咨询与建议

限定检索结果

文献类型

  • 687,370 篇 会议
  • 11,796 篇 期刊文献
  • 6,262 册 图书
  • 19 篇 学位论文

馆藏范围

  • 705,419 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 416,517 篇 工学
    • 307,155 篇 计算机科学与技术...
    • 245,667 篇 软件工程
    • 85,825 篇 信息与通信工程
    • 58,768 篇 控制科学与工程
    • 47,392 篇 电气工程
    • 36,762 篇 机械工程
    • 35,720 篇 电子科学与技术(可...
    • 35,350 篇 生物工程
    • 29,641 篇 生物医学工程(可授...
    • 21,738 篇 光学工程
    • 21,648 篇 仪器科学与技术
    • 19,762 篇 动力工程及工程热...
    • 18,331 篇 化学工程与技术
    • 15,967 篇 安全科学与工程
    • 14,425 篇 材料科学与工程(可...
    • 14,125 篇 交通运输工程
    • 13,064 篇 土木工程
  • 169,137 篇 理学
    • 94,513 篇 数学
    • 41,630 篇 物理学
    • 38,059 篇 生物学
    • 27,060 篇 统计学(可授理学、...
    • 19,414 篇 系统科学
    • 17,848 篇 化学
  • 104,387 篇 管理学
    • 67,558 篇 管理科学与工程(可...
    • 42,297 篇 图书情报与档案管...
    • 31,564 篇 工商管理
  • 25,404 篇 医学
    • 21,124 篇 临床医学
    • 19,556 篇 基础医学(可授医学...
  • 16,299 篇 法学
    • 13,270 篇 社会学
  • 15,106 篇 教育学
    • 14,481 篇 教育学
  • 12,535 篇 经济学
  • 8,674 篇 农学
  • 4,670 篇 文学
  • 1,789 篇 军事学
  • 1,543 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,358 篇 computer science
  • 20,255 篇 application soft...
  • 19,290 篇 computational mo...
  • 18,108 篇 software
  • 16,872 篇 accuracy
  • 16,524 篇 feature extracti...
  • 16,217 篇 computer archite...
  • 16,061 篇 software enginee...
  • 13,980 篇 training
  • 11,841 篇 deep learning
  • 11,186 篇 data mining
  • 10,484 篇 machine learning
  • 10,417 篇 hardware
  • 9,985 篇 predictive model...
  • 9,603 篇 testing
  • 9,554 篇 educational inst...
  • 9,031 篇 data models
  • 8,960 篇 costs
  • 8,789 篇 support vector m...
  • 8,721 篇 real-time system...

机构

  • 1,978 篇 chitkara univers...
  • 1,384 篇 school of comput...
  • 1,153 篇 school of comput...
  • 1,094 篇 school of comput...
  • 876 篇 school of comput...
  • 817 篇 department of co...
  • 730 篇 college of compu...
  • 701 篇 school of comput...
  • 664 篇 school of comput...
  • 644 篇 university of ch...
  • 637 篇 department of co...
  • 589 篇 state key labora...
  • 583 篇 lovely professio...
  • 543 篇 school of comput...
  • 540 篇 college of compu...
  • 515 篇 maharishi school...
  • 484 篇 department of co...
  • 438 篇 school of comput...
  • 434 篇 school of comput...
  • 426 篇 nanjing univ sta...

作者

  • 460 篇 wang wei
  • 338 篇 liu yang
  • 338 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 256 篇 yang liu
  • 245 篇 li wei
  • 243 篇 zhang lei
  • 242 篇 wang lei
  • 235 篇 wei li
  • 226 篇 vinay kukreja
  • 219 篇 kukreja vinay
  • 215 篇 li yang
  • 197 篇 liu wei
  • 183 篇 zhang wei
  • 181 篇 wei wang
  • 175 篇 wang jian
  • 172 篇 lei wang
  • 171 篇 zhang yan
  • 170 篇 li bo

语言

  • 625,091 篇 英文
  • 75,194 篇 其他
  • 8,155 篇 中文
  • 80 篇 德文
  • 64 篇 西班牙文
  • 48 篇 俄文
  • 44 篇 法文
  • 36 篇 土耳其文
  • 28 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 阿拉伯文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
705450 条 记 录,以下是1101-1110 订阅
排序:
The Study of RX software Identification Number Management Strategy  6
The Study of RX Software Identification Number Management St...
收藏 引用
6th international conference on computer Information science and Application Technology, CISAT 2023
作者: Wenxia, Ji Haijun, Wang CA TARC Intelligent and Connected Technology Co. Ltd. No.68 East Xianfeng Road Dongli District Tianjin China
According to the requirements of UN/WP.29 R156, the management system and vehicle technology requirements for vehicle manufacturers to use RX software identification number are put forward. In order to meet the compli... 详细信息
来源: 评论
The Application of the BERT Transformer Model for Phishing Email Classification  47
The Application of the BERT Transformer Model for Phishing E...
收藏 引用
47th IEEE-computer-Society Annual international conference on computers, software, and Applications (COMPSAC)
作者: Otieno, Denish Omondi Namin, Akhar Siami Jones, Keith S. Texas Tech Univ Dept Comp Sci Lubbock TX 79409 USA Texas Tech Univ Dept Psychol Sci Lubbock TX 79409 USA
Phishing attacks pose serious challenges to users, commercial institutions and governments alike including identity theft, companies and government secrets. The weakest link in any computer security system is the peop... 详细信息
来源: 评论
Anomaly Detection in Traffic Surveillance Videos using Differential Evolution Dragonfly Algorithm with VGG16  1
Anomaly Detection in Traffic Surveillance Videos using Diffe...
收藏 引用
1st international conference on software, Systems and Information Technology, SSITCON 2024
作者: Balassem, Zaid Ajzan Silvia, Ensteih Thind, Harpreet Kaur Harirajkumar, J. Kavitha, P. The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Dayananda Sagar College of Engineering Department of Artificial Intelligence and Machine Learning Bengaluru India Dayananda Sagar College of Engineering Department of Computer Science and Engineering Bengaluru India Sona College of Technology Department of Electronics and Communication Engineering Salem India New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Chennai India
Anomaly detection in video surveillance systems is an eminently vital field due to the widespread utility of the method, ranging from public security to monetary safety. Numerous architectures can be used for detectio... 详细信息
来源: 评论
Integrating software and Systems engineering: A Framework for Human-Centric Design of Augmented Reality Applications  18
Integrating Software and Systems Engineering: A Framework fo...
收藏 引用
18th Annual IEEE international Systems conference (SysCon)
作者: Aoki, Emi Tran, Bach Norceide, Flore Tran, Vinh Sastry, Shivakumar Thompson, Charles Chandra, Kavitha Univ Massachusetts Lowell Lowell MA 01854 USA Dassault Syst Amer Corp Waltham MA USA Dayananda Sagar Univ Bengaluru India
Modeling from the perspectives of software engineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems an... 详细信息
来源: 评论
AI-Driven Analysis and Prediction of Energy Consumption in NYC's Municipal Buildings  22
AI-Driven Analysis and Prediction of Energy Consumption in N...
收藏 引用
22nd IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2024
作者: Jamali, Hossein Dascalu, Sergiu M. Harris, Frederick C. University of Nevada Reno Department of Computer Science and Engineering RenoNV United States
Municipal buildings are major energy consumers in urban areas, contributing significantly to greenhouse gas emissions and climate change. Understanding and predicting their energy consumption patterns is crucial for i... 详细信息
来源: 评论
Use of Search Tools in software Development: A Study of Microservice-Based Team Projects  17
Use of Search Tools in Software Development: A Study of Micr...
收藏 引用
17th international conference on computer Supported Education, CSEDU 2025
作者: Lau, Yi Meng Koh, Christian Michael Jiang, Lingxiao School of Computing & Information Systems Singapore Management University Singapore Singapore
Universities are increasingly integrating real-world projects into software engineering curricula to prepare students for careers involving complex concepts like Microservices Architecture (MSA). Students frequently s... 详细信息
来源: 评论
Cryptographic Protocols for Securing Internet of Things (IoT)  15
Cryptographic Protocols for Securing Internet of Things (IoT...
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Manimekala, B. Aravind, T. Sounderrajan, T. Rajakumareswaran, V. Kondreddi, Krishnaveni Mohanambal, K. Christ University Department of Computer Science Yeshwanthpur Bengaluru India Vel TecRangarajanDr.Sagunthala R&d Institute of Science and Technology Department of Cse School of Computing India Erode Sengunthar Engineering College Department of Ai and Data Science Tamil Nadu Thuduppathi India Erode Sengunthar Engineering College Department of Computer Science and Design Tamil Nadu Thuduppathi India Chaitanya Bharathi Institute of Technology Electrical and Electronics Engineering Ranga Reddy Telangana Gandipet500075 India Bannariamman Institute of Technology Department of Computer Science and Engineering Sathyamangalam India
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic sta... 详细信息
来源: 评论
Simulation Optimization of Tobacco Sorting System Based on Genetic Simulated Annealing Algorithm  2
Simulation Optimization of Tobacco Sorting System Based on G...
收藏 引用
2nd IEEE international conference on Electrical, Automation and computer engineering, ICEACE 2024
作者: Yang, Yang Wang, Jinbing Wu, Zaiquan Luo, Mingyang Wei, Li Li, Zhaoqing Guiyang Company Guizhou Tobacco Company Guiyang China Guizhou University School of Mechanical Engineering Guiyang China
The sorting system is the core of the tobacco logistics distribution center, the current distribution center cigarette sorting volume is large, and different order sorting orders have a greater impact on the total pro... 详细信息
来源: 评论
Effective computer software Unit Testing -Thinking about unit test-driven development (UTDD) mode  4
Effective Computer Software Unit Testing -Thinking about uni...
收藏 引用
4th international conference on Signal Processing and computer science, SPCS 2023
作者: Fang, Yu Tian, Fang Wang, Wenbo Li, Wenxing Xichang Satellite Launch Center Xichang615000 China
Unit testing is a crucial quality assurance activity within the computer software development process. The efficacy of unit testing significantly impacts the final quality of software products. However, given the rapi... 详细信息
来源: 评论
The Use of Activity Models and Regression Analysis for Development Effort Forecasting
The Use of Activity Models and Regression Analysis for Devel...
收藏 引用
2024 international conference on Intelligent Computing and Sustainable Innovations in Technology, IC-SIT 2024
作者: Paul, Nayan Ranjan Sahoo, Pulak Das, Asit Kumar Sahoo, Prateek Patra, Chandan Silicon University Computer Science and Engineering Bhubaneswar India KIIT Deemed to Be University School of Computer Engineering Bhubaneswar India
Majority of modern-day industries operate with the help of computer applications which contain hardware and software parts. software programs are extremely important and developing them can be quite challenging. Creat... 详细信息
来源: 评论