咨询与建议

限定检索结果

文献类型

  • 28,016 篇 会议
  • 11,437 篇 期刊文献
  • 352 册 图书

馆藏范围

  • 39,805 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,385 篇 工学
    • 19,152 篇 计算机科学与技术...
    • 15,962 篇 软件工程
    • 5,004 篇 信息与通信工程
    • 3,049 篇 控制科学与工程
    • 2,573 篇 生物工程
    • 2,104 篇 电气工程
    • 1,624 篇 机械工程
    • 1,592 篇 生物医学工程(可授...
    • 1,572 篇 电子科学与技术(可...
    • 1,285 篇 光学工程
    • 891 篇 安全科学与工程
    • 888 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 789 篇 动力工程及工程热...
    • 688 篇 交通运输工程
    • 685 篇 建筑学
  • 10,942 篇 理学
    • 6,371 篇 数学
    • 2,816 篇 生物学
    • 2,143 篇 物理学
    • 1,836 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,271 篇 管理学
    • 4,382 篇 管理科学与工程(可...
    • 3,220 篇 图书情报与档案管...
    • 2,002 篇 工商管理
  • 1,398 篇 医学
    • 1,218 篇 临床医学
    • 1,108 篇 基础医学(可授医学...
    • 701 篇 药学(可授医学、理...
  • 1,117 篇 法学
    • 880 篇 社会学
  • 701 篇 经济学
    • 698 篇 应用经济学
  • 685 篇 教育学
  • 381 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,808 篇 software enginee...
  • 1,651 篇 computer science
  • 863 篇 computational mo...
  • 840 篇 feature extracti...
  • 790 篇 training
  • 693 篇 software
  • 668 篇 semantics
  • 604 篇 deep learning
  • 582 篇 accuracy
  • 550 篇 machine learning
  • 543 篇 data mining
  • 510 篇 application soft...
  • 425 篇 computer archite...
  • 388 篇 predictive model...
  • 383 篇 internet of thin...
  • 373 篇 software systems
  • 371 篇 testing
  • 352 篇 optimization
  • 351 篇 data models
  • 332 篇 support vector m...

机构

  • 1,216 篇 college of compu...
  • 353 篇 school of comput...
  • 299 篇 state key labora...
  • 221 篇 school of comput...
  • 196 篇 department of co...
  • 194 篇 school of comput...
  • 160 篇 school of softwa...
  • 156 篇 college of compu...
  • 146 篇 state key labora...
  • 142 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 127 篇 national enginee...
  • 127 篇 school of comput...
  • 125 篇 school of softwa...
  • 120 篇 school of comput...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 96 篇 school of big da...

作者

  • 70 篇 ruimin hu
  • 58 篇 liu yang
  • 54 篇 chen zhong
  • 54 篇 baowen xu
  • 48 篇 hu ruimin
  • 46 篇 zhang lei
  • 45 篇 wang ping
  • 44 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 43 篇 zhou jie
  • 43 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 38,310 篇 英文
  • 1,005 篇 其他
  • 500 篇 中文
  • 13 篇 德文
  • 8 篇 日文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Software Engineering"
39805 条 记 录,以下是4911-4920 订阅
排序:
Predicting Users’ Requests on the WWW  7
Predicting Users’ Requests on the WWW
收藏 引用
7th International Conference on User Modeling, UM 1999
作者: Zukerman, I. Albrecht, D.W. Nieholsan, A.E. School of Computer Science and Software Engineering Monash University Clayton ClaytonVIC3168 Australia
We describe several Markov models derived from the behaviour pattems of many users, which predict which documents a user is likely torequest next. We then present comparative results of the predictive accuracy of the ... 详细信息
来源: 评论
Efficient keyword search for SLCA in parallel XML databases
Efficient keyword search for SLCA in parallel XML databases
收藏 引用
8th Web Information Systems and Applications Conference, WISA 2011, Workshop on Semantic Web and Ontology, SWON 2011, Workshop on Electronic Government Technology and Application, EGTA 2011
作者: Yue, Dejun Yu, Ge Liu, Jinshen Zhang, Tiancheng Nie, Tiezheng Li, Fang Fang Department of Computer Software and Theory School of Information Science and Engineering Northeastern University Shenyang China
Keyword search is a wildly popular way for querying XML document. However, the increasing volume of XML data poses new challenges to keyword search processing. Parallel database is an efficient solution for this probl... 详细信息
来源: 评论
Voting policies that cope with unreliable agents
Voting policies that cope with unreliable agents
收藏 引用
4th International Conference on Autonomous Agents and Multi agent Systems, AAMAS 05
作者: Guttmann, Christian Zukerman, Ingrid School of Computer Science and Software Engineering Monash University Clayton Vic. 3800 Australia
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-Task-Agents-Policy-Protocol) framework, which d... 详细信息
来源: 评论
A Review of Colonial Pipeline Ransomware Attack  23
A Review of Colonial Pipeline Ransomware Attack
收藏 引用
23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023
作者: Beerman, Jack Berent, David Falter, Zach Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH45056 United States
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r... 详细信息
来源: 评论
Artificial Intelligence-Based Centralized Resource Management Application for Distributed Systems  13
Artificial Intelligence-Based Centralized Resource Managemen...
收藏 引用
13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022
作者: Hettiarachchi, Lasal Sandeepa Jayadeva, Senura Vihan Bandara, Rusiru Abhisheak Vikum Palliyaguruge, Dilmi Arachchillage, Udara Srimath S. Samaratunge Kasthurirathna, Dharshana Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Sri Lanka
Due to the decentralized nature and emergence of new practices, tools, and platforms, microservices have become one of the most widely spread software architectures in the modern software industry. Furthermore, the ad... 详细信息
来源: 评论
Fast parallel algorithm for distance transforms  15
Fast parallel algorithm for distance transforms
收藏 引用
15th International Parallel and Distributed Processing Symposium, IPDPS 2001
作者: Datta, A. Soundaralakshmi, S. Department of Computer Science and Software Engineering University of Western Australia PerthWA6907 Australia
The distance transform (DT) is an operation to convert a binary image consisting of black and white pixels to a representation where each pixel has the distance of the nearest black pixel in a given distance metric. T... 详细信息
来源: 评论
A Case Study on the Multi-Vector Data Breach on Astoria  4
A Case Study on the Multi-Vector Data Breach on Astoria
收藏 引用
4th International Conference on computer Communication and the Internet, ICCCI 2022
作者: Nadjar, Jorge Liu, Yuxuan Salinas, Jose Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH45056 United States
Managing the security of big data has become increasingly more complex as threat actors continue to maliciously exploit legacy and outdated systems of smaller and medium-sized firms. In this paper, we explore Astoria ... 详细信息
来源: 评论
Migrating legacy command and control (C2) systems to next generation combat systems architecture: A case study
Migrating legacy command and control (C2) systems to next ge...
收藏 引用
Huntsville Simulation Conference, HSC 2008
作者: Kuhr, Mark G. Hamilton, John A. Department of Computer Science and Software Engineering Auburn University Auburn AL 36830 United States
Across the US Department of Defense (DoD) exist many command and control (C2) systems built before the advent of the Internet or modern microprocessor-based computers. These systems are still in use today, yet they ar... 详细信息
来源: 评论
Methods for the prevention, detection and removal of software security vulnerabilities  42
Methods for the prevention, detection and removal of softwar...
收藏 引用
42nd Annual Southeast Regional Conference, ACM-SE 42
作者: Tevis, Jay-Evan J. Hamilton Jr., John A. Department of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified ways that malicious users can exploit so... 详细信息
来源: 评论
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ChatGPT in software Development Strategies
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Aamana Ain, Qurat Ul Nisa, Sardar Un NUML Department of Software Engineering Rawalpindi Pakistan NUML Department of Computer Science Islamabad Pakistan
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i... 详细信息
来源: 评论