咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computing and Software Engineering"
2889 条 记 录,以下是381-390 订阅
排序:
Empirical Insights into Product Security Challenges and Practices in software Development
Empirical Insights into Product Security Challenges and Prac...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Saima Rafi Muhammad Azeem Akbar Arif Ali Khan School of Computing Engineering & the Built Environment Edinburgh Napier University Scotland Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland
Ensuring product security in software development is crucial, encompassing hardware, firmware, and holistic protection measures. With rising cyber threats, organizations face challenges in safeguarding software produc... 详细信息
来源: 评论
Amplifying the Voice of Blacks in computing
Amplifying the Voice of Blacks in Computing
收藏 引用
Black Issues in computing Education (BICE)
作者: Cheryl Swanier Cheryl Seals Dale-Marie Wilson Manning College of Information and Computing Sciences University of Massachusetts USA Computer Science and Software Engineering Auburn University USA Department of Software and Information Systems University of North Carolina at Charlotte USA
This workshop is designed to intentionally share experiences and connect participants to their greatest asset, their voice. There is power in your voice. Engaging interaction, thought-provoking storytelling, and authe...
来源: 评论
Predicting Modalities of Dyslexic Students using Neuro-Linguistic Programming to Enhance Learning Method
Predicting Modalities of Dyslexic Students using Neuro-Lingu...
收藏 引用
2022 IEEE International Conference on Data Science and Information System, ICDSIS 2022
作者: Choube, Gaurav Dudhmande, Gauri Rahul Pushparaj, Jagalingam Anand, Christopher Suresh, Shilpa Software Engineer Optum Global Solutions Pvt Ltd Hyderabad India Software Engineer Intel Technology Pvt Ltd Aurangabad India Vellore Institute of Technology School of Computer Science and Engineering Vellore India McMaster University Department of Computing and Software Ontario Canada Manipal Institute of Technology Department of Mechatronics Manipal India
Dyslexia causes difficulty in reading, writing and learning. The children at a tender age have always suffered due to dyslexia. Dyslexia deceives student's perception and makes it difficult in the process of learn... 详细信息
来源: 评论
Review of Inference Time Prediction Approaches of DNN: Emphasis on Service robots with cloud-edge-device architecture
Review of Inference Time Prediction Approaches of DNN: Empha...
收藏 引用
2023 IEEE International Conference on Robotics and Biomimetics, ROBIO 2023
作者: Xiang, Tian Meng, Qiwei Zhang, Ji Zhang, Beibei Song, Wei Xie, Anhuan Gu, Jason Research Institute of Interdisciplinary Innovation Zhejiang Laboratory Research Center for Intelligent Robotics Hangzhou311100 China The Chinese University of Hong Kong T Stone Robotics Institute Department of Mechanical and Automation Engineering Hong Kong Research Institute of Intelligent Computing Zhejiang Laboratory Research Center for Intelligent Computing Software Hangzhou311100 China Dalhousie University Electrical and Computer Engineering Halifax Canada
In recent years, the global robot market has witnessed substantial growth, particularly in the domain of service robots. Despite their expanding presence, service robots encounter limitations when operating autonomous...
来源: 评论
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Lili Zhu, Quanyan Ray, Herman Xie, Ying Hewlett Packard Enterprise United States Department of Electrical and Computer Engineering New York University United States College of Computing and Software Engineering Kennesaw State University United States
Network threat detection has been challenging due to the complexities of attack activities and the limitation of historical threat data to learn from. To help enhance the existing practices of using analytics, machine... 详细信息
来源: 评论
Cybersecurity Risks Quantification in the Internet of Things  7
Cybersecurity Risks Quantification in the Internet of Things
收藏 引用
7th IEEE International Conference on Recent Advances and Innovations in engineering, ICRAIE 2022
作者: Alagappan, Annamalai Baptist Andrews, Leo John Sampath Kumar, V. Raj, Raymon Antony Sarathkumar, D. Botho University Faculty of Engineering and Technology Department of Network and Infrastructure Management Gaborone Botswana Botho University Faculty of Computing Department of Software Engineering Botswana Grant Thornton Plot 50370 Acument Park Fair Grounds Gaborone Botswana Kongu Engineering College Department of Electrical and Electronics Engineering Tamilnadu India
A dynamic platform, the Internet of Things uses data, which in turn invites cybersecurity risks. In a dynamic and complicated world, many organisations are putting more of their attention into understanding cyber thre... 详细信息
来源: 评论
Socially-Critical software Systems: Is Extended Regulation Required?  1
收藏 引用
29th European Systems, software and Services Process Improvement, EuroSPI 2022
作者: Dagg, Niall Kostick, Conor Fallon, James O’Neill, Alex Yilmaz, Murat Messnarz, Richard Clarke, Paul M. School of Computing Dublin City University Dublin Ireland Department of Computer Engineering Gazi University Ankara Turkey ISCN the International Software Consulting Network Graz Austria Lero the Science Foundation Ireland Research Center for Software Limerick Ireland
Data has become a prevailing aspect of our daily lives, becoming ever more present since the beginning of the 21st century. It is a commodity in today’s world and the amount of data being produced has increased enorm... 详细信息
来源: 评论
A Feasibility Study of Fitting the Normal Distribution and Gamma Distribution to Rainfall Data at Kuantan River Basin  5th
A Feasibility Study of Fitting the Normal Distribution and G...
收藏 引用
5th International Conference on Water Resources, ICWR 2021
作者: Ghani, Nadiatul Adilah Ahmad Abdul Senawi, Azlyna Subramaniam, Roshan Department of Civil Engineering College Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Pahang Kuantan26300 Malaysia Centre for Mathematical Sciences College of Computing and Applied Sciences Universiti Malaysia Pahang Lebuhraya Tun Razak Pahang Gambang Kuantan26300 Malaysia Centre for Software Development & Integrated Computing Universiti Malaysia Pahang Lebuhraya Tun Razak Pahang Gambang Kuantan26300 Malaysia
Rainfall data can be very useful for decision makers in developing precautionary strategies to mitigate the impact of climate change in a variety of ways, such as forecasting floods. Prior to the data being utilised, ... 详细信息
来源: 评论
Brain Tumor Auto-Segmentation on Multimodal Imaging Modalities Using Deep Neural Network
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4509-4523页
作者: Elias Hossain Md.Shazzad Hossain Md.Selim Hossain Sabila Al Jannat Moontahina Huda Sameer Alsharif Osama S.Faragallah Mahmoud M.A.Eid Ahmed Nabih Zaki Rashed Department of Software Engineering Daffodil International UniversityDhaka 1207Bangladesh Department of Computing and Information System Daffodil International UniversityDhaka 1207Bangladesh Department of Computer Science&Engineering BRAC UniversityDhaka 1212Bangladesh Department of Information and Communication Engineering Bangladesh University of Professionals(BUP)Dhaka 1216Bangladesh Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Electrical Engineering College of EngineeringTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Electronics and Electrical Communications Engineering Department Faculty of Electronic EngineeringMenouf 32951Egypt
Due to the difficulties of brain tumor segmentation, this paper proposes a strategy for extracting brain tumors from three-dimensional MagneticResonance Image (MRI) and Computed Tomography (CT) scans utilizing3D U-Net... 详细信息
来源: 评论
Deepfake Detection Using EfficientNet and XceptionNet  11
Deepfake Detection Using EfficientNet and XceptionNet
收藏 引用
11th IEEE International Conference on Intelligent computing and Information Systems, ICICIS 2023
作者: Yasser, Basma Hani, Jumana El-Gayar, Salma Amgad, Omar Ahmed, Nourhan Ebied, Hala M. Amr, Habiba Salah, Mohamed Ain Shams University Software Engineering Faculty of Computer and Information Sciences Cairo Egypt Ain Shams University Faculty of Computer and Information Sciences Computer Science Department Cairo Egypt Ain Shams University Faculty of Computer and Information Sciences Scientific Computing Department Cairo Egypt
The increasing prevalence of manipulated media, particularly deepfake videos, poses significant challenges in distinguishing real from fake content. This paper addresses the issue of detecting deepfake videos using ad... 详细信息
来源: 评论