咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是541-550 订阅
排序:
Enhancing Intrusion Detection systems Using RNN, LSTM, and Hybrid RNN-LSTM Models
Enhancing Intrusion Detection Systems Using RNN, LSTM, and H...
收藏 引用
Machine Learning and Autonomous systems (ICMLAS), International Conference on
作者: Sahar Ebadinezhad Nooshin Nooraei Nia Nasratullah Shirzad Nwabueze Kenneth Osemeha Department of Computer Information Systems Computer Information Systems Research and Technology Center (CISRTC) Near East University Nicosia Turkey Artificial Intelligence Near East University Nicosia North Cyprus Software Engineering Department Near East University Nicosia North Cyprus
Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class imbalances in complex network datasets, represe... 详细信息
来源: 评论
Control of Multipath Transmissions in the Nodes of Switching Segments of Reserved Paths  6
Control of Multipath Transmissions in the Nodes of Switching...
收藏 引用
6th International Scientific Conference on Information, Control, and Communication Technologies, ICCT 2022
作者: Bogatyrev, Vladimir A. Bogatyrev, Stanislav V. Bogatyrev, Anatoly V. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia Yadro Cloud Storage Development Center Saint Petersburg Russia
The options for ensuring timely delivery of packages to the addressee in networks with duplication of communication paths with the addressee for some subscribers are analyzed. Connecting subscribers to two communicati... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论
Choosing the Discipline of Restoring computer systems with Acceptable Degradation with Consolidation of Node Resources Saved After Failures  6
Choosing the Discipline of Restoring Computer Systems with A...
收藏 引用
6th International Scientific Conference on Information, Control, and Communication Technologies, ICCT 2022
作者: Bogatyrev, Vladimir A. Bogatyrev, Stanislav V. Bogatyrev, Anatoly V. Security Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Saint Petersburg Russia Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia Yadro Cloud Storage Development Center Saint Petersburg Russia
An approach to substantiating the choice of a discipline for the maintenance of a redundant computer system, with the possible use of node resources saved after failures, is considered. The choice is aimed at improvin... 详细信息
来源: 评论
Chaotification as a Method for the Treatment of Uncertainty
Chaotification as a Method for the Treatment of Uncertainty
收藏 引用
2021 International Conference on Data Science and Its Applications, ICoDSA 2021
作者: Benderskaya, Elena N. Great St. Petersburg Polytechnic University Computer Systems and Software Engineering Department St. Petersburg Russia
Chaotification of the systems is considered as a method for the implementation of the 'order-chaos' boundary computations. A natural phenomenon of the adaptation mechanism provided by self-organization is used... 详细信息
来源: 评论
University Distributed computer Network Vulnerability Assessment
University Distributed Computer Network Vulnerability Assess...
收藏 引用
2023 IEEE International Conference on Smart Information systems and Technologies, SIST 2023
作者: Lakhno, Valerii Malyukov, Volodimir Akhmetov, Bakhtyzhan Yagaliyeva, Bagdat Kryvoruchko, Olena Desiatko, Alona National University of Life and Environmental Sciences of Ukraine Department of Computer Systems Networks and Cybersecurity Kyiv Ukraine Abai Kazakh National Pedagogical University Department of Informatics and Informatization of Education Almaty Kazakhstan Department of Software Engineering and Cybersecurity State University of Trade and Economics Kyiv Ukraine
A methodology for evaluating information security (IS) for a distributed computer network (DCN) of a university (hereinafter referred to as UDCN) has been proposed. A mathematical model for calculating the UDCN vulner... 详细信息
来源: 评论
Optimizing Link-Identified Forwarding Framework in LEO Satellite Networks  21
Optimizing Link-Identified Forwarding Framework in LEO Satel...
收藏 引用
21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023
作者: Zhang, Hefan Wang, Zhiyuan Zhang, Shan Meng, Qingkai Luo, Hongbin School of Computer Science and Engineering Beihang University Beijing China Zhongguancun Laboratory Beijing China Institute of Artificial Intelligence Beihang University Beijing China State Key Laboratory of Software Development Environment China State Key Laboratory of Virtual Reality Technology and Systems China
Low earth orbit (LEO) satellite networks have the potential to provide low-latency communication with global coverage. To unleash this potential, it is crucial to achieve efficient data delivery. In this paper, we ana... 详细信息
来源: 评论
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
Innovations in Intelligent systems and Applications Conference
作者: Elif Kanca Tolgahan Gulsoy Arda Ustubioglu Beste Ustubioglu Selen Ayas Elif Baykal Kablan Guzin Ulutas Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论
Uvlhub: A Feature Model Data Repository Using Uvl and Open Science Principles
SSRN
收藏 引用
SSRN 2023年
作者: Romero-Organvidez, David Galindo, José A. Sundermann, Chico Horcas, Jose-Miguel Benavides, David Department of Computer Languages and Systems University of Seville Spain Institute of Software Engineering and Programming Languages Ulm University Germany CAOSD ITIS Software University of Málaga Spain
Feature models are the de facto standard for modelling variabilities and commonalities. Concrete models in different domains exist;however, many are in private or sparse repositories or belong to discontinued projects... 详细信息
来源: 评论
Empowering Personalized Health Data Queries with Knowledge Graph and GPT-Enhanced Voice Assistant  25
Empowering Personalized Health Data Queries with Knowledge G...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Wang, Xin Ul Hasan, Wordh Li, Juan Hendawi, Rasha Du, Yang Xie, Bo Tao, Cui North Dakota State University Department of Computer Science Fargo United States Valley City State University Department of Computer Systems and Software Engineering Valley City United States School of Nursing The University of Texas at Austin Austin United States School of Biomedical Informatics University of Texas Health Science Center at Houston Houston United States
The proliferation of digital health technologies has led to an abundance of personal health data. However, querying and retrieving specific health-related information from disparate sources can be challenging and inco... 详细信息
来源: 评论