咨询与建议

限定检索结果

文献类型

  • 2,066 篇 会议
  • 889 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,011 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,757 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 346 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 165 篇 生物工程
    • 153 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 117 篇 机械工程
    • 91 篇 安全科学与工程
    • 83 篇 光学工程
    • 74 篇 动力工程及工程热...
    • 68 篇 建筑学
    • 68 篇 土木工程
    • 67 篇 化学工程与技术
    • 66 篇 仪器科学与技术
    • 60 篇 网络空间安全
  • 789 篇 理学
    • 419 篇 数学
    • 191 篇 生物学
    • 149 篇 物理学
    • 147 篇 系统科学
    • 125 篇 统计学(可授理学、...
    • 68 篇 化学
  • 524 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 204 篇 工商管理
    • 201 篇 图书情报与档案管...
  • 132 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 82 篇 法学
    • 64 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 54 篇 教育学
  • 24 篇 农学
  • 13 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 73 篇 deep learning
  • 72 篇 accuracy
  • 70 篇 laboratories
  • 70 篇 machine learning
  • 68 篇 software systems
  • 67 篇 software
  • 62 篇 computer archite...
  • 60 篇 artificial intel...
  • 60 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 49 篇 security
  • 47 篇 grid computing
  • 47 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,632 篇 英文
  • 362 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Systems"
3011 条 记 录,以下是131-140 订阅
排序:
Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function Chains  36
Model Predictive Control for Automated Network Assurance in ...
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Avgeris, Marios Leivadeas, Aris Athanasopoulos, Nikolaos Lambadaris, Ioannis Falkner, Matthias Carleton University Department of Systems and Computer Engineering Ottawa Canada Ácole de Technologie Supérieure Department of Software and It Engineering Montreal Canada Queen's University School of Electronics Electrical Engineering and Computer Science Belfast United Kingdom Cisco Systems Ottawa Canada
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate... 详细信息
来源: 评论
Bluetooth Vulnerabilities and Security  7
Bluetooth Vulnerabilities and Security
收藏 引用
7th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2025
作者: Mareeswari, V. Vijayan, R. Shukla, Ashish Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
A Web-Based Vaccine Distribution System for Covid-19 Using Vaxallot  4th
A Web-Based Vaccine Distribution System for Covid-19 Using V...
收藏 引用
4th EAI International Conference on Cognitive Computing and Cyber Physical systems, IC4S 2023
作者: Valarmathi, B. Srinivasa Gupta, N. Prakash, G. BarathyKolappan, A. Padmavathy, N. Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Systems Engineer Tata Consultancy Services Tamil Nadu Chennai India Department of Electronics and Communication Engineering Vishnu Institute of Technology Andhra Pradesh Bhimavaram India
Vaxallot seeks to implement a system to distribute vaccines across high-risk groups accounting for various parameters and prove to be superior to what conventional systems are capable of today. It is a Python flask-ba... 详细信息
来源: 评论
Passivity-Based Distributed Event-Triggered Flocking Control of Port-Hamiltonian systems
收藏 引用
IEEE Control systems Letters 2025年 9卷 342-347页
作者: Aranda-Escolástico, Ernesto Abdelrahim, Mahmoud Fernández-Amorós, David Guinaldo, María Colombo, Leonardo Universidad Nacional de Educación a Distancia Department of Software and Systems Engineering Madrid28040 Spain Prince Sultan University Renewable Energy Laboratory College of Engineering Riyadh11586 Saudi Arabia Universidad Nacional de Educación a Distancia Computer Science and Automatic Control Department Madrid28040 Spain Field and Service Robotics Department Madrid28500 Spain
This letter addresses the problem of flocking motion in the context of port-Hamiltonian systems. The port-Hamiltonian framework offers advantages in modeling networks, dissipation, and heterogeneous agents. In this re... 详细信息
来源: 评论
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection  2
From Data to Diagnosis: Investigating Approaches in Mental I...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Montasser, Reem Kadry Mazen, Sherif A. Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Network Traffic Classifiers for Internet of Things Intrusion Detection using Machine Learning Classifiers  3
Network Traffic Classifiers for Internet of Things Intrusion...
收藏 引用
3rd International Conference on Innovative Sustainable Computational Technologies, CISCT 2023
作者: Uniyal, Anita Mishra, Amit Kumar Manushi Pant, Yogesh Computer Science & Engineering GRD IMT Dehradun India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India GRD IMT Department of Computer Science & Engineering Dehradun India Software Business Systems Consultanting India Private Limited India
In today's era smart devices are integral part of our life and every device becomes smart if it is equipped with sensors and having ability to connect with internet. Without any hindrance we can connect and intera... 详细信息
来源: 评论
Generative AI-Driven Incentive Mechanism for Semantic Communications in RSMA Networks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年 第3期11卷 1708-1722页
作者: Liu, Dongqing Liu, Yongwen Zhang, Lei Hafid, Abdelhakim Khoukhi, Lyes Li, Mingyuan Liu, Yutao Dong, Yadong The First Affiliated Hospital of Zhengzhou University National Engineering Laboratory for Internet Medical Systems and Applications Zhengzhou China Zhengzhou University of Light Industry Software Engineering College Zhengzhou China Henan University of Technology College of Electrical Engineering Zhengzhou China University of Montreal Department of Computer Science and Operational Research Canada GREYC Laboratory ENSICAEN Normandie University France
This paper proposes a framework integrating Rate Splitting Multiple Access (RSMA), semantic communications, and generative AI for optimizing next-generation wireless networks. We present a unified model that combines ... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论