咨询与建议

限定检索结果

文献类型

  • 682,364 篇 会议
  • 11,807 篇 期刊文献
  • 6,257 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,432 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,403 篇 工学
    • 304,443 篇 计算机科学与技术...
    • 244,193 篇 软件工程
    • 84,059 篇 信息与通信工程
    • 56,501 篇 控制科学与工程
    • 46,364 篇 电气工程
    • 36,353 篇 机械工程
    • 35,288 篇 电子科学与技术(可...
    • 35,243 篇 生物工程
    • 29,485 篇 生物医学工程(可授...
    • 21,663 篇 光学工程
    • 21,206 篇 仪器科学与技术
    • 19,255 篇 动力工程及工程热...
    • 18,192 篇 化学工程与技术
    • 15,340 篇 安全科学与工程
    • 14,327 篇 材料科学与工程(可...
    • 13,524 篇 交通运输工程
    • 13,009 篇 土木工程
  • 167,764 篇 理学
    • 93,720 篇 数学
    • 41,214 篇 物理学
    • 37,989 篇 生物学
    • 26,788 篇 统计学(可授理学、...
    • 19,395 篇 系统科学
    • 17,278 篇 化学
  • 102,840 篇 管理学
    • 66,247 篇 管理科学与工程(可...
    • 41,695 篇 图书情报与档案管...
    • 31,378 篇 工商管理
  • 24,799 篇 医学
    • 20,875 篇 临床医学
    • 19,479 篇 基础医学(可授医学...
  • 16,076 篇 法学
    • 13,055 篇 社会学
  • 14,950 篇 教育学
    • 14,325 篇 教育学
  • 12,420 篇 经济学
  • 8,631 篇 农学
  • 4,548 篇 文学
  • 1,784 篇 军事学
  • 1,543 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,009 篇 computational mo...
  • 17,971 篇 software
  • 16,196 篇 feature extracti...
  • 16,131 篇 accuracy
  • 16,123 篇 computer archite...
  • 15,859 篇 software enginee...
  • 13,745 篇 training
  • 11,247 篇 deep learning
  • 11,139 篇 data mining
  • 10,394 篇 hardware
  • 10,136 篇 machine learning
  • 9,772 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,463 篇 testing
  • 8,907 篇 costs
  • 8,836 篇 data models
  • 8,670 篇 support vector m...
  • 8,405 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,147 篇 school of comput...
  • 1,092 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 722 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 642 篇 department of co...
  • 625 篇 university of ch...
  • 586 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 502 篇 department of co...
  • 435 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 458 篇 wang wei
  • 338 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 china
  • 264 篇 li li
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 181 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,883 篇 英文
  • 22,375 篇 其他
  • 6,542 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700463 条 记 录,以下是951-960 订阅
排序:
Matching Corporate software Engineers and Data Offerings - from Discovery to Recommendations  19
Matching Corporate Software Engineers and Data Offerings - f...
收藏 引用
19th international Joint conference on computer science and software engineering (JCSSE)
作者: Martens, Benedikt Franke, Joerg Friedrich Alexander Univ Erlangen Germany
Data plays an essential role in developing software, especially in large and complex projects. Data can be collected from different stages of the software life cycle and can form the basis for decision-making and ther... 详细信息
来源: 评论
Application Of Blockchain To Prevent Benami Transactions  6
Application Of Blockchain To Prevent Benami Transactions
收藏 引用
6th Parul international conference on engineering and Technology, PICET 2024
作者: Patil, Vishal Police Ryaan, Mohammed Shrinidhi Deepu Darshan, S. Shruthi, L. Department of Computer Science and Engineering PES University Bangalore India
Blockchain is a distributed, decentralized, and unchangeable ledger that keeps track of all transactions. The inability to edit a transaction once it has been created helps eliminate the need for central servers and o... 详细信息
来源: 评论
Revolutionizing Lip Reading: The Power of Temporal Attention  36
Revolutionizing Lip Reading: The Power of Temporal Attention
收藏 引用
36th international conference on software engineering and Knowledge engineering, SEKE 2024
作者: Jianfeng, Shi Furen, Bai Wenjuan, Li Qifei, Zhang School of Software Zhejiang University Ningbo China School of Computer Science Hangzhou Normal University Hangzhou China
This paper presents a novel Convolutional Based Temporal Attention (CBTA) module that improves the performance of temporal convolutional networks (TCN) in lipreading tasks without requiring any additional data. Our CB... 详细信息
来源: 评论
Examining the Utilization of Artificial Intelligence Tools by Students in software engineering Projects  16
Examining the Utilization of Artificial Intelligence Tools b...
收藏 引用
16th international conference on computer Supported Education, CSEDU 2024
作者: Dirin, Amir Laine, Teemu H. Metropolia University of Applied Sciences Helsinki Finland Department of Digital Media Ajou University Suwon Korea Republic of
With the popularity of AI-based tools, the landscape of learning and teaching software engineering has shifted to a new era, which has left both educators and students confused regarding the extent to which these tool... 详细信息
来源: 评论
Regularized Hybrid Deep Learning for DDoS Attack Prediction in software Defined Internet of Things (SD-IoT)  3
Regularized Hybrid Deep Learning for DDoS Attack Prediction ...
收藏 引用
3rd international conference on Power, Control and Computing Technologies, ICPC2T 2024
作者: Deepthy, J. Radhika, N. Denny, Alosh Department of Electronics & Communication Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India School of Engineering Ernakulam Cochin University of Science and Technology Division of Computer Science and Engineering India
The availability of online resource is seriously threatened by the fatal DDoS (Distributed Denial of Service) attacks, which can earnestly break up a targeted network or website by flooding it with traffic. DDoS attac... 详细信息
来源: 评论
Beyond Self-Promotion: How software engineering Research Is Discussed on LinkedIn  46
Beyond Self-Promotion: How Software Engineering Research Is ...
收藏 引用
46th ACM/IEEE international conference on software engineering: software engineering in Society
作者: Wyrich, Marvin Bogner, Justus Saarland Univ Saarbrucken Germany Vrije Univ Amsterdam Amsterdam Netherlands
LinkedIn is the largest professional network in the world. As such, it can serve to build bridges between practitioners, whose daily work is software engineering (SE), and researchers, who work to advance the field of... 详细信息
来源: 评论
An Empirical Study of the Content and Quality of Sprint Retrospectives in Undergraduate Team software Projects  46
An Empirical Study of the Content and Quality of Sprint Retr...
收藏 引用
ACM/IEEE 44th international conference on software engineering: software engineering Education and Training (ICSE-SEET)
作者: Hundhausen, Christopher Conrad, Phillip Tariq, Ahsun Pugal, Surya Flores, Bryan Zamora Oregon State Univ Corvallis OR 97331 USA UC Santa Barbara Santa Barbara CA USA
The retrospective, or retro, is a fundamental component of the Agile process, widely used in both software engineering courses and industry. In a retro, teams conic together at the end of a sprint to reflect on their ... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata  4
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
4th international Informatics and software engineering conference, IISEC 2023
作者: Majid, Rasty Shakhawan Varol, Cihan Varol, Asaf Nasab, Ahad Firat University Department of Software Engineering Erbil Iraq Sam Houston State University Computer Science Department HuntsvilleTX United States College of Engineering and Computer Science Dept. of Engineering Management and Technology ChattanoogaTN United States
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ... 详细信息
来源: 评论
SBOM Challenges for Developers: From Analysis of Stack Overflow Questions  22
SBOM Challenges for Developers: From Analysis of Stack Overf...
收藏 引用
22nd IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2024
作者: Otoda, Wataru Kanda, Tetsuya Manabe, Yuki Inoue, Katsuro Higo, Yoshiki Osaka University Japan Notre Dame Seishin University Japan The University of Fukuchiyama Japan Nanzan University Japan
Current software development takes advantage of many external libraries, but it entails security and copyright risks. While the use of the software Bill of Materials (SBOM) has been encouraged to cope with this proble... 详细信息
来源: 评论
FaultFuzz: A Coverage Guided Fault Injection Tool for Distributed Systems  24
FaultFuzz: A Coverage Guided Fault Injection Tool for Distri...
收藏 引用
46th international conference on software engineering: Companion, ICSE-Companion 2024
作者: Feng, Wenhan Pei, Qiugen Gao, Yu Wang, Dong Dou, Wensheng Wei, Jun Liang, Zheheng Long, Zhenyue State Key Lab of Computer Science at ISCAS China University of CAS Beijing China Nanjing Institute of Software Technology China University of CAS Nanjing China Joint Laboratory on Cyberspace Security China Southern Power Grid GuangDong Power Grid China
Distributed systems are expected to correctly recover from various faults, e.g., node crash / reboot and network disconnection / reconnection. However, faults that occur under special timing can trigger fault recovery... 详细信息
来源: 评论