咨询与建议

限定检索结果

文献类型

  • 3,244 篇 会议
  • 1,228 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,656 篇 工学
    • 2,065 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 494 篇 信息与通信工程
    • 428 篇 控制科学与工程
    • 236 篇 生物工程
    • 216 篇 电气工程
    • 175 篇 机械工程
    • 174 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 114 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 179 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 317 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 119 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 117 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 87 篇 machine learning
  • 85 篇 laboratories
  • 84 篇 accuracy
  • 80 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 69 篇 artificial intel...
  • 66 篇 software testing
  • 63 篇 wireless sensor ...
  • 63 篇 cloud computing
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 28 篇 buyya rajkumar
  • 27 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,348 篇 英文
  • 165 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4544 条 记 录,以下是961-970 订阅
排序:
CovDNet: A Hybrid Multi - Level Densely Connected Neural Network for Improvised Analysis and Classification of COVID-19 Using Chest CT-Scans
CovDNet: A Hybrid Multi - Level Densely Connected Neural Net...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Deepa S Praveenkumar G D R Suguna Vivek Duraivelu C Jamunadevi S G Sundhar Department of Computer Technology-PG Kongu Engineering College Perundurai Erode Tamilnadu Department of computer science Vet institute of Arts and Science (Co-Education) College Erode Tamilnadu Department of Computer science and Engineering Bannari Amman Institute of Technology Sathyamangalam Department of Computer Science and Engineering B V Raju Institute of Technology Narsapur Telangana Department of Computer Technology PG Kongu Engineering College Perundurai Erode Tamilnadu Final M.Sc(Software Systems) Kongu Engineering College Perundurai Erode Tamilnadu
COVID-19, caused by the new coronavirus SARS-Co V-2, has turned into a worldwide health emergency, needing speedy and precise diagnostic techniques. This abstract provides a thorough evaluation of research works focus...
来源: 评论
QSroute : A QoS Aware Routing Scheme for software Defined Networking
QSroute : A QoS Aware Routing Scheme for Software Defined Ne...
收藏 引用
International Conference on software engineering and computer systems (ICSECS)
作者: Imran Edzereiq Kamarudin Mohamed Ariff Ameedeen Muhamad Idaham Umar Ong Azlee Zabidi Department of Computer Systems and Networking Faculty of Computing Universiti Malaysia Pahang AL-Sultan Abdullah Pekan Malaysia Department of Software Engineering Faculty of Computing Universiti Malaysia Pahang AL-Sultan Abdullah Pekan Malaysia
The increasing demand for bandwidth-intensive network applications, such as video streaming, multimedia, and Internet of Things (IoT) applications, necessitates improved resource management to protect the network with...
来源: 评论
Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant Security Controls
arXiv
收藏 引用
arXiv 2024年
作者: Gupta, Deepti Elluri, Lavanya Jain, Avi Moni, Shafika Showkat Aslan, Omer Dept. of Computer Information Systems Texas A&M University - Central Texas TX United States College of Business University of Tampa Florida United States Dept. of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Florida United States Department of Software Engineering Bandırma Onyedi Eylül University Bandırma Turkey
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks... 详细信息
来源: 评论
NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks
NESec: A Modified-UI Honeyword Generation Strategy for Mitig...
收藏 引用
Cyber Security in Networking Conference (CSNet)
作者: Nilesh Chakraborty Mohammad Shojafar Zhuangzhuang Chen Victor C. M. Leung Jianqiang Li Mohammad Zulkernine School of Computing Queen's University Canada 5GIC & 6GIC Institute for Communication Systems University of Surrey United Kingdom College of Computer Science and Software Engineering Shenzhen University China
By harnessing Graphics Processing Unit (GPU), Field-programmable Gate Array (FPGA), and advanced cracking techniques, the success rates of server-side threats on passwords have reached unprecedented levels. Honeywords...
来源: 评论
Career Aura-Smart Resume and Employment Recommender  3
Career Aura-Smart Resume and Employment Recommender
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Dissanayake, Kavindi Mendis, Senidu Subasinghe, Randula Geethanjana, Dineth Lunugalage, Dilani Kasthurirathna, Dharshana Sri Lanka Institute of Information Technology Computer Systems Engineering Department Malabe Sri Lanka Sri Lanka Institute of Information Technology Information Technology Department Malabe Sri Lanka Sri Lanka Institute of Information Technology Computer Science and Software Engineering Department Malabe Sri Lanka
Recruitment and Job seeking are two major factors that are directly proportional to each other. Due to the competitive nature of the present world, the process of acquiring the best resource effectively and efficientl... 详细信息
来源: 评论
An Investigation Method Incorporates with Contextual Information and Transformer Residual BiLSTM to Improve the Accuracy of Detecting Sensitive Content in Various Contexts
An Investigation Method Incorporates with Contextual Informa...
收藏 引用
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
作者: Niharika Karne Chandra Shekar Ramagundam Ranga Rao Patnala Shashishekhar Ramagundam Sai Nitisha Tadiboina Department of Electrical Engineering Masters in Electrical Engineering Sr. Principal Systems Engineer in C&RS Platform Services DT Amtrak University of South Alabama USA Senior Software Engineer in Cloud Platform Services City Of Philadelphia Pennsylvania USA Vice President US AL. Department of Computer Science Masters In Computer Science Software Development & Engineering in Content Discovery & AI Comcast Troy University Montgomery Campus USA Department of Information Technology GEICO - Chevy Chase MD United States
In the modern era, the internet is an emerging technology with a rapidly growing user. Sensitive content uploaders consider this platform as a way to transmit disturbing visual content, such as animated cartoon videos... 详细信息
来源: 评论
Quantifying Information Exposure by Web Browsers
Quantifying Information Exposure by Web Browsers
收藏 引用
Future Technologies Conference, FTC 2020
作者: Mohsen, Fadi Shehab, Mohamed Lange, Maxamilliano Karastoyanova, Dimka Department of Computer Science Bernoulli Institute University of Groningen Groningen Netherlands Department of Software and Information Systems University of North Carloina at Charlotte Charlotte United States Department of Computer Science Engineering and Physics University of Michigan-Flint Flint United States
Internet surfing entails exchanging numerous HTTP requests between clients and servers. Attached with each request is a string containing plenty of information about the client called User-Agent string. There have bee... 详细信息
来源: 评论
MIMO-Terahertz in 6G Nano-Communications:Channel Modeling and Analysis
收藏 引用
computers, Materials & Continua 2021年 第1期66卷 263-274页
作者: Shahid Bashir Mohammed H.Alsharif Imran Khan Mahmoud A.Albreem Aduwati Sali Borhanuddin Mohd Ali Wonjong Noh Business Studies Department Namal InstituteMianwali42250Pakistan Department of Electrical Engineering College of Electronics and Information EngineeringSejong UniversitySeoul05006South Korea Department of Electrical Engineering University of Engineering and Technology PeshawarPeshawar814Pakistan Department of Electronics and Communications Engineering College of EngineeringA’Sharqiyah UniversityIbraOman Wireless and Photonics Networks Research Centre of Excellence Department of Computer and Communication Systems EngineeringUnversiti Putra MalaysiaSelangor43400Malaysia School of Software Hallym UniversityHallymdaehak-gilChunchoen-si24252South Korea
With the development of wireless mobile communication technology,the demand for wireless communication rate and frequency increases year by *** wireless mobile communication frequency tends to be saturated,which deman... 详细信息
来源: 评论
The software Complex for the Selection and Analysis of Algorithms Predicting Key Quality Indicators of Polymer Film Materials of Industrial Production
The Software Complex for the Selection and Analysis of Algor...
收藏 引用
International Conference on Control systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)
作者: Tamara B. Chistyakova Anton Damrin Nikita D. Grishchenkov CAD&C Department St. Petersburg State Institute of Technology (Technical University) St. Petersburg Russia Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia
The following algorithms for constructing predictive models of key quality indicators of polymer film materials are considered and implemented: adaptive boosting of decision trees (AdaBoost), recurrent neural network ...
来源: 评论
Enhancing Dental Caries Identification with Deep Learning: A Study of Convolutional Neural Networks and Transfer Learning Approaches
SSRN
收藏 引用
SSRN 2024年
作者: Mannan, Fayqa Adeel, Muhammad Arif, Erssa Li, Jianqiang Ullah, Amin Nawazish, Samra Mahmood, Tariq Rehman, Amjad Shoukat, Ijaz Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of Computer Science Government College University Faisalabad38000 Pakistan Department of Computer Science School of Science National Textile University Faisalabad37610 Pakistan Department of Computer Science Faculty of Computing Riphah International University Faisalabad38000 Pakistan Beijing Engineering Research Center for IoT Software and Systems 100124 China Department of Computer Science Faculty of IT and Computer Science University of Central Punjab Lahore Pakistan School of Computer Science and Engineering Southeast University Nanjing China Software Engineering Department University of Engineering and Technology Taxila Pakistan Artificial Intelligence & Data Analytics Lab CCIS Prince Sultan University Riyadh11586 Saudi Arabia Faculty of information Sciences University of Education Vehari Campus Vehari61100 Pakistan
Various deep learning techniques have been employed to diagnose dental caries using X-ray images. In this study, we utilized deep learning models, including Convolutional Neural Networks (CNNs) and transfer learning m... 详细信息
来源: 评论