咨询与建议

限定检索结果

文献类型

  • 5,458 篇 会议
  • 1,036 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 6,591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,079 篇 工学
    • 2,726 篇 计算机科学与技术...
    • 2,296 篇 软件工程
    • 951 篇 信息与通信工程
    • 762 篇 控制科学与工程
    • 586 篇 电气工程
    • 552 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 249 篇 光学工程
    • 238 篇 动力工程及工程热...
    • 191 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 144 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 123 篇 建筑学
    • 119 篇 材料科学与工程(可...
  • 2,005 篇 理学
    • 1,149 篇 数学
    • 479 篇 物理学
    • 384 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 987 篇 管理学
    • 634 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 390 篇 工商管理
  • 219 篇 医学
    • 198 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 185 篇 法学
    • 148 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 111 篇 教育学
  • 64 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 143 篇 accuracy
  • 124 篇 computational mo...
  • 114 篇 machine learning
  • 111 篇 feature extracti...
  • 108 篇 training
  • 107 篇 software
  • 96 篇 software enginee...
  • 93 篇 optimization
  • 87 篇 predictive model...
  • 84 篇 artificial intel...
  • 83 篇 deep learning
  • 76 篇 real-time system...
  • 70 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 data mining
  • 62 篇 mathematical mod...
  • 61 篇 internet of thin...
  • 61 篇 monitoring
  • 58 篇 neural networks

机构

  • 56 篇 dept. of systems...
  • 36 篇 dept. of systems...
  • 23 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 dept. of technol...
  • 18 篇 university of eu...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of electri...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of systems...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 20 篇 tan mengxi
  • 20 篇 ali raja hashim
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 17 篇 arshad usama
  • 16 篇 zain ul abideen
  • 16 篇 moss david j.
  • 15 篇 yangquan chen
  • 15 篇 baldwin timothy
  • 14 篇 raja hashim ali
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong

语言

  • 5,982 篇 英文
  • 533 篇 其他
  • 58 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Dept. Software Engineering and Computer Systems"
6591 条 记 录,以下是681-690 订阅
排序:
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based systems
A Secure RPL Rank Computation and Distribution Mechanism for...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Mishra, Alekha Kumar Puthal, Deepak Tripathy, Asis Kumar National Institute of Technology Dept. of Computer Science and Engineering Jamshedpur India Khalifa University Center for Cyber-Physical Systems and Department of EECS Abu Dhabi United Arab Emirates School of IT and Engineering VIT Vellore India
The sinkhole attack detection mechanisms that have been reported till date are distributed in nature. Defending a sinkhole attack requires protecting the act of forging the rank computation task. This paper propose a ... 详细信息
来源: 评论
Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices
Performance Evaluation of Quantum-Resistant TLS for Consumer...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Jessica Bozhko Yacoub Hanna Ricardo Harrilal-Parchment Samet Tonyali Kemal Akkaya Dept. of Computer Science Auburn University Auburn USA Dept. of Electrical and Computer Engineering Florida International University Miami USA Dept. of Software Engineering Gumushane University Gumushane Turkey
Post-quantum (PQ) cryptographic algorithms are currently being developed to be able to resist attacks by quantum computers. The practical use of these algorithms for securing networks will depend on their computationa... 详细信息
来源: 评论
Towards the Diagnosis of Heart Disease Using an Ensemble Learning Approach
Towards the Diagnosis of Heart Disease Using an Ensemble Lea...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Zheng Zhang Liangliang Xu Yida Bao Sanjeev Baskiyar Dept. of Computer Science & Software Engineering Dept. of Mathematics & Statistics Auburn University Auburn AL United States
Heart disease is one of the leading causes of death worldwide. Understanding the presence of heart disease is crucial for timely intervention and effective management. However, it is still a challenging task to accura...
来源: 评论
Evaluating Datagram Congestion Control Protocol (DCCP) for Real-Time Applications: A Comparative Study with TCP in Multi-Node Networks  10
Evaluating Datagram Congestion Control Protocol (DCCP) for R...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Hassan, Aqib Memon, Vengas Shaikh, Farhan Bashir Alahmari, Saad Iqbal, Mansoor Azam, Farooq School of Computing and Mathematical Sciences University of Greenwich London United Kingdom Universiti Tunku Faculty of Information and Communication Tech. Abdul Rahman Perak Malaysia Northern Border University Department of Computer Science Arar Saudi Arabia University of Wah Department of Computer Science Wah Cantt Pakistan Nust Dept. of Computer Software Engineering Islamabad Pakistan
The rise in demand for real-time applications, such as live streaming, online gaming, and Internet telephony, has highlighted the necessity for transport protocols that offer low latency and network stability. Traditi... 详细信息
来源: 评论
Closed-Loop System Identification of an Unstable Nonlinear System Using Koopman Operator
Closed-Loop System Identification of an Unstable Nonlinear S...
收藏 引用
First International Symposium on Instrumentation, Control, Artificial Intelligence, and Robotics (ICA-SYMP)
作者: Benjaset Maneeloke Sudchai Boonto Peerayot Sanposh Yodyium Tipsuwan Natthawut Chinthaned Warit Tanaprasitpattana Dept. of Electrical Engineering Kasetsart University Bangkok Thailand Dept. of Control Systems and Instrumentation Engineering King Mongkut's University of Technology Thonburi Bangkok Thailand Dept. of Computer Engineering Kasetsart University Bangkok Thailand
This paper presents a novel methodology for closed-loop system identification of unstable nonlinear systems using the Koopman operator with Extended Dynamic Mode Decomposition with control (EDMDc). The study highlight... 详细信息
来源: 评论
Cocopal - A Deep Learning Based Intelligent System to Certify and Standardize the Quality of Coconut Based Products  4
Cocopal - A Deep Learning Based Intelligent System to Certif...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Gunawardana, K.H.R. Hemachandra, M.G.S.P. Hettiarachchi, N.M. Deshan, M.P.N. Ganegoda, Devanshi Weerasinghe, Lokesha Dept. of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Dept. of Information Technology Sri Lanka Institute of Information Technology Malabe Sri Lanka
The procedure of certifying and standardizing the quality of the coconut-based products is done manually in Sri Lanka at precent. It is a time consuming and labor- intensive task and is conducted by experts. In most c... 详细信息
来源: 评论
Enhancing Diabetes Prediction using Hybrid Feature Selection and Ensemble Learning with AdaBoost  8
Enhancing Diabetes Prediction using Hybrid Feature Selection...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Thuraka, Bharadwaj Pasupuleti, Vikram Kodete, Chandra Shikhi Chigurupati, Ravi Swaroop Tirumanadham, N. S. Koti Mani Kumar Shariff, Vahiduddin Northwest Missouri State University School of Computer Science and Information Systems MaryvilleMO64468 United States Eastern Illinois University School of Technology CharlestonIL61920 United States Dept. of Cse Bhimavaram India Sir C R Reddy College of Engineering Dept. of Cse Eluru India
This research relies on a feature selection method termed LasNO to analyse the progress of diabetes prediction. The ANOVA integrated with Lasso regularization identifies significant predictors like Age, BMI, DiabetesP... 详细信息
来源: 评论
Multi-Label Classification of CS Papers Using Natural Language Processing Models
Multi-Label Classification of CS Papers Using Natural Langua...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Zheng Zhang Amit Das Mostafa Rahgouy Yida Bao Sanjeev Baskiyar Dept. of Computer Science & Software Engineering Dept. of Mathematics & Statistics Auburn University Auburn AL United States
computer science (CS) is a rapidly evolving field of knowledge with a significant volume and significance of scientific papers. Consequently, meticulous management and categorization of CS papers are crucial to ensure...
来源: 评论
software Defined Network Based Next Generation Mobile Communication Network Architecture
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第23期18卷 138-148页
作者: Kumar, Sumit Ben Sujin, B. Bhavani, K. Srilatha, Doddi Anand, Ketan Dept. of CSE Haridwar University Uttarakhand Roorkee India University of Technology and Applied Sciences Nizwa Oman Department of Computer Science and Business Systems Panimalar Engineering College Tamil Nadu Chennai India Department of CSE Koneru Lakshmaiah Education Foundation Telangana Hyderabad India Sreenidhi Institute of Science and Technology Telangana Hyderabad India
As mobile networks and network speeds become more prevalent, the demand for marketing strategies increases. The operators are thinking about this, and the development of 5G communication networks is one of their main ... 详细信息
来源: 评论
Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools  33
Understanding Statistical Correlation of Application Securit...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Kasturi, Santanam Li, Xiaolong Pickard, John Li, Peng Indiana State University Technology Management Terre Haute United States Indiana State University Dept. of Electronics and Computer Engineering Terre Haute United States East Carolina University Dept. of Technology Sys Greenville United States East Carolina University Dept. of Technology Systems Greenville United States
Vulnerability data gathered from multiple detection and monitoring capabilities at different layers of an application using a time-series analysis will provide value and insights by doing a statistical correlation wit... 详细信息
来源: 评论