咨询与建议

限定检索结果

文献类型

  • 678,666 篇 会议
  • 11,745 篇 期刊文献
  • 1,000 册 图书
  • 29 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 691,414 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 411,559 篇 工学
    • 303,231 篇 计算机科学与技术...
    • 243,267 篇 软件工程
    • 83,725 篇 信息与通信工程
    • 56,125 篇 控制科学与工程
    • 46,155 篇 电气工程
    • 36,225 篇 机械工程
    • 35,194 篇 生物工程
    • 35,171 篇 电子科学与技术(可...
    • 29,377 篇 生物医学工程(可授...
    • 21,442 篇 光学工程
    • 21,135 篇 仪器科学与技术
    • 19,155 篇 动力工程及工程热...
    • 18,127 篇 化学工程与技术
    • 15,238 篇 安全科学与工程
    • 14,275 篇 材料科学与工程(可...
    • 13,437 篇 交通运输工程
    • 12,920 篇 土木工程
  • 167,078 篇 理学
    • 93,339 篇 数学
    • 40,991 篇 物理学
    • 37,921 篇 生物学
    • 26,615 篇 统计学(可授理学、...
    • 19,379 篇 系统科学
    • 17,230 篇 化学
  • 102,408 篇 管理学
    • 65,958 篇 管理科学与工程(可...
    • 41,521 篇 图书情报与档案管...
    • 31,203 篇 工商管理
  • 24,654 篇 医学
    • 20,749 篇 临床医学
    • 19,358 篇 基础医学(可授医学...
  • 15,997 篇 法学
    • 12,995 篇 社会学
  • 14,854 篇 教育学
    • 14,229 篇 教育学
  • 12,373 篇 经济学
  • 8,594 篇 农学
  • 4,548 篇 文学
  • 1,780 篇 军事学
  • 1,540 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,326 篇 computer science
  • 20,254 篇 application soft...
  • 18,800 篇 computational mo...
  • 17,823 篇 software
  • 16,049 篇 computer archite...
  • 16,038 篇 feature extracti...
  • 15,680 篇 accuracy
  • 13,800 篇 software enginee...
  • 13,617 篇 training
  • 11,105 篇 data mining
  • 10,919 篇 deep learning
  • 10,392 篇 hardware
  • 9,939 篇 machine learning
  • 9,625 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,412 篇 testing
  • 8,879 篇 costs
  • 8,744 篇 data models
  • 8,570 篇 support vector m...
  • 8,377 篇 neural networks

机构

  • 1,889 篇 chitkara univers...
  • 1,360 篇 school of comput...
  • 1,127 篇 school of comput...
  • 1,096 篇 school of comput...
  • 865 篇 school of comput...
  • 793 篇 department of co...
  • 678 篇 school of comput...
  • 676 篇 college of compu...
  • 651 篇 school of comput...
  • 633 篇 department of co...
  • 621 篇 university of ch...
  • 579 篇 state key labora...
  • 567 篇 lovely professio...
  • 553 篇 college of compu...
  • 544 篇 school of comput...
  • 516 篇 maharishi school...
  • 515 篇 department of co...
  • 443 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 416 篇 college of compu...

作者

  • 451 篇 wang wei
  • 336 篇 liu yang
  • 328 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 258 篇 yang liu
  • 254 篇 li wei
  • 239 篇 zhang lei
  • 237 篇 wang lei
  • 227 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 204 篇 li yang
  • 195 篇 liu wei
  • 185 篇 wei wang
  • 182 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 168 篇 wei zhang
  • 166 篇 zhang yan

语言

  • 673,842 篇 英文
  • 12,405 篇 其他
  • 6,185 篇 中文
  • 81 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 45 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
691445 条 记 录,以下是4911-4920 订阅
排序:
Blockchain for Cybersecurity_ Securing Data Transactions and Enhancing Privacy in Digital Systems  1
Blockchain for Cybersecurity_ Securing Data Transactions and...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Rajababu, Durgam Surya, S. Padhiary, Mrutyunjay Modi, Harshadkumar School of Engineering SR University Department of EEE Telangana Warangal India Porur Chennai600116 India Triguna Sen School of Technology Assam University Department of Agricultural Engineering Assam Silchar788011 India Government Polytechnic Gandhinagar India
The feasibility of using blockchain technology as a method to improve cybersecurity through data security transactions and users' anonymity is discussed in this paper. It scans network traffic, sings out abnormiti... 详细信息
来源: 评论
Designing Ethics-Aware DecidArch Game to Promote Value Diversity in software Architecture Design Decision Making  17th
Designing Ethics-Aware DecidArch Game to Promote Value Diver...
收藏 引用
17th international conference on Universal Access in Human-computer Interaction (UAHCI) part of the 25th international conference on Human-computer Interaction (HCI)
作者: Alidoosti, Razieh Lago, Patricia Poort, Eltjo Razavian, Maryam Vrije Univ Amsterdam Amsterdam Netherlands Gran Sasso Sci Inst Laquila Italy CGI Rotterdam Netherlands Eindhoven Univ Technol Eindhoven Netherlands
software systems are increasingly being employed in people's lives and society. They can improve, but also negatively affect the quality of life and interfere with human rights by, e.g., undermining the individual... 详细信息
来源: 评论
CIDER: Concept-based Interactive Design Recovery  22
CIDER: Concept-based Interactive Design Recovery
收藏 引用
44th ACM/IEEE international conference on software engineering - New Ideas and Emerging Results (ICSE-NIER)
作者: Fang, Hongzhou Cai, Yuanfang Kazman, Rick Lefever, Jason Drexel Univ Philadelphia PA 19104 USA Univ Hawaii Honolulu HI 96822 USA
In this paper, we introduce CIDER, a Concept-based Interactive DEsign Recovery tool that recovers a software design in the form of hierarchically organized concepts. In addition to facilitating design comprehension, i... 详细信息
来源: 评论
Assessing Cloud Service Quality: An Empirical Study in Ethiopia
Assessing Cloud Service Quality: An Empirical Study in Ethio...
收藏 引用
2024 international conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Wondafrash, Natnael Gizaw, Solomon Hilcoe School of Computer Science and Technology Department of Computer Science Addis Ababa Ethiopia Addis Ababa University Department of Computer Science Addis Ababa Ethiopia
The study aimed to identify Cloud service evaluation metrics and evaluate the quality of cloud services in Governmental organizations, Non-Government Organizations, and Companies in Ethiopia. It found that the cloud s... 详细信息
来源: 评论
RFECV-DT: Recursive Feature Selection with Cross Validation using Decision Tree based Android Malware Detection  15
RFECV-DT: Recursive Feature Selection with Cross Validation ...
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Awasthi, Naimisha Gautam, Prateek Raj Sharma, Anuj Kumar Aktu Centre for Advanced Studies Department of Computer Science and Engineering Lucknow India Upes School of Computer Science Dehradun India Aktu Centre For Advanced Studies Department of Mechatronics Lucknow India
The internet is extremely valuable, but it is also vulnerable to assault. Malware is a persistent and dynamic danger. Malware assaults entail introducing malicious code into software. The task was handled using a vari... 详细信息
来源: 评论
Smart Agricultural Monitoring and Automation System for Farms  9
Smart Agricultural Monitoring and Automation System for Farm...
收藏 引用
9th IEEE international conference on Adaptive science and Technology, ICAST 2024
作者: Banahene, Wiafe Owusu Adjaye, Aboagye Isaac Kweku, Essuman Aaron Fredrick, Hazel Sagoe Gifty, Osei Marcellinus, Kuubore Stephen, Danso-Mensah Longdon, Sowah Nii University of Ghana Department of Computer Engineering Ghana
Agriculture is practiced in nearly every country in the world. Agricultural practices have changed over the years and this has also changed the way people live. Due to the growth of the world's population, the tra... 详细信息
来源: 评论
Deep Learning-Based Image Recognition for Electronic Components Identification  5
Deep Learning-Based Image Recognition for Electronic Compone...
收藏 引用
5th IEEE international conference on Recent Trends in computer science and Technology, ICRTCST 2024
作者: Panigrahi, Bhawani Sankar Royappa, Angelina Monga, Sandeep Geetha, H. Pavithra, G. Shaik, Bazani Vardhaman College of Engineering Department of IT Telangana Hyderabad India S.A. Engineering College Department of ECE Tamil Nadu Chennai India Oriental Institute of Science and Technology Department of Computer Science and Engineering India St.Joseph's College of Engineering OMR Semmenchery Department of Mathematics Tamil Nadu Chennai India Dayananda Sagar College of Engineering Department of Electronics & Communication Engineering Karnataka Bangalore India Ramachandra College Of Engineering Department of Mechanical Engineering Andhra Pradesh Eluru India
The use of deep learning techniques in the field of picture recognition for the purpose of identifying electronic components. Because of the growing complexity and variety of electronic devices, it is essential for ma... 详细信息
来源: 评论
Automatic Detection of Photovoltaic Module Defects based on Infrared images with Deep Learning Technique  5
Automatic Detection of Photovoltaic Module Defects based on ...
收藏 引用
5th international conference on Electrical, Communication and computer engineering, ICECCE 2024
作者: Elshamy, Abdalla Shaker, Yomna University of Science and Technology of Fujairah Dept. of Engineering and Technology Fujairah United Arab Emirates
The study presents an innovative approach for detecting defects in photovoltaic modules using deep learning techniques applied to infrared and electroluminescence images. This method offers enhanced accuracy and effic... 详细信息
来源: 评论
Towards N-version Quantum software Systems for Reliable Classical-Quantum Computing  35
Towards N-version Quantum Software Systems for Reliable Clas...
收藏 引用
35th IEEE international Symposium on software Reliability engineering Workshops, ISSREW 2024
作者: Saito, Shinobu Endo, Suguru Suzuki, Yasunari Ntt Computer and Data Science Laboratories Tokyo Japan
While quantum computers have attracted much attention, dealing with computational errors due to noise effects caused by the interaction between quantum hardware and the external environment is a significant challenge.... 详细信息
来源: 评论
Research on standardization of non-standardized format data in power system
Research on standardization of non-standardized format data ...
收藏 引用
2022 international conference on Electronic Information engineering and computer science, EIECS 2022
作者: Luan, JingZhao Liu, Lin Sun, Yao Liu, Yiming Dalian Power Supply Company of State Grid Dalian China Beijing Engineering Research Center of Energy Electric Power Information Security North China Electric Power University China
With the acceleration of information construction, the network structure and technology of information system are full of diversity. How to effectively resolve security risks and effectively deal with various unexpect... 详细信息
来源: 评论