咨询与建议

限定检索结果

文献类型

  • 86,110 篇 会议
  • 2,734 册 图书
  • 1,724 篇 期刊文献
  • 4 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 90,568 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 46,753 篇 工学
    • 38,434 篇 计算机科学与技术...
    • 31,983 篇 软件工程
    • 6,382 篇 控制科学与工程
    • 6,314 篇 信息与通信工程
    • 5,566 篇 电气工程
    • 3,216 篇 机械工程
    • 2,952 篇 电子科学与技术(可...
    • 2,059 篇 生物工程
    • 1,599 篇 生物医学工程(可授...
    • 1,487 篇 安全科学与工程
    • 1,407 篇 动力工程及工程热...
    • 1,374 篇 仪器科学与技术
    • 1,274 篇 建筑学
    • 1,206 篇 土木工程
    • 1,147 篇 材料科学与工程(可...
    • 1,038 篇 光学工程
    • 1,029 篇 交通运输工程
  • 13,168 篇 理学
    • 7,357 篇 数学
    • 2,661 篇 物理学
    • 2,363 篇 系统科学
    • 2,245 篇 生物学
    • 1,766 篇 统计学(可授理学、...
  • 11,155 篇 管理学
    • 7,853 篇 管理科学与工程(可...
    • 4,113 篇 工商管理
    • 4,080 篇 图书情报与档案管...
  • 2,147 篇 教育学
    • 2,121 篇 教育学
  • 1,383 篇 医学
    • 1,181 篇 临床医学
    • 1,036 篇 基础医学(可授医学...
  • 1,378 篇 法学
    • 1,077 篇 社会学
  • 1,313 篇 经济学
    • 1,304 篇 应用经济学
  • 382 篇 农学
  • 257 篇 文学
  • 194 篇 军事学
  • 62 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 8,329 篇 application soft...
  • 7,112 篇 software enginee...
  • 5,921 篇 computer archite...
  • 5,291 篇 software
  • 5,225 篇 computer science
  • 4,425 篇 software systems
  • 4,162 篇 hardware
  • 3,535 篇 computer aided s...
  • 3,262 篇 control systems
  • 2,660 篇 computational mo...
  • 2,223 篇 costs
  • 2,093 篇 programming
  • 1,811 篇 artificial intel...
  • 1,745 篇 computer softwar...
  • 1,740 篇 real time system...
  • 1,619 篇 testing
  • 1,508 篇 real-time system...
  • 1,419 篇 software design
  • 1,371 篇 protocols
  • 1,350 篇 information syst...

机构

  • 197 篇 college of compu...
  • 114 篇 school of comput...
  • 59 篇 school of comput...
  • 56 篇 college of compu...
  • 54 篇 school of comput...
  • 49 篇 department of co...
  • 40 篇 college of compu...
  • 37 篇 department of el...
  • 37 篇 school of comput...
  • 36 篇 school of electr...
  • 36 篇 department of el...
  • 34 篇 institute of inf...
  • 33 篇 state key labora...
  • 32 篇 school of comput...
  • 32 篇 department of el...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 29 篇 department of co...
  • 28 篇 school of comput...
  • 27 篇 department of co...

作者

  • 49 篇 anon
  • 37 篇 bernady o. apduh...
  • 36 篇 bosch jan
  • 34 篇 o'connor rory v.
  • 28 篇 shaoying liu
  • 28 篇 li yang
  • 26 篇 dubinsky yael
  • 26 篇 ebrahim babaei
  • 22 篇 zhu huibiao
  • 21 篇 lei wang
  • 21 篇 dong jin song
  • 20 篇 katz guy
  • 19 篇 zhang lei
  • 17 篇 levent yilmaz
  • 17 篇 rui wang
  • 17 篇 wenyun zhao
  • 17 篇 shahar maoz
  • 17 篇 vardi moshe y.
  • 16 篇 weiming shen
  • 16 篇 noraziah a.

语言

  • 89,084 篇 英文
  • 1,017 篇 其他
  • 437 篇 中文
  • 32 篇 西班牙文
  • 18 篇 葡萄牙文
  • 15 篇 德文
  • 14 篇 土耳其文
  • 13 篇 俄文
  • 9 篇 法文
  • 4 篇 捷克文
  • 4 篇 日文
  • 2 篇 乌克兰文
  • 1 篇 朝鲜文
检索条件"任意字段=Israel Conference on Computer Systems and Software Engineering"
90574 条 记 录,以下是4811-4820 订阅
排序:
Intelligent Expert systems Application for Structuring Educational Materials to Enhance the Quality of Learning Outcomes  13
Intelligent Expert Systems Application for Structuring Educa...
收藏 引用
13th IEEE International conference on Electronics and Information Technologies, ELIT 2023
作者: Ivanyshyn, Alla Zahorodniuk, Tetiana Maliarenko, Valentyna Sus, Bohdan Zagorodnyuk, Sergiy Bauzha, Oleksandr Boyko, Oksana Department of Information Measuring Technologies Lviv Polytechnic National University Lviv Ukraine Preparatory Department Taras Shevchenko National University of Kyiv Kyiv Ukraine Institute of Biology and Medicine Taras Shevchenko National University of Kyiv Kyiv Ukraine Institute of High Technologies Taras Shevchenko National University of Kyiv Kyiv Ukraine Faculty of Radio Physics Electronics and Computer Systems Taras Shevchenko National University of Kyiv Kyiv Ukraine Department of Medical Informatics Danylo Halytsky Lviv National Medical University Lviv Ukraine
Application of intelligent expert systems for structuring and automation of laboratory activities in the educational process has been analysed. It is shown that combination of teaching materials with cross-references ... 详细信息
来源: 评论
IoT Device Authentication via RAM Trace Analysis: A Representation Learning Framework
IoT Device Authentication via RAM Trace Analysis: A Represen...
收藏 引用
2024 IEEE Global Communications conference, GLOBECOM 2024
作者: Iqbal, Asif Aman, Muhammad Naveed Sikdar, Biplab National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore University of Nebraska-Lincoln School of Computing Nebraska United States
Recent advances in IoT, machine learning, and edge computing have driven transformative paradigms like smart cities, grids, healthcare, and transportation systems, providing efficient solutions. This has led to a perv... 详细信息
来源: 评论
Adaptive dynamic programming control algorithm and simulation software design  3
Adaptive dynamic programming control algorithm and simulatio...
收藏 引用
2022 3rd International conference on computer Information and Big Data Applications, CIBDA 2022
作者: Ma, Runmin Xia, Xiaonan School of Computer Sciences and Engineering Northeastern University Shenyang110169 China Department of Automation College of Information Engineering Yangzhou University Yangzhou225127 China
In this paper, an event-triggered adaptive dynamic programming tracking control scheme is investigated for a class of nonlinear systems with unmodeled dynamics based on dynamic surface control method. Due to consideri... 详细信息
来源: 评论
Detect and Mitigate Cyberattacks Using SIEM  16
Detect and Mitigate Cyberattacks Using SIEM
收藏 引用
16th International conference on Developments in esystems engineering, DeSE 2023
作者: Younus, Zeyad Safaa Alanezi, Mafaz Univ. of Mosul College of Computer Science and Mathematics Dept. of Software Mosul Iraq Univ. of Mosul College of Computer Science and Mathematics Dept. of Computer Science Mosul Iraq Univ. of Mosul Ict Research Unit Computer Center Mosul Iraq
Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like denial of service (DOS) and file modification. Security tools like intrusion detection and prevention systems (IDS and IPS... 详细信息
来源: 评论
Performance Comparison of Different Digital Image Filters Used for Biomedical Signals  8th
Performance Comparison of Different Digital Image Filters U...
收藏 引用
8th International conference on Internet of Things and Connected Technologies, ICIoTCT 2023
作者: Sudagani Jyothi Muthu Krishnammal, P. School of Electronics Engineering VIT—AP University Andhra Pradesh Amaravati India School of Electronics Engineering VIT—AP University Andhra Pradesh Amaravati India
Getting highly accurate output in biomedical data processing concerning biomedical signals and images is impossible because biomedical data are generated from various electronic and electrical resources that can deliv... 详细信息
来源: 评论
Multi-Population Genetic Algorithm Based EFSM Regression Test Data Generation  23
Multi-Population Genetic Algorithm Based EFSM Regression Tes...
收藏 引用
23rd IEEE International conference on software Quality, Reliability, and Security Companion, QRS-C 2023
作者: Li, Jiahao Zhang, Bo Fan, Zeyu Wang, Yichen School of Reliability and Systems Engineering Beihang University Beijing China Tianjin University Computer Science and Technology Division of Intelligence and Computing China
Extended Finite State Machine(EFSM) has a wide range of application systems and protocols in control modeling. Genetic algorithms are commonly used in EFSM test data generation due to their good performance. Studies h... 详细信息
来源: 评论
Malware Analysis Types & Techniques : A Survey  5
Malware Analysis Types & Techniques : A Survey
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Arora, Priya Gupta, Rashmi Malik, Nidhi Kumar, Anil Amity University Haryana Gurugram India The North Cap University Haryana Gurugram India Poornima Institute of Engineering and Technology Rajasthan Jaipur India
Malware is like a digital troublemaker. It's a type of software that sneaks into computers and gadgets with harmful objectives. It can cause problems by stealing in- formation, damaging files, or making devices ac... 详细信息
来源: 评论
Method of Signal Detection for NOMA systems Based on Convolutional Neural Network
Method of Signal Detection for NOMA Systems Based on Convolu...
收藏 引用
International conference on Artificial Intelligence and Autonomous Transportation, AIAT 2024
作者: Zhao, Tong Zhao, Shipeng School of Computer and Software Dalian Neusoft University of Information Liaoning Dalian116026 China School of Information Science and Technology Dalian Maritime University Liaoning Dalian116026 China
The employment of non-orthogonal multiple access (NOMA) technology represents an innovative approach in enhancing spectrum efficiency and bolstering user access capabilities, which acts as a pivotal technology within ... 详细信息
来源: 评论
An Intelligent-Safe Network Traffic Distribution System in Cluster Mesh-Formations of Thermal-Technology Complexes  1
收藏 引用
2nd International conference on Information Technologies and Intelligent Decision Making systems, ITIDMS 2022
作者: Lazarev, Alexey Vereykina, Elizabeth Sinyavskiy, Viktor National Research University "Moscow Power Engineering Institute" in Smolensk 1 Energy Passage Smolensk214013 Russia National Research University "Moscow Power Engineering Institute" 14 Krasnokazarmennaya Moscow111250 Russia
Nowadays, means of communication development exchange affects the vast majority of industries in the world, in particular, data exchange in thermal technology systems. The rapid development of communications makes it ... 详细信息
来源: 评论
Granular Network Traffic Classification on Mobile Application Service for Better Parental Control  2
Granular Network Traffic Classification on Mobile Applicatio...
收藏 引用
2nd IEEE International conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Dhivvya, J.P. Aswini Dath, Guru Chinta, Mahesh Kumar Karki, Ankit Amrita Vishwa Vidyapeetham Amrita School of Computing Center for Wireless Networks and Applications Department of Computer Science and Engineering Kollam Amritapuri India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Kollam Amritapuri India
The widespread use of mobile applications among children had its limitations in excessive screen usage in entertainment. Traditional parental control techniques mostly depend on blocking applications based on their na... 详细信息
来源: 评论