咨询与建议

限定检索结果

文献类型

  • 3,265 篇 会议
  • 1,252 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,679 篇 工学
    • 2,082 篇 计算机科学与技术...
    • 1,723 篇 软件工程
    • 509 篇 信息与通信工程
    • 450 篇 控制科学与工程
    • 236 篇 生物工程
    • 224 篇 电气工程
    • 178 篇 机械工程
    • 176 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 121 篇 安全科学与工程
    • 104 篇 仪器科学与技术
    • 95 篇 土木工程
    • 94 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 87 篇 交通运输工程
    • 86 篇 网络空间安全
  • 1,139 篇 理学
    • 592 篇 数学
    • 269 篇 生物学
    • 228 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
  • 830 篇 管理学
    • 584 篇 管理科学与工程(可...
    • 321 篇 工商管理
    • 320 篇 图书情报与档案管...
  • 167 篇 医学
    • 153 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 122 篇 法学
    • 99 篇 社会学
  • 100 篇 经济学
    • 100 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 37 篇 农学
  • 16 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 181 篇 computer science
  • 118 篇 computational mo...
  • 111 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 89 篇 machine learning
  • 86 篇 laboratories
  • 85 篇 accuracy
  • 83 篇 deep learning
  • 82 篇 computer archite...
  • 82 篇 training
  • 73 篇 feature extracti...
  • 72 篇 artificial intel...
  • 70 篇 data mining
  • 69 篇 systems engineer...
  • 66 篇 software testing
  • 64 篇 security
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...

机构

  • 40 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 15 篇 university of ch...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 28 篇 buyya rajkumar
  • 27 篇 yingmin jia
  • 24 篇 ismail leila
  • 20 篇 zamli kamal z.
  • 20 篇 noraziah ahmad
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,052 篇 英文
  • 506 篇 其他
  • 28 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems & Software Engineering"
4589 条 记 录,以下是11-20 订阅
排序:
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Security Aspects of Container Orchestration in Kubernetes Environments  24
Security Aspects of Container Orchestration in Kubernetes En...
收藏 引用
24th International Symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Stanišić, Sava Vesković, Milan Ristić, Olga Dordević, Borislav Faculty of Technical Sciences Department of Computer and Software Engineering Čačak Serbia Mihajlo Pupin Institute Imp Computer Systems Belgrade Serbia
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernete... 详细信息
来源: 评论
ForkXplorer:an approach of fork summary generation
收藏 引用
Frontiers of computer Science 2022年 第2期16卷 1-15页
作者: Zhang ZHANG Xinjun MAO Chao ZHANG Yao LU Key Laboratory of Software Engineering for Complex Systems College of ComputerNational University of Defense TechnologyChangsha 410073China
Pull-based development has become an important paradigm for distributed software *** this model,each developer independently works on a copied repository(i.e.,a fork)from the central *** is essential for developers to... 详细信息
来源: 评论
Leveraging Geographic Information systems and Remote Sensing for Enhanced Water Resource Management in Kazakhstan  4
Leveraging Geographic Information Systems and Remote Sensing...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Hamada, Mohamed Ahmed Tolkyn, Orden Hamada, Gehad M. International It University Information Systems Department Almaty Kazakhstan International It University Computer Systems and Software Engineering Department Almaty Kazakhstan
Kazakhstan's deputy member is vast, and is one of sparse population, scattering and creating an overwhelming challenge to map and assess the water resources. Most of the waters are in remote and poorly equipped ar... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & Sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
DeepVec: State-Vector Aware Test Case Selection for Enhancing Recurrent Neural Network
收藏 引用
IEEE Transactions on software engineering 2025年 第6期51卷 1702-1723页
作者: Jiang, Zhonghao Yan, Meng Huang, Li Sun, Weifeng Liu, Chao Sun, Song Lo, David Chongqing University School of Big Data and Software Engineering China Chongqing Normal University School of Computer and Information Science China Singapore Management University School of Information Systems Singapore
Deep Neural Networks (DNN) have realized significant achievements across various application domains. There is no doubt that testing and enhancing a pre-trained DNN that has been deployed in an application scenario is... 详细信息
来源: 评论
Author profiling from Romanized Urdu text using transfer learning models
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4455-4470页
作者: Ali, Abid khan, Muhammad Sohail Khan, Muhammad Amin Khan, Sajid Ullah Khan, Faheem Department of Computer Software Engineering University of Engineering & Technology Mardan KPK Mardan23200 Pakistan Islamabad H-11/4 Islamabad44000 Pakistan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Engineering Gachon University Seongnam-Si Korea Republic of
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论
Building a Full-text Search Index Using "Transformer" Neural Network  17
Building a Full-text Search Index Using "Transformer" Neural...
收藏 引用
17th IEEE International Conference on Application of Information and Communication Technologies, AICT 2023
作者: Dobrynin, Vyacheslav Abramovich, Roman Platonov, Alexey Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia
The use of deep neural networks in information retrieval significantly improves its effectiveness, but negatively affects the performance of the process. To deal with this, we propose a new ranking model that uses the... 详细信息
来源: 评论