咨询与建议

限定检索结果

文献类型

  • 1,153 篇 会议
  • 818 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,252 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 835 篇 软件工程
    • 247 篇 信息与通信工程
    • 163 篇 控制科学与工程
    • 162 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 生物医学工程(可授...
    • 68 篇 光学工程
    • 64 篇 机械工程
    • 64 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 48 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 43 篇 动力工程及工程热...
  • 586 篇 理学
    • 329 篇 数学
    • 179 篇 生物学
    • 115 篇 物理学
    • 91 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 46 篇 化学
  • 384 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 119 篇 医学
    • 110 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 53 篇 经济学
    • 52 篇 应用经济学
  • 52 篇 教育学
    • 49 篇 教育学
  • 51 篇 法学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 61 篇 machine learning
  • 46 篇 deep learning
  • 44 篇 computational mo...
  • 42 篇 internet of thin...
  • 42 篇 quality of servi...
  • 42 篇 cloud computing
  • 41 篇 grid computing
  • 39 篇 accuracy
  • 38 篇 resource managem...
  • 38 篇 training
  • 32 篇 feature extracti...
  • 32 篇 software
  • 31 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 27 篇 semantics
  • 27 篇 security

机构

  • 121 篇 college of compu...
  • 53 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 23 篇 college of intel...
  • 22 篇 shenzhen univers...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 14 篇 school of comput...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 college of compu...
  • 13 篇 artificial intel...
  • 13 篇 department of in...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 18 篇 leung victor c.m...
  • 16 篇 shen linlin
  • 15 篇 wang xiaofei
  • 14 篇 muhammad adnan k...
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 10 篇 zhengfeng ji

语言

  • 1,914 篇 英文
  • 86 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2010 条 记 录,以下是161-170 订阅
排序:
software Security Measurements: A Survey
Software Security Measurements: A Survey
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Almogahed, Abdullah Omar, Mazni Zakaria, Nur Haryani Alawadhi, Abdulwadood Taiz University Faculty of Engineering and Information Technology Department of Software Engineering Taiz Yemen Universiti Utara Malaysia School of Computing Sintok06010 Malaysia University of Science and Technology Faculty of Engineering and Computing Department of Computers and Information Technology Yemen
Security metrics for software products give a quantifiable assessment of a software system's trustworthiness. Metrics can also help detect vulnerabilities in systems, prioritize corrective actions, and raise the l... 详细信息
来源: 评论
Data and Ensemble Machine Learning Fusion Based Intelligent software Defect Prediction System
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 6083-6100页
作者: Sagheer Abbas Shabib Aftab Muhammad Adnan Khan Taher MGhazal Hussam Al Hamadi Chan Yeob Yeun School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science Virtual University of PakistanLahore54000Pakistan Department of Software Faculty of Artificial Intelligence and SoftwareGachon UniversitySeongnam13120Korea Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKMBangiSelangor43600Malaysia College of Engineering and IT University of Dubai14143UAE EECS Department Center for Cyber Physical SystemsKhalifa UniversityAbu Dhabi127788UAE
The software engineering field has long focused on creating high-quality software despite limited *** defects before the testing stage of software development can enable quality assurance engineers to con-centrate on ... 详细信息
来源: 评论
Explainable Artificial Intelligence Solution for Online Retail
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4425-4442页
作者: Kumail Javaid Ayesha Siddiqa Syed Abbas Zilqurnain Naqvi Allah Ditta Muhammad Ahsan M.A.Khan Tariq Mahmood Muhammad Adnan Khan Department of Computer Science University of South AsiaLahore54000Pakistan Department of Mechatronics and Control Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Information Sciences Division of Science and TechnologyUniversity of EducationLahore54000Pakistan Riphah School of Computing and Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Division of Science and Technology University of EducationLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13557Korea
Artificial intelligence(AI)and machine learning(ML)help in making predictions and businesses to make key decisions that are beneficial for *** the case of the online shopping business,it’s very important to find tren... 详细信息
来源: 评论
Model for Recognition of Sign Language and Hand Gesture by Hard Hearing People
Model for Recognition of Sign Language and Hand Gesture by H...
收藏 引用
2023 International Conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Manjula, R. Jagadeesan, S. Ramalingam, Venkadeshan Vetriselvi, T. Johnpeter, T. Srm Institute of Science and Technology College of Engineering and Technology Department of Computing Technologies Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Tamilnadu Vellore India Information Technology Department University of Technology and Applied Sciences-Shinas Branch Sultanate of Oman Oman Vellore Institute of Technology School of Computer Science and Engineering Department of Iot Tamilnadu Vellore India K.Ramakrishnan College of Engineering Department of Computer Science and Engineering Trichy India
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm... 详细信息
来源: 评论
Process Mining representation using Communication Structured Acyclic Nets (CSA-nets)
Process Mining representation using Communication Structured...
收藏 引用
2024 International Workshop on Petri Nets and software engineering, PNSE 2024
作者: Almutairi, Nadiyah Alshammari, Tuwailaa Alahmadi, Mohammed School of Computing Newcastle University Science Square Newcastle upon TyneNE4 5TG United Kingdom Department of Science and Technology University of Hafr Albatin Hafr Al-Batin39524 Saudi Arabia Department of Software Engineering University of Jeddah Jeddah21493 Saudi Arabia
Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets SON which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). It consists of... 详细信息
来源: 评论
Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT
Cross Device Federated Intrusion Detector for Early Stage Bo...
收藏 引用
Annual IEEE Systems Conference
作者: Angela Grace Famera Raj Mani Shukla Suman Bhunia Department of Computer Science and Software Engineering Miami University Oxford Ohio Computing and Information Science Anglia Ruskin University Cambridge
A botnet is an army of zombified computers infected with malware and controlled by malicious actors to carry out tasks such as Distributed Denial of Service (DDoS) attacks. Billions of Internet of Things (IoT) devices... 详细信息
来源: 评论
Joint Channel and Multi-User Detection Empowered with Machine Learning
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 109-121页
作者: Mohammad Sh.Daoud Areej Fatima Waseem Ahmad Khan Muhammad Adnan Khan Sagheer Abbas Baha Ihnaini Munir Ahmad Muhammad Sheraz Javeid Shabib Aftab College of Engineering Al Ain UniversityAbu Dhabi112612UAE Department of Computer Science Lahore Garrison UniversityLahore54792Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Riphah School of Computing and Innovation Faculty of ComputingRiphah International UniversityLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversitySeongnam13557South Korea Department of Computer Science College of Science and TechnologyWenzhou Kean University325060USA Department of Computer Science Hameeda Rasheed Institute of Science and TechnologyMultan66000Pakistan
The numbers of multimedia applications and their users increase with each passing *** multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future ge... 详细信息
来源: 评论
MCDS: An Effective Multi-UAV Collaborative Decision-Making System in Mobile Edge computing Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xiong, Naixue Zhong, Weiyu Chen, Yuxiang He, Dacheng Li, Yuhui Chen, Linshu Liang, Wei Sanya Research Institute of Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China Sanya Research Institute of Hunan University of Science and Technology Hunan University School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Information Science and Engineering China The Hong Kong Polytechnic University Department of Computing Hong Kong
Mobile Edge computing (MEC) pushes computing resources from the network center to the network edge to provide efficient and reliable computing services. However, due to the mobility and diversity of mobile users (MUs)... 详细信息
来源: 评论
Optimization of Arrhythmia-based ECG-lead Selection for Computer-interpreted Heart Rhythm Classification
Optimization of Arrhythmia-based ECG-lead Selection for Comp...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Serhii Reznichenko Shijie Zhou Department of Computer Science and Software Engineering College of Engineering and Computing Miami University Oxford OH USA Department of Chemical Paper and Biomedical Engineering and Department of Computer Science and Software Engineering College of Engineering and Computing Miami University Oxford OH USA
The 12-lead ECG only has 8 independent ECG leads, which leads to diagnostic redundancy when using all 12 leads for heart arrhythmias classification. We have previously developed a deep learning (DL)-based computer-int...
来源: 评论
Classification of Real and Deepfakes Visual Samples with Pre-trained Deep Learning Models  7th
Classification of Real and Deepfakes Visual Samples with Pre...
收藏 引用
Proceedings of the 7th International Conference on Advances in computing and Data sciences, ICACDS 2023
作者: Nawaz, Marriam Javed, Ali Nazir, Tahira Khan, Muhammad Attique Rajinikanth, Venkatesan Kadry, Seifedine Department of Software Engineering UET Taxila Taxila47050 Pakistan Department of Computing Riphah International University Islamabad Pakistan Department of Computer Science HITEC University Taxila Pakistan Department of Computer Science and Engineering Division of Research and Innovation Saveetha School of Engineering SIMATS Chennai602105 India Department of Applied Data Science Noroff University College Kristiansand4612 Norway Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Serious security and privacy problems have arisen as a result of significant advancements in the creation of deepfakes. Attackers can easily replace a person’s face with the target person’s face in an image using so... 详细信息
来源: 评论