咨询与建议

限定检索结果

文献类型

  • 2,248 篇 会议
  • 923 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,875 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 351 篇 信息与通信工程
    • 314 篇 控制科学与工程
    • 175 篇 生物工程
    • 150 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 87 篇 安全科学与工程
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 71 篇 化学工程与技术
    • 70 篇 土木工程
    • 66 篇 仪器科学与技术
  • 821 篇 理学
    • 434 篇 数学
    • 200 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 130 篇 统计学(可授理学、...
    • 73 篇 化学
  • 550 篇 管理学
    • 390 篇 管理科学与工程(可...
    • 216 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 141 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 88 篇 法学
    • 65 篇 社会学
  • 66 篇 教育学
    • 66 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 144 篇 computer science
  • 84 篇 application soft...
  • 84 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 75 篇 deep learning
  • 73 篇 accuracy
  • 71 篇 software systems
  • 71 篇 software
  • 70 篇 laboratories
  • 69 篇 machine learning
  • 68 篇 artificial intel...
  • 64 篇 training
  • 63 篇 computer archite...
  • 61 篇 quality of servi...
  • 52 篇 security
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 24 篇 ismail leila
  • 24 篇 buyya rajkumar
  • 23 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 makoto ikeda
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned

语言

  • 3,080 篇 英文
  • 132 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3230 条 记 录,以下是751-760 订阅
排序:
Application of Artificial Intelligence in Rock Tunnel engineering: A Survey on Where and How
收藏 引用
Expert systems 2025年 第7期42卷
作者: Yu, Xiaojie He, Ben-Guo Xu, Xu Zhou, Yicong Diaz, Miguel A. Chen, Junxin Camacho, David School of Software Dalian University of Technology Dalian China Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern University Shenyang China School of Computer Science and Engineering Northeastern University Shenyang China Department of Computer and Information Science University of Macau China Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Rock tunnel engineering (RTE) plays a crucial role in modern infrastructure development. The development of artificial intelligence (AI) is able to drive transformative advances in RTE. This review provides an in-dept... 详细信息
来源: 评论
Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant Security Controls
Blockchain-Enhanced Framework for Secure Third-Party Vendor ...
收藏 引用
IEEE International Conference on Big Data
作者: Deepti Gupta Lavanya Elluri Avi Jain Shafika Showkat Moni Omer Aslan Dept. of Computer Information Systems Texas A&M University - Central Texas Texas USA College of Business University of Tampa Florida USA Dept. of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Florida USA Department of Software Engineering Bandırma Onyedi Eylül University Bandırma Turkey
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks... 详细信息
来源: 评论
Rain Predictive Model using Machine learning Techniques
Rain Predictive Model using Machine learning Techniques
收藏 引用
Multi-disciplinary Conference in Emerging Research Trends (IMCERT), International
作者: Muhammad Shahbaz Muneer Syed Muhammad Nabeel Mustafa Syeda Sundus Zehra Haniya Maqsood Dpertment of Computational Finance NED University of Engineering and Technology Karachi Pakistan Dept. of Computer Science & I.T NED University of Engineering and Technology Karachi Pakistan Dept. of Software Engineering Sir Syed Uuniversity of Engineering and Technology Karachi Pakistan Department of Computer and Information Systems Engineering NED University of Engineering and Technology Karachi Pakistan
Climate is rapidly changing around the world. Over time, there have been significant changes in the weather. Rainfall is now erratic due to climate change. The frequency of extreme weather events like droughts and flo... 详细信息
来源: 评论
Surface Recognition from Wheelchair-induced Noisy Vibration Data: A Tale of Many Cities
Surface Recognition from Wheelchair-induced Noisy Vibration ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Rochishnu Banerjee Md Fourkanul Islam Shaswati Saha Vaskar Raychoudhury Md Osman Gani Department of Computer Science & Software Engineering Miami University Oxford OH USA Department of Information Systems University of Maryland Baltimore County Baltimore MD USA
Despite the active legislation in many countries supporting the accessibility of public spaces by mobility-impaired users, the reality is far from ideal. Wheelchair users often struggle to navigate the built environme... 详细信息
来源: 评论
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module
Mitigating Insecure Outputs in Large Language Models(LLMs): ...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: MD Abdul Barek Md Mostafizur Rahman Shapna Akter A.B.M Kamrul Islam Riad Md Abdur Rahman Hossain Shahriar Akond Rahman Fan Wu Department of Intelligent Systems and Robotics University of West Florida USA Dept. of Cybersecurity and Information Technology University of West Florida USA Center for Cybersecurity University of West Florida USA Computer Science and Software Engineering Auburn University USA Dept. of Computer Science Tuskegee University USA
Large Language Models (LLMs) have extensive ability to produce promising output. Nowadays, people are increasingly relying on them due to easy accessibility, rapid and outstanding outcomes. However, the use of these r... 详细信息
来源: 评论
Editorial: Advanced deep learning approaches for medical neuroimaging data with limitation
收藏 引用
Frontiers in Computational Neuroscience 2023年 17卷 1272448页
作者: Tang, Zhiri Li, Ming Hu, Ruihan Dev, Kapal Department of Computer Science City University of Hong Kong Kowloon Hong Kong Department of Industrial and Systems Engineering The Hong Kong Polytechnic University Kowloon Hong Kong School of Software Harbin Institute of Technology Harbin China Department of Computer Science Munster Technological University Cork Ireland
This research topic collects the latest works focusing on approaches and analysis for medical neuroimaging data with limitations. With the increasing development of deep learning and artificial intelligence, it also a... 详细信息
来源: 评论
The Minimum Covariance Determinant Technique for Insider Threat Detection in Communications and Network Security
SSRN
收藏 引用
SSRN 2024年
作者: Al-Shehari, Taher Kadri, Mohammed Al-Mhiqani, Mohammed Nasser Al-Razgan, Muna Alfakih, Taha Computer Skills Department of Self-Development Skill Common First Year Deanship King Saud University Riyadh11362 Saudi Arabia Department of Computer Science University of Huddersfield HuddersfieldHD1 3DH United Kingdom Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11345 Saudi Arabia Department of Information Systems College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia
Insider threats present a critical concern for network security of organizations, as malicious activities (data theft, hacking, security breaching, etc.) perpetrated by insiders with privileged access systems can resu... 详细信息
来源: 评论
Family of Mutually Uncorrelated Codes for DNA Storage Address Design
IEEE Transactions on Nanobioscience
收藏 引用
IEEE Transactions on Nanobioscience 2025年 PP卷 PP页
作者: Liu, Zhenlu Cao, Ben Shao, Qi Zheng, Yanfen Wang, Bin Zhou, Shihua Zheng, Pan Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China University of Canterbury Upper Riccarton Department of Accounting and Information Systems Christchurch8140 New Zealand
Deoxyribonucleic acid (DNA) has become an ideal medium for long-term storage and retrieval due to its extremely high storage density and long-term stability. But access efficiency is an existing bottleneck in DNA stor... 详细信息
来源: 评论
Scalable analysis of stop-and-go waves
arXiv
收藏 引用
arXiv 2024年
作者: Ji, Junyi Gloudemans, Derek Wang, Yanbing Zachár, Gergely Barbour, William Sprinkle, Jonathan Piccoli, Benedetto Work, Daniel B. Department of Civil and Environmental Engineering Vanderbilt University United States Institute for Software Integrated Systems Vanderbilt University United States Department of Computer Science Vanderbilt University United States The Transportation and Power Systems Division Argonne National Laboratory United States School of Sustainable Engineering and the Built Environment Arizona State University United States Department of Mathematical Sciences Rutgers University Camden United States
Analyzing stop-and-go waves at the scale of miles and hours of data is an emerging challenge in traffic research. In the past, datasets were of limited scale and could be easily analyzed by hand or with rudimentary me... 详细信息
来源: 评论
Physical Layer Security of Wireless Communications: When Moving Target Defense Meets Unmanned Aerial Vehicles
SSRN
收藏 引用
SSRN 2024年
作者: Ghourab, Esraa M. Jaafar, Wael Naser, Shimaa Muhaidat, Sami Al-Qutayri, Mahmoud Damiani, Ernesto Center for Cyber-Physical Systems Department of Computer and Communication Engineering Khalifa University United Arab Emirates Department of Software and Information Technology Engineering École de Technologie Supérieure MontrealQCH3C 1K3 Canada 6G Research Center Khalifa University United Arab Emirates Center Department of Computer and Communication Engineering Khalifa University United Arab Emirates
In the realm of unmanned aerial vehicle (UAV) communication, the utilization of UAVs as aerial relays for ground nodes (GNs) introduces strategic flexibility, especially in scenarios where ground base stations may exp... 详细信息
来源: 评论