咨询与建议

限定检索结果

文献类型

  • 11,201 篇 会议
  • 5,227 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,236 篇 工学
    • 8,155 篇 计算机科学与技术...
    • 6,801 篇 软件工程
    • 2,015 篇 信息与通信工程
    • 1,326 篇 控制科学与工程
    • 1,091 篇 生物工程
    • 860 篇 电气工程
    • 726 篇 生物医学工程(可授...
    • 681 篇 机械工程
    • 607 篇 电子科学与技术(可...
    • 550 篇 光学工程
    • 418 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 339 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 317 篇 建筑学
  • 4,524 篇 理学
    • 2,648 篇 数学
    • 1,237 篇 生物学
    • 828 篇 物理学
    • 744 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 351 篇 化学
  • 3,153 篇 管理学
    • 1,915 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 944 篇 工商管理
  • 715 篇 医学
    • 622 篇 临床医学
    • 550 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 486 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 316 篇 教育学
  • 322 篇 经济学
    • 320 篇 应用经济学
  • 175 篇 农学
  • 74 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 304 篇 deep learning
  • 303 篇 application soft...
  • 290 篇 computational mo...
  • 268 篇 data mining
  • 248 篇 machine learning
  • 242 篇 computer archite...
  • 225 篇 software
  • 202 篇 software systems
  • 193 篇 accuracy
  • 191 篇 feature extracti...
  • 189 篇 internet of thin...
  • 185 篇 support vector m...
  • 185 篇 training
  • 180 篇 programming
  • 170 篇 educational inst...
  • 169 篇 laboratories
  • 169 篇 optimization
  • 168 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 82 篇 department of co...
  • 77 篇 school of inform...
  • 73 篇 department of co...
  • 71 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 50 篇 school of softwa...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 16,058 篇 英文
  • 489 篇 其他
  • 119 篇 中文
  • 7 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering Department"
16657 条 记 录,以下是4931-4940 订阅
排序:
Dependency Practices for Vulnerability Mitigation
arXiv
收藏 引用
arXiv 2023年
作者: Jafari, Abbas Javan Costa, Diego Elias Abdellatif, Ahmad Shihab, Emad Lab The Department of Computer Science and Software Engineering Concordia University Montreal Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Relying on dependency packages accelerates software development, but it also increases the exposure to security vulnerabilities that may be present in dependencies. While developers have full control over which depend... 详细信息
来源: 评论
A biometric-based IoT device identity authentication scheme  1st
A biometric-based IoT device identity authentication scheme
收藏 引用
1st EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019
作者: Xue, Qingshui Ju, Xingzhong Zhu, Haozhi Zhu, Haojin Li, Fengying Zheng, Xiangwei School of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201418 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China
IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of pos... 详细信息
来源: 评论
PMMVar: Leveraging Multi-level Protein Structures for Enhanced Coding Variant Pathogenicity Prediction
PMMVar: Leveraging Multi-level Protein Structures for Enhanc...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Chen, Yijia Chen, Yiwen Nie, Shanling Yang, Hai East China University of Science and Technology Department of Computer Science and Engineering Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China National University of Singapore Center for Continuing and Lifelong Education Singapore The University of Sydney Faculty of Engineering Australia
Genomic variants, which can disrupt cellular functions, present a challenge in distinguishing deleterious from benign instances. While assessing genome-wide functional impacts, many current algorithms neglect protein ... 详细信息
来源: 评论
A stepwise multi-centroid classification learning algorithm with GPU implementation
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8886卷 347-358页
作者: Cresswell-Miley, Cain Neshatian, Kourosh Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
By viewing the training of classifiers as an optimisation problem, we have developed a method in this paper to train a new type of nearest centroid classifier with multiple centroids per class, using Particle Swarm Op... 详细信息
来源: 评论
Security modeling and analysis in a software architecture design
Security modeling and analysis in a software architecture de...
收藏 引用
2008 International Conference on software engineering Theory and Practice, SETP 2008
作者: Dai, Lirong Cooper, Kendra Department of Computer Science and Software Engineering Seattle University P.O. 222000 Seattle WA 98122 United States Department of Computer Science MS 31 University of Texas at Dallas Richardson TX P.O. 830688 United States
The problem of effectively designing and analyzing software to meet security requirements is an important research topic. This paper presents an approach to model and analyze security aspects for software architecture... 详细信息
来源: 评论
Evaluation of multi-radio extensions to dsr for wireless multi-hop networks
Evaluation of multi-radio extensions to dsr for wireless mul...
收藏 引用
WINSYS 2007 - 2nd International Conference on Wireless Information Networks and Systems
作者: Biaz, Saad Qi, Bing Wu, Shaoen Ji, Yiming Dept. of Computer Science and Software Engineering Auburn University Dustan Hall 107 AL 36849 United States Department of Computer Science University of South Carolina Harg ray Building Beaufort SC 29909 United States
Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equi... 详细信息
来源: 评论
Parametric search: three new applications
收藏 引用
中国高等学校学术文摘·数学 2010年 第1期5卷 65-73页
作者: Naoki KATOH Wencheng WANG Yinfeng XU Binhai ZHU Department of Architecture and Architectural Engineering Kyoto University Nishikyo Kyoto 615-8540 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China School of Management Xi'an Jiaotong University State Key Lab for Manufacturing Systems Engineering Xi'an 710049 China Department of Computer Science Montana State University Bozeman MT 59717-3880 USA
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinator... 详细信息
来源: 评论
Virtual Laboratory Learning Experience in engineering: An Extended Technology Acceptance Model (TAM)  3
Virtual Laboratory Learning Experience in Engineering: An Ex...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2023
作者: Ahmed Alnagrat, Ahmed Jamah Ahmed, Khamiss M. S. Alkhallas, Muhannad Ismail Almakhzoom, Osama Abulaqasim Ibrahim Syed Idrus, Syed Zulkarnain Che Ismail, Rizalafande Higher Institute of Science and Technology Wadi Al-Shati Department of Computer Science and Information Technology Wadi al-Shati Fezzan Libya Sebha University Faculty of Information Technology Department of Computer Science Sebha Libya Faculty of Engineering Technology in Zuwarah Department of Software Engineering Zuwarah Libya Department of Communication Perlis Kangar01000 Malaysia Arau02600 Malaysia
This research presents an enhanced version of the Technology Acceptance Model (TAM), which integrates usability and learning objectives to evaluate the effect of adopting virtual laboratories on student performance. D... 详细信息
来源: 评论
Simulating new markets by introducing new accepting policies for the conventional continuous double auction
Simulating new markets by introducing new accepting policies...
收藏 引用
2008 Spring Simulation Multiconference, SpringSim'08
作者: Honari, Sina Gomrokchi, Maziar Ebadi, Mojtaba Fos-Hati, Amin Bentahar, Jamal Premier Ideas Support Center School of Engineering Shiraz University Shiraz Iran Computer Science and Software Engineering Department Concordia University Canada Concordia Institute for Information Systems Engineering Concordia University Canada
In recent years a huge number of online auctions that use Multi Agent systems have been created. As a result there are numerous auctions that provide the same product. In this case each customer can buy a product with... 详细信息
来源: 评论
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks
收藏 引用
International Journal of Internet Protocol Technology 2008年 第2期3卷 128-135页
作者: Lee, Isaac Hunt, Ray Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
This paper proposes a novel method to address the protection necessary to mitigate flooding attacks in VoIP networks which can produce rapid saturation of a firewall and crippling of a VoIP switch. The paper proposes ... 详细信息
来源: 评论