咨询与建议

限定检索结果

文献类型

  • 3,248 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,650 篇 工学
    • 2,053 篇 计算机科学与技术...
    • 1,708 篇 软件工程
    • 491 篇 信息与通信工程
    • 428 篇 控制科学与工程
    • 236 篇 生物工程
    • 215 篇 电气工程
    • 175 篇 机械工程
    • 173 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 126 篇 光学工程
    • 114 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 92 篇 土木工程
    • 91 篇 动力工程及工程热...
    • 87 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,123 篇 理学
    • 587 篇 数学
    • 268 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 179 篇 统计学(可授理学、...
    • 82 篇 化学
  • 811 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 317 篇 工商管理
    • 311 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 119 篇 法学
    • 96 篇 社会学
  • 98 篇 经济学
    • 98 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 181 篇 computer science
  • 117 篇 computational mo...
  • 111 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 88 篇 machine learning
  • 86 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 81 篇 computer archite...
  • 81 篇 training
  • 73 篇 feature extracti...
  • 70 篇 data mining
  • 70 篇 artificial intel...
  • 69 篇 systems engineer...
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 63 篇 security

机构

  • 39 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 15 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 28 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 21 篇 zamli kamal z.
  • 21 篇 fashan yu
  • 20 篇 noraziah ahmad
  • 19 篇 xenofon koutsouk...
  • 17 篇 biswas gautam
  • 16 篇 herawan tutut
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,137 篇 英文
  • 385 篇 其他
  • 28 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4553 条 记 录,以下是1091-1100 订阅
排序:
Demand Density Forecasting in Mobility-on-Demand systems Through Recurrent Mixture Density Networks
Demand Density Forecasting in Mobility-on-Demand Systems Thr...
收藏 引用
International Conference on Intelligent Transportation
作者: Xiaoming Li Hubert Normandin-Taillon Chun Wang Xiao Huang Concordia Institute for Information Systems Engineering (CIISE) Concordia University Montréal QC Canada Department of Computer Science and Software Engineering (CSSE) Concordia University Montréal QC Canada Concordia John Molson School of Business (JMSB) Concordia University Montréal QC Canada
Demand forecasting is one of the essential issues in the Mobility-on-Demand (MoD) systems. Most deep learning-based models address this issue by point prediction, which neglects stochasticity in the forecasting result...
来源: 评论
What really changes when developers intend to improve their source code: A commit-level study of static metric value and static analysis warning changes
arXiv
收藏 引用
arXiv 2021年
作者: Trautsch, Alexander Erbel, Johannes Herbold, Steffen Grabowski, Jens Institute of Software and Systems Engineering TU Clausthal Germany Institute of Computer Science University of Goettingen Germany
Many software metrics are designed to measure aspects that are believed to be related to software quality. Static software metrics, e.g., size, complexity and coupling are used in defect prediction research as well as... 详细信息
来源: 评论
Mitigating Crop Losses: AI-enabled Disease Detection in Tomato Plants
Mitigating Crop Losses: AI-enabled Disease Detection in Toma...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Hassan Ashfaq Usama Arshad Raja Hashim Ali Zain ul Abideen Muhammad Huzaifa Shah Talha Ali Khan Ali Zeeshan Ijaz Nisar Ali Abu Bakar Siddique Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
Fostering crop health is vital for global food security, underscoring the need for effective disease detection. This research introduces an innovative artificial intelligence (AI) model designed to enhance the detecti...
来源: 评论
QuIP: A P4 Quantum Internet Protocol Prototyping Framework
arXiv
收藏 引用
arXiv 2024年
作者: Kozlowski, Wojciech Kuipers, Fernando A. Smets, Rob Turkovic, Belma QuTech Delft University of Technology Delft2628 CD Netherlands The Networked Systems Group Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands SURF Utrecht3511 EP Netherlands TNO The Hague2595 DA Netherlands
Quantum entanglement is so fundamentally different from a network packet that several quantum network stacks have been proposed;one of which has even been experimentally demonstrated. Several simulators have also been... 详细信息
来源: 评论
Exploring the relationship between performance metrics and cost saving potential of defect prediction models
arXiv
收藏 引用
arXiv 2021年
作者: Tunkel, Steffen Herbold, Steffen Institute of Computer Science University of Goettingen Germany Institute of Software and Systems Engineering TU Clausthal Germany
Context: Performance metrics are a core component of the evaluation of any machine learning model and used to compare models and estimate their usefulness. Recent work started to question the validity of many performa... 详细信息
来源: 评论
A Data Completion Algorithm Based on Low-Rank Prior Knowledge for Data-Driven Applications
收藏 引用
IEEE Transactions on Network and Service Management 2024年
作者: Tang, Jun Guo, Bing Shen, Yan Garg, Sahil Kaddoum, Georges Hossain, M. Shamim Sichuan University College of Computer Science Chengdu China Chengdu University of Information Technology School of Computer Science Chengdu China École de Technologie Supérieure Electrical Engineering Department MontréalQCH3C 1K3 Canada Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Punjab Rajpura140401 India Lebanese American University Artificial Intelligence and Cyber Systems Research Center Beirut03797751 Lebanon King Saud University College of Computer and Information Sciences Department of Software Engineering Riyadh12372 Saudi Arabia
Low rank tensor ring based data recovery algorithms have been widely used in data-driven consumer electronics to recover missing data entries in the collecting data pre-processing stage for providing stable and reliab... 详细信息
来源: 评论
xLSTM-UNet can be an Effective 2D & 3D Medical Image Segmentation Backbone with Vision-LSTM (ViL) better than its Mamba Counterpart
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianrun Ding, Chaotao Zhu, Lanyun Xu, Tao Ji, Deyi Wang, Yan Zang, Ying Li, Zejian College of Computer Science and Technology Zhejiang University China Tech. Co. LTD China School of Information Engineering Huzhou University China Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore School of Software Technology Zhejiang University China School of Information Science and Technology University of Science and Technology of China China School of Instrumentation and Optoelectronic Engineering State Key Laboratory of Software Development Environment Beihang University China
Convolutional Neural Networks (CNNs) and Vision Transformers (ViT) have been pivotal in biomedical image segmentation. Yet, their ability to manage long-range dependencies remains constrained by inherent locality and ... 详细信息
来源: 评论
Cache-Enabled in Cooperative Cognitive Radio Networks for Transmission Performance
收藏 引用
Tsinghua Science and Technology 2020年 第1期25卷 1-11页
作者: Jiachen Yang Chaofan Ma Jiabao Man Huifang Xu Gan Zheng Houbing Song School of Electrical and Information Engineering Tianjin UniversityTianjin 300000China Wolfson School of Mechanical Electrical and Manufacturing EngineeringLoughborough UniversityLoughboroughLE11 3TUUK Department of Electrical ComputerSoftwareand Systems EngineeringEmbry-Riddle Aeronautical UniversityDaytona BeachFL 32114USA.
The proliferation of mobile devices that support the acceleration of data services(especially smartphones)has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceed... 详细信息
来源: 评论
Performance Evaluation of Popular Deep Neural Networks for Neural Machine Translation
Performance Evaluation of Popular Deep Neural Networks for N...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Naeem Abu Bakar Siddique Raja Hashim Ali Usama Arshad Zain ul Abideen Talha Ali Khan Muhammad Huzaifa Shah Ali Zeeshan Ijaz Nisar Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
The field of Neural Machine Translation (NMT) has shown impressive performance for quick and easy communication in various languages spoken all over the world. NMT helps us by improving communication between different...
来源: 评论
Research and development of two-factor authentication methods using neural networks
Research and development of two-factor authentication method...
收藏 引用
Smart Information systems and Technologies (SIST), IEEE International Conference on
作者: Temirkhan Darbek Assel Mukasheva Alibek Bissembayev Sergiy Gnatyuk Dinargul Mukammejanova Department of Information Systems and Cybersecurity Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论