咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是141-150 订阅
排序:
Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults  19
Securing the Silver Surfers: Cybersecurity Awareness Among O...
收藏 引用
19th International Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Ahmad Nawi, Haslinda Sutan Omar, Siti Fatimah Basaruddin, Suzana Info. Science & Computing Department Management and Science University Selangor Malaysia Software Engineering Section UniKL MIIT Kuala Lumpur Malaysia Informatics & Analytics Section UniKL MIIT Kuala Lumpur Malaysia
This research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. The data from 331 participants showed that 30.8%... 详细信息
来源: 评论
GliomaCNN: An Effective Lightweight CNN Model in Assessment of Classifying Brain Tumor from Magnetic Resonance Images Using Explainable AI
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 2425-2448页
作者: Md.Atiqur Rahman Mustavi Ibne Masum Khan Md Hasib M.F.Mridha Sultan Alfarhood Mejdl Safran Dunren Che Department of Computer Science and Engineering Ahsanullah University of Science and TechnologyDhaka1208Bangladesh Department of Computer Science and Software Engineering The University of Western AustraliaPerthWA 6009Australia Department of Computer Science American International University-BangladeshDhaka1229Bangladesh Department of Computer Science College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia School of Computing Southern Illinois UniversityCarbondale62901USA
Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global *** study addresses the pressing issue of brain tumor classification using Magnetic reson... 详细信息
来源: 评论
Airline Delay Prediction: A Comparative Study using Machine Learning and Deep Learning Models
Airline Delay Prediction: A Comparative Study using Machine ...
收藏 引用
Advances in Technology and computing (ICATC), International Conference on
作者: G.W.I. Dilshani Muditha Tissera Department of Software Engineering Faculty of Computing and Technology University of Kelaniya Sri Lanka
The goal of this research is to use past flight data to create predictive models that will forecast airline delays, thereby alleviating operational inefficiencies and displeasure among passengers in the aviation indus... 详细信息
来源: 评论
Metaverse to Enhance Experimental Learning in Higher Education
Metaverse to Enhance Experimental Learning in Higher Educati...
收藏 引用
International Conference on Information Technology Research (ICITR)
作者: M.H.M. Wickramasinghe S. R. Liyanage Software Engineering Department Faculty of Computing and Technology University of Keniaya Sri Lanka
The rapid growth of technology has resulted in innovative methods to improve education, and traditional learning has evolved. The purpose of this study is to explore how the education sector can utilise the ecosystem ... 详细信息
来源: 评论
Joint Class-Balanced Client Selection and Bandwidth Allocation for Cost-Efficient Federated Learning in Mobile Edge computing Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第7期24卷 5681-5698页
作者: Tang, Jian Li, Xiuhua Li, Hui Li, Penghua Wang, Xiaofei Leung, Victor C. M. Chongqing University School of Big Data & Software Engineering Chongqing400000 China Chongqing University of Posts and Telecommunications School of Automation Chongqing400065 China Tianjin University College of Intelligence and Computing Tianjin300072 China Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T1Z4 Canada
Federated Learning (FL) has significant potential to protect data privacy and mitigate network burden in mobile edge computing (MEC) networks. However, due to the system and data heterogeneity of mobile clients (MCs),... 详细信息
来源: 评论
Network Coverage Improvement during Natural Disaster using Self-Organizing Maps
Network Coverage Improvement during Natural Disaster using S...
收藏 引用
2023 International Conference on Electrical, Computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Hoang, Nam Devabhakthini, Prathyusha Shukla, Raj Mani Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH United States Anglia Ruskin University Computing and Information Science Cambridge United Kingdom
This paper presents an emergency response management system to tackle the problem of the absence of network connectivity during the time of a natural disaster. Network connectivity is often enabled by the base station... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain Computer Networks
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论
Phishing Website Detection with and Without Proper Feature Selection Techniques: Machine Learning Approach
Phishing Website Detection with and Without Proper Feature S...
收藏 引用
作者: Adane, Kibreab Beyene, Berhanu Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia Computer Science Department Ethiopian Civil Service University Addis Ababa Ethiopia
Indeed, successful phishing website attempts could result in catastrophic data loss, login credential compromise, ransomware infection, and financial loss. It also significantly hampers the competitiveness and product... 详细信息
来源: 评论
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论