咨询与建议

限定检索结果

文献类型

  • 11,297 篇 会议
  • 5,170 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,210 篇 工学
    • 8,122 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,985 篇 信息与通信工程
    • 1,312 篇 控制科学与工程
    • 1,096 篇 生物工程
    • 813 篇 电气工程
    • 729 篇 生物医学工程(可授...
    • 676 篇 机械工程
    • 597 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 325 篇 建筑学
    • 323 篇 动力工程及工程热...
  • 4,508 篇 理学
    • 2,645 篇 数学
    • 1,232 篇 生物学
    • 828 篇 物理学
    • 751 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 349 篇 化学
  • 3,145 篇 管理学
    • 1,909 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 946 篇 工商管理
  • 711 篇 医学
    • 622 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 371 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 322 篇 经济学
    • 319 篇 应用经济学
  • 171 篇 农学
  • 70 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,020 篇 software enginee...
  • 313 篇 deep learning
  • 304 篇 application soft...
  • 295 篇 computational mo...
  • 270 篇 data mining
  • 247 篇 machine learning
  • 243 篇 computer archite...
  • 230 篇 software
  • 204 篇 accuracy
  • 202 篇 software systems
  • 201 篇 feature extracti...
  • 189 篇 internet of thin...
  • 188 篇 support vector m...
  • 188 篇 training
  • 181 篇 programming
  • 172 篇 educational inst...
  • 171 篇 semantics
  • 166 篇 laboratories
  • 164 篇 optimization

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 148 篇 state key labora...
  • 118 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 83 篇 school of inform...
  • 81 篇 department of co...
  • 75 篇 department of co...
  • 73 篇 department of co...
  • 72 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 school of softwa...
  • 47 篇 department of co...
  • 47 篇 software enginee...
  • 47 篇 department of co...
  • 46 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 15,145 篇 英文
  • 1,447 篇 其他
  • 130 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16696 条 记 录,以下是1421-1430 订阅
排序:
Benchmarking: The Correlation Between Architectural Styles and Major Faults in software Qualities
Benchmarking: The Correlation Between Architectural Styles a...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Kenza Meridji Wael Hadi Khalid T. Al-Sarayreh Department of Software Engineering University of Petra Amman Jordan Department of Computer Science University of Petra Amman Jordan
software architecture defines the underlying composition of a software system. It includes high-level design decisions and principles that guide software application development, deployment, and operation. Identifying... 详细信息
来源: 评论
An IT/OT Converged Cyber Range Framework Supporting Ensemble of Large Multimodal Models-Human Teaming and RAG Capability for Bigdata Information Retrieval - 6G Perspective
An IT/OT Converged Cyber Range Framework Supporting Ensemble...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Rahman, M. Abdur Islam, M. Saiful Islam, M. Repon Hossain, M. Shamim Al-Hazzaa, Selwa University of Prince Mugrin Cyber Security and Forensic Computing Department Medina Saudi Arabia UoL Worldwide University of London London United Kingdom Khulna University of Engineering & Technology Department of Computer Science and Engineering Khulna Bangladesh King Saud University Department of Software Engineering Riyadh Saudi Arabia Riyadh Saudi Arabia
In IT/OT converged enterprise networks, the management of multimodal big data has surpassed human capabilities, presenting critical challenges in business decision-making. This paper introduces an innovative IT/OT Con... 详细信息
来源: 评论
A Logical Evaluation of Predicting Immune System Strength by using Enhanced Deep Learning Strategy
A Logical Evaluation of Predicting Immune System Strength by...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Malathi, K. Ramkumar, M. Ruby, E. D. Kanmani Santhi, G.B. Korde, Vivek Aljawawdeh, Hamzeh J. Saveetha University Department of Cse Chennai India Veltech Rangarajan Dr Sagunthala R & D Institute of Science & Technology Department of Ece Chennai India New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Zarqa University Faculty of information technology Department of software engineering Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
The immune system plays a crucial role in defending the body against diseases, making it vital to develop models that can accurately predict immune system strength. This study presents an Enhanced Deep Learning Strate... 详细信息
来源: 评论
Feature Reduction-based Intrusion Detection (FRID) in Satellite-Terrestrial Integrated Networks  5
Feature Reduction-based Intrusion Detection (FRID) in Satell...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Yao, Lin Tian, Ziyuan Deng, Jing Wu, Guowei Li, Li DUT-RU International School of Information Science & Engineering Dalian University of Technology Dalian China School of Software Dalian University of Technology Dalian China The Department of Computer Science UNC Greensboro UNC NC Greensboro27412 United States Department of Computer and Information Science University of Macau China
Satellite-Terrestrial Integrated Networks (STINs) integrate satellite networks, the Internet, and mobile wireless networks and are able to provide powerful services to users. In STIN, satellite gateways play an import... 详细信息
来源: 评论
Objective Full-Reference Image Assessment Metrics for Estimating the Quality of Remote Sensing Images  2
Objective Full-Reference Image Assessment Metrics for Estima...
收藏 引用
2nd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2023
作者: Maruthi, R. Anusha, P. Sankar, P. Thiyagaragan, K. Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India Periyar Maniammai Institute of Science and Technology Department of Software Engineering Thanjavur India Hindustan Institute of Technology and Science Department of Electronics and Communication Engg Tamil Nadu Chennai India
Image Quality (IQ) assessment is a very complex task and it is extremely important to evaluate the images with the metrics. The metrics applied can be a full reference, partial reference or no-reference metric and it ... 详细信息
来源: 评论
Enhancing Brain Stroke Risk Prediction with Multi-Algorithm Evaluation and Web Interface
Enhancing Brain Stroke Risk Prediction with Multi-Algorithm ...
收藏 引用
engineering & Computing Technologies (ICECT), International Conference on
作者: Muhammad Ahmed Umer Liaquat Attique Ur Rehman Sabeen Javaid Tahir Muhammad Ali Azka Mir Department of Software Engineering University of Sialkot Sialkot Pakistan Department of Computer Science Gulf University for Science and Technology Kuwait
Brain stroke is the world's leading cause of death, impacting numerous lives annually. The chances of having a stroke have increased by 50% over one's lifetime, impacting one in four people worldwide. Machine ... 详细信息
来源: 评论
Aerial Vehicle Detection and Classification Through Fusion of Multi-Domain Features of Acoustic Signals
Aerial Vehicle Detection and Classification Through Fusion o...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Sumble, Malaika Aziz, Sumair Khan, Muhammad Umar Iqtidar, Khushbakht Fernandez-Rojas, Raul University of Engg. and Tech. Taxila Department of Electronics Engineering Taxila Pakistan University of Canberra Faculty of Science and Technology CanberraACT Australia National University of Sciences & Tech. Dept. of Computer and Software Engineering Islamabad Pakistan
Detection of aerial vehicles is a challenging task. Over time, the significance of developing such vehicles has increased rapidly. However, an utmost concern arises from the potential misuse of these small-sized vehic... 详细信息
来源: 评论
On Federated Multi-Armed Bandits for Mobile Social Networks
On Federated Multi-Armed Bandits for Mobile Social Networks
收藏 引用
International Conference on Distributed Computing Systems
作者: Kazuya Sakai Takeshi Kitamura Min-Te Sun Wei-Shinn Ku Department of Electrical Engineering and Computer Science Tokyo Metropolitan University Tokyo Japan Department of Computer Science and Information Engineering National Central University Taoyuan Taiwan Department of Computer Science and Software Engineering Auburn University Auburn Alabama USA
Multi-armed bandits (MABs) are widely used for decision making processes, in which an agent tries to maximize a long-term reward by balancing exploiting and exploring actions. In this paper, we are particularly intere... 详细信息
来源: 评论
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 5211-5223页
作者: Gheisari, Mehdi Javadpour, Amir Gao, Jiechao Abbasi, Aaqif Afzaal Pham, Quoc-Viet Liu, Yang Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of Computer Science University of Virginia VA United States Department of Software Engineering Foundation University Islamabad44000 Pakistan Korean Southeast Center for the 4Th Industrial Revolution Leader Education Pusan National University Busan46241 Korea Republic of ADiT-Lab Electrotechnics and Telecommunications Department Instituto Politécnico de Viana do Castelo Porto4900-347 Portugal
Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due to its positive impact on society. However, due to the automatic man... 详细信息
来源: 评论
Video Surveillance-Based Intrusion Detection System in Edge Cloud Environment  3rd
Video Surveillance-Based Intrusion Detection System in Edge ...
收藏 引用
3rd International Conference on Emergent Converging Technologies and Biomedical Systems, ETBS 2023
作者: Sharma, Annu Devasenapathy, Deepa Raja, M. Shadrach, Finney Daniel Shirgire, Anil Arun, R. Yau, Thomas Moh Shan Department of Computer Science and Applications Rajarajeshwari College of Engineering Karnataka Bengaluru560074 India Instructor-II/Computing and Software Engineering U.A. Whitaker College of Engineering Florida Gulf Coast University Fort Myers United States Department of Computer Science and Engineering CMR Institute of Technology Karnataka Bengaluru560037 India Department of Electronics and Communication Engineering KPR Institute of Engineering and Technology Tamil Nadu Coimbatore641407 India Department of Civil Engineering Dr. D Y Patil Institute of Technology Maharashtra Pimpri Pune411018 India Department of Computer Science and Engineering Hindusthan Institute of Technology Coimbatore India Director of Centre of University Courses and Innovative Learning University of Technology Sarawak Jalan Universiti Sibu Sarawak96000 Malaysia
Video surveillance is mostly used for monitoring distant videos and the cloud memory in the system provides more secure to the data. But, in the existing methodologies poor intrusion detection accuracy as well as poor... 详细信息
来源: 评论