咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是881-890 订阅
排序:
Identifying barriers to the systematic literature review process
Identifying barriers to the systematic literature review pro...
收藏 引用
2013 ACM / IEEE International Symposium on Empirical software engineering and Measurement, ESEM 2013
作者: Carver, Jeffrey C. Hassler, Edgar Hernandes, Elis Kraft, Nicholas A. Dept. of Computer Science Univ. of Alabama Tuscaloosa AL United States Dept. of Information Systems Statistics and Management Science Univ. of Alabama Tuscaloosa AL United States LaPES Software Engineering Research Lab Federal Univ. of Sao Carlos Sao Carlos SP Brazil
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficultie... 详细信息
来源: 评论
Secure Aggregation and Attack Detection for Smart Grid System
Secure Aggregation and Attack Detection for Smart Grid Syste...
收藏 引用
International Conference on Network-Based Information Systems (NBIS)
作者: Inshil Doh Jiyoung Lim Kijoon Chae Dept. of Computer Science and Engineering Ewha Womans University Seoul Korea Dept. of Computer Software Korean Bible University Seoul Korea
Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting ... 详细信息
来源: 评论
Accelerating k-12 computational thinking using scaffolding, staging, and abstraction  13
Accelerating k-12 computational thinking using scaffolding, ...
收藏 引用
44th ACM Technical Symposium on computer science Education, SIGCSE 2013
作者: Touretzky, David S. Marghitu, Daniela Ludi, Stephanie Bernstein, Debra Ni, Lijun Computer Science Department Carnegie Mellon University Pittsburgh PA 15213 United States Computer Science and Software Engineering Auburn University Auburn AL 36849 United States Dept. of Software Engineering Rochester Institute of Technology Rochester NY 14623 United States TERC Cambridge MA 02140 United States Georgia Inst. of Technology Atlanta GA 30332-0760 United States
We describe a three-stage model of computing instruction beginning with a simple, highly scaffolded programming en-vironment (Kodu) and progressing to more challenging frame-works (Alice and Lego NXT-G). In moving bet... 详细信息
来源: 评论
LIDAR: A layered intrusion detection and remediationframework for smartphones
LIDAR: A layered intrusion detection and remediationframewor...
收藏 引用
4th ACM Sigsoft International Symposium on Architecting Critical Systems, ISARCS 2013
作者: Roshandel, Roshanak Arabshahi, Payman Poovendran, Radha Seattle University Dept. of Computer Science and Software Engineering P.O. Box 222000 Seattle WA 98122-1090 United States University of Washington Department of Electrical Engineering Box 352500 Seattle WA 98195-2500 United States
Given the advanced set of capabilities offered by smartphone and tablet computing devices, they have become the platform of choice for many users for day-to-day work and leisure. There is however a fundamental differe... 详细信息
来源: 评论
QoS Traffic Mapping for a Multi-Participant Session in Unified Communications Networks
QoS Traffic Mapping for a Multi-Participant Session in Unifi...
收藏 引用
IEEE Canadian Conference on Electrical and computer engineering
作者: Abdelwahab M. Elnaka Qusay H. Mahmoud School of Computer Science University of Guelph Dept. of Electrical Computer and Software Engineering University of Ontario Institute of Technology
Unified communications (UC) offers users an uninterrupted communication service regardless of the device which the user is using, the heterogeneous networks to which he might be connected, the physical and logical con... 详细信息
来源: 评论
LAVI: A Location Aware Virtual Infrastructure for VANETs
LAVI: A Location Aware Virtual Infrastructure for VANETs
收藏 引用
International Conference on Connected Vehicles and Expo (ICCVE)
作者: Rohan B. Golatkar Yu Chen Wei-Shinn Ku Dept. of Electrical and Computing Engineering SUNY-Binghamton Binghamton NY USA Dept. of Computer Science and Software Engineering Auburn University Auburn AL USA
Without requiring pre-fixed infrastructure, Vehicular Ad Hoc networks (VANETs) allow drivers to exchange information and access variant services in real-time manner. While achieving significant flexibility and conveni... 详细信息
来源: 评论
C2MS: Dynamic Monitoring and Management of Cloud Infrastructures
C2MS: Dynamic Monitoring and Management of Cloud Infrastruct...
收藏 引用
IEEE International Conference on Cloud Computing Technology and science (CloudCom)
作者: Gary A. McGilvary Josep Rius Íñigo Goiri Francesc Solsona Adam Barker Malcolm Atkinson Edinburgh Data-Intensive Research Group The University of Edinburgh ICG Software Industrial Polygon Torrefarrera Spain Dept. of Computer Science Rutgers University Dept. of Computer Science and Industrial Engineering Univrsity of Lleida School of Computer Science University of St Andrews
Server clustering is a common design principle employed by many organisations who require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the ... 详细信息
来源: 评论
Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones  14
Towards continuous and passive authentication via touch biom...
收藏 引用
Proceedings of the Tenth USENIX Conference on Usable Privacy and Security
作者: Hui Xu Yangfan Zhou Michael R. Lyu Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and MoE Key Laboratory of High Confidence Software Technologies (CUHK Sub-Lab) Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and Dept. of Computer Science & Engineering The Chinese University of Hong Kong
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy threats: A malicious user can manipulate the phone if bypassing the screen lock. To solve thi... 详细信息
来源: 评论
Human sensing for smart cities
Human sensing for smart cities
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Derek Doran Swapna Gokhale Aldo Dagnino Dept. of Computer Science and Engineering University of Connecticut Storrs CT Industrial Software Systems ABB Corporate Research Raleigh NC
Smart cities are powered by the ability to self-monitor and respond to signals and data feeds from heterogeneous physical sensors. These physical sensors, however, are fraught with interoperability and dependability c... 详细信息
来源: 评论
Tablet PC in restaurant
Tablet PC in restaurant
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: Ali Adil Ali Hussain Falih Mahdi Dept. of Mathematics and Computer Science Graduate School of Natural and Applied Sciences Cankaya University Ankara Turkey Computer and Software Engineering Department College of Engineering University of Diyala Iraq
The growth of wireless technology and tablet PC in this era is creating a great impact on our lives. Some early efforts have been made to combine and utilize both of these technologies in advancement of hospitality in... 详细信息
来源: 评论