咨询与建议

限定检索结果

文献类型

  • 2,053 篇 会议
  • 871 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,735 篇 工学
    • 1,336 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 331 篇 信息与通信工程
    • 299 篇 控制科学与工程
    • 165 篇 生物工程
    • 146 篇 电气工程
    • 119 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 84 篇 安全科学与工程
    • 83 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
  • 777 篇 理学
    • 415 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 126 篇 统计学(可授理学、...
    • 67 篇 化学
  • 505 篇 管理学
    • 357 篇 管理科学与工程(可...
    • 200 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 80 篇 法学
    • 62 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 54 篇 教育学
    • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 76 篇 computational mo...
  • 75 篇 application soft...
  • 71 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 69 篇 machine learning
  • 68 篇 software systems
  • 66 篇 software
  • 61 篇 computer archite...
  • 60 篇 training
  • 59 篇 artificial intel...
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 48 篇 security
  • 47 篇 grid computing
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 institute for so...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,697 篇 英文
  • 266 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Software Systems"
2980 条 记 录,以下是1081-1090 订阅
排序:
Using Internet of Things Technologies to Ensure Cargo Transportation Safety
Using Internet of Things Technologies to Ensure Cargo Transp...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Igor Shostak Mariia Danova Olga Morozova Tamara Kliuieva Department of Software Engineering National Aerospace University "KhAI" Kharkiv Ukraine Department of Computer Systems National Aerospace University "KhAI" Kharkiv Ukraine
The article is devoted to the problem of automatic monitoring of the driver's physical conditions while driving. The purpose of this article is to describe an approach to recognizing driver fatigue using a video c...
来源: 评论
Semi-Supervised Domain-Adversarial Training for Intrusion Detection against False Data Injection in the Smart Grid
Semi-Supervised Domain-Adversarial Training for Intrusion De...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yongxuan Zhang Jun Yan Department of Computer Science and Software Engineering (CSSE) Concordia University Concordia Institute for Information Systems Engineering (CIISE) Concordia University Montréal Canada
The smart grid faces with increasingly sophisticated cyber-physical threats, against which machine learning (ML)-based intrusion detection systems have become a powerful and promising solution to smart grid security m... 详细信息
来源: 评论
A Policy Recommendations Framework to Resolve Global software Development Issues  3
A Policy Recommendations Framework to Resolve Global Softwar...
收藏 引用
3rd International Conference on Innovative Computing, ICIC 2019
作者: Hassan, Mujtaba Hussain, Muzammil Ayubi, Salah-U-Din Irfan, Maham School of Systems and Technology University of Management and Technology Department of Software Engineering Lahore Pakistan School of Systems and Technology University of Management and Technology Department of Computer Science Lahore Pakistan
Global software development (GSD) is basically a development which is done through low cost in given time frame by sitting in remote areas within cities, countries and around the globe. The global software development... 详细信息
来源: 评论
Image Steganography Based on Local Variance  2019
Image Steganography Based on Local Variance
收藏 引用
Proceedings of the 2019 2nd International Conference on Watermarking and Image Processing
作者: Ofer Hadar Adiel Sol Or Hamra Armin Shmilovici School of Electrical and Computer Engineering Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ... 详细信息
来源: 评论
Image steganography based on local variance  2
Image steganography based on local variance
收藏 引用
2nd International Conference on Watermarking and Image Processing, ICWIP 2019
作者: Hadar, Ofer Sol, Adiel Hamra, Or Shmilovici, Armin School of Electrical and Computer Engineering Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ... 详细信息
来源: 评论
Vertical Federated Learning: Challenges, Methodologies and Experiments
arXiv
收藏 引用
arXiv 2022年
作者: Wei, Kang Li, Jun Ma, Chuan Ding, Ming Wei, Sha Wu, Fan Chen, Guihai Ranbaduge, Thilina School of Electrical and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China Ministry of Education China Data61 CSIRO SydneyNSW2015 Australia Beijing100191 China The Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China The State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
Recently, federated learning (FL) has emerged as a promising distributed machine learning (ML) technology, owing to the advancing computational and sensing capacities of end-user devices, as well as the increasing con... 详细信息
来源: 评论
Author name disambiguation in bibliographic databases: A survey
arXiv
收藏 引用
arXiv 2020年
作者: Shoaib, Muhammad Daud, Ali Amjad, Tehmina Department of Computer Science Comsats University Sahiwal Campus Pakistan Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Saudi Arabia Department of Computer Science and Software Engineering International Islamic University Islamabad Pakistan
Entity resolution is a challenging and hot research area in the field of Information systems since last decade. Author Name Disambiguation (AND) in Bibliographic Databases (BD) like DBLP1, Citeseer2, and Scopus3 is a ... 详细信息
来源: 评论
Differential privacy–based location privacy enhancing in edge computing
Differential privacy–based location privacy enhancing in ed...
收藏 引用
作者: Miao, Qiucheng Jing, Weipeng Song, Houbing College of Information and Computer Engineering Northeast Forestry University Harbin China Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona Beach United States
In the era of edge computing, real-time data preprocessing on the edge node has the potential to improve computational efficiency and data accuracy. However, a significant challenge is private data disclosure, particu... 详细信息
来源: 评论
Cloud storage architecture: Research challenges and opportunities
arXiv
收藏 引用
arXiv 2020年
作者: Ghani, Anwar Badshah, Afzal Jan, Saeedullah Alshdadi, Abdulrahman A. Daud, Ali Department of Computer Science & Software Engineering International Islamic University Islamabad44000 Pakistan Department of Computer Science & IT University of Malakand Chakdara18800 Pakistan Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Saudi Arabia
From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog ... 详细信息
来源: 评论
Regressor driven incremental instance segmentation for contraband items identification
收藏 引用
engineering Applications of Artificial Intelligence 2025年 157卷
作者: Ammara Nasim Mahboob Anwar Muhammad Owais Samet Akcay Divya Velayudhan Muhammad Usman Akram Mohammed Ghazal Naoufel Werghi Taimur Hassan Department of Computer and Software Engineering National University of Sciences and Technology (NUST) Islamabad 44000 Pakistan Department of Electrical Computer and Biomedical Engineering Abu Dhabi University Abu Dhabi 59911 United Arab Emirates Khalifa University Center for Autonomous Robotic Systems (KUCARS) Khalifa University Abu Dhabi 127788 United Arab Emirates Research and Development Division Intel Corporation United Kingdom
Detecting suspicious objects contained within passenger baggage is one of the most difficult tasks, even for the security experts. To address this problem, many researchers have developed computer-aided screening meth...
来源: 评论