咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Software Systems"
2960 条 记 录,以下是91-100 订阅
排序:
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors  4
Dynamic Multimedia Encryption Using a Parallel File System B...
收藏 引用
4th IEEE International Conference on Data engineering and Communication systems, ICDECS 2024
作者: Simi Margarat, G. Malathi, S. Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Grt Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Tiruttani India Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set... 详细信息
来源: 评论
Enhancing Secure Development in Globally Distributed software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 5031-5049页
作者: Marya Iqbal Yaser Hafeez Nabil Almashfi Amjad Alsirhani Faeiz Alserhani Sadia Ali Mamoona Humayun Muhammad Jamal University Institute of Information Technology PMAS-Arid Agriculture UniversityRawalpindiPakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaAl Jouf72388Saudi Arabia Department of Mathematics Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindiPakistan
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var... 详细信息
来源: 评论
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY-BASED CYBERATTACK CAMPAIGNS
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY...
收藏 引用
2024 Winter Simulation Conference, WSC 2024
作者: Shin, Jeongkeun Dobson, Geoffrey B. Carley, L. Richard Carley, Kathleen M. Department of Electrical and Computer Engineering Carnegie Mellon University PittsburghPA United States Software and Societal Systems Department Carnegie Mellon University PittsburghPA United States
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims’ human factors affect th...
来源: 评论
Enhancing Soft Skills in Autistic Children: The Next Generation of Mind Champ's Technological Approach
Enhancing Soft Skills in Autistic Children: The Next Generat...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Kalna Peiris Ruchira Nelaka Kalpani Manathunga Department of Computer Systems Engineering Department of Information Technology Department of Computer Science and Software Engineering
Autism Spectrum Disorder (ASD) significantly impacts a child's ability to navigate social interactions, regulate emotions, and develop adaptive skills crucial for daily functioning. While various interventions exi... 详细信息
来源: 评论
Towards Modeling Functional Requirements From Tacit Knowledge
Towards Modeling Functional Requirements From Tacit Knowledg...
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Jafar, Rameen Almufareh, Maram Fahaad Ashraf, Sundas Khan, Bushra Butt, Wasi Haider Humayun, Mamoona National University of Sciences and Technology Department of Computer and Software Engineering Pakistan College of Computer and Information Sciences Jouf University Department of Information Systems Sakakah Saudi Arabia
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o... 详细信息
来源: 评论
Improving Thyroid Disorder Diagnosis via Ensemble Stacking and Bidirectional Feature Selection
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4225-4241页
作者: Muhammad Armghan Latif Zohaib Mushtaq Saad Arif Sara Rehman Muhammad Farrukh Qureshi Nagwan Abdel Samee Maali Alabdulhafith Yeong Hyeon Gu Mohammed A.Al-masni Department of Computer and Information System Cleveland State UniversityOhio44115USA Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Biomedical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Electrical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Artificial Intelligence College of Software and Convergence TechnologySejong UniversitySeoul05006Korea
Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid *** and timely diagnosis of these disorders is... 详细信息
来源: 评论
Categorizing methods for integrating machine learning with executable specifications
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 5-19页
作者: David HAREL Raz YERUSHALMI Assaf MARRON Achiya ELYASAF Department of Computer Science and Applied Mathematics Weizmann Institute of Science Department of Software and Information Systems Engineering Ben-Gurion University of the Negev
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
Super-Resolution Based ROI Enhancement Approaches for Palmprint Recognition  8
Super-Resolution Based ROI Enhancement Approaches for Palmpr...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: MacAn, Huseyin Furkan Bingol, Ozkan Turk, Salih Ekinci, Murat Gumushane University Department of Management Information Systems Gümüşhane Turkey Gumushane University Department of Software Engineering Gümüşhane Turkey Karadeniz Technical University Department of Computer Engineering Trabzon Turkey
The sizes of regions of interest (ROI) obtained from images captured by cameras in palmprint recognition may vary depending on the camera specifications and the position of the hand. The regions of interest that recog... 详细信息
来源: 评论
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on Data engineering and Communication systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论