咨询与建议

限定检索结果

文献类型

  • 3,234 篇 会议
  • 1,222 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,644 篇 工学
    • 2,056 篇 计算机科学与技术...
    • 1,707 篇 软件工程
    • 491 篇 信息与通信工程
    • 426 篇 控制科学与工程
    • 233 篇 生物工程
    • 215 篇 电气工程
    • 174 篇 机械工程
    • 174 篇 电子科学与技术(可...
    • 172 篇 生物医学工程(可授...
    • 125 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 89 篇 动力工程及工程热...
    • 89 篇 土木工程
    • 87 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,118 篇 理学
    • 583 篇 数学
    • 266 篇 生物学
    • 220 篇 物理学
    • 202 篇 系统科学
    • 176 篇 统计学(可授理学、...
    • 82 篇 化学
  • 809 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 313 篇 工商管理
    • 308 篇 图书情报与档案管...
  • 160 篇 医学
    • 149 篇 临床医学
    • 125 篇 基础医学(可授医学...
  • 118 篇 法学
    • 94 篇 社会学
  • 98 篇 经济学
    • 98 篇 应用经济学
  • 97 篇 教育学
    • 96 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 117 篇 computational mo...
  • 108 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 81 篇 accuracy
  • 79 篇 computer archite...
  • 79 篇 training
  • 78 篇 deep learning
  • 73 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 60 篇 security

机构

  • 36 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 20 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,392 篇 英文
  • 105 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4528 条 记 录,以下是221-230 订阅
排序:
A Blockchain-Based Framework for Efficient and Secure E-Certification Sharing and Verification
A Blockchain-Based Framework for Efficient and Secure E-Cert...
收藏 引用
Information Technology (ACIT)
作者: Mahmoud Obaid Allam Abumwais Rami Hodrob Suhail Odeh Computer Systems Engineering Arab American University Jenin Palestine Software Engineering Bethlehem University Bethlehem Palestine
It is against this backdrop of the cumbersome and time-consuming process of academic certificate validation in Palestine that we proffer an innovative blockchain-based solution. Automation of certificate creation and ... 详细信息
来源: 评论
Research and development of an information system for speech recognition based on neural network algorithms metrics  4
Research and development of an information system for speech...
收藏 引用
4th IEEE International Conference on Smart Information systems and Technologies, SIST 2024
作者: Kanashev, Maksat Mukasheva, Assel Yedilkhan, Didar Rakhmetulaeva, Sabina Gnatyuk, Sergiy Nazym, Mirambayeva Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The Department of Computer Engineering Astana IT University Astana Kazakhstan The Department of Information Systems International University of Information Technologies Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th... 详细信息
来源: 评论
A Deep Learning-Based Approach for Mammographic Architectural Distortion Classification  1
收藏 引用
5th International Conference on Innovative Computing, IC 2022
作者: ur Rehman, Khalil Li, Jianqiang Pei, Yan Yasin, Anaa Ali, Saqib School of Software Engineering Beijing University of Technology Beijing China Beijing Engineering Research Center for IoT Software and Systems Beijing China Computer Science Division University of Aizu Aizuwakamatsu Japan
Breast cancer is the most deadly cancer in females globally. Architectural distortion is the third most often reported irregularity on digital mammograms among the masses and microcalcification. Physically identifying... 详细信息
来源: 评论
Special Issue: Cybersecurity in Manufacturing
收藏 引用
Journal of Computing and Information Science in engineering 2024年 第7期24卷 070201页
作者: Ameta, Gaurav Bukkapatnam, Satish Li, Dan Tian, Wenmeng Yampolskiy, Mark Zhang, Fan Siemens Corporate Research PrincetonNJ08540 United States Department of Industrial and Systems Engineering Texas A&M University College StationTX77843 United States Department of Industrial Engineering Clemson University ClemsonSC29634 United States Department of Industrial and Systems Engineering Mississippi State University Mississippi StateMS39762 United States Department of Computer Science and Software Engineering Auburn University AuburnAL36849 United States School of Mechanical Engineering Georgia Institute of Technology AtlantaGA30318 United States
The landscape of cybersecurity in manufacturing exhibits a dynamic interplay between evolving threats and vulnerabilities against innovative defense mechanisms. With the increasing adoption of smart and cloud-controll... 详细信息
来源: 评论
Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities
Extending ISO 15118-20 EV Charging: Preventing Downgrade Att...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Ross Porter Morteza Biglari-Abhari Benjamin Tan Duleepa Thrimawithana Electrical Computer Systems & Software Engineering Department University of Auckland Auckland New Zealand Department of Electrical and Software Engineering University of Calgary Calgary Canada
Previous works have identified that EV charging can be weaponised to attack the power grid. As a case study, we consider the newest charging protocol ISO 15118–20, which provides a high-level communication protocol f... 详细信息
来源: 评论
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论
Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things
收藏 引用
SN computer Science 2023年 第5期4卷 454页
作者: Lazar, Arokia Jesu Prabhu Soundararaj, Sivaprakash Sonthi, Vijaya Krishna Palanisamy, Vishnu Raja Subramaniyan, Vanithamani Sengan, Sudhakar Department of Computer Science and Engineering AI & ML CMR Institute of Technology Telangana Hyderabad 501401 India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore 632014 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram 522502 India Department of Computer Science and Engineering Kongu Engineering College Tamil Nadu Perundurai 638060 India Master of Computer Applications M. Kumarasamy College of Engineering Tamil Nadu Karur 638060 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Agriculture, energy, mining, healthcare, and transportation are a few of the top industries transformed by the industrial internet of things (IIoT). Industry 4.0 mainly relies on machine learning (ML) to use the vast ... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques  13
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Rehida, Pavlo Markowsky, George Sachenko, Anatoliy Savenko, Oleg Khmelnytskyi National University Department of Computer Engineering and Information Systems Khmelnytskyi Ukraine Kennesaw State University Department of Software Engineering and Game Development Marietta United States Kazimierz Pulaski University of Technology and Humanities Department of Informatics Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog... 详细信息
来源: 评论
Reliability of Multipath Networks with Optimization of the Location of Inter-Path Communication Nodes
Reliability of Multipath Networks with Optimization of the L...
收藏 引用
2023 International Russian Smart Industry Conference, SmartIndustryCon 2023
作者: Bogatyrev, Vladimir A. Tu Le, Anh Abramova, Evgenia A. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia University ITMO Faculty of Software Engineering and Computer Technology Saint Peterburg Russia
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p... 详细信息
来源: 评论
Reliability of a Reconfigurable Network with Segment Switching
Reliability of a Reconfigurable Network with Segment Switchi...
收藏 引用
2023 Wave Electronics and its Application in Information and Telecommunication systems, WECONF 2023
作者: Tu, Le Anh Bogatyrev, V.A. Abramova, E.A. ITMO University Faculty of Software Engineering and Computer Technology Saint Peterburg Russia Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ... 详细信息
来源: 评论