咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是381-390 订阅
排序:
Automatic Multi-Class Non-Functional software Requirements Classification Using Machine Learning Algorithms
Automatic Multi-Class Non-Functional Software Requirements C...
收藏 引用
International Research Conference on Smart computing and systems Engineering (SCSE)
作者: M. A. F. Saroth P. M. A. K. Wijerathne B. T. G. S. Kumara Department of Computing and Information Systems Faculty of Computing Sabaragamuwa University of Sri Lanka Department of Software Engineering Faculty of Computing Sabaragamuwa University of Sri Lanka
A successful software development process depends on software requirements. Those requirements are often classified into two categories: functional requirements (FR) and non-functional requirements (NFR). In software ... 详细信息
来源: 评论
An embedded vertical‐federated feature selection algorithm based on particle swarm optimisation
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 734-754页
作者: Yong Zhang Ying Hu Xiaozhi Gao Dunwei Gong Yinan Guo Kaizhou Gao Wanqiu Zhang School of Information and Control Engineering China University of Mining and TechnologyXuzhouChina The Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchunChina School of Computing University of Eastern FinlandKuopioFinland The Macao Institute of Systems Engineering Macao University of Science and TechnologyTaipaChina
In real life,a large amount of data describing the same learning task may be stored in different institutions(called participants),and these data cannot be shared among par-ticipants due to privacy *** case that diffe... 详细信息
来源: 评论
Application of the Refactoring to the Understandability and the Cognitive Complexity of a software  7
Application of the Refactoring to the Understandability and ...
收藏 引用
7th IEEE International conference for Convergence in technology, I2CT 2022
作者: Wijendra, Dinuka R. Hewagamage, K.P. Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka University of Colombo School of Computing Department of Information Systems Colombo Sri Lanka
Cognitive complexity of a software determines the methodology of comprehending the internal logic of a given software by an individual, quantitatively. The procedure of handling a software by different users is differ... 详细信息
来源: 评论
Explainable Federated Learning for Botnet Detection in IoT Networks
Explainable Federated Learning for Botnet Detection in IoT N...
收藏 引用
Cyber Security and Resilience (CSR), IEEE International Conference on
作者: Rajesh Kalakoti Hayretdin Bahsi Sven Nõmm Department of Software Science School of Information Technology Taltech Tallinn Estonia Department of Software Science School of Information Technology TalTech Estonia School of Informatics Computing and Cyber Systems Northern Arizona University United States
The widespread use of Internet of Things (IoT) de-vices has increased the vulnerability to botnet attacks, presenting significant challenges to network security. Federated learning (FL) is a promising approach for det... 详细信息
来源: 评论
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4059-4079页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Management Information Systems Business Administration CollegeKing Saud UniversityRiyadh11451Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the... 详细信息
来源: 评论
State of the Art Survey on Artificial Intelligence-Based Approach for Early Diagnosis of Tuberculosis
State of the Art Survey on Artificial Intelligence-Based App...
收藏 引用
Electrical and Computer Engineering Researches (ICECER), International Conference on
作者: Gibson Chengetanai Stewart Muchuchuti Freedmore Sidume Rabson Tamukate Kushata Ntwaetsile Patience R. Nthekeng School of Computing & Information Systems Botswana Accountancy College Gaborone Botswana School of Computing & Information Systems Botswana International University of Science and Technology Palapye Botswana Information Technology Dept Botswana Accountancy College Gaborone Botswana
Tuberculosis (TB) has been affecting people and high deaths from it has been recorded globally. Techniques around use of artificial intelligence (AI) based approaches are gaining momentum in early diagnosis of TB. Thi... 详细信息
来源: 评论
Cognitive Complexity Reduction through Control Flow Graph Generation  7
Cognitive Complexity Reduction through Control Flow Graph Ge...
收藏 引用
7th IEEE International conference for Convergence in technology, I2CT 2022
作者: Wijendra, Dinuka R. Hewagamage, K.P. Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka University of Colombo School of Computing Department of Information Systems Colombo Sri Lanka
The cognitive complexity of a software determines the human comprehension effort to determine its underlying logic. The human comprehension effort preliminary depends on the person, who deals with the software, the so... 详细信息
来源: 评论
An Effective Detection of Brain Tumor Detection Using ResNet-50 Model
An Effective Detection of Brain Tumor Detection Using ResNet...
收藏 引用
2024 International Conference on Advancement in Renewable Energy and Intelligent systems, AREIS 2024
作者: Raji, V. Maheswari, S. Dharinya, S. Sree Chinniah, P. Kavin, K.S. Raja, Kiruba Thangam S.K.P. Engineering College Dept. of Information Technology Tiruvannamalai India Tamilnadu Erode India School of Computer Science Engineering and Information Systems Vit University Dept. of Software and Systems Engineering Vellore India ST. Joseph College of Engineering Dept. of Ece Tamilnadu Sriperumbudur India Government College of Engineering Dept. of Eee Tamil Nadu Tirunelveli India Vit University Dept. of Software and Systems Engineering Vellore India
Rapid proliferation of aberrant neurons in brain tumors significantly damages organ function or causes death, endangering adult health. These tumors vary widely in terms of their locations, sizes, and textures. Findin... 详细信息
来源: 评论
Artificial Intelligence Adoption in QSR Industry  22
Artificial Intelligence Adoption in QSR Industry
收藏 引用
6th International Conference on E-Education, E-Business and E-technology, ICEBT 2022
作者: Lee, Angela S.H Bengeri, Atul Kan, Chong Chin Department of Computing and Information Systems School of Engineering and Technology Sunway University Malaysia Linc Education Singapore Singapore
According to research conducted by Allied Market Research (Kale and Deshmukh, 2020), the Quick-service restaurant (QSR) industry has been enjoying significant growth over the last several years and the trend is expect... 详细信息
来源: 评论
Toward Effective Secure Code Reviews: An Empirical Study of Security-Related Coding Weaknesses
arXiv
收藏 引用
arXiv 2023年
作者: Charoenwet, Wachiraphan Thongtanunam, Patanamon Pham, Van-Thuan Treude, Christoph School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia School of Computing and Information Systems Singapore Management University Singapore
Identifying security issues early is encouraged to reduce the latent negative impacts on the software systems. Code review is a widely-used method that allows developers to manually inspect modified code, catching sec... 详细信息
来源: 评论