咨询与建议

限定检索结果

文献类型

  • 682,364 篇 会议
  • 11,807 篇 期刊文献
  • 6,257 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,432 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,403 篇 工学
    • 304,443 篇 计算机科学与技术...
    • 244,193 篇 软件工程
    • 84,059 篇 信息与通信工程
    • 56,501 篇 控制科学与工程
    • 46,364 篇 电气工程
    • 36,353 篇 机械工程
    • 35,288 篇 电子科学与技术(可...
    • 35,243 篇 生物工程
    • 29,485 篇 生物医学工程(可授...
    • 21,663 篇 光学工程
    • 21,206 篇 仪器科学与技术
    • 19,255 篇 动力工程及工程热...
    • 18,192 篇 化学工程与技术
    • 15,340 篇 安全科学与工程
    • 14,327 篇 材料科学与工程(可...
    • 13,524 篇 交通运输工程
    • 13,009 篇 土木工程
  • 167,764 篇 理学
    • 93,720 篇 数学
    • 41,214 篇 物理学
    • 37,989 篇 生物学
    • 26,788 篇 统计学(可授理学、...
    • 19,395 篇 系统科学
    • 17,278 篇 化学
  • 102,840 篇 管理学
    • 66,247 篇 管理科学与工程(可...
    • 41,695 篇 图书情报与档案管...
    • 31,378 篇 工商管理
  • 24,799 篇 医学
    • 20,875 篇 临床医学
    • 19,479 篇 基础医学(可授医学...
  • 16,076 篇 法学
    • 13,055 篇 社会学
  • 14,950 篇 教育学
    • 14,325 篇 教育学
  • 12,420 篇 经济学
  • 8,631 篇 农学
  • 4,548 篇 文学
  • 1,784 篇 军事学
  • 1,543 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,009 篇 computational mo...
  • 17,971 篇 software
  • 16,196 篇 feature extracti...
  • 16,131 篇 accuracy
  • 16,123 篇 computer archite...
  • 15,859 篇 software enginee...
  • 13,745 篇 training
  • 11,247 篇 deep learning
  • 11,139 篇 data mining
  • 10,394 篇 hardware
  • 10,136 篇 machine learning
  • 9,772 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,463 篇 testing
  • 8,907 篇 costs
  • 8,836 篇 data models
  • 8,670 篇 support vector m...
  • 8,405 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,147 篇 school of comput...
  • 1,092 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 722 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 642 篇 department of co...
  • 625 篇 university of ch...
  • 586 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 502 篇 department of co...
  • 435 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 458 篇 wang wei
  • 338 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 china
  • 264 篇 li li
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 181 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,883 篇 英文
  • 22,375 篇 其他
  • 6,542 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700463 条 记 录,以下是761-770 订阅
排序:
Towards Integrated Framework for Efficient Educational software Development  21
Towards Integrated Framework for Efficient Educational Softw...
收藏 引用
21st IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2023
作者: Mbiada, Alain Kabo Isong, Bassey Lugayizi, Francis Abu-Mahfouz, Adnan North-West University Computer Science Dept Mafikeng South Africa Pretoria South Africa
This paper proposes a framework for creating educational software systems that effectively meet student engagement and pedagogical goals. While different design methodologies have been used in developing educational s... 详细信息
来源: 评论
Tropical Cyclone Intensity Prediction Using Deep Learning Techniques- A Survey  4
Tropical Cyclone Intensity Prediction Using Deep Learning Te...
收藏 引用
4th IEEE international conference on Applied Electromagnetics, Signal Processing, and Communication, AESPC 2024
作者: Ilayaraja, V. Rajamohana, S.P. Jagadeesan, S. Aishwarya, V. Rakesh, M. School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632 014 India School of Engineering & Technology Pondicherry University Department of Computer Science Puducherry Karaikal India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Tamil Nadu Vellore632 014 India
Tropical cyclones, characterized by strong winds and heavy rainfall, threaten human life in coastal regions crucial to the economy, including fisheries, agriculture, tourism, and infrastructure. Their frequent occurre... 详细信息
来源: 评论
μChaos: Moving Chaos engineering to IoT Devices  24th
μChaos: Moving Chaos Engineering to IoT Devices
收藏 引用
24th international conference on Computational science (ICCS)
作者: Kalka, Wojciech Szydlo, Tomasz AGH Univ Krakow Inst Comp Sci Al Mickiewicza 30 PL-30059 Krakow Poland Newcastle Univ Newcastle Upon Tyne NE1 7RU Tyne & Wear England
The concept of the Internet of Things (IoT) has been widely used in many applications. IoT devices can be exposed to various external factors, such as network congestion, signal interference, and limited network bandw... 详细信息
来源: 评论
Designing NLP-Based Solutions for Requirements Variability Management: Experiences from a Design science Study at Visma  30th
Designing NLP-Based Solutions for Requirements Variability M...
收藏 引用
30th international Working conference on Requirements engineering - Foundation for software Quality (REFSQ)
作者: Elahidoost, Parisa Unterkalmsteiner, Michael Fucci, Davide Liljenberg, Peter Fischbach, Jannik Blekinge Inst Technol SERL Valhallavagen 1 S-37179 Karlskrona Sweden Fortiss GmbH Guerickestr 25 D-80805 Munich Germany Visma Sambandsvagen 5 S-35236 Vaxjo Sweden Netlight Consulting GmbH Prannerstr 4 D-80333 Munich Germany
Context andmotivation: In this industry-academia collaborative project, a team of researchers, supported by a software architect, business analyst, and test engineer explored the challenges of requirement variability ... 详细信息
来源: 评论
ISS-Scenario: Scenario-Based Testing in CARLA  18th
ISS-Scenario: Scenario-Based Testing in CARLA
收藏 引用
18th international conference on Theoretical Aspects of software engineering (TASE)
作者: Li, Renjue Qin, Tianhang Widdershoven, Cas Chinese Acad Sci Inst Software Beijing Peoples R China Inst Intelligent Software Guangzhou Peoples R China
The rapidly evolving field of autonomous driving systems (ADSs) is full of promise. However, in order to fulfil these promises, ADSs need to be safe in all circumstances. This paper introduces ISS-Scenario, an autonom... 详细信息
来源: 评论
Surface Defect Detection Algorithm for Strip Steel Based on Improved YOLOv7 Model
IAENG International Journal of Computer Science
收藏 引用
IAENG international Journal of computer science 2024年 第3期51卷 308-316页
作者: Wang, Zhu Liu, Weisheng the College of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China the College of Computer Science and Software Engineering the University of Science and Technology Liaoning CO Anshan114051 China
This research proposes a refined deep learning framework aimed at boosting the precision and efficacy of detecting surface imperfections in strip steel. This method integrates enhancement and simplification techniques... 详细信息
来源: 评论
Slicing Assisted Program Verification: An Empirical Study  18th
Slicing Assisted Program Verification: An Empirical Study
收藏 引用
18th international conference on Theoretical Aspects of software engineering (TASE)
作者: Chai, Wenjian Yan, Rongjie Zhang, Wenhui Zhang, Jian ISCAS Key Lab Syst Software CAS Beijing Peoples R China ISCAS State Key Lab Comp Sci Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
Simplifying programs before verification aims to reduce program complexity thus saving the verification effort. In the paper, we investigate the impacts of applying program slicing before verification. We consider var... 详细信息
来源: 评论
Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in software Defined Networks  25
Machine Learning as the Shield: Mitigating ARP Poisoning Att...
收藏 引用
25th international Arab conference on Information Technology, ACIT 2024
作者: Alquran, Rabee Al Jamal, Mahmoud Aljaidi, Mohammad Al-Jamal, Mohammad Khassawneh, Bashar Alsarhan, Ayoub Alidmat, Omar Samara, Ghassan Almatarneh, Sattam The Hashemite University Faculty of Prince Al-Hussien bin Abdullah for It Department of Information Technology Zarqa Jordan Irbid National University Department of Cybersecurity Irbid Jordan Zarqa University Department of Computer Science Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Yarmouk University Department of Statistics Irbid Jordan Amman Arab University Faculty of Computer Science and Informatics Department of Computer Science Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Department of Artificial Intelligence Zarqa Jordan
software-defined networking (SDN) revolutionizes network management by centralizing control, but this centralization also introduces notable vulnerabilities, especially Address Resolution Protocol (ARP) poisoning atta... 详细信息
来源: 评论
Explainability engineering Challenges: Connecting Explainability Levels to Run-Time Explainability  2nd
Explainability Engineering Challenges: Connecting Explainabi...
收藏 引用
2nd World conference on Explainable Artificial Intelligence (xAI)
作者: Schwammberger, Maike Mirandola, Raffaela Wenninghoff, Nils Karlsruhe Inst Technol D-76131 Karlsruhe Germany
While automated and intelligent software systems are more and more used in everyday software systems, we must ensure that these systems remain understandable to all involved stakeholders. For this, two disciplines can... 详细信息
来源: 评论
Security Dynamics of Blockchain-Enabled SDN Systems: A Taxonomic Approach  9
Security Dynamics of Blockchain-Enabled SDN Systems: A Taxon...
收藏 引用
9th international conference on computer science and engineering, UBMK 2024
作者: Dudukcu, Deniz Karakus, Murat Ankara University Artificial Intelligence Technologies Graduate Program Ankara Turkey Ankara University Department of Software Engineering Ankara Turkey
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxon... 详细信息
来源: 评论