咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,235 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,617 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 93 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 67 篇 software
  • 66 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,880 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3255 条 记 录,以下是2991-3000 订阅
排序:
Privacy-preserving in web services using hippocratic database
Privacy-preserving in web services using hippocratic databas...
收藏 引用
International Symposium on Information Technology, ITSim
作者: Norjihan Abdul Ghani Zailani Mohamed Sidek Department of Information Science Centre for Advanced Software Engineering (CASE) Faculty of Computer Science & Information Technology City Campus University of Malaya Malaysia
Nowadays, the growth of internet has been accompanied by the growth of web services (e.g e-government, e-health, e-commerce). Web services collect data, especially individuals, from users and use them for various purp... 详细信息
来源: 评论
CoCoME in SOFA
CoCoME in SOFA
收藏 引用
作者: Bureš, Tomáš Decký, Martin Hnetynka, Petr Kofron, Jan Parízek, Pavel Plášil, František Poch, Tomáš Šerý, Ondrej Tuma, Petr Department of Software Engineering Faculty of Mathematics and Physics Charles University Malostranské námestí 25 Prague 1 11800 Czech Republic Institute of Computer Science Academy of Sciences of the Czech Republic Pod Vodárenskou vezí Prague 8 18000 Czech Republic
This chapter presents our solution to the CoCoME assignment that is based on the SOFA 2.0 (software Appliances) hierarchical component model. The solution involves (i) modeling architecture in SOFA meta-model, (ii) sp... 详细信息
来源: 评论
How caching queries at client-peers affects the loads of super-peer P2P systems
How caching queries at client-peers affects the loads of sup...
收藏 引用
International Symposium on Information Technology, ITSim
作者: Rozlina Mohamed Christopher D. Buckingham School of Engineering & Applied Science Aston University Birmingham UK Faculty of Computer System & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia
Super-peer P2P systems strike a balance between searching efficiency in centralized P2P systems and the autonomy, load balancing and robustness provided by pure P2P systems. A super-peer is a node in a super-peer P2P ... 详细信息
来源: 评论
Mining Top-K Closed Itemsets Using Best-First Search
Mining Top-K Closed Itemsets Using Best-First Search
收藏 引用
International Conference on computer and Information Technology (CIT)
作者: Panida Songram Veera Boonjing Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Bangkok Thailand Department of Computer Science Faculty of Informatics Mahasarakham University Maha sarakham Thailand
In this paper, we proposed an efficient algorithm, TOPK_CLOSED, for mining top-k closed itemsets. This algorithm mines top-k closed itemsets using best-first search. The closed itemsets with the highest supports are f... 详细信息
来源: 评论
Robust Scheduling and Runtime Adaptation of Multi-agent Plan Execution
Robust Scheduling and Runtime Adaptation of Multi-agent Plan...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Mingzhong Wang Kotagiri Ramamohanarao Jinjun Chen Department of Computer Science and Software Engineering University of Melbourne VIC Australia Faculty of ICT Swinburne University of Technology VIC Australia
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondete... 详细信息
来源: 评论
Graphical Password: Prototype Usability Survey
Graphical Password: Prototype Usability Survey
收藏 引用
International Conference on Advanced computer Theory and engineering, ICACTE
作者: Ali Mohamed Eljetlawi Norafida Ithnin Faculty of Computer Science and Information Systems Centre for Advanced Software Engineering (CASE) Universiti Teknologi Malaysia Kuala Lumpur Malaysia Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Skudai Johor Malaysia
Access to computer networks and systems is most often based on the use of conventional passwords nowadays. However, users have difficulty remembering a password that is long and random-appearing. So, they create short... 详细信息
来源: 评论
A review on the component evaluation approaches to support software reuse
A review on the component evaluation approaches to support s...
收藏 引用
International Symposium on Information Technology, ITSim
作者: Suryani Ismail Wan M.N. Wan-Kadir Yazid M. Saman Siti Z. Mohd-Hashim Computer Science Department Universiti Malaysia TerEngganu Kuala Terengganu Malaysia Software Engineering Department Faculty of Computer Science ' Information Systems Universiti Teknologi Malaysia Skudai Johor Malaysia
Component-based software engineering (CBSE) is becoming popular due to the benefits of software reuse and the availability of many alternatives of reusable components. By reusing existing software components that have... 详细信息
来源: 评论
Evaluating the impact of requirements analysis tools using simulation
Evaluating the impact of requirements analysis tools using s...
收藏 引用
作者: Raffo, David Ferguson, Robert Setamanit, Siri-On Sethanandha, Bhuricha School of Business Administration Portland State University Portland OR 97201 United States Maseeh College of Engineering and Computer Science Portland State University Portland OR 97201 United States Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States Faculty of Commerce and Accountancy Chulalongkorn University Bangkok 10330 Thailand
Adopting new tools and technologies on a development process can be a risky endeavor. Will the project accept the new technology? What will be the impact? Far too often the project is forced to adopt the new technolog... 详细信息
来源: 评论
An Approach Using Hybrid Methods to Select Informative Genes from Microarray Data for Cancer Classification
An Approach Using Hybrid Methods to Select Informative Genes...
收藏 引用
Asia International Conference on Modeling & Simulation
作者: Mohd Saberi Mohamad Sigeru Omatu Michifumi Yoshioka Safaai Deris Department of Computer Science and Intelligent Systems Graduate School of Engineering Osaka Prefecture University Sakai Japan Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Skudai Johor Malaysia
Recent advances in microarray technology allow scientists to measure expression levels of thousands of genes simultaneously in human tissue samples. This technology has been increasingly used in cancer research becaus... 详细信息
来源: 评论
CoCoTA - Common component task
CoCoTA - Common component task
收藏 引用
作者: Mirandola, Raffaela Plášil, František Politecnico di Milano Piazza Leonardo Da Vinci 32 20133 Milano Italy Charles University in Prague Faculty of Mathematics and Physics Department of Software Engineering Malostranske namesti 25 118 00 Prague 1 Czech Republic Academy of Sciences of the Czech Republic Institute of Computer Science
This chapter overviews the scope, goals and timeline of the modeling contest CoCoME. It also describes the input the competing teams received and, furthermore, explains how the peer reviewing process went ahead, and h... 详细信息
来源: 评论