咨询与建议

限定检索结果

文献类型

  • 2,427 篇 会议
  • 995 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 3,494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,023 篇 工学
    • 1,578 篇 计算机科学与技术...
    • 1,291 篇 软件工程
    • 402 篇 信息与通信工程
    • 342 篇 控制科学与工程
    • 185 篇 生物工程
    • 182 篇 电气工程
    • 143 篇 电子科学与技术(可...
    • 131 篇 机械工程
    • 130 篇 生物医学工程(可授...
    • 90 篇 安全科学与工程
    • 87 篇 动力工程及工程热...
    • 86 篇 光学工程
    • 73 篇 化学工程与技术
    • 72 篇 建筑学
    • 71 篇 仪器科学与技术
    • 69 篇 土木工程
  • 887 篇 理学
    • 484 篇 数学
    • 210 篇 生物学
    • 165 篇 系统科学
    • 162 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 73 篇 化学
  • 593 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 235 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 135 篇 医学
    • 124 篇 临床医学
    • 105 篇 基础医学(可授医学...
  • 94 篇 法学
    • 70 篇 社会学
  • 70 篇 经济学
    • 70 篇 应用经济学
  • 67 篇 教育学
    • 67 篇 教育学
  • 27 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 193 篇 software enginee...
  • 166 篇 computer science
  • 97 篇 application soft...
  • 94 篇 computational mo...
  • 87 篇 laboratories
  • 76 篇 software
  • 75 篇 computer archite...
  • 75 篇 machine learning
  • 74 篇 software systems
  • 73 篇 deep learning
  • 72 篇 artificial intel...
  • 72 篇 accuracy
  • 69 篇 distributed comp...
  • 66 篇 wireless sensor ...
  • 63 篇 quality of servi...
  • 61 篇 resource managem...
  • 59 篇 training
  • 57 篇 grid computing
  • 56 篇 cloud computing
  • 54 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of co...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...

作者

  • 66 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 36 篇 junping du
  • 31 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 fashan yu
  • 18 篇 xenofon koutsouk...
  • 16 篇 m. parashar
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 13 篇 choo kim-kwang r...
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 dustdar schahram
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol

语言

  • 3,333 篇 英文
  • 134 篇 其他
  • 22 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering for Distributed Computer Systems"
3494 条 记 录,以下是421-430 订阅
排序:
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
Innovations in Intelligent systems and Applications Conference
作者: Elif Kanca Tolgahan Gulsoy Arda Ustubioglu Beste Ustubioglu Selen Ayas Elif Baykal Kablan Guzin Ulutas Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论
Enhancing Human Posture Detection with Hybrid Deep VGG16 and Attention Mechanism Network
收藏 引用
Procedia computer Science 2025年 258卷 1209-1218页
作者: Ogundokun Roseline Oluwaseun Rytis Maskeliūnas Federick Oscar Oluwakayode A. Oki Department of Software Engineering Kaunas University of Technology Kaunas 44249 Lithuania Department of Computer Science Landmark University Omu-Aran Nigeria Department of Computer Systems Engineering Tshwane University of Technology (TUT) Pretoria South Africa Adioo Technology Abuja Nigeria Department of Information Technology East London Walter Sisulu University South Africa
Human Posture Detection (HPD) and classification are the initial steps toward various computer vision applications related to security, advertisement, and healthcare. Even though more than three decades have passed, m... 详细信息
来源: 评论
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 288-298页
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kandiy, Sergey Smirnov, Oleksii Ulianovska, Yuliia Kobylianska, Olena Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security Faculty of Comupter Science V. N. Karazin Kharkiv National University 4 Svobody Sq Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Cybersecurity & Software Academic Department Central Ukrainian National Technical University 8 University Avenue Kropyvnytskyi25006 Ukraine Department of Computer Science and Software Engineering University of Customs and Finance Vernadskogo Street 2/4 Dnipro49000 Ukraine
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
Intelligent Daycare: Enhancing Child Safety with IoT and Machine Learning Innovations
Intelligent Daycare: Enhancing Child Safety with IoT and Mac...
收藏 引用
International Conference on Communication and Electronics systems (ICCES)
作者: Amisha Prathyanga Pasindu Shyaminda Pasan Chamikara Sachin Lakshan Samantha Thelijjagoda Dharshana Kasthurirathna Department of Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Child safety and well-being in daycare settings are important, thus it is vital that the persons in charge be attentive to them. This research tries to solve the problem by introducing a smart and detailed monitoring ... 详细信息
来源: 评论
Audio-Assisted Smart Home Security Monitoring with Few Samples
Audio-Assisted Smart Home Security Monitoring with Few Sampl...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Haotian Chi Qi Ma Yuxuan Zhang Chenglong Fu Yuwei Wang Haijun Geng Xiaojiang Du School of Automation and Software Engineering Shanxi University Taiyuan China Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC USA Department of Electical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA
Smart home IoT devices have always been the target of various cyber attacks. By leveraging the smart home monitoring infrastructure, event-based anomaly detection is effective to detect anomalies that cause unfavorabl... 详细信息
来源: 评论
Approaching Test Time Augmentation in the Context of Uncertainty Calibration for Deep Neural Networks
arXiv
收藏 引用
arXiv 2023年
作者: Conde, Pedro Barros, Tiago Lopes, Rui L. Premebida, Cristiano Nunes, Urbano J. The Institute of Systems and Robotics Department of Electrical and Computer Engineering University of Coimbra Portugal Critical Software South Africa
With the rise of Deep Neural Networks, machine learning systems are nowadays ubiquitous in a number of real-world applications, which bears the need for highly reliable models. This requires a thorough look not only a... 详细信息
来源: 评论
Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns
Design, Modeling and Simulation of Cybercriminal Personality...
收藏 引用
Simulation Winter Conference
作者: Jeongkeun Shin Geoffrey B. Dobson L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims' human factors affect... 详细信息
来源: 评论
STEP UP: Systematically Motivating the Children with Low Psychological Maturity Level and Disabled Children using Gamification and Human computer Interaction  7
STEP UP: Systematically Motivating the Children with Low Psy...
收藏 引用
7th IEEE International conference for Convergence in Technology, I2CT 2022
作者: Dharmarathne, R.S.C.K. Medagedara, K.A. Madhubashinee, N.B.W.N. Maitipe, P.T. Sriyaratna, Disni Abeywardena, Kavinga Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Systems Engineering Malabe Sri Lanka
Children are the future of this world. Therefore, teaching them to have a better future is very important. Also, as the adults we have to motivate them to overcome the obstacles and challenges they face throughout the... 详细信息
来源: 评论
Ontological Model for Cohesive Smart Health Services Management
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3679-3695页
作者: Muhammad Raza Naqvi Muhammad Waseem Iqbal Syed Khuram Shahzad M.Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Le Laboratoire Génie de Production de l’École Nationale d’Ingénieurs de Tarbes(LGP-INP-ENIT) Universitéde ToulouseCEDEXTarbes65016France Department of Software Engineering Superior UniversityLahore53700Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Computer Science University of Management and TechnologySialkot51310Pakistan Department of Computer Science King Abdul-Aziz UniversityJeddah21577Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21577Saudi Arabia
Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of *** massive increase in the usage of health car... 详细信息
来源: 评论