咨询与建议

限定检索结果

文献类型

  • 2,417 篇 会议
  • 993 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 3,482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,011 篇 工学
    • 1,569 篇 计算机科学与技术...
    • 1,287 篇 软件工程
    • 399 篇 信息与通信工程
    • 338 篇 控制科学与工程
    • 182 篇 生物工程
    • 181 篇 电气工程
    • 142 篇 电子科学与技术(可...
    • 129 篇 机械工程
    • 129 篇 生物医学工程(可授...
    • 89 篇 安全科学与工程
    • 86 篇 动力工程及工程热...
    • 84 篇 光学工程
    • 73 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 建筑学
    • 67 篇 土木工程
  • 882 篇 理学
    • 482 篇 数学
    • 208 篇 生物学
    • 165 篇 系统科学
    • 161 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 73 篇 化学
  • 592 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 133 篇 医学
    • 122 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 94 篇 法学
    • 69 篇 社会学
  • 70 篇 经济学
    • 70 篇 应用经济学
  • 69 篇 教育学
    • 68 篇 教育学
  • 27 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 193 篇 software enginee...
  • 166 篇 computer science
  • 97 篇 application soft...
  • 93 篇 computational mo...
  • 87 篇 laboratories
  • 75 篇 computer archite...
  • 75 篇 machine learning
  • 74 篇 software systems
  • 74 篇 software
  • 72 篇 artificial intel...
  • 71 篇 deep learning
  • 69 篇 distributed comp...
  • 68 篇 accuracy
  • 66 篇 wireless sensor ...
  • 63 篇 quality of servi...
  • 61 篇 resource managem...
  • 59 篇 training
  • 57 篇 grid computing
  • 56 篇 cloud computing
  • 54 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of co...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...

作者

  • 66 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 36 篇 junping du
  • 31 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 fashan yu
  • 18 篇 xenofon koutsouk...
  • 16 篇 m. parashar
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 13 篇 choo kim-kwang r...
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 dustdar schahram
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol

语言

  • 3,362 篇 英文
  • 93 篇 其他
  • 22 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering for Distributed Computer Systems"
3482 条 记 录,以下是141-150 订阅
排序:
Enhancing MANETs Security Against Black Hole Attacks through Time-Based Node Analysis in AOMDV Protocol
Enhancing MANETs Security Against Black Hole Attacks through...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Abdullah A. Naji Mogeeb A. Saeed Ammar H. Almagashi Alaa M. Ahmed Hashem S. Al-Atefi Mohammed N. Khaled Olayan M. Rashed Computer Network & Distributed Systems Department Al-Saeed Faculty Of Engineering &IT Taiz University Computer Networks & Distributed Systems Al-Saeed Faculty Of Engineering &IT Taiz University Computer Center & Information Technology Taiz University
Mobile ad-hoc networks (MANETs) rely solely on direct node communication and function without a fixed infrastructure. Due to their decentralized design, they are susceptible to numerous security risks, with black hole... 详细信息
来源: 评论
A Web-Based Vaccine Distribution System for Covid-19 Using Vaxallot  4th
A Web-Based Vaccine Distribution System for Covid-19 Using V...
收藏 引用
4th EAI International Conference on Cognitive Computing and Cyber Physical systems, IC4S 2023
作者: Valarmathi, B. Srinivasa Gupta, N. Prakash, G. BarathyKolappan, A. Padmavathy, N. Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Systems Engineer Tata Consultancy Services Tamil Nadu Chennai India Department of Electronics and Communication Engineering Vishnu Institute of Technology Andhra Pradesh Bhimavaram India
Vaxallot seeks to implement a system to distribute vaccines across high-risk groups accounting for various parameters and prove to be superior to what conventional systems are capable of today. It is a Python flask-ba... 详细信息
来源: 评论
GPU accelerated blockchain over key-value database transactions
IET Blockchain
收藏 引用
IET Blockchain 2022年 第1期2卷 1-12页
作者: Iliakis, Konstantinos Koliogeorgi, Konstantina Litke, Antonios Varvarigou, Theodora Soudris, Dimitrios Microprocessors and Digital Systems Laboratory Department of Electrical and Computer Engineering National Technical University of Athens Zografou Campous 9 Iroon Polytechniou str Athens Greece Distributed Knowledge and Media Systems group Department of Electrical and Computer Engineering National Technical University of Athens Zografou Campous 9 Iroon Polytechniou str Athens Greece
Blockchain is a distributed ledger based on peer-to-peer networks, originally used for crypto-currency systems. Blockchains are being used as an enabling technology for decentralised applications in the areas of Inter... 详细信息
来源: 评论
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection  2
From Data to Diagnosis: Investigating Approaches in Mental I...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Montasser, Reem Kadry Mazen, Sherif A. Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Data-informed Healthy Cell Clustering Technique for Second-life Applications of Retired Electric Vehicle Batteries
Data-informed Healthy Cell Clustering Technique for Second-l...
收藏 引用
IEEE Transportation Electrification Conference and Expo (ITEC)
作者: Akash Samanta Dominic Karnehm Antje Neve Sheldon Williamson Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa Canada Institute of Intelligent Distributed Systems University of the Bundeswehr Munich Neubiberg Germany
The electric vehicles (EVs) adoption rate has been significant in the last decade and keeps on increasing. Recently, the retired EV battery packs which no longer provide satisfactory performance to power an EV started... 详细信息
来源: 评论
Detecting Duplicate Contributions in Pull-Based Model CombiningTextual and Change Similarities
收藏 引用
Journal of computer Science & Technology 2021年 第1期36卷 191-206页
作者: Zhi-Xing Li Yue Yu Tao Wang Gang Yin Xin-Jun Mao Huai-Min Wang Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense Technology Changsha 410073China Laboratory of Software Engineering for Complex Systems College of ComputerNational University of Defense TechnologyChangsha 410073China
Communication and coordination between OSS developers who do not work physically in the same location have always been the challenging *** pull-based development model,as the state-of-art collaborative development mec... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Network Traffic Classifiers for Internet of Things Intrusion Detection using Machine Learning Classifiers  3
Network Traffic Classifiers for Internet of Things Intrusion...
收藏 引用
3rd International Conference on Innovative Sustainable Computational Technologies, CISCT 2023
作者: Uniyal, Anita Mishra, Amit Kumar Manushi Pant, Yogesh Computer Science & Engineering GRD IMT Dehradun India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India GRD IMT Department of Computer Science & Engineering Dehradun India Software Business Systems Consultanting India Private Limited India
In today's era smart devices are integral part of our life and every device becomes smart if it is equipped with sensors and having ability to connect with internet. Without any hindrance we can connect and intera... 详细信息
来源: 评论