咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是191-200 订阅
排序:
Success Factors of Requirement Elicitation in the Field of software engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
Refactoring Codes to Improve software Security Requirements
Refactoring Codes to Improve Software Security Requirements
收藏 引用
2022 International Conference on Industry Sciences and Computer Science Innovation, iSCSi 2022
作者: Almogahed, Abdullah Omar, Mazni Zakaria, Nur Haryani Department of Software Engineering Taiz University Taiz Yemen School of Computing Universiti Utara Malaysia Sintok06010 Malaysia
Refactoring is one of the most widely used techniques in practice to improve the quality of software, such as maintainability, testability, and understandability. However, there is a lack of studies investigating the ... 详细信息
来源: 评论
Optimization of Interactive Videos Empowered the Experience of Learning Management System
收藏 引用
Computer Systems Science & engineering 2023年 第7期46卷 1021-1038页
作者: Muhammad Akram Muhammad Waseem Iqbal M.Usman Ashraf Erssa Arif Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
The Learning management system(LMS)is now being used for uploading educational content in both distance and blended *** platform has two types of users:the educators who upload the content,and the students who have to... 详细信息
来源: 评论
Traffic Anomaly Detection Using Optimized Faster R-CNN
Traffic Anomaly Detection Using Optimized Faster R-CNN
收藏 引用
2024 International Conference on Electronics, Electrical and Information engineering, ICEEIE 2024
作者: Karim, Shahid Qadir, Akeel Han, Gao Li, Jing Ibrar, Muhammad Bibi, Irfana School of Information Engineering Xi'an Eurasia University 710065 China Software College Shenyang Normal University Shenyang China Department of Computer Science Faculty of Computing and Information Technology University of Punjab Punjab Lahore Pakistan
This paper introduces a new method for traffic anomaly identification within the Faster R-CNN framework by combining the DenseNet module with the region proposals (RPs) processing block. The suggested approach seeks t... 详细信息
来源: 评论
A Novel Contrastive Clustering Algorithm Based on K-means  4
A Novel Contrastive Clustering Algorithm Based on K-means
收藏 引用
4th IEEE International Conference on Pattern Recognition and Machine Learning, PRML 2023
作者: Yun, Yu Yang, Geng Li, Qin You, Jane Shenzhen Institute of Information Technology School of Software Engineering Shenzhen China Xidian University School of Telecommunications Engineering Xi'an China The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Benefitting from the simplicity and ease of implementation, K-means algorithm and its variants have been extensively studied and applied. However, the similarity measure manner limits the performance of previous K-mea... 详细信息
来源: 评论
A computer-aided speech analytics approach for pronunciation feedback using deep feature clustering
A computer-aided speech analytics approach for pronunciation...
收藏 引用
作者: Nazir, Faria Majeed, Muhammad Nadeem Ghazanfar, Mustansar Ali Maqsood, Muazzam Department of Software Engineering University of Engineering and Technology Taxila Taxila Pakistan Department of Data Science University of the Punjab Lahore Pakistan School of Architecture Computing and Engineering University of East London London United Kingdom Department of Computer Science COMSATS University Islamabad Attock Campus Pakistan
Nowadays, the demand for language learning is increasing because people need to communicate with other people belonging to different regions for their business deals, study, etc. During language learning, a lot of pro... 详细信息
来源: 评论
Recursive Generation of Multi-Qubits Control Gate to Facilitate the Grover's Quantum Algorithm in Large Scale Database Search  24
Recursive Generation of Multi-Qubits Control Gate to Facilit...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Wang, Wen-Li Hussain, Shahid Rondinelli, Nathaniel V. Tang, Mei-Huei Rehman Khan, Saif Ur Penn State University Behrend Department of Computer Science and Software Engineering EriePA United States Gannon University Department of Computer Information Science EriePA United States Shifa Tameer-e-Millat University Department of Computing Islamabad44000 Pakistan
Context: Grover's algorithm is a powerful tool in the realm of quantum computing because it offers exponential speedup over classical linear searching for unstructured / unsorted search problems. However, it is ch... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论
Age of Information in Digital Twin Migration
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Noroozi, Kiana Todd, Terence D. Zhao, Dongmei Karakostas, George McMaster University Department of Electrical and Computer Engineering HamiltonON Canada McMaster University Department of Computing and Software HamiltonON Canada
A Digital Twin (DT) is a virtual representation of a real physical system (PS) that interacts with other objects on its behalf. In these interactions, the Age of Information (AoI) is a key performance measure that is ... 详细信息
来源: 评论
software Security Measurements: A Survey
Software Security Measurements: A Survey
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Almogahed, Abdullah Omar, Mazni Zakaria, Nur Haryani Alawadhi, Abdulwadood Taiz University Faculty of Engineering and Information Technology Department of Software Engineering Taiz Yemen Universiti Utara Malaysia School of Computing Sintok06010 Malaysia University of Science and Technology Faculty of Engineering and Computing Department of Computers and Information Technology Yemen
Security metrics for software products give a quantifiable assessment of a software system's trustworthiness. Metrics can also help detect vulnerabilities in systems, prioritize corrective actions, and raise the l... 详细信息
来源: 评论