咨询与建议

限定检索结果

文献类型

  • 2,042 篇 会议
  • 881 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,745 篇 工学
    • 1,353 篇 计算机科学与技术...
    • 1,119 篇 软件工程
    • 338 篇 信息与通信工程
    • 300 篇 控制科学与工程
    • 163 篇 生物工程
    • 151 篇 电气工程
    • 119 篇 生物医学工程(可授...
    • 118 篇 电子科学与技术(可...
    • 115 篇 机械工程
    • 84 篇 安全科学与工程
    • 82 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 57 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 189 篇 生物学
    • 147 篇 系统科学
    • 146 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 68 篇 化学
  • 511 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 193 篇 图书情报与档案管...
  • 126 篇 医学
    • 116 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 81 篇 法学
    • 60 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 72 篇 deep learning
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 62 篇 artificial intel...
  • 59 篇 computer archite...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 26 篇 buyya rajkumar
  • 25 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,873 篇 英文
  • 89 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2979 条 记 录,以下是31-40 订阅
排序:
Adaptive Deep Reinforcement Learning-based Resource Management for Complex Decision Making in Industry Internet of Things Applications  4
Adaptive Deep Reinforcement Learning-based Resource Manageme...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karne, Niharika Ramagundam, Chandra Shekar Patnala, Ranga Rao Ramagundam, Shashishekhar Tadiboina, Sai Nitisha Sr. Principal Systems Engineer in C&RS Platform Services University of South Alabama Department of Electrical Engineering Masters in Electrical Engineering Amtrak DT United States Software Engineer in Cloud Platform Services City of Philadelphia Pennsylvania United States Vice President Neuberger Berman United States Software Development & Engineering in Content Discovery & AI Troy University Department of Computer Science Masters in Computer Science AL Comcast Montgomery Campus United States Department of Information Technology GEICO - Chevy Chase Chevy ChaseMD20815 United States
An independent industrial system may transform into a connected network through the assistance of Industrial Internet of Things (IIoT). The deployed sensors in the IIoT maintain surveillance of the industrial machiner... 详细信息
来源: 评论
An intelligent framework for sarcasm detection in Arabic tweets using deep learning with Al-Biruni earth radius optimization algorithm
收藏 引用
Alexandria engineering Journal 2025年 127卷 562-572页
作者: AL-anazi, Reema G. A. Alzaidi, Muhammad Swaileh Eltahir, Majdy M. Almukadi, Wafa Sulaiman Alajmani, Samah Hazzaa Darem, Abdulbasit A. Alshahrani, Mohammed Alhebaishi, Nawaf Department of Arabic Language and Literature College of Humanities and Social Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of English Language College of Language Sciences King Saud University P. O. Box 145111 Riyadh Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Software Engineering College of Engineering and Computer Science University of Jeddah Saudi Arabia Department of Information Technology College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Department of Computer Science College of Science Northern Border University Arar Saudi Arabia Computer Department Applied College Najran University Najran66462 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Social media networks play a major role in expressing people's feelings, reviews, and thoughts. One of the popular linguistic patterns to express or criticize one's ideas with ridicule is sarcasm, where they h... 详细信息
来源: 评论
Crop protection and disease detection using artificial intelligence and computer vision: a comprehensive review
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3723-3743页
作者: Shah, Kanish Sushra, Rajat Shah, Manan Shah, Dhairya Shah, Haard Raval, Megh Prajapati, Mitul Software Engineer Walmart SunnyvaleCA United States Atmiya Vidya Mandir Gujarat Surat India Department of Chemical Engineering School of Energy Technology Pandit Deendayal Energy University Gujarat Gandhinagar India Robotics ECE Concentration Northeastern University BostonMA United States Department of Computer Science Concentration in AI Hofstra University HempsteadNY United States Department of Chemical Engineering S. S Agrawal Institute of Engineering & Technology Gujarat Navsari India R &D Engineer Span Inspection Systems Pvt. Ltd Gujarat Gandhinagar India
The technological advancements in the field of agriculture have increased to a great extent in recent years, and many techniques have evolved from other techniques. Some methods are improved or upgraded from the previ... 详细信息
来源: 评论
Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks
收藏 引用
Scientific Reports 2025年 第1期15卷 1-25页
作者: Srinivasan, Jagadeesan Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural... 详细信息
来源: 评论
Enhancing Retrieval Augmented Generation systems Using AI Models and Graph Databases
Enhancing Retrieval Augmented Generation Systems Using AI Mo...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Souvik Mukherjee Soosan Shabnam Sara Hasan D. Ajitha Department of Computer Science and Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamil Nadu India
This paper outlines the process of generating a Neo4j graph database powered by Language Models (LLMs). The primary goal is to extract structured information from unstructured data, including user profiles, paper brie... 详细信息
来源: 评论
Security Aspects of Container Orchestration in Kubernetes Environments
Security Aspects of Container Orchestration in Kubernetes En...
收藏 引用
International Symposium on INFOTEH-JAHORINA (INFOTEH)
作者: Sava Stanišić Milan Vesković Olga Ristić Borislav Đorđević Department of Computer and Software Engineering Faculty of Technical Sciences Čačak Republic of Serbia IMP Computer Systems Mihajlo Pupin Institute Belgrade Republic of Serbia
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernete... 详细信息
来源: 评论
Variational quantum classifier-based early identification and classification of chronic kidney disease using sparse autoencoder and LASSO shrinkage
收藏 引用
PeerJ computer Science 2025年 11卷
作者: Parthasarathi, P. Alshahrani, Haya Mesfer Venkatachalam, K. Cho, Jaehyuk Department of Computer Science and Engineering Bannari Amman Institute of Technology Erode India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Saudi Arabia Department of Software Engineering Jeonbuk National University Jeonju Korea Republic of Department of Software Engineering Division of Electronics Information Engineering Jeonbuk National University Jeonju Korea Republic of
The two leading causes of chronic kidney disease (CKD) are excessive blood pressure and diabetes. Researchers worldwide utilize the rate of globular filtration and kidney inflammation biomarkers to identify chronic ki... 详细信息
来源: 评论
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns  24
Design, Modeling and Simulation of Cybercriminal Personality...
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Jeongkeun Shin Geoffrey B. Dobson L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA and Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims' human factors affect...
来源: 评论
YOLO-RAW: Advancing UAV Detection With Robustness to Adverse Weather Conditions
收藏 引用
IEEE Transactions on Intelligent Transportation systems 2025年 第6期26卷 7857-7873页
作者: Munir, Adnan Siddiqui, Abdul Jabbar Hossain, M. Shamim El-Maleh, Aiman Computer Engineering Department Dhahran31261 Saudi Arabia KFUPM SDAIA-KFUPM Joint Research Center for Artificial Intelligence IRC for Intelligent Secure Systems and Computer Engineering Department Dhahran31261 Saudi Arabia King Saud University College of Computer and Information Sciences Research Chair of Pervasive and Mobile Computing Department of Software Engineering Riyadh12372 Saudi Arabia KFUPM Computer Engineering Department Information and Computer Science Department IRC for Intelligent Secure Systems Dhahran31261 Saudi Arabia
With the widespread adoption of unmanned aerial vehicles (UAVs) in various applications (e.g., aerial transportation, traffic monitoring), there have been apprehensions regarding the associated risks of employing UAVs... 详细信息
来源: 评论