咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是651-660 订阅
排序:
RAT: A Refactoring-Aware Traceability Model for Bug Localization
RAT: A Refactoring-Aware Traceability Model for Bug Localiza...
收藏 引用
International Conference on software engineering (ICSE)
作者: Feifei Niu Wesley K. G. Assunção LiGuo Huang Christoph Mayr-Dorn Jidong Ge Bin Luo Alexander Egyed State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science and Engineering Southern Methodist University Dallas Texas USA
A large number of bug reports are created during the evolution of a software system. Locating the source code files that need to be changed in order to fix these bugs is a challenging task. Information retrieval-based...
来源: 评论
Towards a Smart Home : An Intelligent Approach to Environment Monitoring and Anti-Theft Alarming
Towards a Smart Home : An Intelligent Approach to Environmen...
收藏 引用
International Conference on Awareness Science and Technology (iCAST)
作者: Ravitha Wathsala Malith Silva Ravindu Kodikara Sadev Ekanayake Narmada Gamage Poojani Gunathilake Department of Computer Systems Engineering Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka Department of Computer Science & Software Engineering Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitor...
来源: 评论
A New Application of Machine Learning: Detecting Errors in Network Simulations  22
A New Application of Machine Learning: Detecting Errors in N...
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Maciej K. Wozniak Luke Liang Hieu Phan Philippe J. Giabbanelli Department of Intelligent Systems KTH Royal Institute of Technology Stockholm SWEDEN Department of Computer Science & Software Engineering Miami University Oxford OH USA
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, imp...
来源: 评论
Location Intelligence Based Smart E-Commerce Platform for Residential Real-Estate Industry  3
Location Intelligence Based Smart E-Commerce Platform for Re...
收藏 引用
3rd International Conference on Smart Electronics and Communication, ICOSEC 2022
作者: Balasooriya, Tharindu Kavishka, Lakindu Dananjana, Isini Yumna, Maryam Thelijjagoda, Samantha Attanayaka, Buddhima Marasinghe, Lanil Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Sliit Business School Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Sysco Labs Colombo Sri Lanka
Making the decision to purchase or invest in real estate can be a very crucial process due to its high financial risk. The purchasing decision of residential real estate properties can be even more decisive because, a... 详细信息
来源: 评论
The ABLoTS Approach for Bug Localization: is it replicable and generalizable?
The ABLoTS Approach for Bug Localization: is it replicable a...
收藏 引用
International Mining software Repositories, MSR
作者: Feifei Niu Christoph Mayr-Dorn Wesley K. G. Assunção LiGuo Huang Jidong Ge Bin Luo Alexander Egyed State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science and Engineering Southern Methodist University Dallas Texas USA
Bug localization is the task of recommending source code locations (typically files) that probably contain the cause of a bug and hence need to be changed to fix the bug. Along these lines, information retrieval-based...
来源: 评论
Suggestion Mining from Opinionated Text of Big Social Media Data
收藏 引用
computers, Materials & Continua 2021年 第9期68卷 3323-3338页
作者: Youseef Alotaibi Muhammad Noman Malik Huma Hayat Khan Anab Batool Saif ul Islam Abdulmajeed Alsufyani Saleh Alghamdi Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Software Engineering Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Computer Sciences Institute of Space TechnologyIslamabadPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f... 详细信息
来源: 评论
SID: Service Identification and Discovery Framework for Decentralised Supply Chains
SID: Service Identification and Discovery Framework for Dece...
收藏 引用
software Services engineering (SSE) IEEE International Conference on
作者: Hang Zhao Helen Paik Qin Wang Shining Chen School of Computer Science and Engineering The University of New South Wales Sydney Australia Software Systems Group CSIRO Data61 Sydney Australia
The traditional decentralised supply chains are facing challenges to meet the increasing demands for openness, transparency, trust and efficiency. As a result, blockchain-based decentralised supply chains are emerging...
来源: 评论
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 288-298页
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kandiy, Sergey Smirnov, Oleksii Ulianovska, Yuliia Kobylianska, Olena Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security Faculty of Comupter Science V. N. Karazin Kharkiv National University 4 Svobody Sq Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Cybersecurity & Software Academic Department Central Ukrainian National Technical University 8 University Avenue Kropyvnytskyi25006 Ukraine Department of Computer Science and Software Engineering University of Customs and Finance Vernadskogo Street 2/4 Dnipro49000 Ukraine
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o... 详细信息
来源: 评论
Modeling and Real-Time Simulation of Microgrid Components Using Systemc-Ams
Modeling and Real-Time Simulation of Microgrid Components Us...
收藏 引用
Simulation Winter Conference
作者: Rahul Bhadani Gabor Karsai Hao Tu Srdjan Lukic Institute for Software Integrated Systems Vanderbilt University Nashville TN USA Electrical and Computer Engineering North Carolina State University Raleigh NC USA
Microgrids are localized power systems that can function independently or alongside the main grid. They consist of interconnected generators, energy storage, and loads that can be managed locally. Using SystemC-AMS, w...
来源: 评论
Enhancing Intrusion Detection systems Using RNN, LSTM, and Hybrid RNN-LSTM Models  2
Enhancing Intrusion Detection Systems Using RNN, LSTM, and H...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Ebadinezhad, Sahar Nia, Nooshin Nooraei Shirzad, Nasratullah Osemeha, Nwabueze Kenneth Near East University Department of Computer Information Systems Nicosia99138 Cyprus Artificial Intelligence Near East University Nicosia Cyprus Near East University Software Engineering Department Nicosia Cyprus
Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class imbalances in complex network datasets, represe... 详细信息
来源: 评论