咨询与建议

限定检索结果

文献类型

  • 25,379 篇 会议
  • 12,480 篇 期刊文献
  • 301 册 图书
  • 1 篇 学位论文

馆藏范围

  • 38,161 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 31,601 篇 工学
    • 22,160 篇 计算机科学与技术...
    • 14,405 篇 软件工程
    • 8,028 篇 电气工程
    • 3,117 篇 信息与通信工程
    • 2,324 篇 控制科学与工程
    • 2,031 篇 机械工程
    • 1,576 篇 生物医学工程(可授...
    • 1,092 篇 材料科学与工程(可...
    • 1,045 篇 电子科学与技术(可...
    • 1,021 篇 土木工程
    • 864 篇 生物工程
    • 782 篇 建筑学
    • 666 篇 化学工程与技术
    • 610 篇 力学(可授工学、理...
    • 543 篇 仪器科学与技术
    • 542 篇 动力工程及工程热...
    • 428 篇 交通运输工程
  • 6,030 篇 理学
    • 3,002 篇 数学
    • 1,407 篇 物理学
    • 1,122 篇 生物学
    • 608 篇 统计学(可授理学、...
    • 562 篇 化学
    • 512 篇 系统科学
  • 4,298 篇 管理学
    • 3,378 篇 管理科学与工程(可...
    • 1,057 篇 工商管理
    • 1,029 篇 图书情报与档案管...
  • 2,001 篇 教育学
    • 1,872 篇 教育学
  • 1,452 篇 医学
    • 826 篇 基础医学(可授医学...
    • 809 篇 临床医学
  • 470 篇 法学
  • 414 篇 经济学
    • 401 篇 应用经济学
  • 407 篇 农学
  • 61 篇 文学
  • 37 篇 艺术学
  • 35 篇 军事学
  • 14 篇 历史学
  • 13 篇 哲学

主题

  • 2,449 篇 software enginee...
  • 1,477 篇 software
  • 1,465 篇 computer softwar...
  • 955 篇 computer science
  • 772 篇 computer archite...
  • 765 篇 application soft...
  • 700 篇 computer aided s...
  • 483 篇 hardware
  • 400 篇 computational mo...
  • 384 篇 machine learning
  • 383 篇 computer simulat...
  • 372 篇 simulation
  • 333 篇 software systems
  • 306 篇 testing
  • 290 篇 artificial intel...
  • 272 篇 deep learning
  • 272 篇 software testing
  • 265 篇 security
  • 252 篇 internet of thin...
  • 244 篇 software design

机构

  • 35 篇 univ maryland de...
  • 35 篇 concordia univ d...
  • 34 篇 nanjing univ sta...
  • 33 篇 hong kong polyte...
  • 32 篇 mcmaster univ de...
  • 31 篇 tsinghua univ de...
  • 30 篇 concordia univ d...
  • 30 篇 george mason uni...
  • 27 篇 n carolina state...
  • 25 篇 colorado state u...
  • 25 篇 univ victoria de...
  • 24 篇 tsinghua univ sc...
  • 24 篇 shanghai jiao to...
  • 23 篇 univ london impe...
  • 23 篇 department of co...
  • 22 篇 queens univ dept...
  • 21 篇 univ oslo dept i...
  • 21 篇 chulalongkorn un...
  • 21 篇 department of co...
  • 21 篇 iowa state univ ...

作者

  • 43 篇 khomh foutse
  • 30 篇 foutse khomh
  • 28 篇 xie tao
  • 27 篇 bilodeau guillau...
  • 25 篇 carver jeffrey c...
  • 23 篇 poshyvanyk denys
  • 21 篇 zhang lei
  • 21 篇 m. sawan
  • 20 篇 gomaa hassan
  • 19 篇 cheriet farida
  • 19 篇 dwyer matthew b.
  • 17 篇 woodside murray
  • 17 篇 bosch jan
  • 16 篇 liu yang
  • 15 篇 cavalcanti ana
  • 15 篇 rosenblum david ...
  • 15 篇 hironori washiza...
  • 15 篇 li li
  • 14 篇 maurer frank
  • 14 篇 nagappan meiyapp...

语言

  • 36,364 篇 英文
  • 1,545 篇 其他
  • 116 篇 中文
  • 48 篇 日文
  • 23 篇 朝鲜文
  • 16 篇 西班牙文
  • 12 篇 土耳其文
  • 11 篇 德文
  • 4 篇 葡萄牙文
  • 3 篇 法文
  • 3 篇 荷兰文
  • 1 篇 克罗地亚文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
38161 条 记 录,以下是311-320 订阅
A Review of Design and Implementation of computer Based Census Management System  2
A Review of Design and Implementation of Computer Based Cens...
收藏 引用
2nd International Conference on Multidisciplinary engineering and Applied Science, ICMEAS 2023
作者: Bashir, Umar Mohammed Nyangwarimam, Ali Obadiah Thomas, Sadiq Odimba, Chinomso Roselyn Lawal, Shariff Aboaba, Adulfatah A. Elijah, Olakunle Nile University of Nigeria Dept. of Computer Engineering Abuja Nigeria Nile University of Nigeria Dept. of Industrial Chemistry Abuja Nigeria Airforce Institute of Technology Dept. of Mechanical Engineering Kaduna Nigeria University of Maiduguri Dept. of Computer Engineering Borno Nigeria
This Paper Presents a computer-based census management system which is a software application designed to collect, store, manage, and analyze census data electronically. It replaces traditional paper-based methods of ... 详细信息
来源: 评论
Dynamic Threat Intelligence Coalitions for Improved Cyber Defense Capabilities
Dynamic Threat Intelligence Coalitions for Improved Cyber De...
收藏 引用
IEEE International Conference on Cloud Networking (CLOUDNET)
作者: Omar Abdel Wahab Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada
In the dynamic landscape of cybersecu-rity and cyber warfares, Cyber Threat Intelligence (CTI) is increasingly relied on for gathering and sharing the latest information about threats and their trends. Current CTI sha... 详细信息
来源: 评论
4×4 Array Multiplier Using Transmission Gate Full Adder  9
4×4 Array Multiplier Using Transmission Gate Full Adder
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Rathore, Nitesh Kumar Beohar, Ankur Sarkar, Pallabi Khare, Kavita Singh, Pooran Mahindra University Dept. of Electrical And Computer Engineering Hyderabad India Madhya Pradesh India Manit Bhopal Dept. of Electronic And Communication Engineering Madhya Pradesh India
Multiplication is the most essential function carried out by the arithmetic and logic unit. The multiplier specifically has important applications in signal processing analysis, image processing analysis, and so on. T... 详细信息
来源: 评论
Deep Neural Networks in Social Media Forensics: Unveiling Suspicious Patterns and Advancing Investigations on Twitter  3
Deep Neural Networks in Social Media Forensics: Unveiling Su...
收藏 引用
3rd Intelligent Cybersecurity Conference, ICSC 2023
作者: Sharrab, Yousef Al-Fraihat, Dimah Alsmirat, Mohammad Isra University Dept. of Data Science and Artificial Intelligence Amman Jordan Isra University Dept.of Software Engineering Amman Jordan University of Sharjah Dept. of Computer Science Sharjah United Arab Emirates
Text data forensics, a rapidly developing field that focuses on analyzing textual content to identify criminal or suspicious activities, is becoming increasingly important due to the popularity and the huge number of ... 详细信息
来源: 评论
Federated Learning with Clustering-Based Participant Selection for IoT Applications
Federated Learning with Clustering-Based Participant Selecti...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Wang, Kevin I-Kai Ye, Xiaozhou Sakurai, Kouichi The University of Auckland Dept. of Electrical Computer and Software Engineering Auckland New Zealand Kyushu University Dept. of Informatics Fukuoka Japan
Modern Internet of Things (IoT) systems are highly complex due to its mobile, ad-hoc and geographically distributed nature. Very often, an edge-cloud infrastructure is established to offer intelligent services in mode... 详细信息
来源: 评论
A Sensitivity Analysis of the DCP/Vardis Protocol for Coordinating Drone Swarms
A Sensitivity Analysis of the DCP/Vardis Protocol for Coordi...
收藏 引用
IEEE Vehicular Networking Conference (VNC)
作者: Andreas Willig Dept. of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
The DCP/Vardis protocol stack is designed to support coordination and sensor data exchange tasks in ad-hoc type large-scale and multi-hop networks of drones (or drone swarms), by piggybacking coordination and sensor d... 详细信息
来源: 评论
Heuristic approaches for hiding sensitive frequent itemsets in uncertain databases  5
Heuristic approaches for hiding sensitive frequent itemsets ...
收藏 引用
5th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2023
作者: Lefkir, Mira Nouioua, Farid Fournier-Viger, Phillipe University Mohamed El Bachir El Ibrahimi of Bordj Bou Arreridj BBA Dept. of Computer Science Algeria Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin... 详细信息
来源: 评论
Enhancing SMS Spam Detection Using Deep Learning Models: A Comparative Study  1
Enhancing SMS Spam Detection Using Deep Learning Models: A C...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Singh Sikarwar, Shailendra Arivukkodi, R. Krishnane, Dhanya Sharma, Himanshu Namdeo, Avinash Jadon, Kaushiki Jiwaji University Dept. of Computer Science Gwalior India Meenakshi A.H. Educ. & Research Dept. of Computer Applications Chennai India Dhanalakshmi Srinivasan Dept. of CSE Coimbatore India Mangalayatan University Dept. of Computer Eng. & Applications Aligarh India Lingayas Vidyapeeth University Dept. of Mechanical Engineering Faridabad India J.S. University Dept. of Computer Science Shikohabad India
The rise in Machine Learning algorithms for identifying SMS spam has become popular due to a significant surge in unwanted text messages. Detecting SMS spam holds crucial importance for several reasons. Firstly, it ca... 详细信息
来源: 评论
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware  40
Exploring Large Language Models for Semantic Analysis and Ca...
收藏 引用
40th Annual computer Security Applications Conference Workshops, ACSACW 2024
作者: Walton, Brandon J Khatun, Mst Eshita Ghawaly, James M Ali-Gombe, Aisha Louisiana State University Dept. of Computer Science and Engineering Baton Rouge United States
Malware analysis is a complex process of examining and evaluating malicious software's functionality, origin, and potential impact. This arduous process typically involves dissecting the software to understand its... 详细信息
来源: 评论
Towards a Catalog of Prompt Patterns to Enhance the Discipline of Prompt engineering
Ada User Journal
收藏 引用
Ada User Journal 2023年 第3期44卷 220-227页
作者: Schmidt, Douglas C. Spencer-Smith, Jesse Fu, Quchen White, Jules Dept. of Computer Science Vanderbilt University United States
The rapid advent of Large Language Models (LLMs), such as ChatGPT and Claude, is revolutionizing various fields, from education and healthcare to the engineering of reliable software systems. These LLMs operate throug... 详细信息
来源: 评论