咨询与建议

限定检索结果

文献类型

  • 86,124 篇 会议
  • 2,723 册 图书
  • 1,726 篇 期刊文献
  • 4 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 90,573 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 46,771 篇 工学
    • 38,459 篇 计算机科学与技术...
    • 31,975 篇 软件工程
    • 6,391 篇 控制科学与工程
    • 6,351 篇 信息与通信工程
    • 5,584 篇 电气工程
    • 3,219 篇 机械工程
    • 2,960 篇 电子科学与技术(可...
    • 2,058 篇 生物工程
    • 1,600 篇 生物医学工程(可授...
    • 1,488 篇 安全科学与工程
    • 1,408 篇 动力工程及工程热...
    • 1,374 篇 仪器科学与技术
    • 1,271 篇 建筑学
    • 1,203 篇 土木工程
    • 1,161 篇 材料科学与工程(可...
    • 1,037 篇 光学工程
    • 1,031 篇 交通运输工程
  • 13,183 篇 理学
    • 7,373 篇 数学
    • 2,662 篇 物理学
    • 2,365 篇 系统科学
    • 2,244 篇 生物学
    • 1,768 篇 统计学(可授理学、...
  • 11,156 篇 管理学
    • 7,852 篇 管理科学与工程(可...
    • 4,112 篇 工商管理
    • 4,085 篇 图书情报与档案管...
  • 2,145 篇 教育学
    • 2,119 篇 教育学
  • 1,384 篇 医学
    • 1,180 篇 临床医学
    • 1,034 篇 基础医学(可授医学...
  • 1,377 篇 法学
    • 1,076 篇 社会学
  • 1,312 篇 经济学
    • 1,303 篇 应用经济学
  • 382 篇 农学
  • 257 篇 文学
  • 194 篇 军事学
  • 62 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 8,329 篇 application soft...
  • 7,111 篇 software enginee...
  • 5,921 篇 computer archite...
  • 5,292 篇 software
  • 5,225 篇 computer science
  • 4,425 篇 software systems
  • 4,162 篇 hardware
  • 3,534 篇 computer aided s...
  • 3,262 篇 control systems
  • 2,660 篇 computational mo...
  • 2,223 篇 costs
  • 2,093 篇 programming
  • 1,809 篇 artificial intel...
  • 1,744 篇 computer softwar...
  • 1,740 篇 real time system...
  • 1,619 篇 testing
  • 1,508 篇 real-time system...
  • 1,418 篇 software design
  • 1,371 篇 protocols
  • 1,350 篇 information syst...

机构

  • 197 篇 college of compu...
  • 114 篇 school of comput...
  • 59 篇 school of comput...
  • 56 篇 college of compu...
  • 54 篇 school of comput...
  • 49 篇 department of co...
  • 40 篇 college of compu...
  • 37 篇 department of el...
  • 37 篇 school of comput...
  • 36 篇 school of electr...
  • 36 篇 department of el...
  • 34 篇 institute of inf...
  • 33 篇 state key labora...
  • 32 篇 school of comput...
  • 32 篇 department of el...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 29 篇 department of co...
  • 28 篇 school of comput...
  • 27 篇 department of co...

作者

  • 49 篇 anon
  • 37 篇 bernady o. apduh...
  • 35 篇 bosch jan
  • 34 篇 o'connor rory v.
  • 28 篇 shaoying liu
  • 28 篇 li yang
  • 26 篇 dubinsky yael
  • 26 篇 ebrahim babaei
  • 22 篇 zhu huibiao
  • 21 篇 lei wang
  • 21 篇 dong jin song
  • 20 篇 katz guy
  • 19 篇 zhang lei
  • 17 篇 levent yilmaz
  • 17 篇 rui wang
  • 17 篇 wenyun zhao
  • 17 篇 shahar maoz
  • 17 篇 vardi moshe y.
  • 16 篇 weiming shen
  • 16 篇 noraziah a.

语言

  • 89,054 篇 英文
  • 1,053 篇 其他
  • 436 篇 中文
  • 32 篇 西班牙文
  • 18 篇 葡萄牙文
  • 15 篇 德文
  • 14 篇 土耳其文
  • 13 篇 俄文
  • 9 篇 法文
  • 4 篇 捷克文
  • 4 篇 日文
  • 2 篇 乌克兰文
  • 1 篇 朝鲜文
检索条件"任意字段=Israel Conference on Computer Systems and Software Engineering"
90579 条 记 录,以下是251-260 订阅
排序:
COCOWEARS: A framework for COntinuum COmputing WEARable systems  6
COCOWEARS: A framework for COntinuum COmputing WEARable Syst...
收藏 引用
6th International conference on Industry 4.0 and Smart Manufacturing, ISM 2024
作者: Aloi, Gianluca Frustaci, Fabio Gravina, Raffaele Guerrieri, Antonio Pio, Gianvito Savaglio, Claudio DIMES Dept. University of Calabria CS Rende87036 Italy ICAR-CNR CS Rende87036 Italy Dept. of Computer Science University of Bari Aldo Moro Via Orabona 4 BA Bari70125 Italy
The amount and diversity of data generated by the sensors available on current Wearable Computing systems (WCS) impose the adoption of advanced, efficient (and often customized) data analysis methods, including Machin... 详细信息
来源: 评论
Utilizing Ontologies for Combinatorial Testing  18
Utilizing Ontologies for Combinatorial Testing
收藏 引用
18th IEEE International conference on software Testing, Verification and Validation Workshops, ICSTW 2025
作者: Wotawa, Franz Graz University of Technology Institute of Software Engineering and Artificial Intelligence Graz Austria
Test case generation using combinatorial testing requires an input model comprising parameters and their ranges of possible values, i.e., their domains, which might be appropriate for ordinary applications but not for... 详细信息
来源: 评论
A Hybrid Deep Learning-based Person Re-identification Across Multi-Cameras  10
A Hybrid Deep Learning-based Person Re-identification Across...
收藏 引用
10th International conference on Digital Arts, Media and Technology and 8th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2025
作者: Aonon, Manaschai Charoenkwan, Phasit Singkhamfu, Phudinun Kaewkamol, Porntida Chiang Mai University Data Science Consortium Faculty of Engineering Chiang Mai Thailand Chiang Mai University Modern Management and Information Technology College of Arts Media and Technology Chiang Mai Thailand Chiang Mai University Software Engineering College of Arts Media and Technology Chiang Mai Thailand
Surveillance systems play an essential role in enhancing security and ensuring safety within society. Public spaces and critical areas are commonly monitored through multi-camera networks for tracking individuals in r... 详细信息
来源: 评论
A Comprehensive Experimentation Framework for Energy-Efficient Design of Cloud-Native Applications  22
A Comprehensive Experimentation Framework for Energy-Efficie...
收藏 引用
22nd IEEE International conference on software Architecture, ICSA 2025
作者: Werner, Sebastian Borges, Maria C. Wolf, Karl Tai, Stefan Technische Universität Berlin Information Systems Engineering Berlin Germany
Current approaches to designing energy-efficient applications typically rely on measuring individual components using readily available local metrics, like CPU utilization. However, these metrics fall short when appli... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
A High-Gain DC-DC Boost Converter for Solar Microgrid systems Using a Switching Inductor and a Capacitor  1
A High-Gain DC-DC Boost Converter for Solar Microgrid System...
收藏 引用
1st International conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Prasanth, S. Priyadarsini, S. Lakshmi, R. Sneha, G. Ajitha, S.S. Saravanakumar, R. Narendra, Konnaiah Gari Unnamalai Institute of Technology Department of Computer Science and Engineering Tamil Nadu Kovilpatti India PSR Engineering College Department of Computer Science and Engineering Tamil Nadu Sivakasi India Siddharth Institute of Engineering and Technology Department of Elecrical and Electroncis Engineering Puttur India St. Joseph's Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Iconix Software Solution Tamil Nadu Tirunelveli India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electonics and Communication Engineering Tamil Nadu Chennai India
This paper outlines the design and implementation of a solar microgrid-specific high-gain DC-DC booster converter that makes use of a variable inductor and capacitors. To improve the suitability of photovoltaic (PV) p... 详细信息
来源: 评论
Reachability for Nonsmooth systems with Lexicographic Jacobians  31th
Reachability for Nonsmooth Systems with Lexicographic Jacobi...
收藏 引用
31st International conference on Tools and Algorithms for the Construction and Analysis of systems, TACAS 2025, which was held as part of the International Joint conferences on Theory and Practice of software, ETAPS 2025
作者: Ji, Chenxi Zhang, Huan Mitra, Sayan Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign United States
Reachability analysis for dynamical systems typically relies on the system’s Jacobian to bound sensitivity of solutions. This method fails for nonsmooth dynamical systems as the Jacobian becomes undefined at the poin... 详细信息
来源: 评论
Detection and Localization of Malicious Nodes in Internet of Things Based on SDN  18th
Detection and Localization of Malicious Nodes in Internet of...
收藏 引用
18th International conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Jingxu, Xiao Chaowen, Chang Lu, Yuan Yingying, Ma Chenli, Yang Information Engineering University of the Army Strategic Support Force Henan Zhengzhou450004 China
In order to solve the security threat caused by malicious nodes in the Internet of Things transmission link to the data flow and transmission process, a software Defined Network (SDN) based detection and location meth... 详细信息
来源: 评论
Digital Dilemmas: Unpacking the realities of Industry 4.0 for SMEs  16
Digital Dilemmas: Unpacking the realities of Industry 4.0 fo...
收藏 引用
16th International conference on ENTERprise Information systems, CENTERIS 2024 - 12th International conference on Project MANagement, ProjMAN 2024 - 14th International conference on Health and Social Care Information systems and Technologies, HCist 2024
作者: Shinde, Sagar Sampaio, Suzana Cormican, Kathryn Enterprise Research Centre and LERO-The Irish Software Research Centre School of Engineering University of Galway H91 TK33 Ireland Federal Rural University of Pernambuco PE Recife Brazil
The transition to Industry 4.0 is complex and fraught with challenges. There is compelling evidence that demonstrates that Small to Medium Sized Enterprises (SMEs) are struggling to implement digital technologies and ... 详细信息
来源: 评论
Harnessing the Power of AI with Deep Learning: Innovations and Implications
Harnessing the Power of AI with Deep Learning: Innovations a...
收藏 引用
2025 IEEE International conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Upender, Talluri Sathiyamoorthy, C. Udayakumar, K. Kirubakaran, D. Purushothaman, V. Raja, Kiruba Thangam CMR College of Engineering and Technology Department of CSE Medchal Telangana Hyderabad India Department of Commerce Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of CSE Tamil Nadu Chennai India R.M.K. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Chennai Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India VIT University Department of Software and Systems Engineering Tamil Nadu Vellore India
The rapid advancements in artificial intelligence (AI) and deep learning have revolutionized various sectors, enabling unprecedented levels of innovation and efficiency. This paper delves into the transformative impac... 详细信息
来源: 评论