咨询与建议

限定检索结果

文献类型

  • 1,507 篇 会议
  • 747 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 898 篇 软件工程
    • 255 篇 信息与通信工程
    • 236 篇 控制科学与工程
    • 136 篇 生物工程
    • 104 篇 电气工程
    • 94 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 68 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 47 篇 土木工程
    • 46 篇 建筑学
    • 46 篇 网络空间安全
  • 611 篇 理学
    • 316 篇 数学
    • 159 篇 生物学
    • 119 篇 物理学
    • 118 篇 系统科学
    • 97 篇 统计学(可授理学、...
    • 44 篇 化学
  • 404 篇 管理学
    • 284 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 112 篇 医学
    • 101 篇 临床医学
    • 85 篇 基础医学(可授医学...
    • 48 篇 公共卫生与预防医...
  • 64 篇 法学
    • 48 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
  • 20 篇 农学
  • 9 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 65 篇 deep learning
  • 63 篇 machine learning
  • 58 篇 laboratories
  • 54 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 accuracy
  • 51 篇 application soft...
  • 51 篇 artificial intel...
  • 47 篇 cloud computing
  • 46 篇 training
  • 43 篇 computer archite...
  • 43 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 37 篇 security
  • 36 篇 resource managem...
  • 35 篇 data mining
  • 35 篇 feature extracti...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,004 篇 英文
  • 290 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering department"
2301 条 记 录,以下是271-280 订阅
排序:
Empowering Personalized Health Data Queries with Knowledge Graph and GPT-Enhanced Voice Assistant  25
Empowering Personalized Health Data Queries with Knowledge G...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data science and systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Wang, Xin Ul Hasan, Wordh Li, Juan Hendawi, Rasha Du, Yang Xie, Bo Tao, Cui North Dakota State University Department of Computer Science Fargo United States Valley City State University Department of Computer Systems and Software Engineering Valley City United States School of Nursing The University of Texas at Austin Austin United States School of Biomedical Informatics University of Texas Health Science Center at Houston Houston United States
The proliferation of digital health technologies has led to an abundance of personal health data. However, querying and retrieving specific health-related information from disparate sources can be challenging and inco... 详细信息
来源: 评论
software Defect Prediction Using Ensemble Technique
Software Defect Prediction Using Ensemble Technique
收藏 引用
International Conference on Information Management and Technology (ICIMTech)
作者: Pandu Wicaksono Panji Arisaputra Rezky Yunanda Willy Kristian Almuzhidul Mujhid Software Engineering Department School of Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Department School of Information Systems Bina Nusantara University Jakarta Indonesia
software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces ... 详细信息
来源: 评论
Automated Classification of Medical Images Using Convolutional Neural Networks  15
Automated Classification of Medical Images Using Convolution...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Pillai, N. Muthuvairavan Manimala, S. Rongali, Aruna Sri Gugnani, Anchit Kumar, Senthil A. Sriramakrishnan, G.V. Computer Science and Business Systems R.M.D Engineering College Thiruvallur district Kavarapettai India Computer science and engineering University SJCE JSS Science and technology University Karnataka Mysore India Sr. Software Engineer Department Information Technology Emphasis/Information Technology Ph.D University The country University of The Cumberlands United States Physiotherapy Amity University Rajasthan Jaipur India Artificial Intelligent department Shri Vishnu Engineering College for Women AP Bhimavaram India Tamilnadu Chennai India
Medical imagery has been increasingly used in diagnosing and treating various diseases, leading to advances in healthcare. While humans usually lead the qualitative interpretation of visual features, Automated Classif... 详细信息
来源: 评论
A Light Field Image Quality Assessment Method Based on Stereo Vision
A Light Field Image Quality Assessment Method Based on Stere...
收藏 引用
2022 IEEE International Conference on Unmanned systems, ICUS 2022
作者: Fu, Wei Shen, Xingfa Zhou, Wenhui Zhdanov, Andrei D. Geng, Chuntong Itmo Joint Institute Hangzhou Dianzi University Department of Computer Science Hangzhou China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Itmo University Faculty of Software Engineering and Computer Systems St.Petersburg Russia
Light field imaging is an important achievement in visual information exploration in recent years, which can capture more abundant visual information from the real world. However, most existing light field image quali... 详细信息
来源: 评论
Xtractor: A Two-Step Tweet Extractor for Sentiment Analysis
Xtractor: A Two-Step Tweet Extractor for Sentiment Analysis
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Muhammad Bux Alvi Naeem Ahmed Mahoto Mukhtiar Ali Unar Muhammad Akram Shaikh Computer Systems Engineering The Islamia University of Bahawalpur Bahawalpur Pakistan Software Engineering Department Mehran UET Jamshoro Jamshoro Pakistan Computer Systems Engineering Department Mehran UET Jamshoro Jamshoro Pakistan PASTIC Pakistan Science Foundation Islamabad Pakistan
Twitter (now X) has been gaining popularity with each passing day since its inception in 2006. People have been using Twitter as an instant repository to collect data and gain insight into folks’ minds on trending is...
来源: 评论
Exploratory Data Analysis and Predicting Indian Crime Against Women Using Machine Learning Approaches
Exploratory Data Analysis and Predicting Indian Crime Agains...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: N. Srinivasa Gupta B. Valarmathi K. Santhi T.Chellatamilan Sameeksha Nanda Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India
Crime forecasting is a critical endeavor aimed at preventing future criminal actions, specifically the rising rate of violence against women in India. This study proposes the model to predict crimes committed against ... 详细信息
来源: 评论
Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 1967-1981页
作者: Hafsa Shahid Humaira Ashraf Hafsa Javed Mamoona Humayun Nz Jhanjhi Mohammed A.AlZain Department of Computer Science and Software Engineering International Islamic University IslamabadIslamabadPakistan Department of Information Systems College of Computer and Information ScienceJouf UniversityAl-JoufSaudi Arabia School of Computer Science and Engineering(SCE) Taylor’s UniversitySelangorMalaysia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central *** sensors are battery-driven and resource-restrained devices that consume most of the energy in... 详细信息
来源: 评论
Contemporary software Modernization: Strategies, Driving Forces, and Research Opportunities
收藏 引用
ACM Transactions on software engineering and Methodology 2025年 第5期34卷
作者: Assunção, Wesley K.G. Marchezan, Luciano Arkoh, Lawrence Egyed, Alexander Ramler, Rudolf Department of Computer Science North Carolina State University RaleighNC United States Institute of Software Systems Engineering Johannes Kepler University Linz Linz Austria Software Competence Center Hagenberg GmbH Hagenberg Austria
software modernization is a common activity in software engineering, since technologies advance, requirements change, and business models evolve. Differently from conventional software evolution (e.g., adding new feat... 详细信息
来源: 评论
Dilated Neural Networks for Improving Microaneurysm Detection in Fundus Images
收藏 引用
IEEE Access 2025年 13卷 104037-104046页
作者: Norah Asiri Abdel Monim Artoli Muna Al-Razgan Taha Alfakih Department of Computer Science College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Department of Information Systems College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
Diabetic retinopathy (DR) is a microvascular complication that can lead to blindness if left untreated. Early detection of microaneurysms (MAs) is crucial for effective DR diagnosis. However, detecting MAs is challeng... 详细信息
来源: 评论
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 288-298页
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kandiy, Sergey Smirnov, Oleksii Ulianovska, Yuliia Kobylianska, Olena Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security Faculty of Comupter Science V. N. Karazin Kharkiv National University 4 Svobody Sq Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Cybersecurity & Software Academic Department Central Ukrainian National Technical University 8 University Avenue Kropyvnytskyi25006 Ukraine Department of Computer Science and Software Engineering University of Customs and Finance Vernadskogo Street 2/4 Dnipro49000 Ukraine
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o... 详细信息
来源: 评论