咨询与建议

限定检索结果

文献类型

  • 2,052 篇 会议
  • 871 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,741 篇 工学
    • 1,347 篇 计算机科学与技术...
    • 1,113 篇 软件工程
    • 333 篇 信息与通信工程
    • 301 篇 控制科学与工程
    • 165 篇 生物工程
    • 147 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 116 篇 机械工程
    • 83 篇 光学工程
    • 83 篇 安全科学与工程
    • 73 篇 动力工程及工程热...
    • 66 篇 建筑学
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 56 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 81 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 78 篇 computational mo...
  • 75 篇 application soft...
  • 72 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 67 篇 software
  • 63 篇 artificial intel...
  • 61 篇 computer archite...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 47 篇 security
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,843 篇 英文
  • 119 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2979 条 记 录,以下是541-550 订阅
排序:
Machine Learning in Higher Education using RF and SVM for Pedagogical Enhancement  3
Machine Learning in Higher Education using RF and SVM for Pe...
收藏 引用
3rd International Conference on Integrated Circuits and Communication systems, ICICACS 2025
作者: Kunwar, Fateh Bahadur Srivastava, Satyajee Dhivya, R. Gulati, Monika Anand, Taruna Raj, D. Antony Arul Geetanjali Institute of Technical Studies Department of Computer Science and Engineering Udaipur India School of Engineering and Technology Manav Rachna International Institute of Research and Studies Department of Computer Science and Engineering Faridabad India M.Kumarasamy College of Engineering Department of Information Technology Karur India Ambala India University Department of Humanities and Social Sciences Dehradun India Psg College of Arts & Science Department of Software Systems Coimbatore India
AI's revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutori... 详细信息
来源: 评论
The ABLoTS Approach for Bug Localization: is it replicable and generalizable?
The ABLoTS Approach for Bug Localization: is it replicable a...
收藏 引用
International Mining software Repositories, MSR
作者: Feifei Niu Christoph Mayr-Dorn Wesley K. G. Assunção LiGuo Huang Jidong Ge Bin Luo Alexander Egyed State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science and Engineering Southern Methodist University Dallas Texas USA
Bug localization is the task of recommending source code locations (typically files) that probably contain the cause of a bug and hence need to be changed to fix the bug. Along these lines, information retrieval-based...
来源: 评论
Effort Allocation for Deadline-Aware Task and Motion Planning: A Metareasoning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Sung, Yoonchang Shperberg, Shahaf S. Wang, Qi Stone, Peter The Department of Computer Science The University of Texas at Austin AustinTX78712 United States The Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Be’er Sheva Israel Sony AI United States
In robot planning, tasks can often be achieved through multiple options, each consisting of several actions. This work specifically addresses deadline constraints in task and motion planning, aiming to find a plan tha... 详细信息
来源: 评论
Information and Intelligent Forecasting systems Based on the Methods of Neural Network Theory
Information and Intelligent Forecasting Systems Based on the...
收藏 引用
Smart Information systems and Technologies (SIST), IEEE International Conference on
作者: Yuliia Kostiuk Olena Kryvoruchko Alona Desyatko Yuliia Samoilenko Kateryna Stepashkina Rostislav Zakharov Department of Software Engineering and Cybersecurity State University of Trade and Economics Kyiv Ukraine Department of automation and computer technologies of control systems National University of Food Technologies Kyiv Ukraine
This paper is dedicated to the problem of the research of the information and intelligent forecasting systems which solve the problems of regression analysis. This class of the systems includes the systems that use di...
来源: 评论
An Adaptive Decision-Making Approach for Better Selection of Blockchain Platform for Health Insurance Frauds Detection with Smart Contracts: Development and Performance Evaluation  14
An Adaptive Decision-Making Approach for Better Selection of...
收藏 引用
14th International Conference on Ambient systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Kaafarani, Rima Ismail, Leila Zahwe, Oussama ICCS-Lab Computer Science Department American University of Culture and Education Beirut1507 Lebanon Laboratory School of Computing and Information Systems The University of Melbourne Melbourne Australia Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Abu Dhabi United Arab Emirates National Water and Energy Center United Arab Emirates University Abu Dhabi United Arab Emirates
Blockchain technology has piqued the interest of businesses of all types, while consistently improving and adapting to business requirements. Several blockchain platforms have emerged, making it challenging to select ... 详细信息
来源: 评论
High-Accuracy Hand Segmentation for Palmprint Biometric systems Improving Auto-Encoder Techniques
High-Accuracy Hand Segmentation for Palmprint Biometric Syst...
收藏 引用
Innovative Approaches in Smart Technologies (ISAS), International Symposium on
作者: Kadir Yalcin Ramazan Ozgur Dogan Hulya Dogan Ozkan Bingol Department of Artificial Intelligence and Intelligent Systems Graduate Education Institute Gumushane University Gumushane Türkiye Department of Artificial Intelligence Engineering Faculty of Computer and Information Sciences Trabzon University Trabzon Türkiye Department of Software Engineering Faculty of Engineering Karadeniz Technical University Trabzon Türkiye Department of Software Engineering Faculty of Eng. and Natural Sciences Gumushane University Gumushane Türkiye
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio... 详细信息
来源: 评论
Enhancing e-KYC Security and Privacy: Harnessing Quantum Computing and Blockchain in Web 3.0
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第4期3卷 1-23页
作者: G. M. Faruk Ahmed Imran Hasan Md Soumike Hassan Rahul Khan Abu Jor Al Gefari Zain Buksh Joseph Liu A B M Shawkat Ali Cybersecurity Cell Rupali Bank Limited Dhaka Bangladesh Department of Computer Science and Engineering Islamic University Kushtia Bangladesh Department of Statistics Jahangirnagar University Dhaka Bangladesh Department of Pharmacy Bangladesh University Dhaka Bangladesh Rajshahi Science and Technology University Natore Bangladesh Department of Computer Science and Mathematics The University of Fiji Lautoka Fiji Department of Software Systems and Cybersecurity Monash University Melbourne Australia
By implementing a successful and effective Electronic-Know Your Customer (e-KYC) infrastructure, conventional defects and expenses may be greatly reduced. Strong authentication procedures are used by existing e-KYC so... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning  22
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Cao, Weipeng Yao, Xuyang Xu, Zhiwu Pan, Yinghui Sun, Yixuan Li, Dachuan Qiu, Bohua Wei, Muheng Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
Towards Enhanced Verification in Process Mining: A Ctmc-Based Probabilistic Model Checking Approach
SSRN
收藏 引用
SSRN 2024年
作者: Mangi, Fawad Ali Su, Guoxin Zhang, Minjie Liu, Li School of Computing and Information Technology University of Wollongong Wollongong2522 Australia Department of Computer Systems Engineering Mehran University of Engineering and Technology Sindh Jamshoro76062 Pakistan School of Big Data and Software Engineering Chongqing University Chongqing400030 China
Process mining is a rapidly growing research field that uses data science techniques to analyse business processes and extract insights about their performance, efficiency, and compliance. The process mining approach ... 详细信息
来源: 评论
Smart Pilot Decontamination Strategy for High and Low Contaminated Users in Massive MIMO-5G Network  16th
Smart Pilot Decontamination Strategy for High and Low Contam...
收藏 引用
16th International Conference on Information Technology and Applications, ICITA 2022
作者: Khan, Khalid Banoori, Farhad Adnan, Muhammad Zahoor, Rizwan Khan, Tarique Obite, Felix William, Nobel John Ahmad, Arshad Qayum, Fawad Nazir, Shah Beijing University of Posts and Telecommunications Beijing China Guangzhou China Institute of Software Systems Engineering Johannes Kepler University Linz Austria Linz Austria Department of Computer Science University of Swabi Swabi Pakistan University of Campania Luigi Vanvitelli Caserta Italy University of Politechnico Delle Marche Ancona Italy Department of Computer Science IT University of Malakand Totakan Pakistan Department of Physics Ahmadu Bello University Zaria Nigeria University of Valencia Valencia Spain
Massive multiple-input multiple-output (m-MIMO) is recognized as large-scale MIMO (LS-MIMO) and is a crucial podium for fifth-generation communication networks (5G) to reinforce spectral efficiency (SE) and capacity o... 详细信息
来源: 评论