咨询与建议

限定检索结果

文献类型

  • 2,250 篇 会议
  • 926 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,457 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 351 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 175 篇 生物工程
    • 152 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 126 篇 机械工程
    • 124 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 86 篇 安全科学与工程
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 71 篇 化学工程与技术
    • 70 篇 土木工程
    • 66 篇 仪器科学与技术
  • 823 篇 理学
    • 435 篇 数学
    • 200 篇 生物学
    • 156 篇 物理学
    • 149 篇 系统科学
    • 130 篇 统计学(可授理学、...
    • 73 篇 化学
  • 551 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 141 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 89 篇 法学
    • 65 篇 社会学
  • 66 篇 教育学
    • 66 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 144 篇 computer science
  • 85 篇 computational mo...
  • 84 篇 application soft...
  • 76 篇 deep learning
  • 76 篇 wireless sensor ...
  • 73 篇 accuracy
  • 72 篇 artificial intel...
  • 71 篇 software systems
  • 71 篇 software
  • 70 篇 laboratories
  • 68 篇 machine learning
  • 64 篇 training
  • 63 篇 computer archite...
  • 61 篇 quality of servi...
  • 52 篇 security
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 makoto ikeda
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 3,086 篇 英文
  • 131 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3235 条 记 录,以下是451-460 订阅
排序:
Optimal Quad Channel Long Short-Term Memory Based Fake News Classification on English Corpus
收藏 引用
computer systems Science & engineering 2023年 第9期46卷 3303-3319页
作者: Manar Ahmed Hamza Hala J.Alshahrani Khaled Tarmissi Ayman Yafoz Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
The term‘corpus’refers to a huge volume of structured datasets containing machine-readable *** texts are generated in a natural communicative *** explosion of social media permitted individuals to spread data with m... 详细信息
来源: 评论
A Two-Stage Cooperative Reinforcement Learning Scheme for Energy-Aware Computational Offloading
A Two-Stage Cooperative Reinforcement Learning Scheme for En...
收藏 引用
IEEE Workshop on High Performance Switching and Routing
作者: Marios Avgeris Meriem Mechennef Aris Leivadeas Ioannis Lambadaris Department of Systems and Computer Engineering Carleton University Ottawa Canada Department of Software and IT Engineering École de Technologie supérieure (ÉTS) Montréal Canada
In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mo...
来源: 评论
Security-Oriented Network Intent Placement using Particle Swarm Optimization
Security-Oriented Network Intent Placement using Particle Sw...
收藏 引用
Cyber Security in Networking Conference (CSNet)
作者: Gabriel Landeau Marios Avgeris Aris Leivadeas Ioannis Lambadaris Department of Software and IT Engineering École de technologie supérieure (ÉTS) Montréal Canada Department of Systems and Computer Engineering Carleton University Ottawa Canada
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio...
来源: 评论
Towards Modeling Functional Requirements From Tacit Knowledge
Towards Modeling Functional Requirements From Tacit Knowledg...
收藏 引用
computer Science, computer engineering, & Applied Computing (CSCE), Congress in
作者: Rameen Jafar Maram Fahaad Almufareh Sundas Ashraf Bushra Khan Wasi Haider Butt Mamoona Humayun Department of Computer and Software Engineering National University of Sciences and Technology Pakistan Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
来源: 评论
Application of Two Forms of the Erlang Distribution Law in Queueing Theory  8
Application of Two Forms of the Erlang Distribution Law in Q...
收藏 引用
8th IEEE International Conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021
作者: Bakhareva, Nadezhda Tarasov, Veniamin Povolzhskiy State University of Telecommunications And Informatics Department of Informatics And Computer Engineering Software And Management In Technical Systems Department Samara Russia
The purpose of this work is to compare two forms of the Erlang distribution law: ordinary and normalized. The ordinary Erlang distribution is a special case of a more general gamma distribution and its mathematical ex... 详细信息
来源: 评论
An Exact Formula for the Hazardous Event Frequency
An Exact Formula for the Hazardous Event Frequency
收藏 引用
Annual Symposium on Reliability and Maintainability (RAMS)
作者: Armin Zimmermann Andreas Hildebrandt Department of Computer Science and Automation Systems and Software Engineering Group Technische Universität Ilmenau Ilmenau Germany Pepperl+Fuchs SE Mannheim Germany
The remaining risk of safety-instrumented systems is an important non-functional requirement that is regulated by international standards. Several ways towards computing the safety as a function of its relevant design...
来源: 评论
Super-Resolution Based ROI Enhancement Approaches for Palmprint Recognition
Super-Resolution Based ROI Enhancement Approaches for Palmpr...
收藏 引用
International Artificial Intelligence and Data Processing Symposium (IDAP)
作者: Hüseyin Furkan Macan Özkan Bіngöl Salih Türk Murat Ekіncі Department of Management Information Systems Gumushane University Gümüşhane Turkey Department of Software Engineering Gumushane University Gümüşhane Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
The sizes of regions of interest (ROI) obtained from images captured by cameras in palmprint recognition may vary depending on the camera specifications and the position of the hand. The regions of interest that recog... 详细信息
来源: 评论
Simulation-Based Study on False Alarms in Intrusion Detection systems for Organizations Facing Dual Phishing and Dos Attacks
Simulation-Based Study on False Alarms in Intrusion Detectio...
收藏 引用
Annual Modeling and Simulation Conference (ANNSIM)
作者: Jeongkeun Shin L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA United States Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA United States
Machine learning-based intrusion detection systems (IDS) have attracted considerable attention for their role in proactively identifying intrusion attempts and facilitating swift organizational response. While numerou... 详细信息
来源: 评论
Automated Classification of Medical Images Using Convolutional Neural Networks  15
Automated Classification of Medical Images Using Convolution...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Pillai, N. Muthuvairavan Manimala, S. Rongali, Aruna Sri Gugnani, Anchit Kumar, Senthil A. Sriramakrishnan, G.V. Computer Science and Business Systems R.M.D Engineering College Thiruvallur district Kavarapettai India Computer science and engineering University SJCE JSS Science and technology University Karnataka Mysore India Sr. Software Engineer Department Information Technology Emphasis/Information Technology Ph.D University The country University of The Cumberlands United States Physiotherapy Amity University Rajasthan Jaipur India Artificial Intelligent department Shri Vishnu Engineering College for Women AP Bhimavaram India Tamilnadu Chennai India
Medical imagery has been increasingly used in diagnosing and treating various diseases, leading to advances in healthcare. While humans usually lead the qualitative interpretation of visual features, Automated Classif... 详细信息
来源: 评论
Image Classification Analysis to Identify the Tourism Potential Sukabumi on Instagram Using A Deep Learning Approach
Image Classification Analysis to Identify the Tourism Potent...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Falentino Sembiring Rieska Rahayu Ayuningsih Muhamad Muslih Muhammad Andy Maulana Gina Wahdayani Futri Mohd Zainuri Saringat Rachma Siva Ainunnisa Anggun Fergina Information Systems Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan... 详细信息
来源: 评论