咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是571-580 订阅
排序:
A Two-Stage Cooperative Reinforcement Learning Scheme for Energy-Aware Computational Offloading
A Two-Stage Cooperative Reinforcement Learning Scheme for En...
收藏 引用
IEEE Workshop on High Performance Switching and Routing
作者: Marios Avgeris Meriem Mechennef Aris Leivadeas Ioannis Lambadaris Department of Systems and Computer Engineering Carleton University Ottawa Canada Department of Software and IT Engineering École de Technologie supérieure (ÉTS) Montréal Canada
In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mo...
来源: 评论
Towards Modeling Functional Requirements From Tacit Knowledge
Towards Modeling Functional Requirements From Tacit Knowledg...
收藏 引用
computer Science, computer engineering, & Applied Computing (CSCE), Congress in
作者: Rameen Jafar Maram Fahaad Almufareh Sundas Ashraf Bushra Khan Wasi Haider Butt Mamoona Humayun Department of Computer and Software Engineering National University of Sciences and Technology Pakistan Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
来源: 评论
Towards Digital Twining of Lithium-ion Battery Management systems: An Extended Kalman Filter for State-of-Charge Estimation in Cloud-platform
Towards Digital Twining of Lithium-ion Battery Management Sy...
收藏 引用
IEEE Energy Conversion Congress and Exposition, ECCE
作者: Dominic Karnehm Latha Anekal Akash Samanta Antje Neve Sheldon Williamson Institute of Intelligent Distributed Systems Bundeswehr University Munich Neubiberg Germany Electrical Computer and Software Engineering Ontario Tech University ON Canada
In practice, extended Kalman filter (EKF) is one of the most popular lithium-ion battery (LIB) state of charge (SOC) estimation algorithms in electric vehicles onboard battery management system (BMS). With the increas...
来源: 评论
Dynamic Image Deblurring based on Crosshatch Attention Adversarial Network and Hybrid Loss
Dynamic Image Deblurring based on Crosshatch Attention Adver...
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Ummama Aslam Arslan Shaukat Basim Azam Dept. of Computer and Software Engineering College of Electrical and Mechanical Engineering (CEME) National University of Sciences and Technology (NUST) Islamabad Pakistan Institute of Integrated and Intelligent Systems Griffith University Brisbane Australia
Image deblurring techniques that uses deep learning have shown great potential but due to low generalizability, noise immunity and the correlation among different pixels is not addressed in detail that results in unwa...
来源: 评论
Security-Oriented Network Intent Placement using Particle Swarm Optimization
Security-Oriented Network Intent Placement using Particle Sw...
收藏 引用
Cyber Security in Networking Conference (CSNet)
作者: Gabriel Landeau Marios Avgeris Aris Leivadeas Ioannis Lambadaris Department of Software and IT Engineering École de technologie supérieure (ÉTS) Montréal Canada Department of Systems and Computer Engineering Carleton University Ottawa Canada
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio...
来源: 评论
Realization and Performance Tests of a Dual-Polarization Fiber Optic Gyroscope  8
Realization and Performance Tests of a Dual-Polarization Fib...
收藏 引用
8th Symposium on Novel Photoelectronic Detection Technology and Applications
作者: Zhou, Tong Zhu, Lanxin Cao, Yuwen Chen, Yanjun Huang, Huimin Li, Zhengbin School of Software and Microelectronics Peking University Beijing102600 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Peking University Beijing100871 China
Interferometric fiber optical gyroscopes (IFOGs) have become one of the widely used sensors of inertial technology and rotational seismology, owing to their high precision and stability. In recent years, the dual-pola... 详细信息
来源: 评论
Forecasting Breakdowns of Electric Motors of a Sugar Factory Using Machine Learning Methods  4
Forecasting Breakdowns of Electric Motors of a Sugar Factory...
收藏 引用
4th IEEE KhPI Week on Advanced Technology, KhPI Week 2023
作者: Zaiets, Nataliia Vlasenko, Lidiia Lutska, Nataliia Zhyltsov, Andrii Dept. of Automation and Robotic Systems National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine Dept. of Software Engineering and Cyber Security State University of Trade and Economics Kyiv Ukraine Dept. of Automation and Computer Technologies of Control Systems National University of Food Technologies Kyiv Ukraine Dept. of Electromagnetic Systems The Institute of Electrodynamics The National Academy of Sciences of Ukraine Kyiv Ukraine
The paper demonstrates the process of developing mathematical models for identifying breakdowns of electric motors using machine learning methods. The authors have developed three mathematical models for identifying b... 详细信息
来源: 评论
Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function Chains
Model Predictive Control for Automated Network Assurance in ...
收藏 引用
IEEE Symposium on Network Operations and Management
作者: Marios Avgeris Aris Leivadeas Nikolaos Athanasopoulos Ioannis Lambadaris Matthias Falkner Department of Systems and Computer Engineering Carleton University Ottawa Canada Department of Software and IT Engineering Ácole de technologie supérieure Montreal Canada School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast UK Cisco Systems Ottawa Canada
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
来源: 评论
Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack
SSRN
收藏 引用
SSRN 2023年
作者: Lederer, Tzvi Maimon, Gallil Rokach, Lior Software and Information Systems Engineering Ben Gurion University Beer Sheva Israel Computer Science The Hebrew University of Jerusalem Jerusalem Israel
We propose a stealthy and powerful backdoor attack on neural networks based on data poisoning. In contrast to previous attacks, both the poison and the trigger in our method are stealthy. We are able to change the mo... 详细信息
来源: 评论
PD-Refiner: An Underlying Surface Inheritance Refiner with Adaptive Edge-Aware Supervision for Point Cloud Denoising  24
PD-Refiner: An Underlying Surface Inheritance Refiner with A...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Chengwei Zhang, Xueyi Yue, Xianghu Lao, Mingrui Jiang, Tao Wang, Jiawei Zhang, Fubo Chen, Longyong National Key Laboratory of Microwave Imaging Aerospace Information Research Institute Chinese Academy of Sciences Beijing China Laboratory for Big Data and Decision National University of Defense Technology Hunan Changsha China Department of Electrical and Computer and Engineering National University of Singapore Singapore Singapore National Key Laboratory of Information Systems Engineering National University of Defense Technology Hunan Changsha China School of Software Engineering Tongji University Shanghai China
Point clouds from real-world scenarios inevitably contain complex noise, significantly impairing the accuracy of downstream tasks. To tackle this challenge, cascading encoder-decoder architecture has become a conventi... 详细信息
来源: 评论