咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,125 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,883 篇 工学
    • 1,484 篇 计算机科学与技术...
    • 1,256 篇 软件工程
    • 346 篇 信息与通信工程
    • 285 篇 控制科学与工程
    • 217 篇 生物工程
    • 160 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 146 篇 机械工程
    • 118 篇 光学工程
    • 118 篇 电子科学与技术(可...
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 67 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 895 篇 理学
    • 491 篇 数学
    • 241 篇 生物学
    • 229 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 127 篇 系统科学
    • 66 篇 化学
  • 599 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 174 篇 工商管理
  • 169 篇 医学
    • 137 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 95 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 51 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 73 篇 deep learning
  • 62 篇 artificial intel...
  • 59 篇 software
  • 54 篇 computational mo...
  • 54 篇 accuracy
  • 49 篇 feature extracti...
  • 47 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,814 篇 英文
  • 150 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2989 条 记 录,以下是1011-1020 订阅
排序:
Enhanced Security Protocol for VLSI Systems: Modified AES Algorithm for Robust Data Transmission
Enhanced Security Protocol for VLSI Systems: Modified AES Al...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Jinsha Lawrence Dinesh Kumar Budagam P. Mukilan Kavitha Veerappan E. Chandrasekhar K. Barathi Department of Computer Science and Engineering Faculty of Engineering Karpagam Academy of Higher Education (Deemed to be University) Coimbatore India Department of MS in Software Engineering Security Architect at VISA California United States Department of Electronics and Communication Engineering Dhanalakshmi Srinivasan College of Engineering Coimbatore India Department of Electronics and Communication Engineering Kongu Engineering College Erode India Department of Electronics and Communication Engineering Chaitanya Bharathi Institute of Technology (A) Hyderabad India Department of Electrical and Electronics Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India
The development of compact and efficient devices has been made possible by the growth of Very Large Scale Integration (VLSI) technologies, which has transformed modern electronics. However, there are cautions regardin... 详细信息
来源: 评论
Asynchronous Fractional Multi-Agent Deep Reinforcement Learning for Age-Minimal Mobile Edge Computing
arXiv
收藏 引用
arXiv 2024年
作者: Jin, Lyudong Tang, Ming Pan, Jiayu Zhang, Meng Wang, Hao Zhejiang University University of Illinois at Urbana–Champaign Institute Zhejiang University Haining314400 China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518000 China School of Software Technology Zhejiang University Ningbo315048 China Department of Data Science and AI Faculty of Information Technology Monash University MelbourneVIC3800 Australia
In the realm of emerging real-time networked applications such as industrial cyber-physical systems (CPS), the Age of Information (AoI) has emerged as a pivotal metric for evaluating the timeliness. To meet the high c... 详细信息
来源: 评论
EHG Signal Analysis for Prediction of Term and Preterm using Variational Mode Decomposition and Artificial Neural Networks
EHG Signal Analysis for Prediction of Term and Preterm using...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Umar Khan Sumair Aziz Khushbakht Iqtidar Raul Fernandez Rojas Department of Electronics Engineering University of Engineering and Technology Taxila Taxila Pakistan Department of Computer Software Engineering National University of Sciences and Technology Islamabad Pakistan Faculty of Science & Technology University of Canberra Canberra Australia
Preterm deliveries are an important cause of mortality and morbidity in newborns. Accurate and early prediction of a premature delivery can prove helpful in providing proper medication and treatment. Recording of elec... 详细信息
来源: 评论
The Essence of Perceived Compatibility and Behavioral Intention in Mobile Money Use
The Essence of Perceived Compatibility and Behavioral Intent...
收藏 引用
Advanced Information Scientific Development (ICAISD), International Conference on
作者: Leni Susanti Siti Hajar Mohamad Mila Andria Savitri Karen Etania Saputra Doni Purnama Alamsyah Ahmad Setiadi Entrepreneurship Department BINUS Business School Bina Nusantara University Jakarta Indonesia Department of Business Management and Law Management and Science University Selangor Malaysia Interior Design Department School of Design Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia Software Engineering Department Faculty of Information Technology Universitas Bina Sarana Informatika Jakarta Indonesia
Today, financial technology is a part of consumer needs. Mobile payments are used to support daily transactions, so a study of factors that can support behavioral intention and mobile money use is conducted. This stud... 详细信息
来源: 评论
Latency and Secrecy Performance Analysis in Backscatter-Enabled Vehicular Cloudlet Networks
Latency and Secrecy Performance Analysis in Backscatter-Enab...
收藏 引用
IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)
作者: Van-Long Nguyen Thi My Tien Bui Van-Binh Phan Dac-Binh Ha School of Computer Science Duy Tan University Da Nang Vietnam Quy Nhon AI Center FPT Software Science Avenue Quy Nhon City Binh Dinh Province Vietnam Faculty of Basic Sciences Kien Giang Vocational College Vietnam School of Engineering and Technology Duy Tan University Da Nang Vietnam
In this work, we investigate the joint secrecy and latency performance of a multi-user backscatter communication (BC)-enabled vehicular network in the presence of a passive eavesdropper. Specifically, a number of vehi... 详细信息
来源: 评论
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianfu Shen, Li Fan, Qilin Xu, Tong Liu, Tongliang Xiong, Hui Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science University of Science and Technology of China Hefei230027 China The School of Big Data and Software Engineering Chongqing University ChinaScience Chongqing401331 China JD Explore Academy The UBTECH Sydney Artificial Intelligence Centre The School of Information Technologies Faculty of Engineering and Information Technologies The University of Sydney DarlingtonNSW2008 Australia Thrust of Artificial Intelligence Nansha Guangdong Guangzhou511400 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
As an essential resource management problem in network virtualization, virtual network embedding (VNE) aims to allocate the finite resources of physical network to sequentially arriving virtual network requests (VNRs)... 详细信息
来源: 评论
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification  2nd
Metaheuristic Based IDS Using Multi-objective Wrapper Featur...
收藏 引用
2nd International Conference on Advances in Cyber Security, ACeS 2020
作者: Ghanem, Waheed Ali H. M. El-Ebiary, Yousef A. Baker Abdulnab, Mohamed Tubishat, Mohammad Alduais, Nayef A. M. Nasser, Abdullah B. Abdullah, Nibras Al-wesabi, Ola A. Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia Terengganu Kuala Terengganu Malaysia Faculty of Engineering and Faculty of Education-Aden and Saber Aden University Aden Yemen Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Kuala Terengganu Malaysia School of Computing and Technology Asia Pacific University of Technology and Innovation Kuala Lumpur Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Pekan Malaysia National Advanced IPv6 Center Universiti Sains Malaysia Gelugor Malaysia Faculty of Computer Science and Engineering Hodeidah University Al Hudaydah Yemen
Due to the significant ongoing expansion of computer networks in our lives nowadays, the demand for network security and protection from cyber-attacks has never been more imperative to either clients or businesses ali... 详细信息
来源: 评论
Design and demonstration of an operating system for executing applications on quantum network nodes
arXiv
收藏 引用
arXiv 2024年
作者: Donne, Carlo Delle Iuliano, Mariagrazia van der Vecht, Bart Ferreira, Guilherme M. Jirovská, Hana van der Steenhoven, Thom J.W. Dahlberg, Axel Skrzypczyk, Matt Fioretto, Dario Teller, Markus Filippov, Pavel Montblanch, Alejandro R.-P. Fischer, Julius van Ommen, H. Benjamin Demetriou, Nicolas Leichtle, Dominik Music, Luka Ollivier, Harold te Raa, Ingmar Kozlowski, Wojciech Taminiau, Tim H. Pawelczak, Przemyslaw Northup, Tracy E. Hanson, Ronald Wehner, Stephanie QuTech Kavli Institute of Nanoscience Delft University of Technology Delft2628 CJ Netherlands Quantum Computer Science Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 XE Netherlands Embedded Systems Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 XE Netherlands Institut für Experimentalphysik Universität Innsbruck Technikerstraße 25 Innsbruck6020 Austria QAT DIENS Ecole Normale Supérieure PSL University CNRS INRIA. 45 rue d’Ulm Paris75005 France LIP6 CNRS Sorbonne Université 4 Place Jussieu Paris75005 France
The goal of future quantum networks is to enable new internet applications that are impossible to achieve using solely classical communication[1, 2, 3]. Up to now, demonstrations of quantum network applications[4, 5, ... 详细信息
来源: 评论
software Development in Startup Companies: The Greenfield Startup Model
arXiv
收藏 引用
arXiv 2023年
作者: Giardino, Carmine Paternoster, Nicolò Unterkalmsteiner, Michael Gorschek, Tony Abrahamsson, Pekka The Faculty of Computer Science Free University of Bolzano/Bozen Dominikanerplatz 3 Bozen Bolzano39100 Italy The Software Engineering Research Lab Sweden Blekinge Institute of Technology Campus Gräsvik Karlskrona371 79 Sweden The Department of Computer and Information Science Norwegian University of Science and Technology Ntnu Sem Sælandsvei 7-9 Trondheim7491 Norway
software startups are newly created companies with no operating history and oriented towards producing cutting-edge products. However, despite the increasing importance of startups in the economy, few scientific studi... 详细信息
来源: 评论
Method for filtering encrypted traffic using a neural network between an Industrial Internet of things system and Digital Twin  21
Method for filtering encrypted traffic using a neural networ...
收藏 引用
Proceedings of the 5th International Conference on Future Networks and Distributed Systems
作者: Ivan Luksha Truong Duy Dinh Evgenii Karelin Ruslan Glushakov Ruslan Kirichek Dept. of software engineering and computer science Bonch-Bruevich Saint Petersburg State University of Telecommunications Russian Federation Posts and Telecommunications Institute of Technology Faculty of Information Vietnam Dept. of software engineering and computer science The Bonch-Bruevich Saint Petersburg State University of Telecommunications Russian Federation Saint-Petersburg State Pediatric Medical University Russian Federation The Bonch-Bruevich Saint Petersburg State University of Telecommunications Dept. of software engineering and computer science Russian Federation
Several traffic optimization approaches are available nowadays, including compression, packet deduplication, specialized hardware and software solutions, application optimization, and neural network utilization. Howev...
来源: 评论