咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是231-240 订阅
排序:
Evaluating software Development Agents: Patch Patterns, Code Quality, and Issue Complexity in Real-World GitHub Scenarios
Evaluating Software Development Agents: Patch Patterns, Code...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Zhi Chen Lingxiao Jiang Centre for Research on Intelligent Software Engineering School of Computing and Information Systems Singapore Management University
In recent years, AI-based software engineering has progressed from pre-trained models to advanced agentic workflows, with software Development Agents representing the next major leap. These agents, capable of reasonin... 详细信息
来源: 评论
MuLAD: Multimodal Aggression Detection from Social Media Memes Exploiting Visual and Textual Features  27th
MuLAD: Multimodal Aggression Detection from Social Media Me...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Hasan, Md. Maruf Ahsan, Shawly Hoque, Mohammed Moshiul Dewan, M. Ali Akber Chittagong University of Engineering and Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada
Aggression detection from memes is challenging due to their region-specific interpretation and multimodal nature. Detecting or classifying aggressive memes is complicated in low-resource languages (including... 详细信息
来源: 评论
Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System
收藏 引用
Computer systems Science & Engineering 2023年 第11期47卷 2497-2512页
作者: Mahmoud Ragab Sultanah M.Alshammari Abdullah S.Al-Malaise Al-Ghamdi Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
The Internet of Things(IoT)system has confronted dramatic growth in high dimensionality and data *** system named intrusion detection systems(IDS)is broadly utilized for the enhancement of security posture in an IT **... 详细信息
来源: 评论
Wave Density Spectra Estimation with LSTM from Sentinel-1 SAR in the Baltic Sea  13
Wave Density Spectra Estimation with LSTM from Sentinel-1 SA...
收藏 引用
13th IEEE/OES Current, Waves and Turbulence Measurement, CWTM 2024
作者: Rikka, Sander Nomm, Sven Alari, Victor Simon, Martin Bjorkqvist, Jan-Victor Tallinn University of Technology School of Science Department of Marine Systems Tallinn Estonia Tallinn University of Technology School of Information Technology Department of Software Science Tallinn Estonia Norwegian Meteorological Institute Bergen Norway
Surface wave spectra estimation from Synthetic Aperture Radar (SAR) data has been a subject of many studies. In the open ocean, where high-resolution Wave Mode data capture predominately swell waves, various inverse m... 详细信息
来源: 评论
Data-centric-infrastructure Functional Architecture
收藏 引用
NTT Technical Review 2022年 第5期20卷 24-31页
作者: Masutani, Hitoshi Schumacher, Christoph Takasugi, Koichi Network Service Platform Research Group Core Network Technology Research Project NTT Network Service Systems Laboratories Japan Computing Systems Group System Software Project NTT Software Innovation Center Japan Frontier Communication Laboratory NTT Network Innovation Laboratories Japan
Society is changing at a rapid pace due to technical innovations in Internet technologies and cloud computing. In the near future, ever-more refined artificial-intelligence applications are expected, working on ever-l... 详细信息
来源: 评论
Phase-bias-blind computational ghost imaging with optical phased array
收藏 引用
Optics Express 2025年 第10期33卷 21132-21141页
作者: Hirata, Sota Matsuda, Naoki Komatsu, Kento Tanemura, Takuo Horisaki, Ryoichi Department of Information Physics and Computing Graduate School of Information Science and Technology The University of Tokyo 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan Department of Electrical Engineering and Information Systems Graduate School of Engineering The University of Tokyo 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan
We propose a method for computational ghost imaging (CGI) with an optical phased array (OPA), wherein phase biases on the phase shifters are intrinsically unknown. In our method, an object is illuminated with a number... 详细信息
来源: 评论
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain Management  4
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain ...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Amarasinghe, A.A.B.G. Gamagedara, G.M.H.S. Pitigala, K.K. Subawickrama, H.D.A.E. Abeywardena, Kavinga Yapa Yapa, Kanishka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
With the rising competition among pharmaceutical companies, the current drug supply chain market has become more competitive with high-quality product segments. The rapid growth of internet pharmacies has made it more... 详细信息
来源: 评论
Boosting Robustness in Automatic Modulation Recognition for Wireless Communications
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年 第3期11卷 1635-1648页
作者: Zhao, Yuhang Wang, Yajie Zhang, Chuan Li, Chunhai Xiong, Zehui Zhu, Liehuang Niyato, Dusit Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Guilin University of Electronic Technology Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin541004 China Singapore University of Technology and Design Pillar of Information Systems Technology and Design 487372 Singapore Nanyang Technological University College of Computing and Data Science 639798 Singapore
In the radio frequency field, deep neural networks have been widely used for automatic modulation recognition tasks due to their superior accuracy. However, it has been shown that these models are susceptible to adver... 详细信息
来源: 评论
Junior software Developers’ Perspectives on Adopting LLMs for software Engineering: a Systematic Literature Review
arXiv
收藏 引用
arXiv 2025年
作者: Ferino, Samuel Hoda, Rashina Grundy, John Treude, Christoph Department of Software Systems and Cybersecurity Faculty of IT Monash University Melbourne Australia School of Computing and Information Systems Singapore Management University Singapore
Context: Many studies exploring the adoption of Large Language Model-based tools for software development by junior developers have emerged in recent years. These studies have sought to understand developers’ perspec... 详细信息
来源: 评论
Efficient Storage and Retrieval of Similar Data in Edge computing systems  29
Efficient Storage and Retrieval of Similar Data in Edge Comp...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Liu, Yuanfeng Xie, Junjie Liao, Hanlong Chen, Sheng Liu, Xiulong Guo, Deke Tianjin University College of Intelligence and Computing Tianjin300350 China AMS Institute of Systems Engineering Beijing100141 China National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha410073 China
Edge computing is migrating services from remote clouds to the network edge, where a vast amount of data is also flowing into edge nodes. In this context, the Edge Data-Sharing System (EDSS) enhances service quality b... 详细信息
来源: 评论