咨询与建议

限定检索结果

文献类型

  • 3,248 篇 会议
  • 1,240 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 2,055 篇 计算机科学与技术...
    • 1,709 篇 软件工程
    • 492 篇 信息与通信工程
    • 429 篇 控制科学与工程
    • 236 篇 生物工程
    • 215 篇 电气工程
    • 175 篇 机械工程
    • 173 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 114 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 93 篇 土木工程
    • 91 篇 动力工程及工程热...
    • 87 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,124 篇 理学
    • 586 篇 数学
    • 268 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 812 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 317 篇 工商管理
    • 311 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 119 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 181 篇 computer science
  • 117 篇 computational mo...
  • 111 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 88 篇 machine learning
  • 86 篇 laboratories
  • 85 篇 accuracy
  • 82 篇 training
  • 81 篇 deep learning
  • 81 篇 computer archite...
  • 73 篇 feature extracti...
  • 70 篇 data mining
  • 70 篇 artificial intel...
  • 69 篇 systems engineer...
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 63 篇 security

机构

  • 39 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 15 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 28 篇 buyya rajkumar
  • 27 篇 yingmin jia
  • 24 篇 ismail leila
  • 20 篇 zamli kamal z.
  • 20 篇 noraziah ahmad
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,144 篇 英文
  • 385 篇 其他
  • 28 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4560 条 记 录,以下是1001-1010 订阅
排序:
Automating the Training and Deployment of Models in MLOps by Integrating systems with Machine Learning
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Penghao Song, Bo Zhan, Xiaoan Chen, Zhou Yuan, Jiaqiang Information Systems Northeastern University San JoseCA United States Computer Science Northeastern University BostonMA United States Electrical Engineering New York University NY United States Software Engineering Zheiiang University Hangzhou China Information Studies Trine University PhoenixAZ United States
This article introduces the importance of machine learning in real-world applications and explores the rise of MLOps (Machine Learning Operations) and its importance for solving challenges such as model deployment and... 详细信息
来源: 评论
Towards An Efficient Searching Approach of ROS Message by Knowledge Graph
Towards An Efficient Searching Approach of ROS Message by Kn...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Sun Bo Xinjun Mao Shuo Yang Long Chen College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China
The Robot Operating System (ROS) has become the most popular robot development framework in the last few years, which has loosely coupled structure and provides remote communications between different component nodes.... 详细信息
来源: 评论
AutoDebloater: Automated Android App Debloating
AutoDebloater: Automated Android App Debloating
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Jiakun Liu Xing Hu Ferdian Thung Shahar Maoz Eran Toch Debin Gao David Lo School of Computing and Information Systems Singapore Management University Singapore School of Software Technology Zhejiang University China School of Computer Science Tel Aviv University Israel Department of Industrial Engineering Tel Aviv University Israel
Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary features can increase the attack surface and cost additional ...
来源: 评论
Machine Learning in Higher Education using RF and SVM for Pedagogical Enhancement
Machine Learning in Higher Education using RF and SVM for Pe...
收藏 引用
Integrated Circuits and Communication systems (ICICACS), IEEE International Conference on
作者: Fateh Bahadur Kunwar Satyajee Srivastava R Dhivya Monika Gulati Taruna Anand D Antony Arul Raj Department of Computer Science and Engineering Geetanjali Institute of Technical Studies Udaipur India Department of Computer Science and Engineering School of Engineering and Technology Manav Rachna International Institute of Research and Studies Faridabad India Department of Information Technology M.Kumarasamy College of Engineering Karur India MMIM Maharishi Markandeshwar (Deemed to be University) Ambala India Department of Humanities and Social Sciences Graphic Era (Deemed to be) University Dehradun India Department of Software Systems PSG College of Arts & Science Coimbatore India
AI's revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutori... 详细信息
来源: 评论
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks
AI in Education: Improving Quality for Both Centralized and ...
收藏 引用
IEEE Education engineering (EDUCON)
作者: Nisha Thorakkattu Madathil Saed Alrabaee Mousa Al-kfairy Rafat Damseh Abdelkader N Belkacem Department of Information Systems and Security College of IT United Arab Emirates University UAE College of Technological Innovation Zayed University Dubai United Arab Emirates Department of Computer Science and Software Engineering College of IT United Arab Emirates University UAE Department of Computer Engineering and Networks College of IT United Arab Emirates University UAE
Education is essential for achieving many Sustainable Development Goals (SDGs). Therefore, the education system focuses on empowering more educated people and improving the quality of the education system. One of the ... 详细信息
来源: 评论
A GNN-Based Learning Approach for Energy Optimization in Relay-Assisted IoT Networks
A GNN-Based Learning Approach for Energy Optimization in Rel...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Yang, Huapeng Ji, Han Huang, Zhangqin Wu, Xiping College of Computer Science Beijing University of Technology Beijing Engineering Research Center for IoT Software and Systems Beijing100124 China School of Electrical and Electronic Engineering University College Dublin DublinD04 V1W8 Ireland School of Information Science and Engineering Southeast University The National Mobile Communications Research Laboratory Nanjing210096 China
Minimizing energy consumption is critical for the long-range (LoRa) Internet of Things (IoT) networks, to extend the battery lifetime of end devices (EDs) while reducing the maintenance cost. To overcome the excessive... 详细信息
来源: 评论
Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments
Discovering Complex Correlations Among Multiple IoT Devices ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Andrew D'Angelo Chenglong Fu Xiaojiang Du Paul Ratazzi Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC USA Air Force Research Laboratory Rome NY USA
The ubiquity of the Internet of Things (IoT) in a vast range of consumer applications is unparalleled. Unfortunately, despite the benefits of IoT, its widespread integration comes with significant security challenges....
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论
A Melting Pot of Evolution and Learning
arXiv
收藏 引用
arXiv 2023年
作者: Sipper, Moshe Elyasaf, Achiya Halperin, Tomer Haramaty, Zvika Lapid, Raz Segal, Eyal Tzruia, Itai Tamam, Snir Vitrack Department of Computer Science Ben-Gurion University of the Negev Beer-Sheva8410501 Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva8410501 Israel DeepKeep Tel-Aviv Israel
We survey eight recent works by our group, involving the successful blending of evolutionary algorithms with machine learning and deep learning: 1. Binary and Multinomial Classification through Evolutionary Symbolic R... 详细信息
来源: 评论
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers
VoiceGuard: An Effective and Practical Approach for Detectin...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Xuening Xu Chenglong Fu Xiaojiang Du E. Paul Ratazzi Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA Department of Software and Information Systems UNC Charlotte Charlotte NC USA Information Directorate Air Force Research Laboratory Rome NY USA
Smart speakers bring convenience to people's daily lives. However, various attacks can be launched against smart speakers to execute malicious commands, which may cause serious safety or security issues. The exist...
来源: 评论