咨询与建议

限定检索结果

文献类型

  • 3,244 篇 会议
  • 1,228 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,656 篇 工学
    • 2,065 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 494 篇 信息与通信工程
    • 428 篇 控制科学与工程
    • 236 篇 生物工程
    • 216 篇 电气工程
    • 175 篇 机械工程
    • 174 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 114 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 179 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 317 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 119 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 117 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 87 篇 machine learning
  • 85 篇 laboratories
  • 84 篇 accuracy
  • 80 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 69 篇 artificial intel...
  • 66 篇 software testing
  • 63 篇 wireless sensor ...
  • 63 篇 cloud computing
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 28 篇 buyya rajkumar
  • 27 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,348 篇 英文
  • 165 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4544 条 记 录,以下是701-710 订阅
排序:
Implementation of Malaria Detection Using MobileNetV2 Pretrained Model for Improved Deep Learning Based Diagnostics
Implementation of Malaria Detection Using MobileNetV2 Pretra...
收藏 引用
International Conference on Computing, engineering, and Design (ICCED)
作者: Rahmat Hidayat Achmad Solichin Adhitia Erfina Sudin Saepudin Muhamad Muslih Mohd Zainuri Saringat Master of Computer Science Budi Luhur University Jakarta Indonesia Information Systems Study Program Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Tun Hussein Onn Malaysia University
The Plasmodium parasite, which causes malaria, is an acute fever illness that infects people when a female Anopheles mosquito bites them. It is predicted that malaria would claim 619,000 lives in 2021, with 96% of tho... 详细信息
来源: 评论
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Search Based on Knowledge Graph
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Se...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Yuxin Zhao Xinjun Mao Tanghaoran Zhang Zhang Zhang College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China
Reusing ROS components, specifically ROS Nodes, is crucial for improving the efficiency and quality of robotic software development. However, developers face challenges in finding the desired ROS Nodes for reuse due t...
来源: 评论
A Reinforcement Learning Approach for Robust Supervisory Control of Uavs Under Disturbances
SSRN
收藏 引用
SSRN 2023年
作者: Ahmed, Ibrahim Quinones-Grueiro, Marcos Biswas, Gautam Electrical and Computer Engineering Institute for Software Integrated Systems Vanderbilt University 1025 16th Ave S NashvilleTN37212 United States Computer Science Institute for Software Integrated Systems Vanderbilt University 1025 16th Ave S NashvilleTN37212 United States
In this work, we present an approach to supervisory reinforcement learning control for unmanned aerial vehicles (UAVs). UAVs are dynamic systems where control decisions in response to disturbances in the environment h... 详细信息
来源: 评论
Smart Advertising Based on Customer Preferences and Manage the Supermarket  4
Smart Advertising Based on Customer Preferences and Manage t...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Eishan Dinuka, W.H.A. Wickramasinghe, A.Y.S.W. Weerasinghe, W.S.H. Karunaratne, K.P.G. Liyanapathirana, Chethana Rupasinghe, Lakmal Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
As a developing country, Sri Lanka needs to go along with cutting-edge technologies. In the beginning phase of this digital advertising, multiple advertisements were displayed on the users' feeds, including advert... 详细信息
来源: 评论
Enhancing Cybersecurity using Machine Learning Strategies for Phishing Defense
Enhancing Cybersecurity using Machine Learning Strategies fo...
收藏 引用
International Conference on Communication and Electronics systems (ICCES)
作者: C. Jamunadevi S. Pandikumar Naveen N S. Prasath Dhivyashree S Department of Computer Technology PG Kongu Engineering College Perundurai Erode Department of MCA Acharya Institute of technology Bangalore Department of IT Excel Engineering College Komarapalayam Department of Computer Science VET Institute of Arts and Science (Co-education) college Thindal MSc (Software Systems) Kongu Engineering College Perundurai Erode
Cybersecurity experts continue to be concerned about phishing attacks because it causes a real risk to people, businesses, and economies all around the world. Phishing attacks cause a critical threat to global cyberse... 详细信息
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
An Efficient Community-based Approach for the Influence Maximization Problem in Social Networks  10
An Efficient Community-based Approach for the Influence Maxi...
收藏 引用
10th IEEE International Conference on Intelligent Computing and Information systems, ICICIS 2021
作者: Samir, Ahmed M. Rady, Sherine Gharib, Tarek F. Kafrelsheikh University Faculty of Computer and Information Sciences Software Engineering Department Kafrelsheikh Egypt Ain Shams University Faculty of Computer and Information Sciences Information Systems Department Cairo Egypt
The problem of detecting top influential users in social networks is known as the influence maximization problem. Top social network influencers play a significant role in different fields like virtual marketing, poli... 详细信息
来源: 评论
Novel Approach for Enhancing Mental Well-Being Through Machine Learning Techniques
Novel Approach for Enhancing Mental Well-Being Through Machi...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: O.V.D.E Roshani H.M.K.J.J Ayuwardhana P.H.M.S Rodrigo R.U Hewageegana Harinda Fernando Dilshan I. de Silva Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Frequently, individuals undergo specific episodes of mental health challenges throughout their lifetime. But the COVID pandemic has triggered a surge in mental health disorders arising from isolation, monotonous routi...
来源: 评论
DomainDemo: a dataset of domain-sharing activities among different demographic groups on Twitter
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Kai-Cheng Goel, Pranav Quintana-Mathé, Alexi Horgan, Luke McCabe, Stefan D. Grinberg, Nir Joseph, Kenneth Lazer, David Network Science Institute Northeastern University BostonMA United States Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Be’er-Sheva Israel Computer Science and Engineering Department University at Buffalo BuffaloNY United States
Social media play a pivotal role in disseminating web content, particularly during elections, yet our understanding of the association between demographic factors and political discourse online remains limited. Here, ... 详细信息
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng School of Computer Science University of Bristol United Kingdom Department of Information and Computing Science School of Mathematical Science Peking University China Department of Software Systems and Cybersecurity Monash University Australia School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Engineering Nanyang Technological University Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论