咨询与建议

限定检索结果

文献类型

  • 2,066 篇 会议
  • 889 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,011 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,757 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 346 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 165 篇 生物工程
    • 153 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 117 篇 机械工程
    • 91 篇 安全科学与工程
    • 83 篇 光学工程
    • 74 篇 动力工程及工程热...
    • 68 篇 建筑学
    • 68 篇 土木工程
    • 67 篇 化学工程与技术
    • 66 篇 仪器科学与技术
    • 60 篇 网络空间安全
  • 789 篇 理学
    • 419 篇 数学
    • 191 篇 生物学
    • 149 篇 物理学
    • 147 篇 系统科学
    • 125 篇 统计学(可授理学、...
    • 68 篇 化学
  • 524 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 204 篇 工商管理
    • 201 篇 图书情报与档案管...
  • 132 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 82 篇 法学
    • 64 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 54 篇 教育学
  • 24 篇 农学
  • 13 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 73 篇 deep learning
  • 72 篇 accuracy
  • 70 篇 laboratories
  • 70 篇 machine learning
  • 68 篇 software systems
  • 67 篇 software
  • 62 篇 computer archite...
  • 60 篇 artificial intel...
  • 60 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 49 篇 security
  • 47 篇 grid computing
  • 47 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,632 篇 英文
  • 362 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
3011 条 记 录,以下是1101-1110 订阅
排序:
An Efficient Soft Error Tolerant Approach to Enhance Reliability of TCAM  1
An Efficient Soft Error Tolerant Approach to Enhance Reliabi...
收藏 引用
1st International Conference on Advances in Science, engineering and Robotics Technology, ICASERT 2019
作者: Afrin, Rumana Sadi, Muhammad Sheikh Jurjens, Jan Khulna University of Engineering Techonology Department of Computer Science Engineering Khulna9203 Bangladesh University of Koblenz-Landau Fraunhofer-Institute for Software and Systems Engineering ISST Department of Computer Science Koblenz Germany
Ternary Content Addressable Memory (TCAM) is a kind of extraordinary memory which is used to search operations in routers, firewalls, network address translators, and entire content in a single clock cycle. It is a sp... 详细信息
来源: 评论
Emergency response UAS logistics models for coastal and offshore locations
Emergency response UAS logistics models for coastal and offs...
收藏 引用
2019 Institute of Industrial and systems Engineers Annual Conference and Expo, IISE 2019
作者: Rau, James Babiceanu, Radu F. Seker, Remzi Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona BeachFL United States
Recently there has been a rapid increase in the advancements and use of Small Unmanned Aerial systems (sUAS) for a wide range of applications ranging from precision agriculture, to environmental monitoring, and to the... 详细信息
来源: 评论
Data Resolution Improvement for Ocean of Things Based on Improved FCM
Data Resolution Improvement for Ocean of Things Based on Imp...
收藏 引用
2020 International Conference on Computing, Networking and Communications, ICNC 2020
作者: Yang, Jiachen Wen, Jiabao Jiang, Bin Song, Hoibing Kong, Fanhii Zhen, Zhizhio Tianjin University School of Electrical and Information Engineering Tianjin China Embry-Riddle Aeronautical University Department of Electrical Computer Software and Systems Engineering Daytona Beach United States Tianjin University of Technology School of Management Tianiin China Hebei University of Technology School of Artificial Intelligence Tianiin China
In Ocean of Things, information prediction is an important part of marine data processing. Due to a variety of marine acquisition devices, the distribution of marine information is discrete. The marine area is wide, a... 详细信息
来源: 评论
An Exploratory Study on the Introduction and Removal of Different Types of Technical Debt
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Jiakun Huang, Qiao Xia, Xin Shihab, Emad Lo, David Li, Shanping College of Computer Science and Technology Zhejiang University China PengCheng Laboratory China College of Computer Science and Technology Zhejiang University China Faculty of Information Technology Monash University Melbourne Australia Department of Computer Science and Software Engineering Concordia University Canada School of Information Systems Singapore Management University Singapore
To complete tasks faster, developers often have to sacrifice the quality of the software. Such compromised practice results in the increasing burden to developers in future development. The metaphor, technical debt, d... 详细信息
来源: 评论
Natidroid: Cross-language android permission specification
arXiv
收藏 引用
arXiv 2021年
作者: Li, Chaoran Chen, Xiao Sun, Ruoxi Xue, Jason Wen, Sheng Ahmed, Muhammad Ejaz Camtepe, Seyit Xiang, Yang School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia Department of Software Systems and Cybersecurity Faculty of IT Monash University ClaytonVIC3800 Australia School of Computer Science University of Adelaide North TerraceSA5005 Australia CSIRO Data61 Australia
The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation pr... 详细信息
来源: 评论
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs
收藏 引用
Digital Communications and Networks 2024年
作者: Shumaila Javaid Hamza Fahim Sherali Zeadally Bin He Department of Control Science and Engineering College of Electronics and Information Engineering Tongji University Shanghai 201804 China National Key Laboratory of Autonomous Intelligent Unmanned Systems Tongji University Shanghai 201210 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai 201210 China Department of Computer Science Faculty of Computer Sciences Ilma University Karachi 75190 Pakistan College of Communication and Information University of Kentucky Lexington KY USA Academy of Computer Science & Software Engineering University of Johannesburg Johannesburg South Africa
Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and depl... 详细信息
来源: 评论
EER: Enterprise expert ranking using employee reputation
arXiv
收藏 引用
arXiv 2020年
作者: Mahmood, Saba Ghani, Anwar Daud, Ali Saqlain, Syed Muhammad Department of Computer Science and Software Engineering International Islamic University Islamabad Department of Computer Science Bahria University Islamabad Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The emergence of online enterprises spread across continents, have given rise to the need of expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and know... 详细信息
来源: 评论
A regularized CNN approach for detecting cervical cancer
收藏 引用
AIP Conference Proceedings 2024年 第1期3220卷
作者: Jesse Jeremiah Tanimu Mohamed Hamada Mohammed Hassan Tsentob Joy Samson Jane Simon Parah Department of computer Science Bayero Unoiversity Kano Kano Nigeria Division of information systems University of Aizu Aizu Japan Department of Software Engineering Bayero University Kano Kano Nigeria Department of computer Science Air Force Institute of Technology Kaduna Kaduna Nigeria Department of Mathematical and Physical Science Glorious Vision University Ogwa Benin Nigeria
This study delved into leveraging deep learning techniques to classify different types of cervical cancer images, recognizing the disease’s prevalence and criticality. We employed a dataset comprising cervical images...
来源: 评论
Methods of On-Line Computation Acceleration in systems with Direct Connection between Units
Methods of On-Line Computation Acceleration in Systems with ...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Valerii Zhabin Valentina Zhabina Department of Computer Engineering Igor Sikorsky Kyiv Polytechnic Institute Kyiv Ukraine Department of Computer Systems Software Igor Sikorsky Kyiv Polytechnic Institute Kyiv Ukraine
A possibility to increase the effectiveness of the parallel systems with direct connections by means of data between computation units, which are connected one to another in accordance with data flow graph, is conside...
来源: 评论
Blocks' Network: Redesign architecture based on blockchain technology  2
Blocks' Network: Redesign architecture based on blockchain t...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Hanif, Moataz Song, Houbing Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona BeachFL32114 United States
The internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon [1]. However, this technology has become a weapon that threa... 详细信息
来源: 评论