咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 554 篇 期刊文献
  • 32 册 图书

馆藏范围

  • 1,891 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,151 篇 工学
    • 974 篇 计算机科学与技术...
    • 804 篇 软件工程
    • 201 篇 信息与通信工程
    • 129 篇 控制科学与工程
    • 116 篇 生物工程
    • 79 篇 电气工程
    • 71 篇 生物医学工程(可授...
    • 45 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 42 篇 安全科学与工程
    • 40 篇 动力工程及工程热...
    • 37 篇 光学工程
    • 31 篇 建筑学
    • 31 篇 网络空间安全
  • 448 篇 理学
    • 240 篇 数学
    • 122 篇 生物学
    • 89 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 38 篇 化学
  • 366 篇 管理学
    • 216 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 82 篇 医学
    • 77 篇 临床医学
    • 69 篇 基础医学(可授医学...
    • 39 篇 公共卫生与预防医...
    • 36 篇 药学(可授医学、理...
  • 67 篇 法学
    • 53 篇 社会学
  • 50 篇 教育学
    • 48 篇 教育学
  • 31 篇 经济学
    • 31 篇 应用经济学
  • 23 篇 农学
  • 10 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 61 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 grid computing
  • 48 篇 cloud computing
  • 46 篇 software enginee...
  • 41 篇 semantics
  • 39 篇 computer science
  • 37 篇 software
  • 35 篇 resource managem...
  • 34 篇 deep learning
  • 34 篇 machine learning
  • 33 篇 application soft...
  • 33 篇 laboratories
  • 32 篇 computer archite...
  • 32 篇 quality of servi...
  • 32 篇 training
  • 31 篇 data models
  • 30 篇 data mining
  • 30 篇 visualization
  • 27 篇 data warehouses

机构

  • 64 篇 department of so...
  • 56 篇 department of so...
  • 39 篇 school of comput...
  • 26 篇 grid computing a...
  • 19 篇 computing and so...
  • 18 篇 state key labora...
  • 17 篇 computing and so...
  • 16 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 max planck insti...
  • 15 篇 shanghai key lab...
  • 14 篇 college of compu...
  • 13 篇 department of so...
  • 13 篇 university of ch...
  • 13 篇 computing and so...
  • 12 篇 school of comput...
  • 11 篇 natural language...
  • 11 篇 state key labora...
  • 10 篇 school of softwa...
  • 10 篇 department of so...

作者

  • 55 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 34 篇 trujillo juan
  • 27 篇 sergio luján-mor...
  • 26 篇 ismail leila
  • 26 篇 montoyo andrés
  • 24 篇 lloret elena
  • 19 篇 maté alejandro
  • 18 篇 guan haibing
  • 18 篇 palomar manuel
  • 18 篇 martínez-barco p...
  • 18 篇 min chen
  • 18 篇 muñoz rafael
  • 18 篇 munehiro fukuda
  • 17 篇 john grundy
  • 16 篇 luján-mora sergi...
  • 16 篇 mazón jose-norbe...
  • 16 篇 grundy john
  • 16 篇 balahur alexandr...
  • 16 篇 calvo-zaragoza j...

语言

  • 1,800 篇 英文
  • 82 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
检索条件"机构=Computing and Software Systems"
1891 条 记 录,以下是181-190 订阅
排序:
Approach to Studying Information Dissemination in Social Networks with Simulation Tools
Approach to Studying Information Dissemination in Social Net...
收藏 引用
International Conference on Application of Information and Communication Technologies (AICT)
作者: Alexander Kolesnikov Elena Zamyatina Lyudmila Lyadova Viacheslav Lanin Department of Computing Systems Software Perm State University Perm Russia Department of Information Technologies in Business HSE University Perm Russia
To understand information dissemination researchers must combine different methods. The lack of social network research tools combining different analysis methods is a problem for users. An approach to studying social... 详细信息
来源: 评论
Few-shot Object Detection Algorithm Based on YOLOv8-Mamba-Like Linear Attention  16
Few-shot Object Detection Algorithm Based on YOLOv8-Mamba-Li...
收藏 引用
16th International Conference on Communication software and Networks, ICCSN 2024
作者: Wang, Hongliang Wang, Kaizhu Ji, Binglong Deng, Changyi Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human- Computer Interaction System Engineering Research Center Based on DigitTwin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China Institute of Software China Industrial Control Systems Cyber Emergency Response Team Beijing China
In the production and assembly process, the accuracy of detection is usually low due to limited resources and small quantities. In this paper, we propose a few-shot learning method for object detection based on the co... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 190-204页
作者: Farhan Ullah Shamsher Ullah Gautam Srivastava Jerry Chun-Wei Lin School of Software Northwestern Polytechnical UniversityXian710072ShaanxiChina Knowledge Unit of Systems and Technology University of Management and TechnologySialkot 51040Pakistan Department of Math and Computer Science Brandon UniversityBrandonMB R7A 6A9Canada Department of Computer Science and Math Lebanese American UniversityBeirut1102Lebanon Western Norway University of Applied Sciences BergenNorway Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat... 详细信息
来源: 评论
Phantom Events: Demystifying the Issues of Log Forgery in Blockchain
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Yixuan Dong, Yuxin Liu, Ye Luo, Xiapu Li, Yi College of Computing and Data Science Nanyang Technological University Singapore School of Software and Microelectronics Peking University Beijing China School of Computing and Information Systems Singapore Management University Singapore Department of Computing The Hong Kong Polytechnic University Hong Kong
With the rapid development of blockchain technology, transaction logs play a central role in various applications, including decentralized exchanges, wallets, cross-chain bridges, and other third-party services. Howev... 详细信息
来源: 评论
An Aircraft Identification System Using Convolution Neural Networks  12
An Aircraft Identification System Using Convolution Neural N...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced computing systems: Technology and Applications, IDAACS 2023
作者: Turchenko, Viktor Turchenko, Iryna Vasylkiv, Nadiia West Ukrainian National University Department for Information Computer Systems and Control Ternopil46000 Ukraine McMaster University Department of Computing and Software HamiltonL8S 4L8 Canada Research Institute for Intelligent Computer Systems West Ukrainian National University Ternopil Ukraine
The task of aircraft identification using their registration number is important as visual identification remains the only method of their identification in case of air traffic control systems or radar failure. In thi... 详细信息
来源: 评论
Sustainable Development Goal-17 and Nigeria Data Protection Regulation Adoption among Organizations in Nigeria
Sustainable Development Goal-17 and Nigeria Data Protection ...
收藏 引用
Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), International Conference on
作者: Sumayya Babangida-Sabo Samuel C. Avemaria Utulu Abel Ajibesin Department of Informaton Systems School of Informtaon Technology and Computing American University of Nigeria Yola Nigeria Department of Software Engineering School of Information Technology and Computing Amerucan University of Nigeria Yola Nigeria
Adoption of computerized systems by organizations in Nigeria poses some data security challenges to citizens and people from other nations. The challenges require organizations to deploy personal data security that ar... 详细信息
来源: 评论
Video-Based Jump Height Estimation in Athletic Performance Testing
Video-Based Jump Height Estimation in Athletic Performance T...
收藏 引用
2023 IEEE International Workshop on Sport, Technology and Research, STAR 2023
作者: Lokas, Ivan Vasilj, Matea Skender, Sven Vucetic, Vlatko Mihaldinec, Hrvoje Dzapo, Hrvoje Ultrax Technologies Software Development Zagreb Croatia Human Performance Laboratory Faculty of Kinesiology Zagreb Croatia Hardware Development Ultrax Technologies Zagreb Croatia Faculty of Electrical Engineering and Computing Department of Electronic Systems and Information Processing Zagreb Croatia
Jump height estimation is well-studied problem in sports science with a variety of methods proposed over the years. This paper introduces a portable, simple-to-setup and a cost-effective video-based jump height estima... 详细信息
来源: 评论
Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition  21
Texture and Orientation-based Feature Extraction for Robust ...
收藏 引用
21st IEEE/ACIS International Conference on software Engineering Research, Management and Applications, SERA 2023
作者: Khan, Sajid Ali Bin Abdulrahman Alawairdhi, Mohammed Al-Akhras, Mousa Foundation University Islamabad Department of Software Engineering Islamabad Pakistan Saudi Electronic University College of Computing and Informatics Saudi Arabia The University of Jordan Amman King Abdullah II School for Information Technology Computer Information Systems Department Jordan
Facial expressions are the most effective way to characterize people's motives, emotions, and feelings. Several new methods are proposed each year;however, the accuracy of facial expression recognition still needs... 详细信息
来源: 评论
Computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, computing, and Intelligent Technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论