咨询与建议

限定检索结果

文献类型

  • 14,898 篇 会议
  • 6,239 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,916 篇 工学
    • 10,105 篇 计算机科学与技术...
    • 8,402 篇 软件工程
    • 2,605 篇 信息与通信工程
    • 1,745 篇 控制科学与工程
    • 1,401 篇 生物工程
    • 1,206 篇 电气工程
    • 977 篇 生物医学工程(可授...
    • 886 篇 电子科学与技术(可...
    • 842 篇 机械工程
    • 711 篇 光学工程
    • 527 篇 安全科学与工程
    • 489 篇 仪器科学与技术
    • 466 篇 动力工程及工程热...
    • 440 篇 化学工程与技术
    • 414 篇 建筑学
  • 5,786 篇 理学
    • 3,346 篇 数学
    • 1,564 篇 生物学
    • 1,084 篇 物理学
    • 954 篇 统计学(可授理学、...
    • 802 篇 系统科学
    • 457 篇 化学
  • 3,902 篇 管理学
    • 2,417 篇 管理科学与工程(可...
    • 1,647 篇 图书情报与档案管...
    • 1,208 篇 工商管理
  • 938 篇 医学
    • 829 篇 临床医学
    • 743 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 615 篇 法学
    • 478 篇 社会学
  • 401 篇 教育学
    • 385 篇 教育学
  • 398 篇 经济学
    • 396 篇 应用经济学
  • 209 篇 农学
  • 103 篇 文学
  • 63 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,248 篇 software enginee...
  • 1,088 篇 computer science
  • 407 篇 application soft...
  • 392 篇 deep learning
  • 354 篇 computational mo...
  • 337 篇 computer archite...
  • 329 篇 software
  • 301 篇 machine learning
  • 299 篇 accuracy
  • 273 篇 software systems
  • 273 篇 data mining
  • 262 篇 training
  • 247 篇 feature extracti...
  • 244 篇 internet of thin...
  • 223 篇 programming
  • 219 篇 support vector m...
  • 190 篇 artificial intel...
  • 187 篇 testing
  • 183 篇 optimization
  • 175 篇 semantics

机构

  • 355 篇 college of compu...
  • 197 篇 department of co...
  • 124 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 113 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 79 篇 school of inform...
  • 73 篇 department of co...
  • 70 篇 department of co...
  • 61 篇 school of comput...
  • 59 篇 department of co...
  • 53 篇 department of co...
  • 52 篇 department of co...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 shen furao
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 24 篇 kotagiri ramamoh...
  • 24 篇 xiao qin
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 23 篇 mian ajmal
  • 22 篇 khomh foutse
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit

语言

  • 20,348 篇 英文
  • 895 篇 其他
  • 161 篇 中文
  • 8 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21397 条 记 录,以下是1171-1180 订阅
排序:
NPBMT: A Novel and Proficient Buffer Management Technique for Internet of Vehicle-Based DTNs
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 1303-1323页
作者: Sikandar Khan Khalid Saeed Muhammad Faran Majeed Salman A.AlQahtani Khursheed Aurangzeb Muhammad Shahid Anwar Department of Computer Science Shaheed Benazir Bhutto University SheringalDir(U)Khyber Pakhtunkhwa18200Pakistan Department of Computer Science Kohsar University MurreePunjab47150Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Department of AI and Software Gachon UniversitySeongnam-si13120South Korea
Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are *** nodes in DTNs have limited buffer storage... 详细信息
来源: 评论
Broadcasting and Three List Subtraction  17th
Broadcasting and Three List Subtraction
收藏 引用
17th International Conference on Combinatorial Optimization and Applications, COCOA 2024
作者: Harutyunyan, Hovhannes A. Hovhannisyan, Narek Department of Computer Science and Software Engineering Concordia University MontrealQCH3G 1M8 Canada
Broadcasting is an information dissemination primitive where a message is passed from one node (called originator) to all other nodes in the network. In the scope of this paper, we will mainly focus on determining the... 详细信息
来源: 评论
MLRaft: Improvement of Raft Based on Multi-log Synchronization Model  6
MLRaft: Improvement of Raft Based on Multi-log Synchronizati...
收藏 引用
6th International Conference on Electronic Information Technology and computer engineering, EITCE 2022
作者: Zhang, Menghao Xu, Lizhen Department of Software Engineering Southeast University Nanjing China Department of Computer Science and Engineering Southeast University Nanjing China
Raft is currently the most popular distributed consensus protocol. Due to the single leader mechanism of Raft, the performance of the distributed system is degraded to that of a single-machine system. Aiming at this s... 详细信息
来源: 评论
Advancements in Cybersecurity Using Deep Learning Techniques Attack Detection for Trojan Horses
Advancements in Cybersecurity Using Deep Learning Techniques...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Hosanna Princye, P. Ahila, A. Lakshmi, A. Anna Ragavendran, N. Purushothaman, K.E. Uma Maheswari, G. Saravanakumar, R. Sri Sairam College of Engineering Department of Electronics and Communication Engineering Anekal Bangalore India R.M.K. Engineering College Department of Information Technology Tamil Nadu Chennai India RMK College of Engineering and Technology Department of Artificial Intelligence and Data Science Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R and D Institute of Science and Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India RMK College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Software Analyst Iconix Software Solution Tamil Nadu Tirunelveli India
Today's computer networks are threatened by Trojan horse assaults and other cybersecurity dangers. We propose and evaluate deep learning methods using the Kaggle-hosted Trojan Detection dataset to detect Trojan ho... 详细信息
来源: 评论
Economical Requirements Elicitation Techniques During COVID-19: A Systematic Literature Review
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 2665-2680页
作者: Tauqeer ul Amin Basit Shahzad Fazal-e-Amin Muhammad Shoaib Department of Software Engineering National University of Modern LanguagesIslamabadPakistan Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia
Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into *** phase is cost-and time-intensive,and a project may... 详细信息
来源: 评论
Heterogeneous Domain Adaptation via Correlative and Discriminative Feature Learning
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3447-3461页
作者: Lu, Yuwu Lin, Dewei Shen, Linlin Zhou, Yicong Pan, Jiahui South China Normal University School of Artificial Intelligence Foshan528225 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518055 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China University of Nottingham Ningbo China Department of Computer Science Ningbo315100 China University of Macau Department of Computer and Information Science China
Heterogeneous domain adaptation seeks to learn an effective classifier or regression model for unlabeled target samples by using the well-labeled source samples but residing in different feature spaces and lying diffe... 详细信息
来源: 评论
Implementation of Lean Management in software Project Management
Implementation of Lean Management in Software Project Manage...
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Uzair Rasheed Sadia Khalid Mishal Muneer Israr Ahmad Ibraheem Khalil Faisal Masood Department of Computer and Software Engineering College of Electrical and Mechanical Engineering NUST Islamabad Pakistan
Organizations normally focus on delivering the product that could earn maximum profit for the client. They do not focus on time, cost and quality. So the resultant product is of poor quality, over budget, over time, p... 详细信息
来源: 评论
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY-BASED CYBERATTACK CAMPAIGNS
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY...
收藏 引用
2024 Winter Simulation Conference, WSC 2024
作者: Shin, Jeongkeun Dobson, Geoffrey B. Carley, L. Richard Carley, Kathleen M. Department of Electrical and Computer Engineering Carnegie Mellon University PittsburghPA United States Software and Societal Systems Department Carnegie Mellon University PittsburghPA United States
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims’ human factors affect th...
来源: 评论
MAiVAR-T: Multimodal Audio-image and Video Action Recognizer using Transformers  11
MAiVAR-T: Multimodal Audio-image and Video Action Recognizer...
收藏 引用
11th European Workshop on Visual Information Processing, EUVIP 2023
作者: Shaikh, Muhammad Bilal Chai, Douglas Shamsul Islam, Syed Mohammed Akhtar, Naveed Edith Cowan University School of Engineering Australia Edith Cowan University School of Science Australia The University of Western Australia Department of Computer Science & Software Engineering Australia
In line with the human capacity to perceive the world by simultaneously processing and integrating high-dimensional inputs from multiple modalities like vision and audio, we propose a novel model, MAiVAR-T (Multimodal... 详细信息
来源: 评论
Development of Day-Ahead Peer-to-Peer Energy Trading with Time-Series Clustering
Development of Day-Ahead Peer-to-Peer Energy Trading with Ti...
收藏 引用
2023 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices, ASEMD 2023
作者: Noorfatima, Nadya Jung, Jaesung Onen, Ahmet Yoldas, Yeliz Ajou University Department of Energy Systems Research Suwon Korea Republic of Sultan Qaboos University Department of Electrical and Computer Engineering Muscat Oman Kayseri University Department of Software Engineering Kayseri Turkey
Day-ahead trading of electricity has been applied to ensure the balance between the amount of electricity sold and bought. Even so, due to the intermittent distributed energy resources (DERs), the actual condition can... 详细信息
来源: 评论