咨询与建议

限定检索结果

文献类型

  • 3,734 篇 会议
  • 2,832 篇 期刊文献
  • 166 册 图书

馆藏范围

  • 6,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,164 篇 工学
    • 2,984 篇 计算机科学与技术...
    • 2,434 篇 软件工程
    • 889 篇 信息与通信工程
    • 713 篇 控制科学与工程
    • 505 篇 电气工程
    • 484 篇 生物工程
    • 395 篇 电子科学与技术(可...
    • 362 篇 生物医学工程(可授...
    • 324 篇 机械工程
    • 269 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 178 篇 安全科学与工程
    • 175 篇 仪器科学与技术
    • 163 篇 化学工程与技术
    • 147 篇 交通运输工程
  • 2,172 篇 理学
    • 1,113 篇 数学
    • 582 篇 生物学
    • 545 篇 物理学
    • 396 篇 统计学(可授理学、...
    • 312 篇 系统科学
    • 204 篇 化学
  • 1,199 篇 管理学
    • 827 篇 管理科学与工程(可...
    • 420 篇 图书情报与档案管...
    • 412 篇 工商管理
  • 438 篇 医学
    • 384 篇 临床医学
    • 326 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 220 篇 法学
    • 176 篇 社会学
  • 145 篇 经济学
    • 145 篇 应用经济学
  • 118 篇 教育学
  • 69 篇 农学
  • 24 篇 军事学
  • 23 篇 文学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 213 篇 computer science
  • 188 篇 deep learning
  • 183 篇 machine learning
  • 150 篇 artificial intel...
  • 133 篇 accuracy
  • 130 篇 software enginee...
  • 118 篇 computational mo...
  • 117 篇 feature extracti...
  • 110 篇 internet of thin...
  • 97 篇 data mining
  • 93 篇 training
  • 87 篇 information syst...
  • 87 篇 wireless sensor ...
  • 80 篇 optimization
  • 79 篇 predictive model...
  • 75 篇 laboratories
  • 71 篇 support vector m...
  • 71 篇 cloud computing
  • 68 篇 software
  • 67 篇 computer archite...

机构

  • 44 篇 department of la...
  • 39 篇 college of compu...
  • 35 篇 sri lanka instit...
  • 34 篇 department of co...
  • 32 篇 graduate school ...
  • 27 篇 sri lanka instit...
  • 27 篇 school of comput...
  • 26 篇 concordia instit...
  • 25 篇 department of co...
  • 25 篇 department of co...
  • 24 篇 department of in...
  • 23 篇 institute of inf...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 21 篇 department of co...
  • 21 篇 state key labora...
  • 20 篇 ieee
  • 20 篇 concordia instit...
  • 19 篇 department of co...
  • 19 篇 school of comput...

作者

  • 63 篇 leonard barolli
  • 48 篇 arjan durresi
  • 36 篇 bentahar jamal
  • 36 篇 fatos xhafa
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 mohammad s. obai...
  • 21 篇 pedrycz witold
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 fan guisheng
  • 20 篇 choo kim-kwang r...
  • 19 篇 soni mukesh
  • 19 篇 tao yang
  • 19 篇 keshta ismail
  • 18 篇 abdelaziz a.abde...
  • 17 篇 hayashi eiji
  • 17 篇 mengchu zhou
  • 17 篇 gjergji mino
  • 16 篇 johansson karl h...

语言

  • 5,888 篇 英文
  • 791 篇 其他
  • 62 篇 中文
  • 7 篇 日文
  • 5 篇 德文
  • 3 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6732 条 记 录,以下是621-630 订阅
排序:
Optimizing Generative AI Applications: A Comparative Study of Effective Prompting Techniques
Optimizing Generative AI Applications: A Comparative Study o...
收藏 引用
Pervasive Computing and Social Networking (ICPCSN), International Conference on
作者: Shivya Jyoti Moulik Tejpal Jothi K R Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Computational Intelligence School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Generative Artificial Intelligence (GenAI) has emerged as a pivotal technology across various industries, driving advancements in automation, decision-making, and content generation. This paper investigates the effica... 详细信息
来源: 评论
A Fused Machine Learning Approach for Intrusion Detection System
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2607-2623页
作者: Muhammad Sajid Farooq Sagheer Abbas Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam 31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi... 详细信息
来源: 评论
Enhancing Retrieval Augmented Generation systems Using AI Models and Graph Databases
Enhancing Retrieval Augmented Generation Systems Using AI Mo...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Souvik Mukherjee Soosan Shabnam Sara Hasan D. Ajitha Department of Computer Science and Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamil Nadu India
This paper outlines the process of generating a Neo4j graph database powered by Language Models (LLMs). The primary goal is to extract structured information from unstructured data, including user profiles, paper brie... 详细信息
来源: 评论
Keeping Behavioral Programs Alive: Specifying and Executing Liveness Requirements
arXiv
收藏 引用
arXiv 2024年
作者: Yaacov, Tom Elyasaf, Achiya Weiss, Gera Computer Science Department Ben-Gurion University of the Negev Software and Information Systems Engineering Department Ben-Gurion University of the Negev
One of the benefits of using executable specifications such as Behavioral Programming (BP) is the ability to align the system implementation with its requirements. This is facilitated in BP by a protocol that allows i... 详细信息
来源: 评论
BLOCK-SECURE: AI-Based Blockchain Enabled Secure Framework for IoMT Applications
BLOCK-SECURE: AI-Based Blockchain Enabled Secure Framework f...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Panchal, Barkha Bhatia, Jitendra Kumhar, Malaram Tanwar, Sudeep Dutta, Ashit Kumar Rodrigues, Joel J.P.C. Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad India Dept. of Comp. Science and Information Systems College of Applied Sciences AlMaarefa University Saudi Arabia Amazonas State University AM Manaus Brazil
The Internet of Medical Things (IoMT) revolutionizes healthcare by integrating medical devices and systems with the internet. However, the vast amounts of sensitive medical data in IoMT networks pose significant secur... 详细信息
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng University of Oxford Department of Computer Science United Kingdom Peking University Department of Information and Computing Science School of Mathematical Science China Monash University Department of Software Systems and Cybersecurity Australia Singapore Management University School of Computing and Information Systems Singapore Nanyang Technological University School of Computer Science and Engineering Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论
Phase Re-Service in Reinforcement Learning Traffic Signal Control
Phase Re-Service in Reinforcement Learning Traffic Signal Co...
收藏 引用
International Conference on Intelligent Transportation
作者: Zhiyao Zhang George Gunter Marcos Quinones-Grueiro Yuhang Zhang William Barbour Gautam Biswas Daniel Work Department of Civil and Environmental Engineering Institute for Software Integrated Systems Vanderbilt University USA Institute for Software Integrated Systems Vanderbilt University USA Department of Computer Science Institute for Software Integrated Systems Vanderbilt University USA
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen... 详细信息
来源: 评论
Role of RPA to Seize Opportunities in 5G Edge Computing in Telecommunications
Role of RPA to Seize Opportunities in 5G Edge Computing in T...
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Yendluri, Dileep Kumar Tatikonda, Reshmi Tatikonda, Ramya Ponnala, Jainath Kempanna, M. Bhuvanesh, A. University of the Cumberlands Department of Computer Science Williamsburg United States University of the Central Missouri Department of Computer Information Systems Warrensburg United States University of the Cumberlands Department of Information Technology Williamsburg United States Jawaharlal Technological University Department of Electronics and Communication Engineering Hyderabad India Bangalore Institute of Technology Department of Ai and Ml Bangalore India Psn College of Engineering and Technology Department of Electrical and Electronics Engineering Tirunelveli India
This paper explores the role of Robotic Process Automation (RPA) in leveraging opportunities presented by 5G edge computing in the telecommunications industry. Integrating RPA and 5G edge computing offers numerous ben... 详细信息
来源: 评论
Self-adaptive Bat Algorithm With Genetic Operations
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1284-1294页
作者: Jing Bi Haitao Yuan Jiahui Zhai MengChu Zhou H.Vincent Poor School of Software Engineering Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA School of Automation Science and Electrical Engineering Beihang UniversityBeijing 100191China Department of Electrical Engineering Princeton UniversityPrinceton NJ 08544 USA IEEE
Swarm intelligence in a bat algorithm(BA)provides social *** operations for reproducing individuals in a genetic algorithm(GA)offer global search ability in solving complex optimization *** integration provides an opp... 详细信息
来源: 评论
Keeping Behavioral Programs Alive: Specifying and Executing Liveness Requirements
Keeping Behavioral Programs Alive: Specifying and Executing ...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Tom Yaacov Achiya Elyasaf Gera Weiss Computer Science Department Ben-Gurion University of the Negev Software and Information Systems Engineering Department Ben-Gurion University of the Negev
One of the benefits of using executable specifications such as Behavioral Programming (BP) is the ability to align the system implementation with its requirements. This is facilitated in BP by a protocol that allows i... 详细信息
来源: 评论