咨询与建议

限定检索结果

文献类型

  • 1,507 篇 会议
  • 747 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 898 篇 软件工程
    • 255 篇 信息与通信工程
    • 236 篇 控制科学与工程
    • 136 篇 生物工程
    • 104 篇 电气工程
    • 94 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 68 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 47 篇 土木工程
    • 46 篇 建筑学
    • 46 篇 网络空间安全
  • 611 篇 理学
    • 316 篇 数学
    • 159 篇 生物学
    • 119 篇 物理学
    • 118 篇 系统科学
    • 97 篇 统计学(可授理学、...
    • 44 篇 化学
  • 404 篇 管理学
    • 284 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 112 篇 医学
    • 101 篇 临床医学
    • 85 篇 基础医学(可授医学...
    • 48 篇 公共卫生与预防医...
  • 64 篇 法学
    • 48 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
  • 20 篇 农学
  • 9 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 65 篇 deep learning
  • 63 篇 machine learning
  • 58 篇 laboratories
  • 54 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 accuracy
  • 51 篇 application soft...
  • 51 篇 artificial intel...
  • 47 篇 cloud computing
  • 46 篇 training
  • 43 篇 computer archite...
  • 43 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 37 篇 security
  • 36 篇 resource managem...
  • 35 篇 data mining
  • 35 篇 feature extracti...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,004 篇 英文
  • 290 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering department"
2301 条 记 录,以下是291-300 订阅
排序:
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore software Maintenance
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
Evaluating Propagation Models for IIoT in Underground Mining: an Experimental Comparative Study in Underground Coal Mines
Evaluating Propagation Models for IIoT in Underground Mining...
收藏 引用
IEEE ANDESCON
作者: Fabian Medina Oscar Montañez Cristian Suancha Eduardo Avendaño Sandra Céspedes Systems and Computing Engineering school UPTC Sogamoso Colombia Electronic Engineering school UPTC Sogamoso Colombia Department of Computer Science and Software Engineering Concordia University Montreal Canada
Planning the Industrial Internet of Things (IIoT) systems for underground mining is critical in guaranteeing communication between nodes (sensor/actuator) and ensuring the effectiveness of their functionalities. There... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
IoT Based Control Networks and Intelligent systems (ICICNIS), International Conference on
作者: P. Ananthi K. Nirmaladevi Naveen Kumar S Department of Computer Technology-PG Kongu Engineering College Erode Tamilnadu Department of Computer Applications Madanapalle Institute of Technology & Science M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split Federated Learning Scheme for Non-IID Data  7
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Arafeh, Mohamad Wazzeh, Mohamad Ould-Slimane, Hakima Talhi, Chamseddine Mourad, Azzam Otrok, Hadi Department of Software and It Engineering Montreal Canada Department of Mathematics and Computer Science Canada New York University Division of Science Abu Dhabi United Arab Emirates Cyber Security Systems and Applied Ai Research Center Lebanese American University Department of Csm Beirut Lebanon Khalifa University Department of Eecs Abu Dhabi United Arab Emirates
This paper proposes a scheme addressing the challenges of integrating privacy-preserving distributed machine learning in the Internet of Things (IoT) context while improving the efficiency of the learning process and ... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural language Processing
收藏 引用
computer Modeling in engineering & sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
SMATCH-M-LLM: Semantic Similarity in Metamodel Matching With Large language Models
SMATCH-M-LLM: Semantic Similarity in Metamodel Matching With...
收藏 引用
International Mining software Repositories, MSR
作者: Nafisa Ahmed Hin Chi Kwok Mohammad Hamdaqa Wesley K. G. Assunção Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Department of Industrial and Systems Engineering Hong Kong Polytechnic University Hong Kong China Department of Computer Science North Carolina State University Raleigh USA
Metamodel matching plays a crucial role in defining transformation rules in model-driven engineering by identifying correspondences between different metamodels, forming the foundation for effective transformations. C... 详细信息
来源: 评论
Modeling of Sensor Enabled IrrigationManagement for Intelligent Agriculture Using Hybrid Deep Belief Network
收藏 引用
computer systems science & engineering 2023年 第8期46卷 2319-2335页
作者: Saud Yonbawi Sultan Alahmari B.R.S.S.Raju Chukka Hari Govinda Rao Mohamad Khairi Ishak Hend Khalid Alkahtani JoséVarela-Aldás Samih M.Mostafa Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia King Abdul Aziz City for Science and Technology RiyadhKingdom of Saudi Arabia Aditya Engineering College Affiliated to JNTUK(Kakinada) SurampalemIndia Department of MBA Vignan’s Institute of Information and Technology(A)DuvvadaVisakhapatnamAP530049India School of Electrical and Electronic Engineering Engineering CampusUniversiti Sains Malaysia(USM)Nibong TebalPenang14300Malaysia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11564Saudi Arabia SISAu Research Group Universidad Tecnológica IndoaméricaAmbato180103Ecuador Faculty of Computers and Information South Valley UniversityQena83523Egypt
Artificial intelligence(AI)technologies and sensors have recently received significant interest in intellectual *** the application of AI technologies and agriculture sensors in intellectual agriculture is urgently re... 详细信息
来源: 评论
Vehicle type recognition based on audio data  58
Vehicle type recognition based on audio data
收藏 引用
58th Hawaii International Conference on System sciences, HICSS 2025
作者: Kobiela, Dariusz Hajdasz, Michal Erezman, Mateusz Nurzyńska, Karolina Zaporowski, Szymon Kurowski, Adam Weichbroth, Pawel Department of Software Engineering Faculty of Electronics Telecommunication and Informatics Gdańsk University of Technology Gabriela Narutowicza 11/12 Gdańsk80-233 Poland Department of Multimedia Systems Faculty of Electronics Telecommunication and Informatics Gdańsk University of Technology Gabriela Narutowicza 11/12 Gdańsk80-233 Poland Department of Algorithmics and Software Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 16 Gliwice44-100 Poland
Identifying different vehicle types can help manage traffic more efficiently, reduce congestion, and improve public safety. This study aims to create a classification model that can recognize vehicle types based on th... 详细信息
来源: 评论
Missing Pieces: How Do Designs that Expose Uncertainty Longitudinally Impact Trust in AI Decision Aids? An In Situ Study of Gig Drivers
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Rex Wang, Ruiyi Sadeh, Norman Fang, Fei Software & Societal Systems Department School of Computer Science Carnegie Mellon University PittsburghPA United States Department of Computer Science and Engineering University of California La Jolla San DiegoCA United States
Decision aids based on artificial intelligence (AI) induce a wide range of outcomes when they are deployed in uncertain environments. In this paper, we investigate how users’ trust in recommendations from an AI decis... 详细信息
来源: 评论