咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computing and Software Engineering"
2889 条 记 录,以下是531-540 订阅
排序:
Ontological Model for Cohesive Smart Health Services Management
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3679-3695页
作者: Muhammad Raza Naqvi Muhammad Waseem Iqbal Syed Khuram Shahzad M.Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Le Laboratoire Génie de Production de l’École Nationale d’Ingénieurs de Tarbes(LGP-INP-ENIT) Universitéde ToulouseCEDEXTarbes65016France Department of Software Engineering Superior UniversityLahore53700Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Computer Science University of Management and TechnologySialkot51310Pakistan Department of Computer Science King Abdul-Aziz UniversityJeddah21577Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21577Saudi Arabia
Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of *** massive increase in the usage of health car... 详细信息
来源: 评论
A Topic-Aware Graph-Based Neural Network for User Interest Summarization and Item Recommendation in Social Media  28th
A Topic-Aware Graph-Based Neural Network for User Interest ...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Chen, Junyang Fan, Ge Gong, Zhiguo Li, Xueliang Leung, Victor C. M. Wang, Mengzhu Yang, Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen China Tencent Inc. Shenzhen China State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science University of Macau China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
User-generated content is daily produced in social media, as such user interest summarization is critical to distill salient information from massive information. While the interested messages (e.g., tags or posts) fr... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yifan Zhang Haolong Xiang Xuyun Zhang Xiaolong Xu Wei Fan Qin Zhang Lianyong Qi School of software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia Uffield Department of Women's & Reproductive Health University of Oxford England College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering University of Petroleum (East China) China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN Computer Science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Understanding Older Adults' (Dis)Engagement with Design Materials  25
Understanding Older Adults' (Dis)Engagement with Design Mate...
收藏 引用
2025 CHI Conference on Human Factors in computing Systems, CHI 2025
作者: Pradhan, Alisha Jelen, Ben Thangaraj, Ramprabu Siek, Katie A. Jette, Shannon Lazar, Amanda Department of Informatics Ying Wu College of Computing New Jersey Institute of Technology Newark NJ United States Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre Haute IN United States Ying Wu College of Computing New Jersey Institute of Technology Newark NJ United States Luddy School of Informatics Computing and Engineering Indiana University Bloomington IN United States University of Maryland College Park MD United States College of Information Studies University of Maryland College Park MD United States
Design workshops are a popular approach to include older adults in the technology design process. However, formative design sessions with older adults have had unexpected outcomes such as the non-use of traditional de... 详细信息
来源: 评论
Optimal Bounds for Distinct Quartics
arXiv
收藏 引用
arXiv 2024年
作者: Charalampopoulos, Panagiotis Gawrychowski, Pawel Ghazawi, Samah School of Computing and Mathematical Sciences Birkbeck University of London United Kingdom Institute of Computer Science University of Wroclaw Poland Department of Software Engineering Braude College of Engineering Karmiel Israel Department of Computer Science University of Haifa Israel
A fundamental concept related to strings is that of repetitions. It has been extensively studied in many versions, from both purely combinatorial and algorithmic angles. One of the most basic questions is how many dis... 详细信息
来源: 评论
$\mathrm{E}_{\gamma}$-Mixing Time
$\mathrm{E}_{\gamma}$-Mixing Time
收藏 引用
IEEE International Symposium on Information Theory
作者: Behnoosh Zamanlooy Shahab Asoodeh Mario Diaz Flavio P. Calmon Department of Computing and Software McMaster University Canada IIMAS Universidad Nacional Autónoma de México Mexico School of Engineering and Applied Sciences Harvard University USA
We investigate the mixing times of Markov kernels under $\mathsf{E}_{\gamma}-\mathbf{divergence}$ . We demonstrate that the zero-error $\mathsf{E}_{\gamma}- \mathbf{mixing}$ time, for any $\gamma > 1$ , of irre... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable Systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced computing Systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Stock Price Prediction using CuDNNLSTM and multiple CNN layers
Stock Price Prediction using CuDNNLSTM and multiple CNN laye...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Anika Kanwal Siva Chandrasekaran Adnan Akhunzada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing and Information Technology University of Doha for Science and Technology Doha Qatar
Academic and financial sectors are interested in research areas that focus on understanding the patterns of financial activities and predicting their future changes. The daily movement of financial data involves compl...
来源: 评论
Enhancing Anomaly Detection in Electric Vehicle Supply Equipment (EVSE) Networks Using Classical and Ensemble Learning Approaches
Enhancing Anomaly Detection in Electric Vehicle Supply Equip...
收藏 引用
Control Instrumentation System Conference (CISCON)
作者: Sandeep R. Hegde Vijayabhaskaramoorthy V. K. R. M. Vijaya Chandrakala Gireesh Kumar T. V. K. Arun Shankar Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India Department of Electrical and Electronics Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Software Testing Engineer Danfoss Industries Private Limited USA
Electric Vehicle Supply Equipment (EVSE) networks, integral to modern transportation systems, are vulnerable to cyber threats due to integration into smart grids and IoT ecosystems. EVSE network A represents a traditi... 详细信息
来源: 评论