咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是431-440 订阅
排序:
A new online field feature selection algorithm based on streaming data
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1365-1377页
作者: Zhang, Zhenjiang Song, Fuxing Zhang, Peng Chao, Han-Chieh Zhao, Yingsi School of Software Engineering Beijing Jiaotong University Beijing100044 China Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing100044 China School of Information Science and Engineering Fujian University of Technology Fuzhou350118 China School of Mathematics and Computer Science Wuhan Polytechnic University Wuhan430023 China Department of Electrical Engineering National Dong Hwa University Hualien97401 Taiwan School of Economics and Management Beijing Jiaotong University Beijing100044 China
The rapid development of Internet technology derived out a massive network text data. Therefore, how to classify the massive text data efficiently has important theoretical significance and application value. In order... 详细信息
来源: 评论
Reinforcement Learning based MIMO Controller for Virtual Inertia Control in Isolated Microgrids
Reinforcement Learning based MIMO Controller for Virtual Ine...
收藏 引用
2022 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2022
作者: Skiparev, Vjatseslav Belikov, Juri Petlenkov, Eduard Levron, Yoash Tallinn University of Technology Department of Software Science Tallinn Estonia Tallinn University of Technology Department of Computer Systems Tallinn Estonia Technion Faculty of Electrical Engineering Haifa Israel
In this paper, we propose a multi-input multi-output controller for optimal control of nonlinear energy storage, using deep reinforcement learning (DRL) algorithm. This controller provides the frequency support in an ... 详细信息
来源: 评论
CD-FL:Cataract Images Based Disease Detection Using Federated Learning
收藏 引用
computer systems Science & engineering 2023年 第11期47卷 1733-1750页
作者: Arfat Ahmad Khan Shtwai Alsubai Chitapong Wechtaisong Ahmad Almadhor Natalia Kryvinska Abdullah Al Hejaili Uzma Ghulam Mohammad Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz UniversityAlkharjSaudi Arabia School of Telecommunication Engineering Suranaree University of TechnologyNakhon Ratchasima30000Thailand Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Faculty of Computers&Information Technology Computer Science DepartmentUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan
A cataract is one of the most significant eye problems worldwide that does not immediately impair vision and progressively worsens over *** cataract prediction based on various imaging technologies has been addressed ... 详细信息
来源: 评论
Ontological Analysis of the Digital Crime Conceptual Model  18
Ontological Analysis of the Digital Crime Conceptual Model
收藏 引用
18th IEEE International Conference on computer Science and Information Technologies, CSIT 2023
作者: Vlasenko, Lidiia Lutska, Nataliia Zaiets, Nataliia Lysenko, Vitaliy State University of Trade and Economics dept. of Software Engineering and Cyber Security Kyiv Ukraine National University of Food Technologies dept. of Automation and Computer Technologies of Control Systems Kyiv Ukraine National University of Life and Environmental Sciences of Ukraine dept. of Automation and Robotic Systems Kyiv Ukraine
A conceptual ontological model of Digital Crime has been developed, consisting of five non-empty classes. Identification and classification were carried out according to the experience of domestic and foreign experts.... 详细信息
来源: 评论
Business Intelligence Model for Customer Targeting Using Fuzzy-C-Means and FP-Growth
Business Intelligence Model for Customer Targeting Using Fuz...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Sam Abdulilah Ahmed Mohammed Mogeeb A. Saeed Software Engineering Taiz University Taiz Yemen Computer Networks and Distributed systems Taiz University Taiz Yemen
In the era of business, business intelligence (BI) technology can inform the decision-maker of the right data and insight. In this study, a business intelligence model is built to help the marketing department build a...
来源: 评论
Coordinated PI-based frequency deviation control of isolated hybrid microgrid: An online multi-agent tuning approach via reinforcement learning
Coordinated PI-based frequency deviation control of isolated...
收藏 引用
2022 IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2022
作者: Nosrati, K. Tepljakov, A. Petlenkov, E. Levron, Y. Skiparev, V. Belikov, J. Tallinn University of Technology Department of Computer Systems Tallinn Estonia Technion Faculty of Electrical Engineering Haifa Israel Tallinn University of Technology Department of Software Science Tallinn Estonia
Numerous remote area applications welcome standalone renewable energy power generation systems or isolated microgrids (MGs). Due to the nature of solar and wind energy, the frequency deviation control (FDC) in hybrid ... 详细信息
来源: 评论
Interface Protection Against Transient Faults
Interface Protection Against Transient Faults
收藏 引用
IEEE Design and Diagnostics of Electronic Circuits and systems (DDECS)
作者: Ján Mach Lukáš Kohútka Pavel Čičák Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava Slovakia
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against ...
来源: 评论
Fingerprint matching,spoof and liveness detection:classification and literature review
收藏 引用
Frontiers of computer Science 2021年 第1期15卷 179-196页
作者: Syed Farooq ALI Muhammad Aamir KHAN Ahmed Sohail ASLAM Department of Software Engineering University of Management and TechnologyLahore 54770Pakistan Department of Informatics and Systems University of Management and TechnologyLahore 54770Pakistan Department of Computer Science University of Management and TechnologyLahore 54770Pakistan
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of *** recent decade,several technique... 详细信息
来源: 评论
Lockstep Vs Microarchitecture: A Comparison
Lockstep Vs Microarchitecture: A Comparison
收藏 引用
IEEE International SOC Conference
作者: Ján Mach Lukáš Kohútka Pavel Čičák Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava Slovakia
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks... 详细信息
来源: 评论
Tutorial: Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical systems (CPS) with NNV
Tutorial: Safe, Secure, and Trustworthy Artificial Intellige...
收藏 引用
IEEE/IFIP International Conference on Dependable systems and Networks – Supplemental Volume (DSN-S)
作者: Taylor T. Johnson Diego Manzanas Lopez Hoang-Dung Tran Computer Science Vanderbilt University Nashville TN Institute for Software Integrated Systems Vanderbilt University Nashville TN Computer Science and Engineering University of Nebraska Lincoln Lincoln NE
Ensuring safe, secure, and trustworthy artificial intelligence (AI), particularly within safety-critical systems like autonomous cyber-physical stems (CPS), is of paramount importance and of crucial urgency for depend... 详细信息
来源: 评论