咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是521-530 订阅
排序:
Modified Metaheuristics with Transfer Learning Based Insect Pest Classification for Agricultural Crops
收藏 引用
computer systems Science & engineering 2023年 第9期46卷 3847-3864页
作者: Saud Yonbawi Sultan Alahmari T.Satyanarayana murthy Ravuri Daniel E.Laxmi Lydia Mohamad Khairi Ishak Hend Khalid Alkahtani Ayman Aljarbouh Samih M.Mostafa Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia King Abdul Aziz City for Science and Technology RiyadhKingdom of Saudi Arabia Chaitanya Bharathi Institute of Technology HyderabadTelanganaIndia Department of Computer Science and Engineering Prasad V.Potluri Siddhartha Institute of TechnologyVijayawadaIndia Department of Computer Science and Engineering GMR Institute of TechnologyAndhra PradeshRajamIndia School of Electrical and Electronic Engineering Engineering CampusUniversiti Sains Malaysia(USM)Nibong TebalPenangMalaysia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversitySaudi Arabia Department of Computer Science University of Central AsiaNarynKyrgyzstan Faculty of Computers and Information South Valley UniversityQenaEgypt
Crop insect detection becomes a tedious process for agronomists because a substantial part of the crops is damaged,and due to the pest attacks,the quality is *** are the major reason behind crop quality degradation an... 详细信息
来源: 评论
An Exact Formula for the Hazardous Event Frequency
An Exact Formula for the Hazardous Event Frequency
收藏 引用
Annual Symposium on Reliability and Maintainability (RAMS)
作者: Armin Zimmermann Andreas Hildebrandt Department of Computer Science and Automation Systems and Software Engineering Group Technische Universität Ilmenau Ilmenau Germany Pepperl+Fuchs SE Mannheim Germany
The remaining risk of safety-instrumented systems is an important non-functional requirement that is regulated by international standards. Several ways towards computing the safety as a function of its relevant design...
来源: 评论
Sensor data modeling with Bayesian networks
Sensor data modeling with Bayesian networks
收藏 引用
2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2022
作者: Silva, Carla Rodrigues, Arlete Jorge, Alipio Dutra, Ines Bosch Security Systems - Sistemas de Segurança S.A. FIR Software Engineering Ovar Ovar Portugal University of Porto LIAAD Department of Computer Science Porto Portugal University of Porto CINTESIS Department of Computer Science Porto Portugal
This research aims to extract knowledge of sensors behavior resorting to Bayesian networks (BNs) and dynamic Bayesian networks (DBNs), a time-based BN version. These two types of models belong to the group of probabil... 详细信息
来源: 评论
An Effective Detection of Brain Tumor Detection Using ResNet-50 Model
An Effective Detection of Brain Tumor Detection Using ResNet...
收藏 引用
Advancement in Renewable Energy and Intelligent systems (AREIS), International Conference on
作者: V. Raji S. Maheswari S. Sree Dharinya P. Chinniah Kavin K. S. Kiruba Thangam Raja Dept. of Information Technology S.K.P. Engineering College Tiruvannamalai India Dept. of CSE(IoT) Nandha Engineering College Erode Tamilnadu India Dept. of Software and Systems Engineering School of Computer Science Engineering and Information Systems VIT University Vellore India Dept. of ECE ST. Joseph College of Engineering Sriperumbudur Tamilnadu India Dept. of EEE Government College of Engineering Tirunelveli Tamil Nadu India Dept. of Software and Systems Engineering School of Computer Science Engineering and Information Systems(SCORE) VIT University Vellore India
Rapid proliferation of aberrant neurons in brain tumors significantly damages organ function or causes death, endangering adult health. These tumors vary widely in terms of their locations, sizes, and textures. Findin... 详细信息
来源: 评论
Keep It Simple: Towards Accurate Vulnerability Detection for Large Code Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Peng, Xin Wang, Shangwen Qin, Yihao Lin, Bo Chen, Liqian Mao, Xiaoguang Cheng, Jieren The Key Laboratory of Software Engineering for Complex Systems College of Computer Science and Technology National University of Defense Technology Changsha China The Hainan University Haikou China
software vulnerability detection is crucial for high-quality software development. Recently, some studies utilizing Graph Neural Networks (GNNs) to learn the graph representation of code in vulnerability detection tas... 详细信息
来源: 评论
Machine Learning Algorithms for Intrusion Detection Performance Evaluation and Comparative Analysis  4
Machine Learning Algorithms for Intrusion Detection Performa...
收藏 引用
4th International Conference on Smart Electronics and Communication, ICOSEC 2023
作者: Irfan, B. Md. Poornima, V. Mohana Kumar, S. Aswal, Upendra Singh Krishnamoorthy, N. Maranan, Ramya Nalsar University of Law Department of Information Technology Telengana Hyderabad500101 India VISTAS Pallavaram Department of Computer Science Chennai India Ramaiah Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru560054 India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun248002 India Vellore Institute of Technology Vellore Campus Department of Software Systems and Engineering Tamilnadu Vellore632014 India Saveetha School of Engineering Simats Department of Research and Innovation Tamil Nadu Chennai600124 India
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection s... 详细信息
来源: 评论
Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns
Design, Modeling and Simulation of Cybercriminal Personality...
收藏 引用
Simulation Winter Conference
作者: Jeongkeun Shin Geoffrey B. Dobson L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims' human factors affect... 详细信息
来源: 评论
Gymnasium Library Interface for Multi Access Edge Computing
Gymnasium Library Interface for Multi Access Edge Computing
收藏 引用
International Conference on Control systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)
作者: Ivan Filianin Alexander Kapitonov Artem Timoshchuk-Bondar Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
This paper addresses the problem of developing reinforcement learning algorithms for capsule placement decision making tasks in a geo-distributed Multi Access Edge Computing environment. A Python library called gym-Iw... 详细信息
来源: 评论
Image Classification Analysis to Identify the Tourism Potential Sukabumi on Instagram Using A Deep Learning Approach
Image Classification Analysis to Identify the Tourism Potent...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Falentino Sembiring Rieska Rahayu Ayuningsih Muhamad Muslih Muhammad Andy Maulana Gina Wahdayani Futri Mohd Zainuri Saringat Rachma Siva Ainunnisa Anggun Fergina Information Systems Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan... 详细信息
来源: 评论
Learn, Compare, Search: One Sawmill’s Search for the Best Cutting Patterns Across and/or Trees  17th
Learn, Compare, Search: One Sawmill’s Search for the Best...
收藏 引用
17th International Conference on Learning and Intelligent Optimization, LION-17 2023
作者: Ménard, Marc-André Morin, Michael Khachan, Mohammed Gaudreault, Jonathan Quimper, Claude-Guy FORAC Research Consortium Université Laval QuébecQC Canada CRISI Research Consortium for Industry 4.0 Systems Engineering Université Laval QuébecQC Canada Department of Computer Science and Software Engineering Université Laval QuébecQC Canada Department of Operations and Decision Systems Université Laval QuébecQC Canada FPInnovations QuébecQC Canada
A sawmilling process scans a wood log and must establish a series of cutting and rotating operations to perform in order to obtain the set of lumbers having the most value. The search space can be expressed as an and/... 详细信息
来源: 评论