咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2960 条 记 录,以下是201-210 订阅
排序:
Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 341-359页
作者: Batyrkhan Omarov Meirzhan Baikuvekov Daniyar Sultan Nurzhan Mukazhanov Madina Suleimenova Maigul Zhekambayeva Department of Information Systems Al-Farabi Kazakh National UniversityAlmaty050040Kazakhstan Department of Mathematical and Computer Modeling International Information Technology UniversityAlmaty050040Kazakhstan Department of Software Engineering Satbayev UniversityAlmaty050013Kazakhstan
This research introduces an innovative ensemble approach,combining Deep Residual Networks(ResNets)and Bidirectional Gated Recurrent Units(BiGRU),augmented with an Attention Mechanism,for the classification of heart **... 详细信息
来源: 评论
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
收藏 引用
computer systems Science & engineering 2022年 第11期43卷 833-847页
作者: A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and Engineering University College of Engineering AriyalurAriyalur621705India Department of Mathematics University College of Engineering AriyalurAriyalur621705India Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoT School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***... 详细信息
来源: 评论
Towards re-engineering legacy systems for assured dynamic adaptation
Towards re-engineering legacy systems for assured dynamic ad...
收藏 引用
ICSE 2007 Workshops: International Workshop on Modeling in software engineering, MISE'07
作者: Zhang, Ji Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not design... 详细信息
来源: 评论
Determining the Critical Factors of Antenatal Care Follow-Up Using Two-Phase Machine Learning  27
Determining the Critical Factors of Antenatal Care Follow-Up...
收藏 引用
27th International Conference on Soft Computing and Measurements, SCM 2024
作者: Bessmertny, Igor A. Enkomaryam, Bidru C. Mamuye, Adane L. Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia University of Gondar Department of Computer Science Gondar Ethiopia
Determining the critical factors affecting antenatal visits will greatly contribute to reducing maternal and infant mortality. This study, thus attempted to construct a cluster-based predictive model to determine the ... 详细信息
来源: 评论
Support for the file system security requirements of computational e-mail systems  94
Support for the file system security requirements of computa...
收藏 引用
Proceedings of the 2nd ACM Conference on computer and Communications Security
作者: Jaeger, Trent Prakash, Atul Software Systems Research Laboratory Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their u... 详细信息
来源: 评论
Scope-Bounded Reachability in Valence systems  32
Scope-Bounded Reachability in Valence Systems
收藏 引用
32nd International Conference on Concurrency Theory, CONCUR 2021
作者: Shetty, Aneesh K. Krishna, S. Zetzsche, Georg Department of Computer Science and Engineering Iit Bombay India Max Planck Institute for Software Systems Kaiserslautern Germany
Multi-pushdown systems are a standard model for concurrent recursive programs, but they have an undecidable reachability problem. Therefore, there have been several proposals to underapproximate their sets of runs so ... 详细信息
来源: 评论
Comparative Analysis of Camera Calibration Algorithms for Football Applications  4
Comparative Analysis of Camera Calibration Algorithms for Fo...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Sorokivskyi, Oleksandr Hotovych, Volodymyr Nazarevych, Oleg Shymchuk, Grygorii Department of Computer Science Faculty of Computer Information Systems and Software Engineering Ternopil Ivan Puluj National Technical University Ternopil Ukraine
In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca... 详细信息
来源: 评论
An implementation of embedded real time system framework in service oriented architecture
An implementation of embedded real time system framework in ...
收藏 引用
4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012
作者: Aghajani, Mahmood Jawawi, Dayang N. A. Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Johor Bahru Malaysia
Currently, the complexity of embedded software is increased, hence, more efficient design approaches are demanded. Although component based design is well-defined for developing Embedded Real Time (ERT) systems, the d... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Coverage of wireless sensor networks in the presence of transparent obstacles
Coverage of wireless sensor networks in the presence of tran...
收藏 引用
18th International Conference on software, Telecommunications and computer Networks, SoftCOM 2010
作者: Razzazi, Mohammadreza Fotouhi, Azade Software Systems R and D Lab. Department of Computer Engineering and IT Amirkabir University of Technology Tehran Iran
One fundamental issue in the sensor networks is the coverage problem, which we would like to determine whether a region of interest is sufficiently covered by a given set of sensors. It can be considered as a measure ... 详细信息
来源: 评论