咨询与建议

限定检索结果

文献类型

  • 3,234 篇 会议
  • 1,222 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,644 篇 工学
    • 2,056 篇 计算机科学与技术...
    • 1,707 篇 软件工程
    • 491 篇 信息与通信工程
    • 426 篇 控制科学与工程
    • 233 篇 生物工程
    • 215 篇 电气工程
    • 174 篇 机械工程
    • 174 篇 电子科学与技术(可...
    • 172 篇 生物医学工程(可授...
    • 125 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 89 篇 动力工程及工程热...
    • 89 篇 土木工程
    • 87 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,118 篇 理学
    • 583 篇 数学
    • 266 篇 生物学
    • 220 篇 物理学
    • 202 篇 系统科学
    • 176 篇 统计学(可授理学、...
    • 82 篇 化学
  • 809 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 313 篇 工商管理
    • 308 篇 图书情报与档案管...
  • 160 篇 医学
    • 149 篇 临床医学
    • 125 篇 基础医学(可授医学...
  • 118 篇 法学
    • 94 篇 社会学
  • 98 篇 经济学
    • 98 篇 应用经济学
  • 97 篇 教育学
    • 96 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 117 篇 computational mo...
  • 108 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 81 篇 accuracy
  • 79 篇 computer archite...
  • 79 篇 training
  • 78 篇 deep learning
  • 73 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 60 篇 security

机构

  • 36 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 20 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,392 篇 英文
  • 105 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4528 条 记 录,以下是211-220 订阅
排序:
Supporting the Automated Generation of Acceptance Tests of Process-Aware Information systems  19
Supporting the Automated Generation of Acceptance Tests of P...
收藏 引用
19th International Conference on Web Information systems and Technologies, WEBIST 2023
作者: Paiva, Tales M. Oliveira, Toacy C. Pillat, Raquel M. Alencar, Paulo S.C. Computer and Systems Engineering Program Universidade Federal do Rio de Janeiro Rio de Janeiro Brazil Software Engineering Program Universidade Federal do Pampa Alegrete Brazil Cheriton School of Computer Science University of Waterloo Waterloo Canada
software quality assurance is a crucial process that ensures software products meet specified requirements and quality standards. Achieving an exhaustive test coverage is essential for quality assurance, particularly ... 详细信息
来源: 评论
Success Factors of Requirement Elicitation in the Field of software engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
Automated Surface Classification System Using Vibration Patterns - A Case Study With Wheelchairs
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第4期4卷 884-895页
作者: Yu, Haoxiang Raychoudhury, Vaskar Saha, Snehanshu Edinger, Janick Smith, Roger O. Gani, Md Osman The University of Texas at Austin Department of Electrical and Computer Engineering AustinTX78712 United States Miami University Department of Computer Science & Software Engineering OxfordOH45056 United States Bits Pilani K.K. Birla Goa Campus Department of Computer Science & Information Systems Appcair Zuarinagar403726 India University of Hamburg Department of Informatics & Distributed Operating Systems Hamburg20146 Germany University of Wisconsin-Milwaukee Department of Rehabilitation Sciences & Technology MilwaukeeWI53706 United States University of Maryland Baltimore County Department of Information Systems BaltimoreMD21250 United States
Finding a barrier-free accessible path through the built environment is necessary for wheelchair users. Researchers have identified the effect of surface vibration on the health of wheelchair users and proposed variou... 详细信息
来源: 评论
Don't Forget the Exception! : Considering Robustness Changes to Identify Design Problems  20
Don't Forget the Exception! : Considering Robustness Changes...
收藏 引用
20th IEEE/ACM International Conference on Mining software Repositories, MSR 2023
作者: Oliveira, Anderson Correia, Joao Sousa, Leonardo Assuncao, Wesley K. G. Coutinho, Daniel Garcia, Alessandro Oizumi, Willian Barbosa, Caio Uchoa, Anderson Pereira, Juliana Alves Informatics Department - Pontifical Catholic Rio de Janeiro Brazil Carnegie Mellon University Department of Electrical and Computer Engineering Pittsburgh United States Institute of Software Systems Engineering Linz Austria Itapajé Brazil
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop... 详细信息
来源: 评论
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
Transmission Line Age Determination with Statistical Health Index and Failure Probability Curve Fitting Technique  10
Transmission Line Age Determination with Statistical Health ...
收藏 引用
10th International Conference on Condition Monitoring and Diagnosis, CMD 2024
作者: Suwanasri, Cattareeya Yongyee, Ittiphong Suwanasri, Thanapong King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand Rajamangala University of Technology Suvarnabhumi Faculty of Engineering and Architecture Department of Mechatronics Engineering Nonthaburi Thailand King Mongkut's University of Technology North Bangkok Electrical and Software Systems Engineering Bangkok Thailand
The deterioration of transmission lines has a profound effect on the reliability and safety of the power grid. Accurate estimation of their age is critical for effective maintenance and investment planning. This paper... 详细信息
来源: 评论
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Research and Development of Kubernetes Operator for Lightweight Multi-Access Edge Computing Platform Simulator
Research and Development of Kubernetes Operator for Lightwei...
收藏 引用
2025 systems of Signals Generating and Processing in the Field of on Board Communications, SOSG 2025
作者: Filianin, Ivan Borisov, Nikita Bogatyrev, Vladimir Itmo University Faculty of Software Engineering and Computer Engineering St. Petersburg Russia Itmo University Faculty of Infocommunication Technologies St. Petersburg Russia Saint-Petersburg State University of Aerospace Instrumentation Department of Information Systems Security St. Petersburg Russia
This paper addresses the problem of deploying complex systems in Kubernetes clusters. It discusses using the OperatorSDK framework supported by RedHat as a basis for implementing the Kubernetes operator for Lightweigh... 详细信息
来源: 评论
Data Migration from Relational to NoSQL Database: Review and Comparative Study
Data Migration from Relational to NoSQL Database: Review a...
收藏 引用
International Conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Saadouni, Chaimae El Bouchti, Karim Reda, Oussama Mohamed Ziti, Soumia Department of Computer Science Intelligent Processing Systems and Security Team Mohammed V University Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Team Faculty of Sciences Mohammed V University Rabat Morocco
New storage requirements, analysis, and visualization of Big Data, which includes structured, semi-structured, and unstructured data, have caused the developers in the past decade to begin preferring Big Data database... 详细信息
来源: 评论
A Feature Fusion-Based Approach for Mammographic Mass Classification Using Deep Learning  1
收藏 引用
5th International Conference on Innovative Computing, IC 2022
作者: ur Rehman, Khalil Li, Jianqiang Pei, Yan Yasin, Anaa Ali, Saqib Saeed, Yousaf School of Software Engineering Beijing University of Technology Beijing China Beijing Engineering Research Center for IoT Software and Systems Beijing China Computer Science Division University of Aizu Aizuwakamatsu Japan
Breast cancer seems to be the most deadly cancer for females globally. Mammographic masse detection is essential for the early diagnosis of breast cancer. The manual detection of breast masses using texture analysis f... 详细信息
来源: 评论