咨询与建议

限定检索结果

文献类型

  • 679,466 篇 会议
  • 11,767 篇 期刊文献
  • 6,225 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 697,462 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 411,622 篇 工学
    • 303,271 篇 计算机科学与技术...
    • 243,296 篇 软件工程
    • 83,731 篇 信息与通信工程
    • 56,142 篇 控制科学与工程
    • 46,158 篇 电气工程
    • 36,238 篇 机械工程
    • 35,195 篇 生物工程
    • 35,176 篇 电子科学与技术(可...
    • 29,378 篇 生物医学工程(可授...
    • 21,443 篇 光学工程
    • 21,143 篇 仪器科学与技术
    • 19,162 篇 动力工程及工程热...
    • 18,127 篇 化学工程与技术
    • 15,239 篇 安全科学与工程
    • 14,277 篇 材料科学与工程(可...
    • 13,437 篇 交通运输工程
    • 12,921 篇 土木工程
  • 167,121 篇 理学
    • 93,351 篇 数学
    • 40,994 篇 物理学
    • 37,922 篇 生物学
    • 26,617 篇 统计学(可授理学、...
    • 19,381 篇 系统科学
    • 17,232 篇 化学
  • 102,426 篇 管理学
    • 65,973 篇 管理科学与工程(可...
    • 41,523 篇 图书情报与档案管...
    • 31,206 篇 工商管理
  • 24,658 篇 医学
    • 20,750 篇 临床医学
    • 19,360 篇 基础医学(可授医学...
  • 15,997 篇 法学
    • 12,995 篇 社会学
  • 14,854 篇 教育学
    • 14,229 篇 教育学
  • 12,373 篇 经济学
  • 8,595 篇 农学
  • 4,548 篇 文学
  • 1,780 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,332 篇 computer science
  • 20,254 篇 application soft...
  • 18,846 篇 computational mo...
  • 17,855 篇 software
  • 16,101 篇 feature extracti...
  • 16,063 篇 computer archite...
  • 15,813 篇 accuracy
  • 15,738 篇 software enginee...
  • 13,663 篇 training
  • 11,110 篇 data mining
  • 10,969 篇 deep learning
  • 10,401 篇 hardware
  • 10,069 篇 machine learning
  • 9,666 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,429 篇 testing
  • 8,884 篇 costs
  • 8,772 篇 data models
  • 8,594 篇 support vector m...
  • 8,387 篇 neural networks

机构

  • 1,891 篇 chitkara univers...
  • 1,367 篇 school of comput...
  • 1,138 篇 school of comput...
  • 1,094 篇 school of comput...
  • 875 篇 school of comput...
  • 808 篇 department of co...
  • 686 篇 college of compu...
  • 684 篇 school of comput...
  • 664 篇 school of comput...
  • 646 篇 department of co...
  • 621 篇 university of ch...
  • 582 篇 lovely professio...
  • 581 篇 state key labora...
  • 546 篇 college of compu...
  • 544 篇 school of comput...
  • 516 篇 maharishi school...
  • 507 篇 department of co...
  • 431 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 419 篇 school of comput...

作者

  • 451 篇 wang wei
  • 338 篇 liu yang
  • 334 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 258 篇 yang liu
  • 246 篇 li wei
  • 239 篇 zhang lei
  • 237 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 206 篇 li yang
  • 191 篇 liu wei
  • 185 篇 wei wang
  • 181 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 167 篇 lei wang
  • 166 篇 zhang yan

语言

  • 679,889 篇 英文
  • 12,406 篇 其他
  • 6,185 篇 中文
  • 81 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 45 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
697493 条 记 录,以下是4931-4940 订阅
排序:
Modified Term Frequency and Inverse Document Frequency with Optimized Deep Learning Algorithm based Fake News Detection  1
Modified Term Frequency and Inverse Document Frequency with ...
收藏 引用
1st international conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Rana Veer Samara Sihman Bharattej, R. Prashanth, V. Alabdeli, Haideer Thottan, Sunaina Sangeet Ananthi, S. Saint Leo University Department of Computer Science FL United States Nitte Meenakshi Institute of Technology Department of Electrical and Electronics Engineering Bengaluru India The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Dhanalakshmi Srinivasan College of Engineering and Technology Department of Artificial Intelligence and Data Science Mamallapuram India New Prince Shri Bhavani College of Engineering and Technology Department of Electrical and Electronics Engineering Chennai India
The identification of real and fake news has become difficult task in the recent years due to more similar feature between them. As the issues of fake news are leading the miscommunication to the reads, various automa... 详细信息
来源: 评论
A New Topology of Multi-Level Inverter  4
A New Topology of Multi-Level Inverter
收藏 引用
4th IEEE international Maghreb Meeting of the conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Elgheriani, Mohamed M. Abdulhamed, Zeyad E. Univercity of Tripoli Electrical & Electronic Engineering Department Tripoli Libya
According to the spread of Multi-Level Inverter (MLI) in the high power and medium voltage applications and their advantages but at the cost of large number of components which also makes the system more complex. Comp... 详细信息
来源: 评论
MaREA: Multi-class Random Forest for Automotive Intrusion Detection  24th
MaREA: Multi-class Random Forest for Automotive Intrusion De...
收藏 引用
24th international conference on Product-Focused software Process Improvement (PROFES)
作者: Caivano, Danilo Catalano, Christian De Vincentiis, Mirko Lako, Alfred Pagano, Alessandro Univ Bari Aldo Moro Bari Italy Univ Salento Lecce Italy Polytech Univ Tirana Tirana Albania
The technology inside modern vehicles is rapidly growing and poses newer security risks, as vehicle communication protocols are not yet fully secured and vulnerable to attacks. Consequently, the implementation of auto... 详细信息
来源: 评论
Designing Ethics-Aware DecidArch Game to Promote Value Diversity in software Architecture Design Decision Making  17th
Designing Ethics-Aware DecidArch Game to Promote Value Diver...
收藏 引用
17th international conference on Universal Access in Human-computer Interaction (UAHCI) part of the 25th international conference on Human-computer Interaction (HCI)
作者: Alidoosti, Razieh Lago, Patricia Poort, Eltjo Razavian, Maryam Vrije Univ Amsterdam Amsterdam Netherlands Gran Sasso Sci Inst Laquila Italy CGI Rotterdam Netherlands Eindhoven Univ Technol Eindhoven Netherlands
software systems are increasingly being employed in people's lives and society. They can improve, but also negatively affect the quality of life and interfere with human rights by, e.g., undermining the individual... 详细信息
来源: 评论
Blockchain for Cybersecurity_ Securing Data Transactions and Enhancing Privacy in Digital Systems  1
Blockchain for Cybersecurity_ Securing Data Transactions and...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Rajababu, Durgam Surya, S. Padhiary, Mrutyunjay Modi, Harshadkumar School of Engineering SR University Department of EEE Telangana Warangal India Porur Chennai600116 India Triguna Sen School of Technology Assam University Department of Agricultural Engineering Assam Silchar788011 India Government Polytechnic Gandhinagar India
The feasibility of using blockchain technology as a method to improve cybersecurity through data security transactions and users' anonymity is discussed in this paper. It scans network traffic, sings out abnormiti... 详细信息
来源: 评论
Assessing Cloud Service Quality: An Empirical Study in Ethiopia
Assessing Cloud Service Quality: An Empirical Study in Ethio...
收藏 引用
2024 international conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Wondafrash, Natnael Gizaw, Solomon Hilcoe School of Computer Science and Technology Department of Computer Science Addis Ababa Ethiopia Addis Ababa University Department of Computer Science Addis Ababa Ethiopia
The study aimed to identify Cloud service evaluation metrics and evaluate the quality of cloud services in Governmental organizations, Non-Government Organizations, and Companies in Ethiopia. It found that the cloud s... 详细信息
来源: 评论
"What You See Is What You Test": Recommending Features from GUIs for Requirements-Based Testing  24
"What You See Is What You Test": Recommending Features from ...
收藏 引用
IEEE 24th international conference on Information Reuse and Integration for Data science (IRI)
作者: Peng, Zedong Savolainen, Juha Zhang, Jianzhang Niu, Nan Univ Cincinnati Cincinnati OH 45221 USA Danfoss Drives AS Graaten Denmark Hangzhou Normal Univ Hangzhou Peoples R China
Requirements-based testing (RBT) advocates the design of test cases in order to adequately exercise the behavior of a software system without regard to the internal details of the implementation. To address the challe... 详细信息
来源: 评论
Smart Agricultural Monitoring and Automation System for Farms  9
Smart Agricultural Monitoring and Automation System for Farm...
收藏 引用
9th IEEE international conference on Adaptive science and Technology, ICAST 2024
作者: Banahene, Wiafe Owusu Adjaye, Aboagye Isaac Kweku, Essuman Aaron Fredrick, Hazel Sagoe Gifty, Osei Marcellinus, Kuubore Stephen, Danso-Mensah Longdon, Sowah Nii University of Ghana Department of Computer Engineering Ghana
Agriculture is practiced in nearly every country in the world. Agricultural practices have changed over the years and this has also changed the way people live. Due to the growth of the world's population, the tra... 详细信息
来源: 评论
An Insight Into Security Issues Prevailing In The Cloudified Era  1
An Insight Into Security Issues Prevailing In The Cloudified...
收藏 引用
1st IEEE international conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Nemirajaiah, Naveen Kumar Adalagere Raju, Channa Krishna Sri Siddhartha Academy of Higher Education Department of Computer Science and Engineering Kunigal Road Maralur Karnataka Tumakuru India Sri Siddhartha Institute of Technology Department of Computer Science and Engineering B. H. Road Agalakote Karnataka Tumakuru India
The term 'cloudified era' refers to concept of computing at remote servers to perform everyday operations which involves data storage, processing and software applications been hosted on remote servers accesse... 详细信息
来源: 评论
On Using the Task Models for Refinement and Validation of Requirements Generated Through Co-creation  19th
On Using the Task Models for Refinement and Validation of Re...
收藏 引用
19th international-Federation-for-Information-Processing-Technical-Committee-13 (IFIP TC13) international conference on Human-computer Interaction (INTERACT)
作者: Naqvi, Bilal Martinie, Celia Bakhaev, Stepan Smolander, Kari LUT Univ LENS Software Engn Lappeenranta 53850 Finland Univ Toulouse III Paul Sabatier ICS IRIT Toulouse France
Among the several other approaches for gathering software requirements, co-creation is often used. The co-creation approach based on elements of participatory research is aimed at involving the end users during the re... 详细信息
来源: 评论