咨询与建议

限定检索结果

文献类型

  • 5,480 篇 会议
  • 1,041 篇 期刊文献
  • 98 册 图书

馆藏范围

  • 6,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,102 篇 工学
    • 2,748 篇 计算机科学与技术...
    • 2,310 篇 软件工程
    • 964 篇 信息与通信工程
    • 777 篇 控制科学与工程
    • 590 篇 电气工程
    • 554 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 机械工程
    • 274 篇 生物医学工程(可授...
    • 250 篇 光学工程
    • 241 篇 动力工程及工程热...
    • 189 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 146 篇 安全科学与工程
    • 140 篇 交通运输工程
    • 123 篇 建筑学
    • 120 篇 材料科学与工程(可...
  • 2,013 篇 理学
    • 1,155 篇 数学
    • 480 篇 物理学
    • 385 篇 生物学
    • 347 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 996 篇 管理学
    • 643 篇 管理科学与工程(可...
    • 415 篇 图书情报与档案管...
    • 391 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 189 篇 法学
    • 152 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 114 篇 教育学
  • 64 篇 农学
  • 20 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 143 篇 accuracy
  • 125 篇 computational mo...
  • 118 篇 machine learning
  • 111 篇 feature extracti...
  • 107 篇 software
  • 106 篇 training
  • 96 篇 software enginee...
  • 95 篇 optimization
  • 88 篇 predictive model...
  • 88 篇 artificial intel...
  • 84 篇 deep learning
  • 76 篇 real-time system...
  • 74 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 internet of thin...
  • 62 篇 data mining
  • 61 篇 monitoring
  • 61 篇 mathematical mod...
  • 58 篇 neural networks

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 24 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 21 篇 moss david j.
  • 20 篇 tan mengxi
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 5,846 篇 英文
  • 696 篇 其他
  • 59 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Software Engineering and Computer Systems"
6619 条 记 录,以下是951-960 订阅
排序:
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Saqib, Muhammad Mehta, Dipkumar Yashu, Fnu Malhotra, Shubham Dept. of Computer Science Texas Tech University LubbockTX United States C.K.Pithawalla College of Engineering and Technology Gujrat India Dept. of Computer Science Stony Brook University Stony BrookNY United States Dept. of Software Engineering Rochester Institute of Technology RochesterNY United States
The security of cloud environments, such as Amazon Web Services (AWS), is complex and dynamic. Static security policies have become inadequate as threats evolve and cloud resources exhibit elasticity [1]. This paper a... 详细信息
来源: 评论
An Exploratory Study of ML Sketches and Visual Code Assistants
arXiv
收藏 引用
arXiv 2024年
作者: Gomes, Luís F. Hellendoorn, Vincent J. Aldrich, Jonathan Abreu, Rui Software and Societal Systems Dept. Carnegie Mellon University Pittsburgh United States INESC-ID Faculty of Engineering University of Porto Porto Portugal
This paper explores the integration of Visual Code Assistants in Integrated Development Environments (IDEs). In software engineering, whiteboard sketching is often the initial step before coding, serving as a crucial ... 详细信息
来源: 评论
A Study of the Ecological Dynamics of Batumi, on the Black Sea Coast, Analyzing Environmental Factors and Their Impact
A Study of the Ecological Dynamics of Batumi, on the Black S...
收藏 引用
International Black Sea Conference on Communications and Networking (BlackSeaCom)
作者: Lily Petriashvili Irine Khomeriki Mzia Kiknadze Tamar Lominadze Nona Otkhozoria Dept. of Program Engineering Georgian Technical University Tbilisi Georgia Dept. of Interdisciplinary Informatics Georgian Technical University Tbilisi Georgia Dept. of Computer Engineering Georgian Technical University Tbilisi Georgia Dept. of Information Systems Georgian Technical University Tbilisi Georgia Dept. of Microprocessor and Measurement Systems Georgian Technical University Tbilisi Georgia
This paper studies the complex ecological dynamics of Batumi on the Black Sea coast, through adetailed analysis of environmental factors and their impact. We use Business Intelligence (BI) methods to explore the compl... 详细信息
来源: 评论
SWIN and Vision Transformer-Driven Crack Detection in the Al Qattara Oasis, UAE: Towards Sustainable Infrastructure Management
SWIN and Vision Transformer-Driven Crack Detection in the Al...
收藏 引用
IEEE/ACM International Symposium on Big Data Computing (BDC)
作者: Luqman Ali Medha Mohan Ambali Parambil Muhammed Swavaf Fady Alnajjar Hamad Aljassmi Adriaan De Man Dept. Computer Science and Software Engineering Emirates Centre for Mobility Research United Arab Emirates University Al Ain UAE Dept. Computer Science and Software Engineering United Arab Emirates University Al Ain UAE Dept. Civil and Enviromental Engieering Engieering Emirates Centre for Mobility Research Al Ain UAE Dept. Tourism and Heritage United Arab Emirates University Al Ain UAE
Heritage sites are central to the cultural identity and historical narrative of a community. The Al Qattara Oasis, located in the United Arab Emirates (UAE), illustrates this function well. This study addresses the pr... 详细信息
来源: 评论
Intrusion Detection System (IDS) of Multiclassification IoT by using Pipelining and an Efficient Machine Learning
Intrusion Detection System (IDS) of Multiclassification IoT ...
收藏 引用
International Conference on engineering and Emerging Technologies (ICEET)
作者: Layth Rafea Hazim Abdulrahman Ahmed Jasim Oguz Ata Muhammad Ilyas College of Computer Science and Mathematics Tikrit University Tikrit Iraq Dept. of Electrical and Computer Engineering Altinbas University Istanbul Turkey College of Engineering Al-Iraqia University Baghdad Iraq Dept. of Software Engineering Altinbas University Istanbul Turkey Dept. of Computer Engineering Altinbas University Istanbul Turkey
The Internet of Things (IoT) has quickly advanced and been incorporated into many different fields. With the use of IoT technology, gadgets can receive, process, and send data automatically. IoT has been rapidly accep... 详细信息
来源: 评论
LoRaWAN Scheduling Mechanism for 6G-Based LEO Satellite Communications
LoRaWAN Scheduling Mechanism for 6G-Based LEO Satellite Comm...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Abhijeet Manoj Varma Nikumani Choudhury Jay Dave Anakhi Hazarika Moustafa M. Nasralla Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India Dept. of Electrical & Electronics Engineering Birla Institute of Technology & Science Pilani Hyderabad India Dept. of Communications & Networks Engineering Smart Systems Engineering Lab Prince Sultan University Riyadh Saudi Arabia
As the Internet of Things (IoT) is poised to become a global phenomenon, it is imperative to schedule the transmissions of IoT devices effectively and in a fair way. Leveraging Long Range (LoRa) technology, we can ach... 详细信息
来源: 评论
Automatic Network Intrusion Detection System Using Machine Learning and Deep Learning
Automatic Network Intrusion Detection System Using Machine L...
收藏 引用
Artificial Intelligence and Mechatronics systems (AIMS), International Conference on
作者: Mohammed Mynuddin Sultan Uddin Khan Zayed Uddin Chowdhury Foredul Islam Md Jahidul Islam Mohammad Iqbal Hossain Dewan Mohammed Abdul Ahad Dept. of Electrical Engineering North Carolina A & T State University Data Scientist Data Bid Machine Inc. Associate Power Systems Engineer-II Open Systems International Inc. Dept. of Electrical Engineering Tuskegee University Dept. of Electrical and Computer Engineering University of North Carolina at Charlotte
In recent years, the popularity of network intrusion detection systems (NIDS) has surged, driven by the widespread adoption of cloud technologies. Given the escalating network traffic and the continuous evolution of c...
来源: 评论
A Study on Traceable Group Signature Scheme for Blockchain
A Study on Traceable Group Signature Scheme for Blockchain
收藏 引用
Information and Network Technologies (ICINT), International Conference on
作者: Hyo-Jin Song Im-Yeong Lee Dept. of Software Convergence Soonchunhyang Univ. Asan-si 31538 Republic of Korea Dept. of Computer Software Engineering Soonchunhyang Univ. Asan-si 31538 Republic of Korea
A blockchain is a decentralized database system in which a ledger containing transactions is stored and maintained identically by all through consensus among network participants without a central server. Instead of h...
来源: 评论
Trusted Access to 6G Testbeds Through a Security Intent-Driven software-Defined Perimeter Framework  29
Trusted Access to 6G Testbeds Through a Security Intent-Driv...
收藏 引用
29th IEEE International Workshop on computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
作者: Fernandez-Martinez, Carolina Bikos, Anastasios Verikoukis, Christos Siddiqui, Shuaib i2CAT Foundation Barcelona08034 Spain Universitat Pompeu Fabra Dept. of Information and Communication Technologies Barcelona08018 Spain Iquadrat Informatica Sl Barcelona08006 Spain Universitat Politècnica de Catalunya Dept. of Signal Theory and Communications Barcelona08034 Spain Industrial Systems Institute Athena Research Center Patras26504 Greece University of Patras Dept. of Computer Engineering and Informatics Patras26504 Greece
Parallel to the evolution of recent trends in the cybersecurity industry and the increase of cyberattacks in the last few years, there is renovated interest on the application of software-defined techniques to enforce... 详细信息
来源: 评论
Data Security Enhancement in Cloud Computing by Proposing A DKE Encryption Protocol  23
Data Security Enhancement in Cloud Computing by Proposing A ...
收藏 引用
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications
作者: Sahar Ebadinezhad Halmat Ayub Abdulmajed Department of Computer Information Systems Near East University North Cyprus and Computer Information Systems Research and Technology Center (CISRT) Near East University North Cyprus Dept. Engineering and Computer Systems Lebanese French University (LFU) Iraq
This study uses cryptography to tackle the important problem of data security in cloud computing. Two keys are used in the Dual Key Encryption (DKE) method for both encryption and decryption. DKE employs a public key ... 详细信息
来源: 评论