咨询与建议

限定检索结果

文献类型

  • 3,248 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,650 篇 工学
    • 2,053 篇 计算机科学与技术...
    • 1,708 篇 软件工程
    • 491 篇 信息与通信工程
    • 428 篇 控制科学与工程
    • 236 篇 生物工程
    • 215 篇 电气工程
    • 175 篇 机械工程
    • 173 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 126 篇 光学工程
    • 114 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 92 篇 土木工程
    • 91 篇 动力工程及工程热...
    • 87 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,123 篇 理学
    • 587 篇 数学
    • 268 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 179 篇 统计学(可授理学、...
    • 82 篇 化学
  • 811 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 317 篇 工商管理
    • 311 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 119 篇 法学
    • 96 篇 社会学
  • 98 篇 经济学
    • 98 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 181 篇 computer science
  • 117 篇 computational mo...
  • 111 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 88 篇 machine learning
  • 86 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 81 篇 computer archite...
  • 81 篇 training
  • 73 篇 feature extracti...
  • 70 篇 data mining
  • 70 篇 artificial intel...
  • 69 篇 systems engineer...
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 63 篇 security

机构

  • 39 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 15 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 28 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 21 篇 zamli kamal z.
  • 21 篇 fashan yu
  • 20 篇 noraziah ahmad
  • 19 篇 xenofon koutsouk...
  • 17 篇 biswas gautam
  • 16 篇 herawan tutut
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,137 篇 英文
  • 385 篇 其他
  • 28 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4553 条 记 录,以下是861-870 订阅
排序:
Quantum Reinforcement Learning with Quantum World Model
Quantum Reinforcement Learning with Quantum World Model
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peigen Zeng Ying He F. Richard Yu Victor C.M. Leung Shenzhen Key Lab of Digital & Intelligent Technologies & Systems College of Computer Science and Software Engineering Shenzhen University China Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen China
Quantum reinforcement learning (QRL) can outperform classical reinforcement learning (RL) by utilizing quantum parallel theory and quantum phenomena such as superposition and entanglement. Although some excellent work...
来源: 评论
Resource Allocation for Cognitive Radio Inspired Non-Orthogonal Multiple Access Networks: A Quantum Soft Actor-Critic Method
Resource Allocation for Cognitive Radio Inspired Non-Orthogo...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Chao Huang Ying He Fei Yu Peigen Zeng Shenzhen Key Lab of Digital & Intelligent Technologies & Systems College of Computer Science and Software Engineering Shenzhen University China Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen China
With the growth of the communication industry, the demand for spectrum resources has been increasing steadily. However, the spectrum resources are limited and the utilization rate is low. In this case, Cognitive Radio...
来源: 评论
Towards Unified Field-Testing and Monitoring for Safe and Secure Robotic Applications
Towards Unified Field-Testing and Monitoring for Safe and Se...
收藏 引用
Workshop on Robotics software engineering (RoSE)
作者: Marco Stadler Stefan Biffl Michael Vierhauser Johannes Sametinger LIT SCSL / Inst. of Business Informatics - Software Eng. Johannes Kepler University Linz Austria CDL-SQI Institute of Information Systems Engineering TU Wien and CDP Vienna Austria Department of Computer Science University of Innsbruck Austria
Problems and failures that emerge in Cyber-Physical systems (CPSs), particularly in robotic applications, may originate from various sources, including software bugs, security incidents, hardware malfunctions, and hum... 详细信息
来源: 评论
Improving students’programming quality with the continuous inspection process:a social coding perspective
收藏 引用
Frontiers of computer Science 2020年 第5期14卷 43-60页
作者: Yao Lu Xinjun Mao Tao Wang Gang Yin Zude Li College of Computer National University of Defense TechnologyChangsha410073China Key Laboratory of Software Engineering for Complex Systems Changsha410073China School of Information Science and Engineering Central South UniversityChangsha410012China
College students majoring in computer science and software engineering need to master skills for high-quality ***,rich research has shown that both the teaching and learning of high-quality programming are challenging... 详细信息
来源: 评论
Symbolic Verification of Fuzzy Logic Models  23
Symbolic Verification of Fuzzy Logic Models
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software engineering
作者: Siang Zhao Zhongyang Li Zhenbang Chen Ji Wang College of Computer National University of Defense Technology China AND Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China College of Computer National University of Defense Technology China AND State Key Laboratory of High Performance Computing National University of Defense Technology China
Fuzzy logic is widely applied in various applications. However, verifying the correctness of fuzzy logic models can be difficult. This extended abstract presents our ongoing work on verifying fuzzy logic models. We tr... 详细信息
来源: 评论
Capability-based IoT access control using blockchain
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 463-469页
作者: Yue Liu Qinghua Lu Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang School of Computer Science and Engineering University of New South WalesAustralia Data61 CSIROAustralia Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesChina Department of Information Systems and Cyber Security University of Texas at San AntonioUSA Software Institute Nanjing UniversityChina
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and ***,the existing IoT access control solutions are mainly based on conventional identi... 详细信息
来源: 评论
Smart Pilot Decontamination Strategy for High and Low Contaminated Users in Massive MIMO-5G Network  16th
Smart Pilot Decontamination Strategy for High and Low Contam...
收藏 引用
16th International Conference on Information Technology and Applications, ICITA 2022
作者: Khan, Khalid Banoori, Farhad Adnan, Muhammad Zahoor, Rizwan Khan, Tarique Obite, Felix William, Nobel John Ahmad, Arshad Qayum, Fawad Nazir, Shah Beijing University of Posts and Telecommunications Beijing China Guangzhou China Institute of Software Systems Engineering Johannes Kepler University Linz Austria Linz Austria Department of Computer Science University of Swabi Swabi Pakistan University of Campania Luigi Vanvitelli Caserta Italy University of Politechnico Delle Marche Ancona Italy Department of Computer Science IT University of Malakand Totakan Pakistan Department of Physics Ahmadu Bello University Zaria Nigeria University of Valencia Valencia Spain
Massive multiple-input multiple-output (m-MIMO) is recognized as large-scale MIMO (LS-MIMO) and is a crucial podium for fifth-generation communication networks (5G) to reinforce spectral efficiency (SE) and capacity o... 详细信息
来源: 评论
Towards functional verifying a family of SystemC TLMs
收藏 引用
Frontiers of computer Science 2020年 第1期14卷 53-66页
作者: Tun LI Jun YE Qingping TAN College of Computer National University of Defense TechnologyChangsha 410073China Laboratory of Software Engineering for Complex Systems Changsha 410073China Jiangnan Institute of Computing Technology Wuxi 214083China
It is often the case that in the development of a system-on-a-chip(SoC)design,a family of SystemC transaction level models(TLM)is *** in the same family often share common functionalities but differ in their timing,im... 详细信息
来源: 评论
Optimizing Collective Building Management through a Machine Learning-based Decision Support System  4
Optimizing Collective Building Management through a Machine ...
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Guvencli, Mert Kiran, Halil Dogan, Erkan Dag, Hasan Ozyuruyen, Burcu Cakar, Tuna Apsiyon Informatics Sys. Inc. Software-Team Lead Istanbul Turkey Apsiyon Informatics Sys. Inc. Product-Team Lead Istanbul Turkey Apsiyon Informatics Sys. Inc. Software-Management CPO Istanbul Turkey Kadir Has University Informatics Management Systems Istanbul Turkey Apsiyon Informatics Sys. Inc. R and D and Innovation Incentives Sen. Sp. Istanbul Turkey MEF University Computer Engineering Istanbul Turkey
This study presents the design, implementation, and evaluation of a Decision Support System (DSS) developed for Collective Building Management. Given the potential advantages of machine learning techniques in this dom... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Anita Mihalovicsne Kollar Jozsef Katona Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kando Kalman Faculty of Electrical Engineering Obuda University Budapest Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论