咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 980 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 2,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,597 篇 工学
    • 1,272 篇 计算机科学与技术...
    • 1,045 篇 软件工程
    • 304 篇 信息与通信工程
    • 190 篇 控制科学与工程
    • 155 篇 生物工程
    • 126 篇 电气工程
    • 114 篇 光学工程
    • 109 篇 机械工程
    • 103 篇 电子科学与技术(可...
    • 95 篇 生物医学工程(可授...
    • 59 篇 网络空间安全
    • 56 篇 交通运输工程
    • 54 篇 仪器科学与技术
    • 53 篇 安全科学与工程
    • 51 篇 化学工程与技术
  • 770 篇 理学
    • 396 篇 数学
    • 269 篇 物理学
    • 166 篇 生物学
    • 125 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 61 篇 化学
  • 523 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 125 篇 医学
    • 107 篇 临床医学
    • 85 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
  • 88 篇 法学
    • 75 篇 社会学
  • 62 篇 教育学
    • 59 篇 教育学
  • 57 篇 经济学
    • 56 篇 应用经济学
  • 31 篇 农学
  • 18 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 95 篇 software enginee...
  • 71 篇 machine learning
  • 68 篇 deep learning
  • 67 篇 information tech...
  • 53 篇 accuracy
  • 48 篇 artificial intel...
  • 46 篇 software
  • 45 篇 computational mo...
  • 42 篇 feature extracti...
  • 42 篇 training
  • 41 篇 computer science
  • 35 篇 semantics
  • 31 篇 cloud computing
  • 31 篇 web services
  • 29 篇 optimization
  • 29 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 software testing
  • 29 篇 testing
  • 28 篇 internet of thin...

机构

  • 39 篇 faculty of infor...
  • 37 篇 department of so...
  • 28 篇 faculty of infor...
  • 27 篇 department of so...
  • 26 篇 faculty of elect...
  • 24 篇 school of softwa...
  • 24 篇 centre for quant...
  • 22 篇 national key lab...
  • 22 篇 faculty of infor...
  • 22 篇 institute of inf...
  • 21 篇 department of co...
  • 19 篇 centre for quant...
  • 19 篇 department of in...
  • 19 篇 vietnam national...
  • 18 篇 school of comput...
  • 17 篇 faculty of infor...
  • 17 篇 school of inform...
  • 17 篇 centre for quant...
  • 17 篇 faculty of compu...
  • 16 篇 department of so...

作者

  • 35 篇 bieliková mária
  • 34 篇 tran minh-triet
  • 28 篇 tao dacheng
  • 25 篇 yu mei
  • 25 篇 jiang gangyi
  • 21 篇 herawan tutut
  • 19 篇 yoshitaka shibat...
  • 18 篇 noriki uchida
  • 17 篇 hsieh min-hsiu
  • 16 篇 yu nengkun
  • 14 篇 muhammad waseem ...
  • 14 篇 mei yu
  • 14 篇 gangyi jiang
  • 14 篇 vranic valentino
  • 14 篇 shao feng
  • 13 篇 lee sai peck
  • 13 篇 peng zongju
  • 13 篇 yin baocai
  • 13 篇 valentino vranić
  • 13 篇 siew hock ow

语言

  • 2,349 篇 英文
  • 120 篇 其他
  • 25 篇 中文
  • 1 篇 日文
检索条件"机构=Faculty of Software Engineering and Information Technology"
2493 条 记 录,以下是611-620 订阅
排序:
Utilizing machine learning algorithms for task allocation in distributed agile software development
收藏 引用
Heliyon 2024年 第21期10卷 e39926页
作者: Al-Fraihat, Dimah Sharrab, Yousef Al-Ghuwairi, Abdel-Rahman Alzabut, Hamza Beshara, Malik Algarni, Abdulmohsen Department of Software Engineering Faculty of Information Technology Isra University Amman 11622 Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Isra University Amman 11622 Jordan Department of Software Engineering Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University Zarqa 13133 Jordan Department of Computer Science King Khalid University Abha 61421 Saudi Arabia
Distributed agile software development (DASD) has become a prominent software development approach. Proper task allocation is crucial in DASD to avoid undesirable outcomes including project rejection by clients, unfav... 详细信息
来源: 评论
Identification of selection criteria for blockchain platforms
Identification of selection criteria for blockchain platform...
收藏 引用
International Association of Institutes of Navigation World Congress (IAIN)
作者: Shahr Banoo Muradi Yin Kia Chiam Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some criti... 详细信息
来源: 评论
A motion-based compression algorithm for resource-constrained video camera traps
arXiv
收藏 引用
arXiv 2024年
作者: Ratnayake, Malika Nisal Gallon, Lex Toosi, Adel N. Dorin, Alan Agents and Decision-Making Group Dept. of Data Science and AI Faculty of Information Technology Monash University ClaytonVIC3800 Australia Monash e-Research Centre Monash University ClaytonVIC3800 Australia School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne ParkvilleVIC3052 Australia Dept. of Software Systems and Cybersecurity Faculty of Information Technology Monash University ClaytonVIC3800 Australia
Field-captured video facilitates detailed studies of spatio-temporal aspects of animal locomotion, decision-making and environmental interactions including predator-prey relationships and habitat utilisation. But even... 详细信息
来源: 评论
An Automated Tool for Student Journey Orchestration & Optimization using Machine Learning
An Automated Tool for Student Journey Orchestration & Optimi...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Ramanayaka D.Y Liyanagunawardana A.P E.M.T.K. Ekanayake B Weerarathna U.U Thilini Buddhika Jayasingha Thusithanjana Thilakarthna Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The customer journey is a full interaction that a customer has with a business. Every touchpoint of the business is an opportunity to provide good experiences that encourage future opportunities to become customers an... 详细信息
来源: 评论
AD-PU: A Novel Approach for Automated Identification of the Outliers in User Interface Testing (UAT)
AD-PU: A Novel Approach for Automated Identification of the ...
收藏 引用
International Automatic Testing Conference, AUTOTESTCON
作者: S.M.N.S.K Seneviratne Victoria Penenco Dharshana Kasthurirathna Faculty of Graduate Studies and Research Sri Lanka Institute of Information Technology Sri Lanka UAT London Stock Exchange Group London Dept. of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
User acceptance testing (UAT) is the process that validates the system under test (SUT) behaves according to the business requirements. A User would use the graphical user interface to interact with the underlying cod...
来源: 评论
A Hybrid Deep Learning-based Person Re-identification Across Multi-Cameras  10
A Hybrid Deep Learning-based Person Re-identification Across...
收藏 引用
10th International Conference on Digital Arts, Media and technology and 8th ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications engineering, ECTI DAMT and NCON 2025
作者: Aonon, Manaschai Charoenkwan, Phasit Singkhamfu, Phudinun Kaewkamol, Porntida Chiang Mai University Data Science Consortium Faculty of Engineering Chiang Mai Thailand Chiang Mai University Modern Management and Information Technology College of Arts Media and Technology Chiang Mai Thailand Chiang Mai University Software Engineering College of Arts Media and Technology Chiang Mai Thailand
Surveillance systems play an essential role in enhancing security and ensuring safety within society. Public spaces and critical areas are commonly monitored through multi-camera networks for tracking individuals in r... 详细信息
来源: 评论
Are EEG-to-Text Models Working?
arXiv
收藏 引用
arXiv 2024年
作者: Jo, Hyejeong Yang, Yiqian Han, Juhyeok Duan, Yiqun Xiong, Hui Lee, Won Hee Department of Software Convergence Kyung Hee University Korea Republic of China GrapheneX-UTS HAI Centre Australian Artificial Intelligence Institute Faculty of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia
This work critically analyzes existing models for open-vocabulary EEG-to-Text translation. We identify a crucial limitation: previous studies often employed implicit teacher-forcing during evaluation, artificially inf... 详细信息
来源: 评论
A Hybrid Deep Learning-based Person Re-identification Across Multi-Cameras
A Hybrid Deep Learning-based Person Re-identification Across...
收藏 引用
International ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications engineering (ECTI-NCON)
作者: Manaschai Aonon Phasit Charoenkwan Phudinun Singkhamfu Porntida Kaewkamol Data Science Consortium Faculty of Engineering Chiang Mai University Chiang Mai Thailand Modern Management and Information Technology College of Arts Media and Technology Chiang Mai University Chiang Mai Thailand Software Engineering College of Arts Media and Technology Chiang Mai University Chiang Mai Thailand
Surveillance systems play an essential role in enhancing security and ensuring safety within society. Public spaces and critical areas are commonly monitored through multi-camera networks for tracking individuals in r... 详细信息
来源: 评论
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing  22
Detection Scheme of Impersonation Attack Based on Sarsa(Lamb...
收藏 引用
Proceedings of the 2022 12th International Conference on Communication and Network Security
作者: Aiming Wu Shanshan Tu Junwei Liu Yihe Zhang Yongjie Yang Xuetao Bai Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile (Suzhou) Software Technology Co. Ltd. China Mobile (Suzhou) Software Technology Co. Ltd. China
Fog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of Things(IoT) devices. It reduces the pressure on cloud servers and utilizes network ed... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks  22
Deep Reinforcement Learning-Based Computation Offloading for...
收藏 引用
Proceedings of the 2022 12th International Conference on Communication and Network Security
作者: Yongjie Yang Shanshan Tu Haishuang Yan Yihe Zhang Aiming Wu Xuetao Bai Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile (Suzhou) Software Technology Co. Ltd. China Mobile (Suzhou) Software Technology Co. Ltd. China
With the rapid development of IoT and fog computing, mobile devices can offload computing tasks into the fog layer to reduce energy consumption and transmission delay. However, the communication between fog nodes and ... 详细信息
来源: 评论