咨询与建议

限定检索结果

文献类型

  • 682,416 篇 会议
  • 11,817 篇 期刊文献
  • 6,244 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,482 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,512 篇 工学
    • 304,595 篇 计算机科学与技术...
    • 244,026 篇 软件工程
    • 84,209 篇 信息与通信工程
    • 56,729 篇 控制科学与工程
    • 46,535 篇 电气工程
    • 36,399 篇 机械工程
    • 35,387 篇 电子科学与技术(可...
    • 35,234 篇 生物工程
    • 29,473 篇 生物医学工程(可授...
    • 21,614 篇 光学工程
    • 21,253 篇 仪器科学与技术
    • 19,341 篇 动力工程及工程热...
    • 18,252 篇 化学工程与技术
    • 15,345 篇 安全科学与工程
    • 14,427 篇 材料科学与工程(可...
    • 13,540 篇 交通运输工程
    • 12,981 篇 土木工程
  • 167,884 篇 理学
    • 93,824 篇 数学
    • 41,269 篇 物理学
    • 37,978 篇 生物学
    • 26,763 篇 统计学(可授理学、...
    • 19,393 篇 系统科学
    • 17,337 篇 化学
  • 102,851 篇 管理学
    • 66,250 篇 管理科学与工程(可...
    • 41,707 篇 图书情报与档案管...
    • 31,353 篇 工商管理
  • 24,799 篇 医学
    • 20,871 篇 临床医学
    • 19,468 篇 基础医学(可授医学...
  • 16,060 篇 法学
    • 13,040 篇 社会学
  • 14,922 篇 教育学
    • 14,297 篇 教育学
  • 12,416 篇 经济学
  • 8,627 篇 农学
  • 4,548 篇 文学
  • 1,783 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,016 篇 computational mo...
  • 17,975 篇 software
  • 16,205 篇 feature extracti...
  • 16,158 篇 accuracy
  • 16,124 篇 computer archite...
  • 15,858 篇 software enginee...
  • 13,754 篇 training
  • 11,275 篇 deep learning
  • 11,140 篇 data mining
  • 10,394 篇 hardware
  • 10,161 篇 machine learning
  • 9,779 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,467 篇 testing
  • 8,909 篇 costs
  • 8,841 篇 data models
  • 8,670 篇 support vector m...
  • 8,413 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,148 篇 school of comput...
  • 1,090 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 720 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 644 篇 department of co...
  • 627 篇 university of ch...
  • 587 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 499 篇 department of co...
  • 432 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 459 篇 wang wei
  • 339 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 183 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,696 篇 英文
  • 22,613 篇 其他
  • 6,518 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700513 条 记 录,以下是641-650 订阅
排序:
Incorporating Presence Conditions into Goal Models that Evolve Over Time  31
Incorporating Presence Conditions into Goal Models that Evol...
收藏 引用
31st IEEE international Requirements engineering conference (RE)
作者: Bi, Xinran Grubb, Alicia M. Smith Coll Dept Comp Sci Northampton MA 01063 USA
Goal modeling helps analysts understand the needs and motivations of stakeholders. Recent work has investigated considering how these intentions change over time. In this paper, we investigate the problem of specifyin... 详细信息
来源: 评论
Improvement of Tracking Accuracy using Travel Pattern for Agent-based Human Tracking  16
Improvement of Tracking Accuracy using Travel Pattern for Ag...
收藏 引用
16th international conference on computer and Automation engineering (ICCAE)
作者: Tanigawa, Kozo Shiozuka, Masaru Takahashi, Kenichi Mitsubishi Elect Software Corp Dev Dept B Kobe Hyogo Japan Tottori Univ Grad Sch Sustainabil Sci Cross Informat Res Ctr Tottori Japan
Security systems are widely employed in various facilities, such as companies and schools, to prevent crime. However, as the monitored area increases, it becomes challenging for operators to track numerous targets eff... 详细信息
来源: 评论
CNN-LSTM Model for Mitigation of DDoS Attacks in software-Defined Networks
CNN-LSTM Model for Mitigation of DDoS Attacks in Software-De...
收藏 引用
2024 international conference on science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Jimoh, Ebunayo Rachael Oladele, Tinuke Omolewa Oladele, Oluwabunmi Titilope Akinlolu, Azeez Olawale Akanbi, Mulikat Bola Olabanke, Olasehinde-Williams University of Ilorin Faculty of Communication and Information Sciences Department of Computer Science Ilorin Nigeria University of Ilorin Faculty of Communication and Information Sciences Department of Information Technology Ilorin Nigeria Fountain University Department of Mathematical and Computer Sciences Osogbo Nigeria Kwara State Polytechnic Computer Science Department Kwara State Ilorin Nigeria University of Ilorin Centre for Open and Distance Learning Department of Computer Science Ilorin Nigeria
The Internet, as the world's largest computer network, has evolved beyond a mere repository of information to become an indispensable tool driving modern society. Its dynamic nature enables communication, interact... 详细信息
来源: 评论
ChatGPT as a software Development Bot: A Project-Based Study  19
ChatGPT as a Software Development Bot: A Project-Based Study
收藏 引用
19th international conference on Evaluation of Novel Approaches to software engineering, ENASE 2024
作者: Waseem, Muhammad Das, Teerath Ahmad, Aakash Liang, Peng Fahmideh, Mahdi Mikkonen, Tommi Faculty of Information Technology University of Jyväskylä Jyväskylä Finland School of Computing and Communications Lancaster University Leipzig Leipzig Germany School of Computer Science Wuhan University Wuhan China
Artificial Intelligence has demonstrated its significance in software engineering through notable improvements in productivity, accuracy, collaboration, and learning outcomes. This study examines the impact of generat... 详细信息
来源: 评论
The UAV Altimetry Method Based on Extended Fault-Tolerant Kalman Filter  4
The UAV Altimetry Method Based on Extended Fault-Tolerant Ka...
收藏 引用
4th international conference on Electronic Information engineering and computer science, EIECS 2024
作者: Zhang, Fei Information Engineering Jiangxi University of Science and Technology Jiangxi China
Multi-rotor drones are celebrated for their flexibility and efficiency, and are extensively employed in agriculture, mapping, and leisure activities. Nonetheless, the altitude sensors of these drones can sometimes be ... 详细信息
来源: 评论
Exploring the cultivation of practical innovation ability of engineering students in application-oriented universities driven by scientific research projects - a case study of virtual Try-On software  3
Exploring the cultivation of practical innovation ability of...
收藏 引用
3rd international conference on Intelligent Mechanical and Human-computer Interaction Technology, IHCIT 2024
作者: Hua, Zhongwei Li, Xinyu Huang, Jinglan Jin, Zhuriyao Applied Technology College of Soochow University Jiangsu Suzhou215325 China
With the continuous advancement of technology and rapid development of industries, the demand for engineering talents will also continue to increase. Different from general universities and liberal arts courses, appli... 详细信息
来源: 评论
Detecting Automatic software Plagiarism via Token Sequence Normalization  24
Detecting Automatic Software Plagiarism via Token Sequence N...
收藏 引用
44th ACM/IEEE international conference on software engineering, ICSE 2024
作者: Saglam, Timur Brodel, Moritz Schmid, Larissa Hahner, Sebastian Karlsruhe Germany
While software plagiarism detectors have been used for decades, the assumption that evading detection requires programming proficiency is challenged by the emergence of automated pla-giarism generators. These generato... 详细信息
来源: 评论
Exploring SVM Kernel and Voting Classifiers for Malware Classification in Android Permission Systems  1
Exploring SVM Kernel and Voting Classifiers for Malware Clas...
收藏 引用
1st international conference on Innovations in Communications, Electrical and computer engineering, ICICEC 2024
作者: Singh, Gurdeep Mittal, Sonam Singh, Preet Chitkara University Department of Electronics and Communication Engineering Rajpura India Chitkara University Department of Computer Science and Engineering Rajpura India
Sometimes referred to as hostile software, malware is a subset of programming codes aimed to exploit weaknesses in computer system security. Not only through data theft but also by letting Distributed Denial of Servic... 详细信息
来源: 评论
Industrial Validation of a Neural Network Model Using the Novel MixTCP Tool  19
Industrial Validation of a Neural Network Model Using the No...
收藏 引用
19th international conference on Evaluation of Novel Approaches to software engineering, ENASE 2024
作者: Szederjesi-Dragomir, Arnold Gąceanu, Radu Vescan, Andreea Computer Science Department Faculty of Mathematics and Computer Science Babeş-Bolyai University Cluj-Napoca Romania
Test Case Prioritization (TCP) is crucial in the fast-paced world of software development to speed up and optimize testing procedures, particularly in Continuous Integration (CI) setups. This paper aims to first valid... 详细信息
来源: 评论
Barriers and Self-Efficacy: A Large-Scale Study on the Impact of OSS Courses on Student Perceptions  2023
Barriers and Self-Efficacy: A Large-Scale Study on the Impac...
收藏 引用
28th Annual conference on Innovation and Technology in computer science Education (ITiCSE)
作者: Salerno, Larissa Tonhao, Simone de Franca Steinmacher, Igor Treude, Christoph Univ Melbourne Melbourne Vic Australia Univ Estadual Maringa Maringa Parana Brazil No Arizona Univ Flagstaff AZ USA
Open source software (OSS) development offers a unique opportunity for students in software engineering to experience and participate in large-scale software development, however, the impact of such courses on student... 详细信息
来源: 评论