咨询与建议

限定检索结果

文献类型

  • 2,066 篇 会议
  • 889 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,011 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,757 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 346 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 165 篇 生物工程
    • 153 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 117 篇 机械工程
    • 91 篇 安全科学与工程
    • 83 篇 光学工程
    • 74 篇 动力工程及工程热...
    • 68 篇 建筑学
    • 68 篇 土木工程
    • 67 篇 化学工程与技术
    • 66 篇 仪器科学与技术
    • 60 篇 网络空间安全
  • 789 篇 理学
    • 419 篇 数学
    • 191 篇 生物学
    • 149 篇 物理学
    • 147 篇 系统科学
    • 125 篇 统计学(可授理学、...
    • 68 篇 化学
  • 524 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 204 篇 工商管理
    • 201 篇 图书情报与档案管...
  • 132 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 82 篇 法学
    • 64 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 54 篇 教育学
  • 24 篇 农学
  • 13 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 73 篇 deep learning
  • 72 篇 accuracy
  • 70 篇 laboratories
  • 70 篇 machine learning
  • 68 篇 software systems
  • 67 篇 software
  • 62 篇 computer archite...
  • 60 篇 artificial intel...
  • 60 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 49 篇 security
  • 47 篇 grid computing
  • 47 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,632 篇 英文
  • 362 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
3011 条 记 录,以下是1191-1200 订阅
排序:
Reusable garbled turing machines without FHE  3rd
Reusable garbled turing machines without FHE
收藏 引用
3rd International Conference on Codes, Cryptology and Information Security, C2SI 2019
作者: Wang, Yongge Malluhi, Qutaibah M. Department of Software and Information Systems UNC Charlotte 9201 University City Blvd. CharlotteNC28223 United States Department of Computer Science and Engineering Qatar University Doha Qatar
Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question ... 详细信息
来源: 评论
An Indoor Localization Approach Based on Deep Learning for Indoor Location-Based Services
An Indoor Localization Approach Based on Deep Learning for I...
收藏 引用
2019 IEEE Jordan International Joint Conference on Electrical engineering and Information Technology, JEEIT 2019
作者: Elbes, Mohammed Almaita, Eyad Alrawashdeh, Thamer Kanan, Tarek Alzurbi, Shadi Hawashin, Bilal Computer Science Department Al-Zaytoonah University of Jordan Amman Jordan Electrical Engineering Department Altafilah Technical University tafila Jordan Software Engineering Department Al-Zaytoonah University of Jordan Amman Jordan Computer Information Systems Al-Zaytoonah University of Jordan Amman Jordan
The rapid increase in the demand of location based services (LBS) for indoor environments has attracted scholars to indoor localization based on fingerprinting due its high accuracy. In this paper, we propose our nove... 详细信息
来源: 评论
Corrigendum to “LightSOD: Towards lightweight and efficient network for salient object detection” [J. Comput. Vis. Imag. Underst. 249 (2024) 104148]
收藏 引用
computer Vision and Image Understanding 2025年 252卷
作者: Thien-Thu Ngo Hoang Ngoc Tran Md. Delowar Hossain Eui-Nam Huh School of Information Technology Center for Applied Intelligent Systems Research Halmstad University Kristian IV:s väg 3 Halmstad 30118 Halland Sweden Department Computer Science and Engineering KyungHee University Global Campus Deogyeong-daero Yongin-si 17104 Gyeonggi-do Republic of Korea Department of Software Engineering FPT University 600 Nguyen Van Cu Street Ninh Kieu 94000 Can Tho Viet Nam Department of Computer Science and Engineering Hajee Mohammad Danesh Science & Technology University Basherhat Dinajpur 5200 Rangpur Division Bangladesh
来源: 评论
Review of Machine Learning Applications for Predicting the Quality Biomass Briquettes for Sustainable and Low-Carbon Energy Solutions
Green Energy and Resources
收藏 引用
Green Energy and Resources 2025年
作者: Constance Nakato Nakimuli Fred Kaggwa Johan De Greef David Kilama Okot Julien Blondeau Simon Kawuma Department of Information Technology Mbarara University of Science and Technology Uganda Brussels Institute for Thermal-Fluid Systems and Clean Energy(BRITE) Vrije Universiteit Brussel Belgium Thermodynamics and Fluid Mechanics Group Faculty of Engineering Vrije Universiteit Brussel (VUB) Belgium Department of Computer Science Mbarara University of Science and Technology Uganda Department of Materials Engineering – Leuven Group T Campus KU Leuven Leuven Belgium Department of Physics Mbarara University of Science and Technology Uganda Department of Software Engineering Mbarara University of Science and Technology Uganda
This review discusses how Machine Learning is applied to predict the quality of biomass briquettes produced from agricultural and municipal solid organic waste, which are crucial for advancing green and low-carbon sol... 详细信息
来源: 评论
Diagnosing covid-19 lung inflammation using machine learning algorithms: A comparative study
Studies in Big Data
收藏 引用
Studies in Big Data 2020年 80卷 91-105页
作者: Ali, Abbas M. Ghafoor, Kayhan Zrar Maghdid, Halgurd S. Mulahuwaish, Aos Department of Software Engineering Salahaddin University-Erbil Erbil Iraq School of Mathematics and Computer Science University of Wolverhampton Wulfruna Street WolverhamptonWV1 1LY United Kingdom Department of Software Engineering Faculty of Engineering Koya University Kurdistan Region Koysinjaq Iraq Department of Computer Science and Information Systems Saginaw Valley State University 7400 Bay Rd Science East 174 University Center Itta BenaMI48710 United States
In this paper, we performed a comparative analysis using machine learning algorithms named support vector machine (SVM), decision tree (DT), k-nearest neighbor (kNN), and convolution neural network (CNN) to classify p... 详细信息
来源: 评论
The use of a genetic algorithm in the problem of distribution of information security organizational and financial resources  2
The use of a genetic algorithm in the problem of distributio...
收藏 引用
2nd IEEE International Conference on Advanced Trends in Information Theory, ATIT 2020
作者: Lakhno, Valeriy Akhmetov, Bakhytzhan Adilzhanova, Saltanat Blozva, Andrii Svitlana, Rzaieva Dmytro, Rzaiev National University of Life and Environmental Sciences of Ukraine Department of Computer Systems and Networks Kyiv Ukraine Abai Kazakh National Pedagogical University Department of Information Technology Almaty Kazakhstan Al-Farabi Kazakh National University Department of Information Technology Almaty Kazakhstan Kyiv National University of Trade and Economics Department. of Software Engineering and Cybersecurity Kyiv Ukraine Kyiv National Economics University after Vadym Hetman Department Of. Informatics and Systemology Kyiv Ukraine
A model of the application of the genetic algorithm (GA) for solving the problem of multicriteria optimization in the distribution of resources allocated for the cybersecurity of the protected object is proposed. In t... 详细信息
来源: 评论
Analysis of rogue access points using SDR  2
Analysis of rogue access points using SDR
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Mercenit, Charles Rios, Juan C. Liu, Yongxin Wang, Jian Yuan, Jiawei Song, Houbing Department of Electrical and Computer Engineering University of California Los Angeles Los AngelesCA90095 United States Department of Math and Computer Science Stetson University DeLandFL32723 United States Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona BeachFL32114 United States
When people connect to the Internet with their mobile devices, they do not often think about the security of their data;however, the prevalence of rogue access points has taken advantage of a false sense of safety in ... 详细信息
来源: 评论
IRIS:A method for predicting in vivo RNA secondary structures using PARIS data
收藏 引用
Quantitative Biology 2020年 第4期8卷 369-381页
作者: Jianyu Zhou Pan Li Wanwen Zeng Wenxiu Ma Zhipeng Lu Rui Jiang Qiangfeng Cliff Zhang Tao Jiang Bioinformatics Division BNRISTTsinghua UniversityBeijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China MOE Key Laboratory of Bioinformatics Beijing Advanced Innovation Center for Structural BiologyCenter for Synthetic and Systems BiologyTsinghua-Peking Center for Life SciencesSchool of Life SciencesTsinghua UniversityBeijing 100084China College of Software Nankai UniversityTianjin 300071China Department of Statistics University of CaliforniaRiversideCA 92521USA Department of Pharmacology and Pharmaceutical Sciences University of Southern CaliforniaCA 90089USA Department of Automation Tsinghua UniversityBeijing 100084China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Background:RNA secondary structures play a pivotal role in posttranscriptional regulation and the functions of non-coding RNAs,yet in vivo RNA secondary structures remain ***(Psoralen Analysis of RNA Interactions and ... 详细信息
来源: 评论
Influence of Network Speed on Structured Query Language (SQL) Database Data Transmission Performance in an Internet of Things (IoT) Sensing Device on Single Board computers (SBC)
Influence of Network Speed on Structured Query Language (SQL...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Nor Azhar, A. Nur Ayuni Hasna, S. Roslina, A.H. Fauziah, Z. Rahmah, M. Department of Computer Science Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang Kuantan26300 Malaysia Department of Computer Systems and Networking Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang Kuantan26300 Malaysia Department of Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang Kuantan26300 Malaysia Department of Graphic and Multimedia Technology Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang Kuantan26300 Malaysia
One of the crucial elements in an Internet of Things (IoT) environment is a database. IoT performance will be at stake if the wrong database is adopted. In this research, three Structured Query Language (SQL) database... 详细信息
来源: 评论
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
Integrating Privacy Enhancing Techniques into Blockchains Us...
收藏 引用
2019 IEEE Canadian Conference of Electrical and computer engineering, CCECE 2019
作者: Parizi, Reza M. Homayoun, Sajad Yazdinejad, Abbas Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Software Engineering and Game Development Kennesaw State University GA United States Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran Faculty of Computer Engineering University of Isfahan Iran School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas at San Antonio TX United States
Blockchains are turning into decentralized computing platforms and are getting worldwide recognition for their unique advantages. There is an emerging trend beyond payments that blockchains could enable a new breed of... 详细信息
来源: 评论