咨询与建议

限定检索结果

文献类型

  • 14,595 篇 会议
  • 9,505 篇 期刊文献
  • 438 册 图书

馆藏范围

  • 24,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,625 篇 工学
    • 9,784 篇 计算机科学与技术...
    • 7,957 篇 软件工程
    • 2,832 篇 信息与通信工程
    • 2,643 篇 控制科学与工程
    • 1,785 篇 电气工程
    • 1,544 篇 生物工程
    • 1,516 篇 电子科学与技术(可...
    • 1,125 篇 机械工程
    • 1,117 篇 生物医学工程(可授...
    • 1,034 篇 光学工程
    • 682 篇 仪器科学与技术
    • 668 篇 化学工程与技术
    • 608 篇 动力工程及工程热...
    • 542 篇 材料科学与工程(可...
    • 535 篇 安全科学与工程
    • 529 篇 交通运输工程
  • 7,919 篇 理学
    • 4,053 篇 数学
    • 2,038 篇 物理学
    • 1,850 篇 生物学
    • 1,290 篇 统计学(可授理学、...
    • 1,214 篇 系统科学
    • 760 篇 化学
  • 3,920 篇 管理学
    • 2,638 篇 管理科学与工程(可...
    • 1,458 篇 图书情报与档案管...
    • 1,283 篇 工商管理
  • 1,171 篇 医学
    • 988 篇 临床医学
    • 857 篇 基础医学(可授医学...
    • 509 篇 药学(可授医学、理...
  • 651 篇 法学
    • 549 篇 社会学
  • 469 篇 经济学
    • 465 篇 应用经济学
  • 324 篇 教育学
  • 254 篇 农学
  • 63 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 908 篇 computer science
  • 504 篇 software enginee...
  • 458 篇 deep learning
  • 332 篇 computational mo...
  • 331 篇 machine learning
  • 280 篇 application soft...
  • 278 篇 accuracy
  • 277 篇 feature extracti...
  • 260 篇 computer archite...
  • 257 篇 training
  • 252 篇 artificial intel...
  • 240 篇 systems engineer...
  • 233 篇 internet of thin...
  • 198 篇 support vector m...
  • 197 篇 neural networks
  • 194 篇 optimization
  • 177 篇 data mining
  • 171 篇 image segmentati...
  • 166 篇 reinforcement le...
  • 159 篇 laboratories

机构

  • 269 篇 college of compu...
  • 115 篇 school of comput...
  • 94 篇 state key labora...
  • 85 篇 school of comput...
  • 78 篇 graduate school ...
  • 72 篇 software enginee...
  • 67 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 40 篇 school of softwa...
  • 39 篇 department of co...
  • 37 篇 school of comput...
  • 37 篇 inesc tec - inst...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 33 篇 department of co...
  • 32 篇 department of el...

作者

  • 47 篇 rajkumar buyya
  • 44 篇 niyato dusit
  • 42 篇 m. zahn
  • 33 篇 liu yang
  • 30 篇 baowen xu
  • 29 篇 johansson karl h...
  • 28 篇 zhou jie
  • 26 篇 mengchu zhou
  • 25 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 tao yang
  • 24 篇 li li
  • 23 篇 bo du
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 22 篇 shen linlin
  • 21 篇 zhang lei
  • 21 篇 e. rogers
  • 21 篇 liu xin

语言

  • 22,861 篇 英文
  • 1,346 篇 其他
  • 308 篇 中文
  • 31 篇 日文
  • 13 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24538 条 记 录,以下是911-920 订阅
排序:
Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation  24
Cooperative MIMO Applied Null Beamforming to Self in Full-Du...
收藏 引用
24th International Conference on Advanced Communication Technology, ICACT 2022
作者: Kawano, Masahiro Nagao, Yuhei Lanante, Leonardo Kurosaki, Masayuki Ochi, Hiroshi Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering Japan
This paper proposes a full-duplex wireless communication system applying cooperative multiple-input multiple-output (Co-MIMO). This proposal solves self-interference (SI) in full-duplex wireless communication systems ... 详细信息
来源: 评论
Expert System for Kubernetes Cluster Autoscaling and Resource Management  4
Expert System for Kubernetes Cluster Autoscaling and Resourc...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Hettiarachchi, Lasal Sandeepa Jayadeva, Senura Vihan Bandara, Rusiru Abhisheak Vikum Palliyaguruge, Dilmi Samaratunge Arachchillage, Udara Srimath S. Kasthurirathna, Dharshana Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Sri Lanka
The importance of orchestration tools such as Kubernetes has become paramount with the popularity of software architectural styles such as microservices. Furthermore, advancements in containerization technologies such... 详细信息
来源: 评论
A Systematic Review of Approaches for Reviewing Security-Related Aspects in Agile Requirements Specification of Web Applications
A Systematic Review of Approaches for Reviewing Security-Rel...
收藏 引用
2023 Congress in computer science, computer engineering, and Applied Computing, CSCE 2023
作者: Munir, Aqsa Assiri, Mohammed Alam, Saba Naveed Khan, Muzna Butt, Wasi Haider Humayun, Mamoona Department of Computer and Software Engineering Islamabad Pakistan College of Sciences and Humanities Aflaj Prince Sattam Bin Abdulaziz University Department of Computer Science Saudi Arabia College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Department of Software Engineering Saudi Arabia College of Computer and Information Sciences Jouf University Department of Information Systems Al-Jouf Saudi Arabia
Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically... 详细信息
来源: 评论
Leveraging Deep Learning Models for Accurate and Reproducible Cardiac Measurements in Echocardiography
Leveraging Deep Learning Models for Accurate and Reproducibl...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart systems, ICEMPS 2024
作者: Stojmenski, Aleksandar Mihajlov, Martin Ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje Macedonia Jozef Stefan Institute Laboratory For Open Systems and Networks Ljubljana Slovenia
The primary metrics recorded during ultrasound sessions focused on cardiac assessment are focused on the size of the heart's features, its two chambers and pre-chambers. Presently, these measurements are predomina... 详细信息
来源: 评论
Special Issue: Cybersecurity in Manufacturing
收藏 引用
Journal of Computing and Information science in engineering 2024年 第7期24卷 070201页
作者: Ameta, Gaurav Bukkapatnam, Satish Li, Dan Tian, Wenmeng Yampolskiy, Mark Zhang, Fan Siemens Corporate Research PrincetonNJ08540 United States Department of Industrial and Systems Engineering Texas A&M University College StationTX77843 United States Department of Industrial Engineering Clemson University ClemsonSC29634 United States Department of Industrial and Systems Engineering Mississippi State University Mississippi StateMS39762 United States Department of Computer Science and Software Engineering Auburn University AuburnAL36849 United States School of Mechanical Engineering Georgia Institute of Technology AtlantaGA30318 United States
The landscape of cybersecurity in manufacturing exhibits a dynamic interplay between evolving threats and vulnerabilities against innovative defense mechanisms. With the increasing adoption of smart and cloud-controll... 详细信息
来源: 评论
CircRNA-disease inference using deep ensemble model based on triple association
CircRNA-disease inference using deep ensemble model based on...
收藏 引用
2022 Chinese Automation Congress, CAC 2022
作者: Fu, Laiyi Du, Hongkai Wang, Ying Peng, Qinke Xi'an Jiaotong University School of Automation Science and Engineering Systems Engineering Institute Xi'an China Xi'an Jiaotong University School of Software Engineering Systems Engineering Institute Xi'an China
Accumulating evidence indicates more and more circular RNAs (i.e. circRNAs) have played a vital role in regulating gene expression and are related to diseases through different biological procedures. Predicting circRN... 详细信息
来源: 评论
Multi-View Dynamic Kernelized Evidential Clustering
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2435-2450页
作者: Jinyi Xu Zuowei Zhang Ze Lin Yixiang Chen Weiping Ding the Software Engineering Institute East China Normal UniversityShanghai 200062 Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai 200062China IEEE the School of Automation Northwestern Polytechnical UniversityXi’an 710072China the School of Artificial Intelligence and Computer Science Nantong UniversityNantong 226019 the Faculty of Data Science City University of MacaoMacao 999078China
It is challenging to cluster multi-view data in which the clusters have overlapping *** multi-view clustering methods often misclassify the indistinguishable objects in overlapping areas by forcing them into single cl... 详细信息
来源: 评论
computer Vision and Control Algorithm for Sustainable and Precision Agriculture
收藏 引用
SN computer science 2025年 第4期6卷 1-13页
作者: Adebayo, Segun Aworinde, Halleluyah O. Ojerinde, Stephen A. Oyedoja, Kayode O. Adeniyi, Abidemi Emmanuel Olanloye, Odunayo Dauda Osueke, Christian O. Ogundokun, Roseline Oluwaseun Das, Abhishek Mechatronics Engineering Bowen University Iwo Nigeria Computer Science Bowen University Iwo Nigeria Computer Science Western Illinois University IL United States Technology Education Emmanuel Alayande University of Education Oyo Nigeria Department of Software Engineering Kaunas University of Technology Kaunas Lithuania Department of Computer Science Landmark University Omu-Aran Kwara State Nigeria Department of Computer Science and Engineering Aliah University Kolkata India Tshwane University of Technology Pretoria South Africa Durban University of Technology Durban South Africa Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The world population continues to increase with a large proportion of this increase happening in Africa just as predicated by Food and Agriculture Organization of the United Nation. To meet the demand of feeding this ... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论