咨询与建议

限定检索结果

文献类型

  • 2,241 篇 会议
  • 925 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,225 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,870 篇 工学
    • 1,451 篇 计算机科学与技术...
    • 1,198 篇 软件工程
    • 350 篇 信息与通信工程
    • 313 篇 控制科学与工程
    • 172 篇 生物工程
    • 151 篇 电气工程
    • 129 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 86 篇 安全科学与工程
    • 76 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 71 篇 化学工程与技术
    • 68 篇 土木工程
    • 66 篇 仪器科学与技术
  • 819 篇 理学
    • 434 篇 数学
    • 198 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 129 篇 统计学(可授理学、...
    • 73 篇 化学
  • 551 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 139 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
  • 89 篇 法学
    • 64 篇 社会学
  • 68 篇 教育学
    • 67 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 144 篇 computer science
  • 84 篇 application soft...
  • 84 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 74 篇 deep learning
  • 72 篇 artificial intel...
  • 71 篇 software systems
  • 70 篇 laboratories
  • 69 篇 software
  • 69 篇 accuracy
  • 68 篇 machine learning
  • 64 篇 training
  • 62 篇 computer archite...
  • 61 篇 quality of servi...
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 50 篇 security
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 college of compu...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 song houbing
  • 16 篇 makoto ikeda
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 3,114 篇 英文
  • 93 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3225 条 记 录,以下是271-280 订阅
排序:
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
Computing, Sciences and Communications (ICCSC), International Conference on
作者: Abeer Mathur Abhinav Sudhakar Dubey Pranav Singh Mahara Usha Devi Gandhi Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Information Technology School of Computer Science Engineering & Information Systems Vellore Institute of Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Deep Learning-Based Anomaly Detection in 5G Cellular Networks
Deep Learning-Based Anomaly Detection in 5G Cellular Network...
收藏 引用
International Conference on Information, Intelligence, systems and Applications (IISA)
作者: Umar Farooq Aroosa Hameed Aris Leivadeas Ioannis Lambadaris Department of Software and IT Engineering École de technologie supérieure Montreal Canada Department of Systems and Computer Engineering Carleton University Ottawa Canada
The telecommunication industry saw a dramatic shift with the introduction of 5G technologies. This new cellular generation brought lightening speed, massive capacity, and better connectivity. Despite the many introduc... 详细信息
来源: 评论
Crop protection and disease detection using artificial intelligence and computer vision: a comprehensive review
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3723-3743页
作者: Shah, Kanish Sushra, Rajat Shah, Manan Shah, Dhairya Shah, Haard Raval, Megh Prajapati, Mitul Software Engineer Walmart SunnyvaleCA United States Atmiya Vidya Mandir Gujarat Surat India Department of Chemical Engineering School of Energy Technology Pandit Deendayal Energy University Gujarat Gandhinagar India Robotics ECE Concentration Northeastern University BostonMA United States Department of Computer Science Concentration in AI Hofstra University HempsteadNY United States Department of Chemical Engineering S. S Agrawal Institute of Engineering & Technology Gujarat Navsari India R &D Engineer Span Inspection Systems Pvt. Ltd Gujarat Gandhinagar India
The technological advancements in the field of agriculture have increased to a great extent in recent years, and many techniques have evolved from other techniques. Some methods are improved or upgraded from the previ... 详细信息
来源: 评论
Online VNF Placement using Deep Reinforcement Learning and Reward Constrained Policy Optimization
Online VNF Placement using Deep Reinforcement Learning and R...
收藏 引用
Communications and Networking (MeditCom), IEEE International Mediterranean Conference on
作者: Ramy Mohamed Marios Avgeris Aris Leivadeas Ioannis Lambadaris Department of Systems and Computer Engineering Carleton University Ottawa Canada Department of Software and IT Engineering École de technologie supérieure Montreal Canada
Appropriate deployment of Virtual Network Functions (VNFs) within the network infrastructure to optimize resource utilization, while fulfilling performance criteria, is critical to Network Function Virtualization (NFV... 详细信息
来源: 评论
Determining the Critical Factors of Antenatal Care Follow-Up Using Two-Phase Machine Learning
Determining the Critical Factors of Antenatal Care Follow-Up...
收藏 引用
International Conference on Soft Computing and Measurements (SCM)
作者: Igor A. Bessmertny Bidru C. Enkomaryam Adane L. Mamuye Faculty of Software Engineering and Computer Systems ITMO University Saint Petersburg Russia Department of Computer Science University of Gondar Gondar Ethiopia
Determining the critical factors affecting antenatal visits will greatly contribute to reducing maternal and infant mortality. This study, thus attempted to construct a cluster-based predictive model to determine the ... 详细信息
来源: 评论
Human Tracking and Profiling for Risk Management  21
Human Tracking and Profiling for Risk Management
收藏 引用
21st International Conference on Advances in ICT for Emerging Regions, ICter 2021
作者: Ranjith, Vishaka Jayasekara, Anuj Ratnasooriya, Lahiru Jayasekara, Thilini Rupasinghe, Prabath Liyanapathirana, Chethana Department of Computer Science and Software Engineering Malabe Sri Lanka Department of Computer Systems Engineering Malabe Sri Lanka
Infectious viruses are conveyed via respiratory droplets produced by an infected person when they speak, sneeze, or cough. So, to combat virus transmission, the World Health Organization (WHO) has imposed severe regul... 详细信息
来源: 评论
Chest Radiographs Based Pneumothorax Detection Using Federated Learning
收藏 引用
computer systems Science & engineering 2023年 第11期47卷 1775-1791页
作者: Ahmad Almadhor Arfat Ahmad Khan Chitapong Wechtaisong Iqra Yousaf Natalia Kryvinska Usman Tariq Haithem Ben Chikha Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand School of Telecommunication Engineering Suranaree University of TechnologyNakhon Ratchasima30000Thailand Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Prince Sattam bin Abdulaziz University AlKharjSaudi Arabia
Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse,causing air to enter the pleural cavity,the area close to the lungs and chest *** most persistent disease,as well as one that necessitat... 详细信息
来源: 评论
Fast Resource Allocation for Virtual Network Functions Chain Placement
Fast Resource Allocation for Virtual Network Functions Chain...
收藏 引用
2022 International Telecommunications Conference, ITC-Egypt 2022
作者: Mohamed, Ramy Leivadeas, Aris Lambadaris, Ioannis Moris, Todd Djukic, Petar Carleton University Department of Systems and Computer Engineering OttawaON Canada École de technologie supérieure Department of Software and IT Engineering MontrealQC Canada Ciena Corporation OttawaON Canada
Network slicing enables the creation and management of a network that meets and surpasses the evolving requirements of a diverse set of new services. Within 5G network slicing, we can describe a network service as a S... 详细信息
来源: 评论
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3881-3898页
作者: Asma Sajjad Humaira Ashraf NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan School of Computer Science SCSTaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubangJaya47500SelangorMalaysia Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
The most valuable resource on the planet is no longer oil,but *** transmission of this data securely over the internet is another challenge that comes with its ever-increasing *** order to transmit sensitive informati... 详细信息
来源: 评论
Keeping Behavioral Programs Alive: Specifying and Executing Liveness Requirements
arXiv
收藏 引用
arXiv 2024年
作者: Yaacov, Tom Elyasaf, Achiya Weiss, Gera Computer Science Department Ben-Gurion University of the Negev Software and Information Systems Engineering Department Ben-Gurion University of the Negev
One of the benefits of using executable specifications such as Behavioral Programming (BP) is the ability to align the system implementation with its requirements. This is facilitated in BP by a protocol that allows i... 详细信息
来源: 评论