咨询与建议

限定检索结果

文献类型

  • 1,502 篇 会议
  • 733 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,362 篇 工学
    • 1,066 篇 计算机科学与技术...
    • 885 篇 软件工程
    • 244 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 135 篇 生物工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 92 篇 机械工程
    • 71 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 56 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 45 篇 土木工程
    • 44 篇 建筑学
    • 43 篇 网络空间安全
  • 608 篇 理学
    • 316 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 117 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 44 篇 化学
  • 393 篇 管理学
    • 275 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 111 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 63 篇 法学
    • 47 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 44 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 66 篇 deep learning
  • 62 篇 machine learning
  • 58 篇 laboratories
  • 53 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 artificial intel...
  • 51 篇 application soft...
  • 50 篇 accuracy
  • 47 篇 cloud computing
  • 45 篇 training
  • 43 篇 computer archite...
  • 43 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 37 篇 security
  • 36 篇 resource managem...
  • 35 篇 data mining
  • 34 篇 internet of thin...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 17 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 9 篇 max planck insti...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 24 篇 buyya rajkumar
  • 23 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 1,996 篇 英文
  • 279 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2282 条 记 录,以下是991-1000 订阅
排序:
Towards Smart Green Energy Metering Design for OpenStack/Amazon Elastic Cloud Integration
Towards Smart Green Energy Metering Design for OpenStack/Ama...
收藏 引用
IEEE Power engineering Society Conference and Exposition in Africa, PowerAfrica
作者: K. C. Okafor J. A. Okoye R. M. Onoshakpor Department of Mechatronics Engineering (Computer Systems & Software Dev.) Federal University of Technology Owerri Nigeria Department of Electrical and Electronic Engineering Ojukwu University Uli Anambra State Nigeria Department of Electrical and Electronic Engineering Rivers State University of Science & Tech. Nigeria
Energy demand in most African countries is insufficient thereby hindering economic development. By leveraging renewable technologies, the control and management of renewable micro-grids requires a robust/reliable desi... 详细信息
来源: 评论
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain
Energy Efficient Decentralized Authentication in Internet of...
收藏 引用
IEEE Globecom Workshops
作者: Abbas Yazdinejad Reza M. Parizi Gautam Srivastava Ali Dehghantanha Kim-Kwang Raymond Choo Cyber Science Lab School of Computer Science University of Guelph Ontario Canada College of Computing and Software Engineering Kennesaw State University GA USA Department of Mathematics and Computer Science Brandon University Manitoba Canada Department of Information Systems and Cyber Security University of Texas at San Antonio TX USA
In recent years, there has been rapid growth in developing smart cities. Nearly 70% of the Earth’s surface is covered by water and a large proportion of underwater environments are still unknown and have not be... 详细信息
来源: 评论
Integrating privacy enhancing techniques into blockchains using sidechains
arXiv
收藏 引用
arXiv 2019年
作者: Parizi, Reza M. Homayoun, Sajad Yazdinejad, Abbas Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Software Engineering and Game Development Kennesaw State University GA United States Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran Faculty of Computer Engineering University of Isfahan School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas San AntonioTX United States
Blockchains are turning into decentralized computing platforms and are getting worldwide recognition for their unique advantages. There is an emerging trend beyond payments that blockchains could enable a new breed of... 详细信息
来源: 评论
Learning the optimally coordinated routes from the statistical mechanics of polymers
arXiv
收藏 引用
arXiv 2019年
作者: Liao, Hao Wu, Xingtong Zhou, Mingyang Yeung, Chi Ho National Engineering Laboratory for big data computing systems Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Department of Science and Environmental Studies Education University of Hong Kong Hong Kong
Many major cities suffer from severe traffic congestion. Road expansion in the cites is usually infeasible, and an alternative way to alleviate traffic congestion is to coordinate the route of vehicles. Various path s... 详细信息
来源: 评论
Achieving trust-based and privacy-preserving customer selection in ubiquitous computing
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Chuan Zhu, Liehuang Xu, Chang Sharif, Kashif Liu, Ximeng Du, Xiaojiang Guizani, Mohsen Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Information Systems Singapore Management University College of Mathematics and Computer Science Fuzhou University Department of Computer and Information Sciences Temple University Philadelphia United States Department of Electrical and Computer Engineering University of Idaho MoscowID United States
The recent proliferation of smart devices has given rise to ubiquitous computing, an emerging computing paradigm which allows anytime & anywhere computing possible. In such a ubiquitous computing environment, cust... 详细信息
来源: 评论
Cross-Device Radio Map Generation via Crowdsourcing
Cross-Device Radio Map Generation via Crowdsourcing
收藏 引用
International Conference on Indoor Positioning and Indoor Navigation (IPIN)
作者: Georgios Pipelidis Nikolaos Tsiamitros Efdal Ustaoglu Romeo Kienzler Petteri Nurmi Huber Flores Christian Prehofer Ariadne Maps Munich Germany Technical University of Munich Software and Systems Engineering Research Group Munich Germany IBM Watson Internet of Things Zurich Switzerland Department of Computer Science University of Helsinki Helsinki
Crowdsourcing is a powerful technique for bootstrapping sensing systems that are based on wireless signals. For example, wireless sensing systems can ask users to contribute training data and localization systems (suc... 详细信息
来源: 评论
A blockchain-based framework for detecting malicious mobile applications in app stores
arXiv
收藏 引用
arXiv 2019年
作者: Homayoun, Sajad Dehghantanha, Ali Parizi, Reza M. Choo, Kim-Kwang Raymond Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran School of Computer Science University of Guelph Ontario Canada Department of Software Engineering Game Development Kennesaw State University MariettaGA30060 United States Department of Information Systems Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
The dramatic growth in smartphone malware shows that malicious program developers are shifting from traditional PC systems to smartphone devices. Therefore, security researchers are also moving towards proposing novel... 详细信息
来源: 评论
Code-aware combinatorial interaction testing
arXiv
收藏 引用
arXiv 2019年
作者: Ahmed, Bestoun S. Gargantini, Angelo Zamli, Kamal Z. Yilmaz, Cemal Bures, Miroslav Szeles, Marek Department of Mathematics and Computer Science Karlstad University Karlstad651 88 Sweden Department of Management Information and Production Engineering University of Bergamo Italy Faculty of Computer Systems and Software Engineering University Malaysia Pahang Faculty of Engineering and Natural Sciences Sabanci University Istanbul Turkey Department of Computer Science Faculty of Electrical Engineering Czech Technical University in Prague Karlovo nam. 13 Praha 2121 35 Czech Republic
Combinatorial interaction testing (CIT) is a useful testing technique to ad- dress the interaction of input parameters in software systems. In many ap- plications, the technique has been used as a systematic sampling ... 详细信息
来源: 评论
The use of public-private partnership in the machine-building industry
收藏 引用
AIP Conference Proceedings 2022年 第1期2467卷
作者: Oksana Bondarskaya Tatyana Bondarskaya Sergey Pichugin Anna Drozdova Elena Avksentieva Sergey Yekimov 1Tambov State Technical University Tambov Russian 2S. P. Korolev Rocket and Space Corporation Energia Moscow Russia 3Faculty of Business Informatics and Integrated Systems Management Department of Industrial Economics and Management National Research Nuclear University MEPhI Moscow Russia 4Faculty of Software Engineering and Computer Systems ITMO University St. Peterburg Russia 5Publishing House “Education and Science” Prague The Czech Republic
The process of reengineering business processes, in our opinion, is an iterative procedure in the process of enterprise management. Each subsequent business process in the business process chain is a logical continuat...
来源: 评论
Numerical Evaluation of the Traffic Flow Indicators Using Super-Resolution Satellite Imagery
Numerical Evaluation of the Traffic Flow Indicators Using Su...
收藏 引用
International Multi-Conference on Industrial engineering and Modern Technologies (FarEastCon)
作者: I.N. Pugachev G.Y. Markelov V.S. Tormozov A.O. Nosenko Vice-Rector Doctor of Technical Sciences Pacific National University PNU Khabarovsk Russian Federation Computer Engineering Department Pacific National University PNU Khabarovsk Russian Federation Department of Computer Software and Automated Systems Pacific National University PNU Khabarovsk Russian Federation Foreign Language Department Pacific National University PNU Khabarovsk Russian Federation
The article is devoted to methods of numerical evaluation of traffic flow indicators (TFP) using super-resolution satellite imagery. The method includes several main stages: the stage of extracting images of the space... 详细信息
来源: 评论