咨询与建议

限定检索结果

文献类型

  • 11,348 篇 会议
  • 5,222 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,312 篇 工学
    • 8,215 篇 计算机科学与技术...
    • 6,824 篇 软件工程
    • 2,044 篇 信息与通信工程
    • 1,365 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 862 篇 电气工程
    • 736 篇 生物医学工程(可授...
    • 686 篇 机械工程
    • 610 篇 电子科学与技术(可...
    • 560 篇 光学工程
    • 431 篇 安全科学与工程
    • 355 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 336 篇 动力工程及工程热...
    • 329 篇 建筑学
    • 321 篇 交通运输工程
  • 4,551 篇 理学
    • 2,652 篇 数学
    • 1,234 篇 生物学
    • 842 篇 物理学
    • 746 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 359 篇 化学
  • 3,190 篇 管理学
    • 1,942 篇 管理科学与工程(可...
    • 1,370 篇 图书情报与档案管...
    • 951 篇 工商管理
  • 726 篇 医学
    • 628 篇 临床医学
    • 555 篇 基础医学(可授医学...
    • 330 篇 药学(可授医学、理...
  • 496 篇 法学
    • 384 篇 社会学
  • 329 篇 教育学
  • 328 篇 经济学
    • 325 篇 应用经济学
  • 172 篇 农学
  • 72 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,023 篇 software enginee...
  • 326 篇 deep learning
  • 303 篇 application soft...
  • 292 篇 computational mo...
  • 268 篇 data mining
  • 250 篇 machine learning
  • 245 篇 computer archite...
  • 229 篇 software
  • 205 篇 accuracy
  • 202 篇 software systems
  • 202 篇 feature extracti...
  • 192 篇 training
  • 189 篇 internet of thin...
  • 189 篇 support vector m...
  • 181 篇 programming
  • 170 篇 educational inst...
  • 169 篇 semantics
  • 164 篇 laboratories
  • 164 篇 optimization

机构

  • 358 篇 college of compu...
  • 199 篇 department of co...
  • 147 篇 state key labora...
  • 118 篇 department of co...
  • 116 篇 department of co...
  • 108 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 84 篇 school of inform...
  • 79 篇 department of co...
  • 74 篇 department of co...
  • 74 篇 department of co...
  • 74 篇 department of co...
  • 66 篇 school of comput...
  • 53 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 school of softwa...
  • 46 篇 department of co...
  • 46 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 shen furao
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 niyato dusit
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 14,696 篇 英文
  • 1,999 篇 其他
  • 132 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Department of Software Engineering and Computer Science"
16799 条 记 录,以下是1521-1530 订阅
排序:
Enhancing Brain Stroke Risk Prediction with Multi-Algorithm Evaluation and Web Interface
Enhancing Brain Stroke Risk Prediction with Multi-Algorithm ...
收藏 引用
engineering & Computing Technologies (ICECT), International Conference on
作者: Muhammad Ahmed Umer Liaquat Attique Ur Rehman Sabeen Javaid Tahir Muhammad Ali Azka Mir Department of Software Engineering University of Sialkot Sialkot Pakistan Department of Computer Science Gulf University for Science and Technology Kuwait
Brain stroke is the world's leading cause of death, impacting numerous lives annually. The chances of having a stroke have increased by 50% over one's lifetime, impacting one in four people worldwide. Machine ... 详细信息
来源: 评论
On Federated Multi-Armed Bandits for Mobile Social Networks
On Federated Multi-Armed Bandits for Mobile Social Networks
收藏 引用
International Conference on Distributed Computing Systems
作者: Kazuya Sakai Takeshi Kitamura Min-Te Sun Wei-Shinn Ku Department of Electrical Engineering and Computer Science Tokyo Metropolitan University Tokyo Japan Department of Computer Science and Information Engineering National Central University Taoyuan Taiwan Department of Computer Science and Software Engineering Auburn University Auburn Alabama USA
Multi-armed bandits (MABs) are widely used for decision making processes, in which an agent tries to maximize a long-term reward by balancing exploiting and exploring actions. In this paper, we are particularly intere... 详细信息
来源: 评论
Aerial Vehicle Detection and Classification Through Fusion of Multi-Domain Features of Acoustic Signals
Aerial Vehicle Detection and Classification Through Fusion o...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Sumble, Malaika Aziz, Sumair Khan, Muhammad Umar Iqtidar, Khushbakht Fernandez-Rojas, Raul University of Engg. and Tech. Taxila Department of Electronics Engineering Taxila Pakistan University of Canberra Faculty of Science and Technology CanberraACT Australia National University of Sciences & Tech. Dept. of Computer and Software Engineering Islamabad Pakistan
Detection of aerial vehicles is a challenging task. Over time, the significance of developing such vehicles has increased rapidly. However, an utmost concern arises from the potential misuse of these small-sized vehic... 详细信息
来源: 评论
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 5211-5223页
作者: Gheisari, Mehdi Javadpour, Amir Gao, Jiechao Abbasi, Aaqif Afzaal Pham, Quoc-Viet Liu, Yang Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of Computer Science University of Virginia VA United States Department of Software Engineering Foundation University Islamabad44000 Pakistan Korean Southeast Center for the 4Th Industrial Revolution Leader Education Pusan National University Busan46241 Korea Republic of ADiT-Lab Electrotechnics and Telecommunications Department Instituto Politécnico de Viana do Castelo Porto4900-347 Portugal
Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due to its positive impact on society. However, due to the automatic man... 详细信息
来源: 评论
Video Surveillance-Based Intrusion Detection System in Edge Cloud Environment  3rd
Video Surveillance-Based Intrusion Detection System in Edge ...
收藏 引用
3rd International Conference on Emergent Converging Technologies and Biomedical Systems, ETBS 2023
作者: Sharma, Annu Devasenapathy, Deepa Raja, M. Shadrach, Finney Daniel Shirgire, Anil Arun, R. Yau, Thomas Moh Shan Department of Computer Science and Applications Rajarajeshwari College of Engineering Karnataka Bengaluru560074 India Instructor-II/Computing and Software Engineering U.A. Whitaker College of Engineering Florida Gulf Coast University Fort Myers United States Department of Computer Science and Engineering CMR Institute of Technology Karnataka Bengaluru560037 India Department of Electronics and Communication Engineering KPR Institute of Engineering and Technology Tamil Nadu Coimbatore641407 India Department of Civil Engineering Dr. D Y Patil Institute of Technology Maharashtra Pimpri Pune411018 India Department of Computer Science and Engineering Hindusthan Institute of Technology Coimbatore India Director of Centre of University Courses and Innovative Learning University of Technology Sarawak Jalan Universiti Sibu Sarawak96000 Malaysia
Video surveillance is mostly used for monitoring distant videos and the cloud memory in the system provides more secure to the data. But, in the existing methodologies poor intrusion detection accuracy as well as poor... 详细信息
来源: 评论
The Myth of Immutability: A Multivocal Review on Smart Contract Upgradeability
arXiv
收藏 引用
arXiv 2025年
作者: Qasse, Ilham Ali, Isra M. Ahmed, Nafisa Hamdaqa, Mohammad Jónsson, Björn Þór Department of Computer Science Reykjavik University Reykjavik Iceland College of Science and Engineering Hamad Bin Khalifa University Doha Qatar Department of Computer Engineering and Software Engineering Polytechnique Montreal Montreal Canada
Background: The immutability of smart contracts on blockchain platforms like Ethereum promotes security and trustworthiness but presents challenges for updates, bug fixes, or adding new features post-deployment. These... 详细信息
来源: 评论
Towards Defect Prediction for Quantum software*
Towards Defect Prediction for Quantum Software*
收藏 引用
Quantum software engineering (Q-SE), International Workshop on
作者: Xuan Mao Zijie Huang Jianxin Ge Chao Wang Wuxu Wang Lizhi Cai Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai Development Center of Computer Software Technology Shanghai China
software defects are faults or bugs within a program that can lead to incorrect or unexpected outcomes. Efficiently allocating software quality assurance (SQA) resources to components with a higher likelihood of defec... 详细信息
来源: 评论
Towards Early Warning and Migration of High-Risk Dormant Open-Source software Dependencies
Towards Early Warning and Migration of High-Risk Dormant Ope...
收藏 引用
IEEE/ACM International Conference on software engineering: New Ideas and Emerging Technologies Results Track (ICSE-NIER)
作者: Zijie Huang Lizhi Cai Xuan Mao Kang Yang Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai Development Center of Computer Software Technology Shanghai China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
Dormant open-source software (OSS) dependencies are no longer maintained or actively developed, their related code components are more vulnerable and error-prone since they can hardly keep up with evolving software de... 详细信息
来源: 评论
Mobile Medical Assistant System for Laboratory Report Analysis and Medical Drug Identification  4
Mobile Medical Assistant System for Laboratory Report Analys...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Warnakulasuriya, Deshani Dewangi, Tharushi Sewwandi, Navodya Rathnayake, Minoli Kodagoda, Nuwan Suriyawansha, Kushanra Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
It is quite common for medical drugs and prescriptions to be misidentified by hospitals and after drugs are being dispensed to the patients. Misidentification of medical drugs is more common among elderly and visually... 详细信息
来源: 评论
Digital Forensics Across Multiple Android Versions Using the MOBILEdit Forensic Tool
Digital Forensics Across Multiple Android Versions Using the...
收藏 引用
IEEE International Conference on Multi Topic
作者: Kohal Deep Maheshwari Pardeep Kumar Najma Imtiaz Ali Imtiaz Ali Brohi Dua Agha Department of Computer Science & IT NED University Karachi Pakistan Department of Software Engineering QUEST Univesity Nawabshah Pakistan Institute of Mathematics and Computer Science University of Sindh Jamshoro Pakistan Department of Computer Science Government College University Hyderabad Pakistan Department of Software Engineering Mehran University of Engineering and Technology Jamshoro Pakistan
Open-source Android smartphones present both opportunities and difficulties for forensic investigators as they become more widely used. Advancements in Android security, encryption, and storage features necessitate ne... 详细信息
来源: 评论