咨询与建议

限定检索结果

文献类型

  • 14,802 篇 会议
  • 6,303 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,915 篇 工学
    • 10,111 篇 计算机科学与技术...
    • 8,396 篇 软件工程
    • 2,629 篇 信息与通信工程
    • 1,747 篇 控制科学与工程
    • 1,392 篇 生物工程
    • 1,253 篇 电气工程
    • 974 篇 生物医学工程(可授...
    • 897 篇 电子科学与技术(可...
    • 842 篇 机械工程
    • 707 篇 光学工程
    • 529 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 440 篇 化学工程与技术
    • 405 篇 建筑学
    • 387 篇 交通运输工程
  • 5,781 篇 理学
    • 3,335 篇 数学
    • 1,567 篇 生物学
    • 1,086 篇 物理学
    • 949 篇 统计学(可授理学、...
    • 801 篇 系统科学
    • 463 篇 化学
  • 3,902 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,650 篇 图书情报与档案管...
    • 1,203 篇 工商管理
  • 946 篇 医学
    • 832 篇 临床医学
    • 742 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 618 篇 法学
    • 479 篇 社会学
  • 400 篇 经济学
    • 398 篇 应用经济学
  • 399 篇 教育学
  • 214 篇 农学
  • 105 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 385 篇 deep learning
  • 350 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 306 篇 machine learning
  • 289 篇 accuracy
  • 272 篇 software systems
  • 269 篇 data mining
  • 247 篇 training
  • 246 篇 internet of thin...
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 216 篇 support vector m...
  • 186 篇 artificial intel...
  • 185 篇 testing
  • 182 篇 optimization
  • 173 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 76 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry

语言

  • 20,611 篇 英文
  • 601 篇 其他
  • 159 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21365 条 记 录,以下是4921-4930 订阅
排序:
Security in model driven development: A survey
Security in model driven development: A survey
收藏 引用
2011 6th International Conference on Availability, Reliability and Security, ARES 2011
作者: Jensen, Jostein Jaatun, Martin Gilje Department of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Department of Software Engineering Safety and Security SINTEF ICT Trondheim Norway
Model driven development (MDD) is considered a promising approach for software development. In this paper the results of a systematic survey is reported to identify the state-of-the-art within the topic of security in... 详细信息
来源: 评论
Graph-Based Feature Learning for Cross-Project software Defect Prediction
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 161-180页
作者: Ahmed Abdu Zhengjun Zhai Hakim A.Abdo Redhwan Algabri Sungon Lee School of Software Northwestern Polytechnical UniversityXi’anChina School of Computer Science Northwestern Polytechnical UniversityXi’anChina Department of Computer Science Hodeidah UniversityPO Box 3114Al-HudaydahYemen Research Institute of Engineering and Technology Hanyang UniversityAnsanKorea Department of Robotics Hanyang UniversityAnsanKorea
Cross-project software defect prediction(CPDP)aims to enhance defect prediction in target projects with limited or no historical data by leveraging information from related source *** existing CPDP approaches rely on ... 详细信息
来源: 评论
Sharing secrets and reversibly reconstructing the cover image using two meaningful shadows
Sharing secrets and reversibly reconstructing the cover imag...
收藏 引用
IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing
作者: Kieu, The Duc Chang, Chin-Chen Wang, Zhi-Hui Li, Ming-Chu Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan School of Software Dalian University of Technology Dalian China
This paper proposes a data hiding method by secret sharing. The proposed method embeds a k-bit secret digit in a secret message (i.e., a bit stream, a secret image) into a cover pixel of a grayscale cover image at a t... 详细信息
来源: 评论
RTL implementation of MCMC-based constraints solver  16
RTL implementation of MCMC-based constraints solver
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Ahmed, Moemen Ahmed, Youssef Nagy, Younan Adbel-Rahman, Manar Salah, Khaled El-Kharashi, M. Watheq Khan, Ayub Department of Computer and Systems Faculty of Engineering Ain Shams University Cairo Egypt Siemens Digital Industries Software Fremont United States
Functional hardware verification is one of the most challenging areas in the hardware design cycle. With the increase in the complexity and size of the design, the time needed for verification becomes the largest part... 详细信息
来源: 评论
Improved Approximation for Broadcasting in k-Path Graphs  16th
Improved Approximation for Broadcasting in k-Path Graphs
收藏 引用
16th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2023
作者: Harutyunyan, Hovhannes A. Hovhannisyan, Narek Department of Computer Science and Software Engineering Concordia University MontrealH3G 1M8 Canada
Broadcasting is an information dissemination primitive where a message is passed from one node (called originator) to all other nodes in the network. With the increasing interest in interconnection networks, an extens... 详细信息
来源: 评论
Verification of variable service orchestrations using model checking
Verification of variable service orchestrations using model ...
收藏 引用
2nd International Workshop on Quality Assurance for Service-Based Applications, QASBA 2013, in Conjunction with the International Symposium on software Testing and Analysis, ISSTA 2013
作者: Suloglu, Selma Aktunc, Riza Yucefaydali, Mustafa Computer Engineering Department Middle East Technical University Ankara Turkey TÜBITAK Software Technologies Research Institute Ankara Turkey
Service orchestrations as architectural specifications specify collaborating services and the way they interoperate via information exchange. Some orchestration specifications, which describe the behavior of service-o... 详细信息
来源: 评论
Improving MapReduce performance by using a new partitioner in YARN  23
Improving MapReduce performance by using a new partitioner i...
收藏 引用
23rd International Conference on Distributed Multimedia Systems, Visual Languages and Sentient Systems, DMSVLSS 2017
作者: Lu, Wei Chen, Lei Yuan, Haitao Xing, Weiwei Wang, Liqiang Yang, Yong School of Software Engineering Beijing Jiaotong University Beijing China Department of Computer Science University of Central Florida Orlando United States
Data skew, cluster heterogeneity, and network traffic are three issues that significantly influence the performance of MapReduce applications. However, the Hash-Partitioner in native Hadoop does not consider them. Thi... 详细信息
来源: 评论
MedNetV3: A Deep Learning Model for MRI Brain Tumor Detection with MobileNetV3 and Advanced Data Augmentation  21
MedNetV3: A Deep Learning Model for MRI Brain Tumor Detectio...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Tariq, Hussain Ahmed Fengli, Zhang Salim Shakib, Muhamud Md Javed, Iram School of Information and Software Engineering University of Electronic Science and Technology of China China University of Agriculture Department of Computer Science Faisalabad Pakistan
In this paper, we present a novel deep learning model medical network (MedNetV3) developed for brain tumor detection. It incorporates advanced data augmentation techniques based on the MobileNetV3 architecture. MedNet... 详细信息
来源: 评论
Adaptive dialogue management using intent clustering and fuzzy rules
Adaptive dialogue management using intent clustering and fuz...
收藏 引用
作者: Griol, David Callejas, Zoraida Molina, Jose Manuel Sanchis, Araceli Department of Software Engineering University of Granada Granada Spain Departement of Computer Science Universidad Carlos III de Madrid Madrid Spain
Conversational systems have become an element of everyday life for billions of users who use speech-based interfaces to services, engage with personal digital assistants on smartphones, social media chatbots, or smart... 详细信息
来源: 评论
software Defect Prediction Harnessing on Multi 1-Dimensional Convolutional Neural Network Structure
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1521-1546页
作者: Zuhaira Muhammad Zain Sapiah Sakri Nurul Halimatul Asmak Ismail Reza M.Parizi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Computer Science and Information Technology College of CommunityPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia College of Computing and Software Engineering Kennesaw State UniversityMariettaGA30060USA
Developing successful software with no defects is one of the main goals of software *** order to provide a software project with the anticipated software quality,the prediction of software defects plays a vital *** le... 详细信息
来源: 评论