咨询与建议

限定检索结果

文献类型

  • 867 篇 会议
  • 199 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 546 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 163 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 78 篇 生物工程
    • 77 篇 电气工程
    • 58 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 光学工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 化学工程与技术
  • 310 篇 理学
    • 179 篇 数学
    • 86 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 50 篇 系统科学
    • 29 篇 化学
  • 194 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 56 篇 医学
    • 52 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 31 篇 教育学
    • 30 篇 教育学
  • 20 篇 经济学
  • 20 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 30 篇 artificial intel...
  • 29 篇 accuracy
  • 27 篇 software
  • 25 篇 software enginee...
  • 23 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 real-time system...
  • 21 篇 information syst...
  • 21 篇 information stor...
  • 19 篇 computer communi...
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 computer science
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 internet of thin...
  • 15 篇 servers
  • 15 篇 predictive model...
  • 15 篇 cloud computing
  • 14 篇 database managem...

机构

  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of technol...
  • 8 篇 university of re...
  • 7 篇 dept. of softwar...
  • 7 篇 dept. of compute...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 dept. of informa...
  • 5 篇 computer systems...
  • 5 篇 bcmaterials basq...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of informa...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...

作者

  • 11 篇 fotiadis dimitri...
  • 9 篇 nikumani choudhu...
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 shafiur rahman
  • 7 篇 dimitrios i. fot...
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 bhattacharya pra...
  • 6 篇 cigno renato lo
  • 6 篇 buyya rajkumar
  • 6 篇 ijaz ali zeeshan

语言

  • 1,072 篇 英文
  • 30 篇 其他
  • 6 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Science and Information and Software Systems Engineering"
1115 条 记 录,以下是471-480 订阅
排序:
Online Cloud-Based Battery Lifetime Estimation Framework for Smartphone Devices
收藏 引用
Procedia computer science 2017年 110卷 70-77页
作者: Raja Wasim Ahmad Raja Sehrab Bashir Sharjil Saeed Yangsun Lee Kwangman Ko Yunsik Son COMSATS Institute of Information Technology Pakistan Department of Software Engineering University Malaya Malaysia Department of Computer Science and IT University of AJK Dept. of Computer Engineering Sekyungongguk University South Korea Dept. of Computer Engineering Sanji University South Korea Dept. of Computer Engineering Dongguk University South Korea
Smartphones are resource constrained external battery operated devices. The resources of smartphone devices such as a battery, CPU, and RAM are very low compared to the desktop server. However, the requirements of sma... 详细信息
来源: 评论
Enhancing Supervised Classifications with Metamorphic Relations
Enhancing Supervised Classifications with Metamorphic Relati...
收藏 引用
IEEE/ACM International Workshop on Metamorphic Testing (MET)
作者: Liming Xu Dave Towey Andrew P. French Steve Benford Zhi Quan Zhou Tsong Yueh Chen International Doctoral Innovation Centre University of Nottingham Ningbo China Ningbo Zhejiang China AIOP Group University of Nottingham Ningbo China Ningbo Zhejiang China School of Computer Science University of Nottingham Nottingham UK School of Computing and Information Technology University of Wollongong Wollongong NSW Australia Dept. of Computer Science and Software Engineering Swinburne University of Technology Hawthorn VIC Australia
We report on a novel use of metamorphic relations (MRs) in machine learning: instead of conducting metamorphic testing, we use MRs for the augmentation of the machine learning algorithms themselves. In particular, we ... 详细信息
来源: 评论
Viroinformatics-based investigation of SARS-CoV-2 core proteins for potential therapeutic targets
arXiv
收藏 引用
arXiv 2020年
作者: Agrawal, Lokesh Poullikkas, Thanasis Eisenhower, Scott Monsanto, Carlo Bakku, Ranjith Kumar Universidad Integral del Caribe y América Latina Kaminda Cas Grandi #79 Curaçao United States Graduate School of Comprehensive Human Sciences University of Tsukuba 1-1-1 Tennodai Tsukuba305-8577 Japan Molecular Neuroscience Unit Okinawa Institute of Science and Technology Graduate University Kunigami-gun Okinawa904-0412 Japan Human Biology School of Integrative and Global Majors University of Tsukuba 1-1-1 Tennodai Tsukuba305-0006 Japan Department of Experimental Pathology Faculty of Medicine University of Tsukuba 2-1-1 Tennodai Tsukuba305-8576 Japan Department of Infection Biology Faculty of Medicine University of Tsukuba 1-1-1 Tennodai Tsukuba305-8575 Japan Research Workgroup Ronin Institute 127 Haddon Place MontclairNJ07043-2314 United States Faculty of Engineering Information and Systems Dept. of Computer Science University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki305-8572 Japan University of Tsukuba 1-1-1 Tennodai Tsukuba Ibaraki305-8572 Japan
Due to SARS-CoV-2 (Severe Acute Respiratory Syndrome Coronavirus 2) being a novel virus, there are currently no known effective antiviral drugs capable of slowing its progress. To accelerate the discovery of potential... 详细信息
来源: 评论
Web-Based Application to Collect and Analyze Users Data for Keystroke Biometric Authentication
Web-Based Application to Collect and Analyze Users Data for ...
收藏 引用
IEEE Ukraine Conference on Electrical and computer engineering
作者: Alieksieiev Vasyl Elena Sharapova Olena Ivanova Gorelov Denis Synytsia Yuliia Computer Radio Engineering and Systems of Technical Security of Information dept.(CRESTSI) Kharkiv National University of Radioelectronics (KNURE) Software Engineering Dept. Marvell Semiconductor Inc.
Keystroke dynamics is rapidly developing and promising field of the research. User authentication systems based on this approach is not require the installation of additional equipment. It makes them flexible and sign... 详细信息
来源: 评论
Wireless low power toxic gas detector based on ADuCM360
Wireless low power toxic gas detector based on ADuCM360
收藏 引用
International SoC Design Conference, ISOCC
作者: Minming Gu ZhenPing Xia Yan Lei Lin Zhang Jieming Ma Dept. of Electronic & Information Engineering Suzhou University of Science and Technology Suzhou China Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University (XJTLU) Suzhou China
In order to avoid toxic gas poisoning incident, explosion and improve people's quality of life, this project designed the wireless low power toxic gas detector based on ADuCM360 with sensor technology and wireless... 详细信息
来源: 评论
Baggage detection and classification using human body parameter & boosting technique
Baggage detection and classification using human body parame...
收藏 引用
Conference on Human System Interactions, HSI
作者: Tahmina Khanam Kaushik Deb Kang-Hyun Jo Dept. of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong Bangladesh Dept. of EE and Information Systems University of Ulsan Ulsan Korea
Automatic Video Surveillance System (AVSS) has become important to computer vision researchers as crime in public places has increased in the twenty first century. As a new branch of AVSS, baggage detection and classi... 详细信息
来源: 评论
Model transformations via XSLT  17
Model transformations via XSLT
收藏 引用
17th Annual International Workshop on Databases, Texts, Specifications, and Objects, DATESO 2017
作者: Pavlát, Jakub Richta, Karel Richta, Tomáš Janoušek, Vladimír Czech Technical University in Prague Faculty of Electrical Engineering Dept. of Computer Science Karlovo nám. 13 Praha 2121 35 Czech Republic Brno Institute of Technology Faculty of Information Technology Dept. of Intelligent Systems Božetěchova 2 Brno612 66 Czech Republic
Many present systems are conceived as a set of autonomous agents that communicate together in solving problems. Petri nets are commonly used for a specification of parallel systems. An interesting question is whether ... 详细信息
来源: 评论
Oops!...I think I scanned a malware
arXiv
收藏 引用
arXiv 2017年
作者: Nassi, Ben Shamir, Adi Elovici, Yuval Dept. of Software and Information Systems Eng. Ben-Gurion University of the Negev Be’er-Sheva Israel Computer Science department Weizmann Institute of Science Rehovot Israel
This article presents a proof-of-concept illustrating the feasibility of creating a covert channel between a C&C server and a malware installed in an organization by exploiting an organization’s scanner and using... 详细信息
来源: 评论
Ergodic Capacity Analysis of Wireless Transmission over Generalized Multipath/Shadowing Channels
Ergodic Capacity Analysis of Wireless Transmission over Gene...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Paschalis C. Sofotasios Seong Ki Yoo Sami Muhaidat Simon L. Cotton Michail Matthaiou Mikko Valkama George K. Karagiannidis Dept. of Electr. & Comput. Eng. Khalifa Univ. of Sci. & Technol. Abu Dhabi United Arab Emirates Institute of Electronics Communications and Information Technology Queen's University of Belfast Belfast UK Department of Electrical and Computer Engineering Khalifa University of Science and Technology Abu Dhabi United Arab Emirates Institute for Communication Systems University of Surrey Guildford UK Department of Electronics and Communications Engineering University of Technology Tampere Finland Department of Electrical and Computer Engineering Aristotle University of Thessaloniki Thessaloniki Greece
Novel composite fading models were recently proposed based on inverse gamma distributed shadowing conditions. These models were extensively shown to provide remarkable modeling of the simultaneous occurrence of multip... 详细信息
来源: 评论
Enhancing security for two-party comparison over encrypted data  3
Enhancing security for two-party comparison over encrypted d...
收藏 引用
2016 3rd International Conference on systems and Informatics, ICSAI 2016
作者: Yang, Ching-Nung Yeh, Zong-Xuan Hsu, Shen-Chieh Fu, Zhangjie Dept. of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
The so-called Yao's millionaire problem (YMP) is about securely comparing two numbers held by two parties, respectively. After comparison, the actual values of these two numbers are still unknown to both parties. ... 详细信息
来源: 评论