咨询与建议

限定检索结果

文献类型

  • 682,364 篇 会议
  • 11,807 篇 期刊文献
  • 6,257 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,432 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,403 篇 工学
    • 304,443 篇 计算机科学与技术...
    • 244,193 篇 软件工程
    • 84,059 篇 信息与通信工程
    • 56,501 篇 控制科学与工程
    • 46,364 篇 电气工程
    • 36,353 篇 机械工程
    • 35,288 篇 电子科学与技术(可...
    • 35,243 篇 生物工程
    • 29,485 篇 生物医学工程(可授...
    • 21,663 篇 光学工程
    • 21,206 篇 仪器科学与技术
    • 19,255 篇 动力工程及工程热...
    • 18,192 篇 化学工程与技术
    • 15,340 篇 安全科学与工程
    • 14,327 篇 材料科学与工程(可...
    • 13,524 篇 交通运输工程
    • 13,009 篇 土木工程
  • 167,764 篇 理学
    • 93,720 篇 数学
    • 41,214 篇 物理学
    • 37,989 篇 生物学
    • 26,788 篇 统计学(可授理学、...
    • 19,395 篇 系统科学
    • 17,278 篇 化学
  • 102,840 篇 管理学
    • 66,247 篇 管理科学与工程(可...
    • 41,695 篇 图书情报与档案管...
    • 31,378 篇 工商管理
  • 24,799 篇 医学
    • 20,875 篇 临床医学
    • 19,479 篇 基础医学(可授医学...
  • 16,076 篇 法学
    • 13,055 篇 社会学
  • 14,950 篇 教育学
    • 14,325 篇 教育学
  • 12,420 篇 经济学
  • 8,631 篇 农学
  • 4,548 篇 文学
  • 1,784 篇 军事学
  • 1,543 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,009 篇 computational mo...
  • 17,971 篇 software
  • 16,196 篇 feature extracti...
  • 16,131 篇 accuracy
  • 16,123 篇 computer archite...
  • 15,859 篇 software enginee...
  • 13,745 篇 training
  • 11,247 篇 deep learning
  • 11,139 篇 data mining
  • 10,394 篇 hardware
  • 10,136 篇 machine learning
  • 9,772 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,463 篇 testing
  • 8,907 篇 costs
  • 8,836 篇 data models
  • 8,670 篇 support vector m...
  • 8,405 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,147 篇 school of comput...
  • 1,092 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 722 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 642 篇 department of co...
  • 625 篇 university of ch...
  • 586 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 502 篇 department of co...
  • 435 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 458 篇 wang wei
  • 338 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 china
  • 264 篇 li li
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 181 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,883 篇 英文
  • 22,375 篇 其他
  • 6,542 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700463 条 记 录,以下是901-910 订阅
排序:
Enhancing Cybersecurity through Advanced Keylogging Techniques  2
Enhancing Cybersecurity through Advanced Keylogging Techniqu...
收藏 引用
2nd IEEE international conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Sanjay, K. Ratheesh, J.K. Johin, R.R. Krishnamoorthy, A. Vellore Institute of Technology Department of Computer Science Engineering Tamil Nadu India
As the viruses are increasing efficiently, our project aims to develop a keylogger software. The purpose of this software is to continuously monitor and assess the activities of employees, and to address security conc... 详细信息
来源: 评论
The influence of different seed positions on mechanical properties of stochastic structures with semi-controlled nodes  3
The influence of different seed positions on mechanical prop...
收藏 引用
3rd international conference on Applied Mathematics and computer science, ICAMCS 2023
作者: Kresic, Inga Kaljun, Jasmin Rasovic, Nebojsa Computing and Electrical Engineering University of Mostar Faculty of Mechanical Engineering Mostar Bosnia and Herzegovina University of Maribor Faculty of Mechanical Engineering Maribor Slovenia
Stochastic structures with semi-controlled nodes were generated in the software Rhinoceros 7/Grasshopper using the Voronoi tessellation method, which divides a given volume into Voronoi cells. The structures were test... 详细信息
来源: 评论
Exploring Metamorphic Testing for Fake-News Detection software: A Case Study  47
Exploring Metamorphic Testing for Fake-News Detection Softwa...
收藏 引用
47th IEEE-computer-Society Annual international conference on computers, software, and Applications (COMPSAC)
作者: Miao, Lin Towey, Dave Ma, Yingrui Chen, Tsong Yueh 'Thou, Zhi Quan Jiangsu Automat Res Inst Shanghai Branch Shanghai Peoples R China Univ Nottingham Ningbo China Sch Comp Sci Zhejiang 315100 Peoples R China Swinburne Univ Technol Dept Comp Sci & Software Engn Hawthorn Vic 3122 Australia Univ Wollongong Sch Comp & Informat Technol Wollongong NSW 2522 Australia
Concerns have been growing over fake news and its impact. software that can automatically detect fake news is becoming more popular. However, the accuracy and reliability of such fake-news detection software remains q... 详细信息
来源: 评论
The Intersection of computer engineering and Intellectual Property Law  15
The Intersection of Computer Engineering and Intellectual Pr...
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Bansal, Shweta Sharma, Sachin Sagar, Sipra Ahmad, Shamim Mishra, Rahul Pandey, Arvind Kumar K. R. Mangalam University School of Engineering & Technology Department of Computer Science & Engineering Haryana Gurugram122103 India Dev Bhoomi Uttarakhand University School of Engineering and Computer Uttarakhand 248007 India Invertis University Department of Applied Sciences Uttar Pradesh Bareilly243123 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research in Business and Technology Punjab India Arka Jain University Department of Computer Science and Information Technology Jharkahnd Jamshedpur India
laptop engineering and intellectual belongings regulation are beautiful fields, however their intersection has grow to be increasingly more extensive in current years. With technology advancing speedy, computer engine... 详细信息
来源: 评论
Improved Dingo Optimization Algorithm for Human-robot Collaborative U-shaped Disassembly Line Balancing Problem
Improved Dingo Optimization Algorithm for Human-robot Collab...
收藏 引用
2024 international conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Li, Jialong Guo, XiWang Wang, Jiacun Qin, ShuJin Qi, Liang Kang, Qi Liaoning Petrochemical University Information and Control Engineering Fushun China Monmouth University Wes Long Branch Computer Science and Software Eng. NJ United States Shangqiu Normal University Economics and Management Shangqiu China Shandong University of Science and Technology Computer Science and Technology Qingdao China New Jersey Institute of Technology Electrical and Computer Engineering Newark United States
There is increasing attention on remanufacturing, with the primary focus in the industry on recovering reusable products to generate profit. In the process of optimizing remanufacturing, addressing the balance issue i... 详细信息
来源: 评论
A Study on the Evaluation of Cyber Security Vulnerabilities in Medical software
A Study on the Evaluation of Cyber Security Vulnerabilities ...
收藏 引用
2025 international conference on Electronics, Information, and Communication, ICEIC 2025
作者: Woo, Jeong-Hyun Koo, Jee-Hyun Seo, Byung-Suk Son, Sun-Young Ko, Kwang-Man Sang-Ji University Dept. of Computer Engineering Korea Republic of Sang-Ji University Dept. of Bigdata Science Korea Republic of Sang-Ji University Dept. of Electrical and Electronic Engineering Korea Republic of
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due... 详细信息
来源: 评论
A Comparative Analysis of Different Machine Learning Techniques Used in software Effort Estimation  2
A Comparative Analysis of Different Machine Learning Techniq...
收藏 引用
2nd international conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Rajput, Yashendra Razi, M.H. Sharma, Avinash Kumar Department of Computer Science Engineering Sharda University Greater Noida India
software effort estimation is a vital component of project management, encompassing the prediction of time, cost, and resources necessary for software development. Accurate effort estimation plays a pivotal role in ef... 详细信息
来源: 评论
On the Impact of Draft Pull Requests on Accelerating Feedback  40
On the Impact of Draft Pull Requests on Accelerating Feedbac...
收藏 引用
40th international conference on software Maintenance and Evolution
作者: Harbaoui, Firas Sayagh, Mohammed Abdalkareem, Rabe ETS Quebec Univ Montreal PQ Canada Omar AL Mukhtar Univ Al Bayda Libya
The pull request (PR) mechanism provides a structured way for developers to present their proposed modifications, engage in code review, and address any concerns before the changes are incorporated into the main codeb... 详细信息
来源: 评论
Optimization of UAV Intrusion Detection Based on LSTM-RNN  8
Optimization of UAV Intrusion Detection Based on LSTM-RNN
收藏 引用
8th international conference on Electrical, Mechanical and computer engineering, ICEMCE 2024
作者: Qiu, Junju Yang, Wei Software Engineering Institute of Guangzhou Department of Software Engineering Guangdong China
The increasing prevalence of Unmanned Aerial Vehicles (UAVs) has resulted in a rise in malicious activities targeting their networks, highlighting the critical need for effective Intrusion Detection Systems (IDS). Thi... 详细信息
来源: 评论
Static Deadlock Detection for Interrupt-driven Embedded software
Static Deadlock Detection for Interrupt-driven Embedded Soft...
收藏 引用
2024 international conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Zhang, Yu Zhang, Kaiwen Li, Xiaofeng Xie, Yi Guan, Jian Gu, Bin Liu, Guanjun Tongji University Department of Computer Science and Technology Shanghai China Beijing Control Engineering Institute Beijing China
Interrupt-driven embedded software is widely used in safety-critical systems, where any occurrence of errors can lead to serious consequences. Deadlock is a common concurrency error, and deadlock detection methods are... 详细信息
来源: 评论