咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 729 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,267 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,356 篇 工学
    • 1,062 篇 计算机科学与技术...
    • 889 篇 软件工程
    • 243 篇 信息与通信工程
    • 223 篇 控制科学与工程
    • 133 篇 生物工程
    • 99 篇 电气工程
    • 94 篇 机械工程
    • 92 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 55 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 45 篇 土木工程
    • 44 篇 建筑学
    • 44 篇 网络空间安全
  • 602 篇 理学
    • 314 篇 数学
    • 155 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 43 篇 化学
  • 395 篇 管理学
    • 278 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 106 篇 医学
    • 97 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 62 篇 法学
    • 44 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 46 篇 教育学
    • 44 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 62 篇 deep learning
  • 60 篇 machine learning
  • 58 篇 laboratories
  • 52 篇 software systems
  • 52 篇 computational mo...
  • 52 篇 artificial intel...
  • 51 篇 application soft...
  • 47 篇 accuracy
  • 46 篇 cloud computing
  • 44 篇 training
  • 41 篇 computer archite...
  • 41 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 34 篇 support vector m...
  • 34 篇 systems engineer...
  • 34 篇 data mining

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 computing and so...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,191 篇 英文
  • 69 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2267 条 记 录,以下是271-280 订阅
排序:
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks  14
AI in Education: Improving Quality for Both Centralized and ...
收藏 引用
14th IEEE Global engineering Education Conference, EDUCON 2023
作者: Madathil, Nisha Thorakkattu Alrabaee, Saed Al-Kfairy, Mousa Damseh, Rafat Belkacem, Abdelkader N College of IT United Arab Emirates University Department of Information Systems and Security United Arab Emirates College of Technological Innovation Zayed University Dubai United Arab Emirates College of IT Department of Computer Science and Software Engineering United Arab Emirates University United Arab Emirates College of IT Department of Computer Engineering and Networks United Arab Emirates University United Arab Emirates
Education is essential for achieving many Sustainable Development Goals (SDGs). Therefore, the education system focuses on empowering more educated people and improving the quality of the education system. One of the ... 详细信息
来源: 评论
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore software Maintenance
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
Evaluating Propagation Models for IIoT in Underground Mining: an Experimental Comparative Study in Underground Coal Mines
Evaluating Propagation Models for IIoT in Underground Mining...
收藏 引用
IEEE ANDESCON
作者: Fabian Medina Oscar Montañez Cristian Suancha Eduardo Avendaño Sandra Céspedes Systems and Computing Engineering school UPTC Sogamoso Colombia Electronic Engineering school UPTC Sogamoso Colombia Department of Computer Science and Software Engineering Concordia University Montreal Canada
Planning the Industrial Internet of Things (IIoT) systems for underground mining is critical in guaranteeing communication between nodes (sensor/actuator) and ensuring the effectiveness of their functionalities. There... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
IoT Based Control Networks and Intelligent systems (ICICNIS), International Conference on
作者: P. Ananthi K. Nirmaladevi Naveen Kumar S Department of Computer Technology-PG Kongu Engineering College Erode Tamilnadu Department of Computer Applications Madanapalle Institute of Technology & Science M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split Federated Learning Scheme for Non-IID Data  7
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Arafeh, Mohamad Wazzeh, Mohamad Ould-Slimane, Hakima Talhi, Chamseddine Mourad, Azzam Otrok, Hadi Department of Software and It Engineering Montreal Canada Department of Mathematics and Computer Science Canada New York University Division of Science Abu Dhabi United Arab Emirates Cyber Security Systems and Applied Ai Research Center Lebanese American University Department of Csm Beirut Lebanon Khalifa University Department of Eecs Abu Dhabi United Arab Emirates
This paper proposes a scheme addressing the challenges of integrating privacy-preserving distributed machine learning in the Internet of Things (IoT) context while improving the efficiency of the learning process and ... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural language Processing
收藏 引用
computer Modeling in engineering & sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
Modeling of Sensor Enabled IrrigationManagement for Intelligent Agriculture Using Hybrid Deep Belief Network
收藏 引用
computer systems science & engineering 2023年 第8期46卷 2319-2335页
作者: Saud Yonbawi Sultan Alahmari B.R.S.S.Raju Chukka Hari Govinda Rao Mohamad Khairi Ishak Hend Khalid Alkahtani JoséVarela-Aldás Samih M.Mostafa Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia King Abdul Aziz City for Science and Technology RiyadhKingdom of Saudi Arabia Aditya Engineering College Affiliated to JNTUK(Kakinada) SurampalemIndia Department of MBA Vignan’s Institute of Information and Technology(A)DuvvadaVisakhapatnamAP530049India School of Electrical and Electronic Engineering Engineering CampusUniversiti Sains Malaysia(USM)Nibong TebalPenang14300Malaysia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11564Saudi Arabia SISAu Research Group Universidad Tecnológica IndoaméricaAmbato180103Ecuador Faculty of Computers and Information South Valley UniversityQena83523Egypt
Artificial intelligence(AI)technologies and sensors have recently received significant interest in intellectual *** the application of AI technologies and agriculture sensors in intellectual agriculture is urgently re... 详细信息
来源: 评论
LED there be DoS: Exploiting variable bitrate IP cameras for network DoS
arXiv
收藏 引用
arXiv 2025年
作者: Goldberg, Emmanuel Brodt, Oleg Elyashar, Aviad Puzis, Rami Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Cyber Labs@BGU Ben-Gurion University of the Negev Israel Department of Computer Science Shamoon College of Engineering Israel
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling high-quality video streaming while conserving network bandwidth. However, as the name suggests, variable-bitrate IP cameras can g... 详细信息
来源: 评论
Supporting the Episodic Application of Clinical Guidelines over Significant Time Periods
Supporting the Episodic Application of Clinical Guidelines o...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Ben Shahar, Bruria Shahar, Yuval Jaffe, Shai Cohen, Odeya Shalom, Erez Selivanova, Maya Rimon, Ephraim Goldstein, Ayelet Department of Software and Information Systems Engineering Ben-Gurion University Israel Department of Nursing Faculty of Health Sciences Ben-Gurion University Israel Nursing Informatics lab Faculty of Health Sciences Ben-Gurion University Israel Herzfeld Geriatric Rehabilitation Medical Center Clalit Health Services Israel Department of Computer Science Hadassah Academic College Jerusalem Israel
Medical errors contribute significantly to morbidity and mortality, emphasizing the critical role of Clinical Guidelines (GLs) in patient care. Automating GL application can enhance GL adherence, improve patient outco... 详细信息
来源: 评论