咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2960 条 记 录,以下是281-290 订阅
排序:
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论
Enhanced Loan Approval Prediction System using Ensemble Machine Learning Techniques  3
Enhanced Loan Approval Prediction System using Ensemble Mach...
收藏 引用
3rd International Conference on Automation, Computing and Renewable systems, ICACRS 2024
作者: Gothai, E. Rajalaxmi, R.R. Thamilselvan, R. Sridhar, K. Department of Computer Technology Kongu Engineering College Tamilnadu Perundurai India Department of Computer Science and Engineering Kongu Engineering College Tamilnadu Perundurai India MSc Software Systems Kongu Engineering College Erode India
Banks play a pivotal role in generating significant profits through loan operations. However, the challenge lies in accurately identifying genuine loan applicants who are likely to repay their loans. Manual processes ... 详细信息
来源: 评论
Forecasting Price Prediction for Vegetables and Fruits Using Recurrent Neural Network  5
Forecasting Price Prediction for Vegetables and Fruits Using...
收藏 引用
5th International Conference on Electronics and Sustainable Communication systems, ICESC 2024
作者: Gothai, E. Rajalaxmi, R.R. Thamilselvan, R. Harshath, S.M. Kongu Engineering College Department of Computer Technology Tamilnadu Perundurai India Kongu Engineering College Department of Computer Science and Engineering Tamilnadu Perundurai India Kongu Engineering College MSc Software Systems Erode India
Unpredictable fruit and vegetable prices create significant challenges for farmer livelihoods. This research proposes an innovative approach using recurrent neural networks (RNNs) to predict both minimum and maximum p... 详细信息
来源: 评论
Ontology of moodle e-learning system for social network analysis
Ontology of moodle e-learning system for social network anal...
收藏 引用
2nd IEEE International Conference on Open systems, ICOS 2011
作者: Yusof, Norazah Mansur, Andi Besse Firdausiah Othman, Mohd Shahizan Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Johor Malaysia Department of Information Systems Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Johor Malaysia
The analysis using Social Network Analysis (SNA) is focusing more on the number or the frequency of social interactions based on adjacency matrix. This method cannot be used to observe the semantic relationship among ... 详细信息
来源: 评论
WIP: An Engaging Undergraduate Intro to Model Checking in software engineering Using TLA+  54
WIP: An Engaging Undergraduate Intro to Model Checking in So...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Läufer, Konstantin Mertin, Gunda Thiruvathukal, George K. Loyola University Software and Systems Laboratory Department of Computer Science Chicago United States Institute for Software Engineering and Programming Languages University of Lübeck Germany
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com... 详细信息
来源: 评论
Enabling collaborative adaptation across legacy components
Enabling collaborative adaptation across legacy components
收藏 引用
3rd Workshop on Adaptive and Reflective Middleware, ARM '04
作者: Yang, Z. Zhou, Z. Cheng, B.H.C. McKinley, P.K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adaptation. Composing a single adaptive sys...
来源: 评论
Product Recommendation System using Deep Learning based Recurrent Neural Network
Product Recommendation System using Deep Learning based Recu...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a... 详细信息
来源: 评论
Authentication in reprogramming of sensor networks for mote class adversaries
Authentication in reprogramming of sensor networks for mote ...
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Limin, Wang Kulkarni, Sandeep S. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to... 详细信息
来源: 评论
Visualizing requirements in UML models
Visualizing requirements in UML models
收藏 引用
First International Workshop on Visualization in Requirements engineering, REV 2006, at the 14th IEEE Requirements engineering Conference, RE 2006
作者: Konrad, Sascha Goldsby, Heather Lopez, Karli Cheng, Betty H.C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
As the Unified Modeling Language (UML) and model-driven development (MDD) become increasingly common in industry, many developers are faced with the difficult task of understanding how an existing UML model realizes s... 详细信息
来源: 评论
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks  25
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resil...
收藏 引用
25th IEEE Latin American Test Symposium, LATS 2024
作者: Aksoy, Levent Yasin, Muhammad Pagliarini, Samuel National University Of Sciences And Technology Department Of Computer And Software Engineering Islamabad Pakistan Tallinn University Of Technology Department Of Computer Systems Tallinn Estonia Carnegie Mellon University Department Of Electrical And Computer Engineering Pittsburgh United States
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken. The state-of... 详细信息
来源: 评论