咨询与建议

限定检索结果

文献类型

  • 2,250 篇 会议
  • 926 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,457 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 351 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 175 篇 生物工程
    • 152 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 126 篇 机械工程
    • 124 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 86 篇 安全科学与工程
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 71 篇 化学工程与技术
    • 70 篇 土木工程
    • 66 篇 仪器科学与技术
  • 823 篇 理学
    • 435 篇 数学
    • 200 篇 生物学
    • 156 篇 物理学
    • 149 篇 系统科学
    • 130 篇 统计学(可授理学、...
    • 73 篇 化学
  • 551 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 141 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 89 篇 法学
    • 65 篇 社会学
  • 66 篇 教育学
    • 66 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 144 篇 computer science
  • 85 篇 computational mo...
  • 84 篇 application soft...
  • 76 篇 deep learning
  • 76 篇 wireless sensor ...
  • 73 篇 accuracy
  • 72 篇 artificial intel...
  • 71 篇 software systems
  • 71 篇 software
  • 70 篇 laboratories
  • 68 篇 machine learning
  • 64 篇 training
  • 63 篇 computer archite...
  • 61 篇 quality of servi...
  • 52 篇 security
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 makoto ikeda
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 3,086 篇 英文
  • 131 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3235 条 记 录,以下是621-630 订阅
排序:
Success Factors of Requirement Elicitation in the Field of software engineering
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Buddhima Attanayaka Dasuni Nawinna Kalpani Manathunga Pradeep K.W. Abeygunawardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
A Secure and Reliable Supply chain management approach integrated with IoT and Blockchain
A Secure and Reliable Supply chain management approach integ...
收藏 引用
Business Analytics for Technology and Security (ICBATS), International Conference on
作者: Humaira Ashraf Maria Hanif Uswa Ihsan Fatima Al-Quayed Mamoona Humayun NZ Jhanjhi Department of Computer Science and Software Engineering International Islamic University Islamabad Islamabad Pakistan Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia School of Computer Science and Engineering (SCE) Taylor’s University Malaysia
Nowadays, secure and reliable management of logistics is highly needed. Logistics is the delivery of goods from producers to legitimate consumers in accurate amounts and good conditions. The use of low-capable sensor ... 详细信息
来源: 评论
Web Application to predict Skin Disease: An Approach Using Deep Learning Algorithm
Web Application to predict Skin Disease: An Approach Using D...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Eelanila Thayalan Ayingaran Arumugavel Sharujan Ganeshan Makenthiran Dalaxshan Harinda Fernando Kaushalya Rajapakse Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The Disease Prediction System revolutionizes healthcare with advanced machine learning techniques for early detection of skin diseases, notably focusing on skin cancer. Through image processing and Transfer Learning, ... 详细信息
来源: 评论
Minimizing Occlusion Effect on Multi-View Camera Perception in BEV with Multi-Sensor Fusion
arXiv
收藏 引用
arXiv 2025年
作者: Kumar, Sanjay Truong, Hiep Sharma, Sushil Sistu, Ganesh Scanlan, Tony Grua, Eoin Eising, Ciarán Department of Electronic and Computer Engineering University of Limerick Ireland Research Centre University of Limerick Ireland Lero The Irish Software Research Centre University of Limerick Ireland DSW Valeo Kronach Germany Valeo Vision Systems Ireland
Autonomous driving technology is rapidly evolving, offering the potential for safer and more efficient transportation. However, the performance of these systems can be significantly compromised by the occlusion on sen... 详细信息
来源: 评论
An Automated Solution for Securing Confidential Documents in a BYOD Environment  3
An Automated Solution for Securing Confidential Documents in...
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Abisheka, P. A. C Azra, M. A. F Poobalan, A. V Wijekoon, Janaka Yapa, Kavinga Murthaja, Mifraz Sri Lanka Institute of Information Technology Department of Computer Systems and Engineering Sri Lanka WSO2 Senior Software Engineer Colombo Sri Lanka
BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many a... 详细信息
来源: 评论
Reinforcement Learning for Blind Stair Climbing with Legged and Wheeled-Legged Robots
arXiv
收藏 引用
arXiv 2024年
作者: Chamorro, Simon Klemm, Victor de la Iglesia Valls, Miguel Pal, Christopher Siegwart, Roland Department of Computer and Software Engineering École Polytechnique de Montréal 2900 Boul. Édouard-Montpetit QC Canada Autonomous Systems Lab ETH Zurich Switzerland Robotic Systems Lab ETH Zurich Switzerland Ascento Robotics Zurich Switzerland
In recent years, legged and wheeled-legged robots have gained prominence for tasks in environments predominantly created for humans across various domains. One significant challenge faced by many of these robots is th... 详细信息
来源: 评论
Stop-and-go wave super-resolution reconstruction via iterative refinement
arXiv
收藏 引用
arXiv 2024年
作者: Ji, Junyi Richardson, Alex Gloudemans, Derek Zachár, Gergely Nice, Matthew Barbour, William Sprinkle, Jonathan Piccoli, Benedetto Work, Daniel B. Department of Civil and Environmental Engineering Vanderbilt University United States Institute for Software Integrated Systems Vanderbilt University United States Department of Computer Science Vanderbilt University United States Department of Mathematical Sciences Rutgers University Camden United States
Stop-and-go waves are a fundamental phenomenon in freeway traffic flow, contributing to inefficiencies, crashes, and emissions. Recent advancements in high-fidelity sensor technologies have improved the ability to cap... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
Recent Advances in Science and engineering Technology (ICRASET), International Conference on
作者: P.S. Ramesh I. Sudha J. Jagannathan Rajkumar Pandiarajan A. Ponmalar Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Tamilnadu India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences SIMATS University Chennai Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Katpadi Vellore India Department of Information and Technology School of Computing Kalasalingam Academy Of Research and Education Krishnankoil Virudhunagar India R.M.K. Engineering College Chennai Tamilnadu India
With a steady increase in the adoption of cloud storage systems, the client’s data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the features o... 详细信息
来源: 评论
Text information source modeling for learning monitoring system  3
Text information source modeling for learning monitoring sys...
收藏 引用
3rd IEEE International Conference on Advanced Trends in Information Theory, ATIT 2021
作者: Pliushch, Oleksandr Mykolaichuk, Roman Mykolaichuk, Vira Makhovych, Oleksandr Mykolaichuk, Alisa Kravchenko, Olga Department of Network and internet Technologies Taras Shevchenko National University of Kyiv Kyiv Ukraine Department of Software Engineering of Automated Systems State University of Telecommunications Kyiv Ukraine Department of Foreign Languages National Transport University Kyiv Ukraine
The development of telecommunication technologies opens new opportunities for the use of distance learning methods in the educational process. There is a discrepancy between the need to increase the volume of textual ... 详细信息
来源: 评论
F2NAS: Flexible Federated Neural Architecture Search in Green Edge Computing
F2NAS: Flexible Federated Neural Architecture Search in Gree...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zebo Zhao Chao Qiu Yunfeng Zhao Xiaofei Wang Haipeng Yao Xiuhua Li F. Richard Yu College of Intelligence and Computing Tianjin University Tianjin China Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China School of Big Data & Software Engineering Chongqing University Chongqing China Department of Systems and Computer Engineering Carleton University Ottawa Canada
The rapid growth of edge computing calls for fine-tuned deep neural network (DNN) deployment that emphasizes energy-efficient implementation, due to the resource constraints of edge devices. Traditional Federated Lear... 详细信息
来源: 评论