咨询与建议

限定检索结果

文献类型

  • 3,890 篇 会议
  • 2,033 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,697 篇 工学
    • 2,964 篇 计算机科学与技术...
    • 2,445 篇 软件工程
    • 740 篇 信息与通信工程
    • 487 篇 控制科学与工程
    • 414 篇 生物工程
    • 327 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 225 篇 机械工程
    • 218 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,674 篇 理学
    • 953 篇 数学
    • 448 篇 生物学
    • 362 篇 物理学
    • 299 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 702 篇 管理科学与工程(可...
    • 490 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 154 篇 法学
    • 116 篇 社会学
  • 134 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 168 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 111 篇 machine learning
  • 110 篇 computer science
  • 110 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 222 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,756 篇 英文
  • 201 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6001 条 记 录,以下是321-330 订阅
排序:
ATT&CKViz: Enhancing Cybersecurity Insights by Visual Analytics of Attack Patterns
ATT&CKViz: Enhancing Cybersecurity Insights by Visual Analyt...
收藏 引用
2024 International Conference on engineering and computing, ICECT 2024
作者: Fiza, Inbasat Khurshid, Fizza Fatima, Manahil Noor, Umara Rashid, Zahid International Islamic University Faculty of Computing and Information Technology Department of Software Engineering Islamabad Pakistan College of Engineering Seoul National University Technology Management Economics and Policy Program 1 Gwanak-Ro Gwanak-Gu Seoul08826 Korea Republic of
The ATT&CK MITRE framework serves as an expansive repository of adversary tactics, techniques, and procedures. Given the sheer volume of these intricate attack patterns, the conventional manual navigation method p... 详细信息
来源: 评论
Sentiment Analysis in Social Media for Competitive Environment Using Content Analysis
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 5603-5618页
作者: Shahid Mehmood Imran Ahmad Muhammad Adnan Khan Faheem Khan T.Whangbo Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Department of Computer Engineering Gachon UniversitySeongnam13557Korea
Education sector has witnessed several changes in the recent *** changes have forced private universities into fierce competition with each other to get more students *** competition has resulted in the adoption of ma... 详细信息
来源: 评论
Web Service QoS Prediction Based on Reputation and Location Aware Matrix Factorization  19
Web Service QoS Prediction Based on Reputation and Location ...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Chen, Fan Du, Yugen Zhong, Wenhao Wang, Hanting East China Normal University Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute Shanghai China
With the development of cloud computing and Internet technologies, the number of Web services has increased dramatically. It is increasingly difficult for users to locate applicable services among a large number of fu... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
Introducing on-chain graph data to consortium blockchain for commercial transactions
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 255-257页
作者: Pengyi ZHANG Yuchen YUAN Jie SONG Yu GU Qiang QU Yongjie BAI Software College Northeastern UniversityShenyang 110819China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Blockchain Lab Huawei Cloud Computing Technologies Co.Ltd.Shenzhen 518101China
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algor... 详细信息
来源: 评论
Multi-authority (t,n) Threshold Identity-based Matchmaking Encryption  3
Multi-authority (t,n) Threshold Identity-based Matchmaking E...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Ding, Xiangyu Shanghai Key Laboratory of Trustworthy Computing School of Software Engineering East China Normal University 3663 N. Zhongshan Rd. Shanghai200062 China
In this work, we propose a Multi-authority (t, n) Threshold Identity-based Matchmaking Encryption (MAT-IBME) scheme under the standard assumptions in the standard model, in which multiple authorities share the secrets... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Secure software Development in Google Colab
Secure Software Development in Google Colab
收藏 引用
2023 IEEE World AI IoT Congress, AIIoT 2023
作者: Potluri, Tarun Shi, Yong Shahriar, Hossain Lo, Dan Parizi, Reza Chi, Hongmei Qian, Kai Kennesaw State University College of Computing and Software Engineering United States Florida A&M University Department of Computer and Information Sciences TallahasseeFL United States
software is said to be secure if it has been developed and designed with security as its top priority. This entails implementing secure coding practices, performing vulnerability testing and repair, as well as continu... 详细信息
来源: 评论
PEbfs: Implement High-Performance Breadth-First Search on PEZY-SC3s  24th
PEbfs: Implement High-Performance Breadth-First Search on P...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Guo, Weihao Wang, Qinglin Liu, Xiaodong Peng, Muchun Yang, Shun Liang, Yaling Shi, Yongzhen Cao, Ligang Liu, Jie Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha410073 China Engineering Research Center for National Fundamental Software National University of Defense Technology Changsha410073 China
The breadth-first search (BFS) algorithm is a fundamental algorithm in graph theory, and it’s parallelization can significantly improve performance. Therefore, there have been numerous efforts to leverage the powerfu... 详细信息
来源: 评论
A Fog-assisted Revocable and Auditable Access Control System  2
A Fog-assisted Revocable and Auditable Access Control System
收藏 引用
2nd International Conference on Electronic Information Technology, EIT 2023
作者: Niu, Jiaxu Shanghai Key Laboratory of Trustworthy Computing School of Software Engineering East China Normal University 3663 N. Zhongshan Rd. Shanghai200062 China
Fog computing is a cutting-edge distributed computing architecture that optimizes resource allocation by fully utilizing the resources within the computing network. However, data security is a major concern in fog com... 详细信息
来源: 评论