咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 895 篇 软件工程
    • 302 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 389 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,054 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2150 条 记 录,以下是491-500 订阅
排序:
A systematic literature review on generating higher-order mutant  8
A systematic literature review on generating higher-order mu...
收藏 引用
8th International Conference on Computing for Sustainable Global Development, INDIACom 2021
作者: Amare, Melashu Mohapatra, Sudhir Kumar Panigrahy, Tarini Prasad Addis Ababa Science Technology University Dept. of Software Engineering Addis Ababa Ethiopia Gandhi Institute for Technological Advancement Dept. of Computer Sc. and Engineering Bhubaneswar India
Mutation testing is a fault-based testing technique that is used to evaluate the quality of a given set of test cases by inserting a single change into the program under test and then checking whether tests are good e... 详细信息
来源: 评论
Navigating Adverse Weather: An Exploration of YOLOv8's Object Detection in Fog  10
Navigating Adverse Weather: An Exploration of YOLOv8's Objec...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Haris, Muhammad Iqbal, Mansoor Malik, Muhammad Osama Bokhari, Syed Ahmad Saleem Alahmari, Saad Azam, Farooq Institute for Insight - J Mack Robinson College of Business Georgia State University Georgia United States University of Wah Department of Computer Science Wah Cantt Pakistan University of Tulsa Department of Business Analytics Oklahoma United States Harvard Extension School Harvard University CambridgeMA02138 United States Northern Border University Department of Computer Science Arar Saudi Arabia Nust Dept. of Computer Software Engineering Islamabad Pakistan
Object detection in adverse weather conditions, such as dense fog, poses a critical challenge for computer vision systems in applications like autonomous driving, surveillance, and robotics. Image quality degradation ... 详细信息
来源: 评论
Design and FPGA Implementation of the Henon Chaotic Map for Image Encryption  14
Design and FPGA Implementation of the Henon Chaotic Map for ...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Taqieddin, Eyad Mustafa, Dheya Shatnawi, Ahmed Al-Khaleel, Osama Papachristou, Christos Jordan University of Science and Tech. Network Eng. and Security Department Irbid22110 Jordan The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Jordan University of Science and Tech. Software Engineering Department Irbid22110 Jordan Jordan University of Science and Tech. Computer Engineering Department Irbid22110 Jordan Case Western Reserve University Ecse Department ClevelandOH44106 United States
Due to the ever increasing usage of multimedia content sharing and the inherent nature of the insecure links used for transmission, it is quite necessary to provide a fast and secure encryption algorithm. Current symm... 详细信息
来源: 评论
An In-dept. Study on Handwritten Signature Authentication Using Unique Writer Traits
An In-Depth Study on Handwritten Signature Authentication Us...
收藏 引用
Advances in Computing, Communication and Networking (ICAC2N), International Conference on
作者: M. Vamsikrishna Haritha Murari M. Manikandan Nilamadhab Mishra Raghavendra Gupta T Rohit Patel Dept. of Computer Applications Aditya University Kakinada India Sr Software Engineer Spark Infotech Inc Phoenix Arizona USA Dept. of Computer Science and Engineering VeL Tech. R Dr.S Tamilnadu India Dept. of Computer Science and Engineering VIT Bhopal University Sehore India HITM Hyderabad Telenagana India Dept of CSE Calorx Teachers’ University Gujrat India
Handwriting verification, a subset of signature verification, involves using handwritten text to verify or authorize someone’s identification. Although simple handwriting can serve as a signature, it is often modifie... 详细信息
来源: 评论
Reinforcement Learning-enabled Auctions for Self-Healing in Service Function Chaining
Reinforcement Learning-enabled Auctions for Self-Healing in ...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Marios Avgeris Aris Leivadeas Ioannis Lambadaris Dept. of Systems and Computer Eng. Carleton University Ottawa Canada Dept. of Software Engineering and IT École de Technologie Supérieure (ÉTS) Montréal Canada
Service Function Chaining (SFC), defines the capability of interconnecting a number of ordered Service Functions (SFs) to create composite network services. A critical issue in SFC is the autonomic fault recovery, i.e...
来源: 评论
Towards a symmetrical definition of QoE: An Evaluation of Emotion Semantics in Augmented Reality Training
Towards a symmetrical definition of QoE: An Evaluation of Em...
收藏 引用
International Workshop on Quality of Multimedia Experience, QoMEx
作者: Eoghan Hynes Ronan Flynn Brian Lee Niall Murray Dept. of computer and software engineering Technological University of the Shannon Midlands and Midwest Westmeath Ireland Software Research Institute Technological University of the Shannon Midlands and Midwest Westmeath Eire
The current definition of quality of experience (QoE) designates delight and annoyance as diametrically opposing indicators of the degree of fulfilment of an application, service or system user's pragmatic and hed...
来源: 评论
A Reinforcement-Learning Self-Healing Approach for Virtual Network Function Placement
A Reinforcement-Learning Self-Healing Approach for Virtual N...
收藏 引用
IEEE Symposium on Network Operations and Management
作者: Marios Avgeris Aris Leivadeas Ioannis Lambadaris Dept. of Systems and Computer Eng. Carleton University Ottawa Canada Dept. of Software Engineering and IT École de Technologie Supérieure (ÉTS) Montréal Canada
Modern networking paradigms like Service Function Chaining (SFC) allow for services to be broken down to a series of ordered and interconnected Virtualized Network Functions (VNFs) that can be hosted in generic server...
来源: 评论
Network Intrusion Detection System Using Deep Learning Method with KDD Cup'99 Dataset  15
Network Intrusion Detection System Using Deep Learning Metho...
收藏 引用
15th IEEE International Symposium on Embedded Multicore/Many-Core Systems-on-Chip, MCSoC 2022
作者: Tanimu, Jesse Jeremiah Hamada, Mohamed Robert, Patience Mahendran, Anand Bayero University Kano Dept. of Computer Science Kano Nigeria University of Aizu Software Engineering Lab. Aizu Japan Federal Polytechnic Bali Department of Computer Science Bali Nigeria Higher School of Economics Theoretical Computer Science Lab. Moscow Russia
This work is a deep sparse autoencoder network intrusion detection system which addresses the issue of interpretability of L2 regularization technique used in other works. The proposed model was trained using a mini-b... 详细信息
来源: 评论
Energy Management for Solar PV Generation with Contactless Power Transfer
Energy Management for Solar PV Generation with Contactless P...
收藏 引用
IEEE Electronic Power Grid (eGrid)
作者: Aratrika Ghosh Abhisek Ukil Aiguo Patrick Hu Dept. of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand
In the future, solar photovoltaics(PV) and battery energy storage will be widely used for distributed stand-alone generation. Therefore, in this paper, the energy management scheme is proposed when PV and battery ener... 详细信息
来源: 评论
Utilization of Online Collaborative Tools in software engineering: An Empirical Study on Review Meetings  6
Utilization of Online Collaborative Tools in Software Engine...
收藏 引用
6th International Conference on computer Science and engineering, UBMK 2021
作者: Akman, Ibrahim Turhan, Cigdem Hacaloglu, Tuna Dept. of Computer Engineering Atilim University Ankara Turkey Dept of Software Engineering Atilim University Ankara Turkey Dept of Information Systems Engineering Atilim University Ankara Turkey
software development involves a significant amount of team effort where collaboration and communication of the team members are crucial. The team meetings are core activities in all stages of the software development ... 详细信息
来源: 评论