咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Software Systems"
2960 条 记 录,以下是21-30 订阅
排序:
Comparative Analysis of Camera Calibration Algorithms for Football Applications  4
Comparative Analysis of Camera Calibration Algorithms for Fo...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Sorokivskyi, Oleksandr Hotovych, Volodymyr Nazarevych, Oleg Shymchuk, Grygorii Department of Computer Science Faculty of Computer Information Systems and Software Engineering Ternopil Ivan Puluj National Technical University Ternopil Ukraine
In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Semi‑supervised contour‑driven broad learning system for autonomous segmentation of concealed prohibited baggage items
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2024年 第1期7卷 1-18页
作者: Divya Velayudhan Abdelfatah Ahmed Taimur Hassan Muhammad Owais Neha Gour Mohammed Bennamoun Ernesto Damiani Naoufel Werghi Department of Electrical Engineering and Computer Sciences Center for Cyber‑Physical SystemsKhalifa University of Science and TechnologyAbu Dhabi 127788United Arab Emirates Department of Electrical Computer and Biomedical EngineeringAbu Dhabi UniversityAbu Dhabi 59911United Arab Emirates Department of Computer Science and Software Engineering the University of Western AustraliaPerthWA 6009Australia
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,... 详细信息
来源: 评论
Deep Learning-Based Anomaly Detection in 5G Cellular Networks  15
Deep Learning-Based Anomaly Detection in 5G Cellular Network...
收藏 引用
15th International Conference on Information, Intelligence, systems and Applications, IISA 2024
作者: Farooq, Umar Hameed, Aroosa Leivadeas, Aris Lambadaris, Ioannis École de Technologie Supérieure Department of Software and It Engineering Montreal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
The telecommunication industry saw a dramatic shift with the introduction of 5G technologies. This new cellular generation brought lightening speed, massive capacity, and better connectivity. Despite the many introduc... 详细信息
来源: 评论
Security-Oriented Network Intent Placement using Particle Swarm Optimization  7
Security-Oriented Network Intent Placement using Particle Sw...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Landeau, Gabriel Avgeris, Marios Leivadeas, Aris Lambadaris, Ioannis Department of Software and It Engineering Montréal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio... 详细信息
来源: 评论
Xtractor: A Two-Step Tweet Extractor for Sentiment Analysis  5
Xtractor: A Two-Step Tweet Extractor for Sentiment Analysis
收藏 引用
5th International Conference on Advancements in Computational Sciences, ICACS 2024
作者: Alvi, Muhammad Bux Mahoto, Naeem Ahmed Unar, Mukhtiar Ali Shaikh, Muhammad Akram The Islamia University of Bahawalpur Computer Systems Engineering Bahawalpur Pakistan Mehran Uet Software Engineering Department Jamshoro Pakistan Mehran Uet Computer Systems Engineering Department Jamshoro Pakistan Pastic Pakistan Science Foundation Islamabad Pakistan
Twitter (now X) has been gaining popularity with each passing day since its inception in 2006. People have been using Twitter as an instant repository to collect data and gain insight into folks' minds on trending... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Decision Support System for Enhancing Transportation Services Using Aspect-Based Sentiment Analysis
A Decision Support System for Enhancing Transportation Servi...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Benaddi, Lamya Ouaddi, Charaf Naimi, Lahbib Souha, Adnane Jakimi, Abdeslam Ouchao, Brahim Moulay Ismail University Software Engineering and Information Systems Engineering Team Faculty of Science and Technology Errachidia Department of Computer Sciences Morocco
This paper proposes an innovative decision support system based on sentiment analysis, specifically designed for the transportation sector. The system employs an aspect-based sentiment analysis approach, which accurat... 详细信息
来源: 评论
Towards a software Factory for Developing Recommender systems and Decision Support systems for Smart Tourism
Towards a Software Factory for Developing Recommender System...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Souha, Adnane Naimi, Lahbib Ouaddi, Charaf Benaddi, Lamya Bouziane, El Mahi Jakimi, Abdeslam Moulay Ismail University Software Engineering and Information Systems Engineering Team Faculty of Sciences and Techniques Errachidia Department of Computer Sciences Morocco
The development of smart systems is fundamental to improve the competitiveness of tourist destinations, by exploiting technologies such as Recommender systems (RS) and Decision Support systems (DSS). In this article, ... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论