咨询与建议

限定检索结果

文献类型

  • 2,248 篇 会议
  • 923 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,875 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 351 篇 信息与通信工程
    • 314 篇 控制科学与工程
    • 175 篇 生物工程
    • 150 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 87 篇 安全科学与工程
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 71 篇 化学工程与技术
    • 70 篇 土木工程
    • 66 篇 仪器科学与技术
  • 821 篇 理学
    • 434 篇 数学
    • 200 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 130 篇 统计学(可授理学、...
    • 73 篇 化学
  • 550 篇 管理学
    • 390 篇 管理科学与工程(可...
    • 216 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 141 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 88 篇 法学
    • 65 篇 社会学
  • 66 篇 教育学
    • 66 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 144 篇 computer science
  • 84 篇 application soft...
  • 84 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 75 篇 deep learning
  • 73 篇 accuracy
  • 71 篇 software systems
  • 71 篇 software
  • 70 篇 laboratories
  • 69 篇 machine learning
  • 68 篇 artificial intel...
  • 64 篇 training
  • 63 篇 computer archite...
  • 61 篇 quality of servi...
  • 52 篇 security
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 24 篇 ismail leila
  • 24 篇 buyya rajkumar
  • 23 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 makoto ikeda
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned

语言

  • 3,080 篇 英文
  • 132 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3230 条 记 录,以下是801-810 订阅
排序:
Intelligent Synthesis of Individual Rehabilitation Plans for Patients after Joint Endoprosthesis Based on computer Vision Technologies  7
Intelligent Synthesis of Individual Rehabilitation Plans for...
收藏 引用
7th International Conference on Information Technologies in engineering Education, Inforino 2024
作者: Arseniev, D.G. Borisov, V.V. Misnik, A.E. Gomzhina, E.A. Shalukhova, M.A. Scientific Innovation Institute 'Mathematical Modeling and Intelligent Control Systems' Peter the Great St. Petersburg Polytechnic University St. Petersburg Russia National Research University 'MPEI' Branch in Smolensk Department of Computer Engineering Smolensk Russia Information Technology Software Inter-State Educational Institution of Higher Education 'Belarusian-Russian University' Mogilev Belarus Early Medical Rehabilitation FSBI 'FCTOE' The Ministry of Health of the Russian Federation Smolensk Russia Inter-State Educational Institution of Higher Education 'Belarusian-Russian University Peter the Great St. Petersburg Polytechnic University Information Technology Software Mogilev Belarus
The article presents an innovative approach to the rehabilitation process for patients with joint endoprosthetics, focusing on the integration of a specialized software module based on computer vision technologies and... 详细信息
来源: 评论
Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection
Transformer-based Compound Correlation Miner for Smart Home ...
收藏 引用
IEEE International Conference on Cloud Networking (CLOUDNET)
作者: Andrew D’Angelo Chenglong Fu Xiaojiang Du Paul Ratazzi Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC USA Information Warfare Division Air Force Research Laboratory Rome NY USA
IoT-enabled smart homes can be double-edged swords. On one side, the convenience and efficiency brought about by smart device integrations can improve the standard of living dramatically. However, on the other side, t...
来源: 评论
AutoDebloater: Automated Android App Debloating
AutoDebloater: Automated Android App Debloating
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Jiakun Liu Xing Hu Ferdian Thung Shahar Maoz Eran Toch Debin Gao David Lo School of Computing and Information Systems Singapore Management University Singapore School of Software Technology Zhejiang University China School of Computer Science Tel Aviv University Israel Department of Industrial Engineering Tel Aviv University Israel
Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary features can increase the attack surface and cost additional ...
来源: 评论
Work Engagement Recognition in Smart Office
收藏 引用
Procedia computer science 2022年 200卷 451-460页
作者: Congcong Ma Carman Ka Man Lee Juan Du Qimeng Li Raffaele Gravina Department of Industrial and Systems Engineering The Hong Kong Polytechnic University Hong Kong Special Administrative Region. School of Computer and Software Nanyang Institute of Technology Nanyang 473004 China. Department of Informatics Modeling Electronics and Systems University of Calabria Rende 87036 Italy.
The COVID-19 pandemic has forced a sudden change of traditional office works to smart working models, which however force many workers staying at home with a significant increase of sedentary lifestyle. Metabolic diso... 详细信息
来源: 评论
A Way to Protect the Surveillance Data Stored in the Cloud Using FC and SVM Methods
A Way to Protect the Surveillance Data Stored in the Cloud U...
收藏 引用
Advance Computing and Innovative Technologies in engineering (ICACITE), International Conference on
作者: D. Suganthi M Raju N.B. Mahesh Kumar M. Vasavi Oday Faris Washeel Tareq Hafdhi Abdtawfeeq Department of Computer Science Saveetha College of Liberal Arts and Sciences SIMATS Thandalam Chennai Tamilnadu India Department of Software Systems Sri Krishna Arts and Science College Coimbatore Department: Computer Science and Engineering Institute/university: Hindusthan Institute of Technology Valley Campus Pollachi Main Road Othakkalmandapam (Post) Coimbatore Tamil Nadu INDIA ET department CVR College of Engineering Hyderabad Collage of Nursing National University of Science and Technology Dhi Qar Iraq
Building trust between consumers and service providers is critical to the functioning of cloud computing, a technology that offers a range of services over the Internet. When consumers choose which cloud services to u... 详细信息
来源: 评论
Integrating Design Thinking into software Process Improvement
Integrating Design Thinking into Software Process Improvemen...
收藏 引用
International Conference on Emerging Trends in Networks and computer Communications (ETNCC)
作者: Anum Khalid Amber Sarwar Hashmi Azaz Ahmed Kiani Syeda Mariam Muzammal NZ Jhanjhi Ruqia Bibi Sandeep Kumar Department of Software Engineering Foundation University Islamabad Pakistan Department of Software Engineering Rawalpindi Women University Rawalpindi Pakistan National University of Modern Languages Rawalpindi Pakistan Faculty of Innovation and Technology School of Computer Science Taylor's University Subang Jaya Malaysia University Institute of Information Technology Pir Mehr Ali Shah Arid Agriculture University Rawalpindi Pakistan Division of Research and Development Lovely Professional University Phagwara KKR and KSR institute of technology and sciences Guntur Andhra Pradesh
The need for software improvement is growing widely due to the demand for technology development. The issues that arise by expanding the software processes in the workplace are expense, lack of understanding, time con... 详细信息
来源: 评论
Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant Security Controls
arXiv
收藏 引用
arXiv 2024年
作者: Gupta, Deepti Elluri, Lavanya Jain, Avi Moni, Shafika Showkat Aslan, Omer Dept. of Computer Information Systems Texas A&M University - Central Texas TX United States College of Business University of Tampa Florida United States Dept. of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Florida United States Department of Software Engineering Bandırma Onyedi Eylül University Bandırma Turkey
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks... 详细信息
来源: 评论
Resource-Aware Split Federated Learning for Fall Detection in the Metaverse
Resource-Aware Split Federated Learning for Fall Detection i...
收藏 引用
IEEE International Conference on Wireless and Mobile Computing, Networking And Communications (WiMob)
作者: Mohamad Wazzeh Ahmad Hammoud Mohsen Guizani Azzam Mourad Hadi Otrok Chamseddine Talhi Zbigniew Dziong Chang-Dong Wang Department of Software and IT Engineering Ecole de Technologie Supérieure Montreal Canada Department of CSM Artificial Intelligence and Cyber Systems Research Center Lebanese American University Beirut Lebanon Department of ML Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi UAE Department of Electrical Engineering Ecole de Technologie Supérieure Montreal Canada Department of Computer Science KU 6G Research Center Khalifa University Abu Dhabi UAE Department of Computer Science Center of Cyber-Physical Systems (C2PS) Khalifa University Abu Dhabi UAE School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
As the Metaverse develops, it is becoming more crucial to prioritize the safety of users, especially regarding the potential risks, such as users experiencing dizziness or making incorrect movements that may lead to f... 详细信息
来源: 评论
Corrigendum to: Facial Surface Anthropometric Features and Measurements With an Emphasis on Rhinoplasty
收藏 引用
Aesthetic surgery journal 2022年 第2期42卷 230-231页
作者: M Mazhar Celikoyar Michael F Pérez M Ilhan Akbas Oguzhan Topsakal Department of Otolaryngology Istanbul Florence Nightingale Hospital Istanbul Turkey. Computer Science Department Florida Polytechnic University Lakeland FL USA. Electrical Computer Software and Systems Engineering Department Embry-Riddle Aeronautical University Daytona Beach FL USA.
来源: 评论
Towards Instant Clustering Approach for Federated Learning Client Selection
Towards Instant Clustering Approach for Federated Learning C...
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Sarhad Arisdakessian Omar Abdel Wahab Azzam Mourad Hadi Otrok Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Department of Computer Science Lebanese American University Beirut Lebanon Division of Science New York University Abu Dhabi UAE Department of EECS Center of Cyber-Physical Systems (C2PS) Khalifa University Abu Dhabi UAE
In just few years, Federated Learning (FL) started to gain unprecedented attention given its ability to solve some fundamental privacy and communication challenges of traditional machine learning. Client selection is ... 详细信息
来源: 评论