咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是681-690 订阅
排序:
Software Requirement Ambiguity Avoidance Framework (SRAAF) for Selecting Suitable Requirement Elicitation Techniques for Software Projects
Software Requirement Ambiguity Avoidance Framework (SRAAF) f...
收藏 引用
2022 IEEE International Conference on Current Development in engineering and Technology, CCET 2022
作者: Gupta, Ashok Kumar Siddiqui, Shams Tabrez Qidwai, Khalid Ali Haider, Agha Salman Khan, Haneef Ahmad, Md Oqail Universiti Malaysia Terengganu Faculty of Science and Technology Kuala Terengganu Malaysia Jazan University Department of Computer Science Jazan Saudi Arabia Jazan University Department of Computer and Network Engineering Jazan Saudi Arabia B.S Abdur Rahman Crescent Institute of Science and Technology Department of Computer Application Tamil Nadu India
Ambiguity is an intrinsic deficiency of natural language written requirement documents. Requirement Engineers face difficulties while communicating with stakeholders from different backgrounds and knowledge to extract... 详细信息
来源: 评论
Uncovering network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G
Uncovering Network Vulnerabilities and Conducting Digital Fo...
收藏 引用
International Symposium on Advanced networks and Telecommunication Systems (ANTS)
作者: Shams Tabrez Siddiqui Mohammad Shahid Kamal Khalid Ali Qidwai Md Imran Alam Haneef Khan Malik Zaib Alam Ishan Budhiraja Sandeep Chintham Department of Computer Science Jazan University Saudi Arabia Department of Computer and Network Engineering Jazan University Saudi Arabia School of Computer Science Engineering and Technology Bennett University Greater Noida India School of Computer Science and Artificial Intelligence SR University Warangal Telangana India
The proliferation of IoT gadgets has introduced game-changing technologies across a range of sectors. This widespread use has, however, revealed serious security holes, underscoring the importance of rigorous security...
来源: 评论
Improving students' cognitive abilities in online environment based on neurofeedback
Improving students' cognitive abilities in online environmen...
收藏 引用
IEEE Education engineering (EDUCON)
作者: Nuraini Jamil Abderrahmane Lakas Abdelkader Nasreddine Belkacem Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates Department of Computer and Network Engineering College of Information Technology United Arab Emirates University United Arab Emirates
The brain-computer interface (BCI) and eye-tracking technologies can potentially improve the learning environment in education. Cognitive BCIs can give a deep knowledge of brain functioning, enabling the creation of m... 详细信息
来源: 评论
Hospital Scheduling Systems Current Challenges and Emerging Solutions
Hospital Scheduling Systems Current Challenges and Emerging ...
收藏 引用
Global Digital Health Knowledge Exchange & Empowerment Conference (gDigiHealth.KEE)
作者: Nura Shifa Musa Saida Hafsa Rafique Elezabeth Mathew College of Engineering Al Ain University Al Ain UAE Department of Information Systems and Security United Arab Emirates University Al Ain UAE Department of Computer and Network Engineering United Arab Emirates University Al Ain UAE
Hospital scheduling systems are integral components of healthcare management, addressing the complex challenge of optimizing appointment schedules. In the realm of healthcare research, the Appointment Scheduling Probl... 详细信息
来源: 评论
A Region Division-Based Adaptive Task Offloading in Collaborative LEO Heterogeneous Constellation
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhao, Liang Zeng, Minglin Hawbani, Ammar Sun, Yunhe Xu, Lexi Liu, Zhi Zhou, Xiaoming Shenyang Aerospace University School of Computer Science Shenyang110136 China China United Network Communications Corporation Research Institute Beijing100048 China Department of Computer and Network Engineering University of Electro-Communications Chofu Japan State Grid Liaoning Electric Power Supply Co.Ltd Shenyang110002 China
Satellite Edge Computing (SEC) enhances real-time data processing by deploying computational resources at the edge of satellite networks, reducing Task Completion Delay (TCD). To minimize TCD, the characteristics of s... 详细信息
来源: 评论
D2D Resource Allocation Problem in Full - Load Cellular networks  8th
D2D Resource Allocation Problem in Full - Load Cellular Netw...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Yi, Haimin He, Xiaoli Li, Lun Song, Yu Li, Hongwei Zeng, Zhen Yin, Xiaodong School of Computer Science Sichuan University of Science and Engineering Zigong643000 China Department of Network Information Management Center Sichuan University of Science and Engineering Zigong643000 China China Mobile Group Sichuan Company Limited Zigong Branch Zigong643000 China
With the increasing demand of local service load, how to improve resource utilization is an important problem. D2D (Device-to-Device) communication is considered to be an effective solution. The letter allows users in... 详细信息
来源: 评论
Advancements in Millimeter Wave MIMO Antenna Arrays for Enhanced 5G Connectivity
Advancements in Millimeter Wave MIMO Antenna Arrays for Enha...
收藏 引用
Asia-Pacific Conference on Communications
作者: Asmail Abrahim Mohamed Faniar Akram A. Almohammedi Mohammed Balfaqih Electrical & Electronics Department Karabük University Karabük Turkey Department of Computer and Network Engineering University of Jeddah Jeddah Saudi Arabia
This study proposes an optimized MIMO antenna array design for 5G mm-wave communication systems that operates in the 38 GHz band. The design consists of two antenna arrays, each with four evenly spaced elements. The t...
来源: 评论
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model
Cognitive Defense Cyber Attack Prediction and Security Desig...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: P.T. Devadarshini B Chandrashekar Sumit Pundir Mohit Tiwari Ravikiran Madala E. Indhuma Department of Artificial Intelligence and Data Science Easwari Engineering College Chennai TamilNadu India Department Of Computer Science and Engineering St. Martin's Engineering College Kompalli Secunderabad Telangana Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttrakhand India Department of Computer Science and Engineering Bharati Vidyapeeth's College of Engineering Delhi Network and Data Center Engineer Ph.D Information Technology University of Cumberlands Durham North Carolina US Department of Computer Science and Engineering St.Martln's Engineering College Secunderabad Telangana India
Companies of all sizes in today's linked digital world are susceptible to cyber dangers. In this study, we provide a novel approach to cyber defence that integrates machine learning with cognitive defensive techni...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Light Fidelity system performance in data transmission through the effect of Free-Space Optical Communication
Light Fidelity system performance in data transmission throu...
收藏 引用
International Conference on Smart Communications and networking (SmartNets)
作者: Satea Hikmat Alnajjar Walaa Khalil Abrahem Department of Network Engineering Al-iraqia University Baghdad Iraq Department of Computer Engineering Al-iraqia University Baquba Iraq
Li-Fi (light-fidelity) considers a new technology in the wireless communication domain that operates light for transmission free space; the end-user has employed Visible Light Communication based on Light Emitting Dio... 详细信息
来源: 评论