira
  • 5 篇 marron assaf

语言

  • 1,955 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"任意字段=Fourth Israel Conference on Computer Systems and Software Engineering"
1964 条 记 录,以下是121-130 订阅
排序:
Analysis of software Quality Enhancement through Stability Metrics Models
Analysis of Software Quality Enhancement through Stability M...
收藏 引用
fourth Industrial Revolution Based Technology and Practices (ICFIRTP), International conference on
作者: Sushil Chandra Dimri Kamlesh Chandra Purohit Ankur Dumka Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science and Engineering Women Institute of Technology Dehradun Uttarakhand India
To thrive in today's competitive market, the quality of a company's software is the single most important factor. Many elements, including the program's design, quality measurements, reliability models, an... 详细信息
来源: 评论
A Masked Pruning-Based Algorithm for Dimensionality Reduction in Federated Learning systems
A Masked Pruning-Based Algorithm for Dimensionality Reductio...
收藏 引用
Annual Allerton conference on Communication, Control, and Computing
作者: Tamir L.S. Gez Kobi Cohen School of Electrical and Computer Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
Federated Learning (FL) represents a growing machine learning (ML) paradigm designed for training models across numerous nodes that retain local datasets, all without directly exchanging the underlying private data wi... 详细信息
来源: 评论
The Emergence of IIoT and its Cyber Security Issues in Critical Information Infrastructure  21
The Emergence of IIoT and its Cyber Security Issues in Criti...
收藏 引用
21st European conference on Cyber Warfare and Security, ECCWS 2022
作者: Bhaiyat, Humairaa Yacoob Sithungu, Siphesihle Philezwini Academy of Computer Science and Software Engineering Faculty of Science University of Johannesburg South Africa
The emergence of the Industrial Internet of Things (IIoT) can transform and improve industrial domain processes. This is achieved by IIoT’s ability to collect and process vast amounts of data using technology such as... 详细信息
来源: 评论
Experiences of a "G" Acceleration Generator through Angular Velocities in a Dynamic Design Course
Experiences of a "G" Acceleration Generator through Angular ...
收藏 引用
Information and Education Technology (ICIET), International conference on
作者: Hector Rafael Morano Okuno J. Enrique Chong-Quero Guillermo Sandoval Benitez Rafael Caltenco Castillo Andres Garcia Garcia School of Engineering and Science Tecnologico de Monterrey Mexico
This article shares the educational experiences obtained by using, as a didactic exercise, a "G" acceleration generator modeled in a CAD software tool application to help students understand the effects gene... 详细信息
来源: 评论
Outlook 360 | A Practical Approach of Recruiting Talent Through Artificial Intelligence.
Outlook 360 | A Practical Approach of Recruiting Talent Thro...
收藏 引用
Innovations in computer Science & software engineering (ICONICS), International conference on
作者: Sani E Zehra Areeba Shakil Maryam Fatima M. Anas Munawwar Nida Khalil Software Engineering Department Sir Syed University of Engineering and Technology Karachi Pakistan
Intellectual capital acquired the Position of an asset in the fourth industrial revolution. An asset that would help companies to reach their targeted tier in the 'talent war' and help them maintain their bott... 详细信息
来源: 评论
PIXHELL Attack: Leaking Sensitive Information from Air-Gap computers via ‘Singing Pixels’
PIXHELL Attack: Leaking Sensitive Information from Air-Gap C...
收藏 引用
IEEE Annual International computer software and Applications conference (COMPSAC)
作者: Mordechai Guri Department of Software and Information Systems Engineering Air-Gap Research Lab Ben-Gurion University of the Negev Israel
Air-gapped systems are disconnected from the Internet and other networks because they contain or process sensitive data. However, it is known that attackers can use computer speakers to leak data via sound to circumve... 详细信息
来源: 评论
Augmenting Deep Neural Networks with Scenario-Based Guard Rules  8th
Augmenting Deep Neural Networks with Scenario-Based Guard Ru...
收藏 引用
8th International conference on Model-Driven engineering and software Development (MODELSWARD)
作者: Katz, Guy Hebrew Univ Jerusalem Jerusalem Israel
Deep neural networks (DNNs) are becoming widespread, and can often outperform manually-created systems. However, these networks are typically opaque to humans, and may demonstrate undesirable behavior in corner cases ... 详细信息
来源: 评论
A Radical Approach for Goal-Oriented Testing
A Radical Approach for Goal-Oriented Testing
收藏 引用
fourth Industrial Revolution Based Technology and Practices (ICFIRTP), International conference on
作者: Hemant Singh Pokhariya Ruchira Rawat Ankur Dumka Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science and Engineering Women Institute of Technology Dehradun Uttarakhand India
Taking testing goals into account, this article lays forth a methodology for automating the testing of component-based and embedded systems. We work with the component-based systems from communication point of view. H... 详细信息
来源: 评论
Project-oriented approach to the study of robotics according to the concept of STEM education  14
Project-oriented approach to the study of robotics according...
收藏 引用
14th International conference on Mathematics, Science and Technology Education, ICon-MaSTEd 2022
作者: Palchyk, A.O. Lutsyk, I.B. Burega, N.V. Department Of Computer Technologies Ternopil Volodymyr Hnatiuk National Pedagogical University 2 M. Kryvonosa St Ternopil46027 Ukraine Department Of Mechanical Engineering And Transport Ternopil Volodymyr Hnatiuk National Pedagogical University 2 M. Kryvonosa St Ternopil46027 Ukraine
The importance of studying robotics in the conditions of the fourth Industrial Revolution for solving the problem of training qualified STEM specialists is substantiated. The technique of using a project-oriented appr... 详细信息
来源: 评论
Monitoring First-Order Interval Logic  19th
Monitoring First-Order Interval Logic
收藏 引用
19th International conference on software engineering and Formal Methods (SEFM)
作者: Havelund, Klaus Omer, Moran Peled, Doron CALTECH Jet Prop Lab Pasadena CA 91125 USA Bar Ilan Univ Dept Comp Sci Ramat Gan Israel
Runtime verification is used for monitoring the execution of systems, e.g. checking sequences of reported events against formal specifications. Typically the specification refers to the individual monitored events. In... 详细信息
来源: 评论