咨询与建议

限定检索结果

文献类型

  • 18,232 篇 会议
  • 8,871 篇 期刊文献
  • 277 册 图书

馆藏范围

  • 27,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,418 篇 工学
    • 11,750 篇 计算机科学与技术...
    • 9,689 篇 软件工程
    • 3,214 篇 信息与通信工程
    • 2,179 篇 控制科学与工程
    • 1,888 篇 电气工程
    • 1,869 篇 生物工程
    • 1,616 篇 电子科学与技术(可...
    • 1,470 篇 生物医学工程(可授...
    • 1,166 篇 光学工程
    • 1,066 篇 机械工程
    • 863 篇 化学工程与技术
    • 743 篇 仪器科学与技术
    • 721 篇 材料科学与工程(可...
    • 716 篇 动力工程及工程热...
    • 623 篇 安全科学与工程
    • 507 篇 建筑学
  • 8,389 篇 理学
    • 4,167 篇 数学
    • 2,332 篇 物理学
    • 2,206 篇 生物学
    • 1,290 篇 统计学(可授理学、...
    • 978 篇 化学
    • 953 篇 系统科学
  • 4,586 篇 管理学
    • 2,861 篇 管理科学与工程(可...
    • 1,900 篇 图书情报与档案管...
    • 1,462 篇 工商管理
  • 1,441 篇 医学
    • 1,227 篇 临床医学
    • 1,071 篇 基础医学(可授医学...
    • 656 篇 药学(可授医学、理...
  • 737 篇 法学
    • 586 篇 社会学
  • 636 篇 教育学
    • 602 篇 教育学
  • 501 篇 经济学
  • 314 篇 农学
  • 109 篇 文学
  • 67 篇 军事学
  • 40 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,264 篇 software enginee...
  • 1,154 篇 computer science
  • 472 篇 deep learning
  • 417 篇 application soft...
  • 417 篇 computational mo...
  • 390 篇 accuracy
  • 369 篇 machine learning
  • 364 篇 computer archite...
  • 351 篇 training
  • 345 篇 software
  • 317 篇 feature extracti...
  • 283 篇 internet of thin...
  • 278 篇 software systems
  • 261 篇 support vector m...
  • 260 篇 data mining
  • 231 篇 testing
  • 229 篇 programming
  • 212 篇 artificial intel...
  • 195 篇 semantics
  • 183 篇 optimization

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 department of co...
  • 110 篇 school of softwa...
  • 101 篇 state key labora...
  • 90 篇 department of co...
  • 70 篇 department of co...
  • 69 篇 department of co...
  • 57 篇 department of co...
  • 57 篇 department of co...
  • 50 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 45 篇 school of inform...
  • 41 篇 department of co...
  • 41 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 department of co...
  • 40 篇 renewable and su...

作者

  • 55 篇 rajkumar buyya
  • 44 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 andrea alù
  • 36 篇 stuckey peter j.
  • 34 篇 niyato dusit
  • 30 篇 kono junichiro
  • 29 篇 shen furao
  • 28 篇 ivan i. smalyukh
  • 25 篇 muhammad waseem ...
  • 24 篇 wang lei
  • 24 篇 rehman attique u...
  • 24 篇 liu yang
  • 22 篇 khomh foutse
  • 22 篇 jiacun wang
  • 21 篇 qusay h. mahmoud
  • 21 篇 fattahi jaouhar
  • 20 篇 zhi-hui wang
  • 20 篇 dozier gerry
  • 20 篇 kotagiri ramamoh...

语言

  • 24,645 篇 英文
  • 2,524 篇 其他
  • 217 篇 中文
  • 12 篇 德文
  • 11 篇 日文
  • 7 篇 土耳其文
  • 4 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Program Department of Computer Engineering"
27380 条 记 录,以下是591-600 订阅
排序:
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Robust Car-Following Control of Connected and Autonomous Vehicles: A Stochastic Model Predictive Control Approach
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-14页
作者: Zhang, Peiyu Tian, Daxin Zhou, Jianshan Chang, Mai Duan, Xuting Zhao, Dezong Cao, Dongpu Leung, Vicor C.M. Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University Beijing China James Watt School of Engineering University of Glasgow Glasgow U.K Department of Mechanical and Mechatronics Engineering University of Waterloo Waterloo ON Canada Computer Science and Software Engineering Shenzhen University Shenzhen China
Vehicle platooning has attracted growing attention for its potential to enhance traffic capacity and road safety. This paper proposes an innovative distributed Stochastic Model Predictive Control (SMPC) for a vehicle ... 详细信息
来源: 评论
Design of Evolutionary Algorithm Based Energy Efficient Clustering Approach for Vehicular Adhoc Networks
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 687-699页
作者: VDinesh SSrinivasan Gyanendra Prasad Joshi Woong Cho Department of Electronics and Communication Engineering Kongu Engineering CollegePerundurai638060India Institute of Biomedical Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesSaveetha University602105ChennaiIndia Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Software Convergence Daegu Catholic UniversityGyeongsan38430Korea
In a vehicular ad hoc network(VANET),a massive quantity of data needs to be transmitted on a large scale in shorter time *** the same time,vehicles exhibit high velocity,leading to more vehicle *** of these characteri... 详细信息
来源: 评论
AutoMESC: Automatic Framework for Mining and Classifying Ethereum Smart Contract Vulnerabilities and Their Fixes  49
AutoMESC: Automatic Framework for Mining and Classifying Eth...
收藏 引用
49th Euromicro Conference on software engineering and Advanced Applications, SEAA 2023
作者: Soud, Majd Qasse, Ilham Liebel, Grischa Hamdaqa, Mohammad Reykjavik University Department of Computer Science Reykjavik Iceland Polytechnique Montreal Department of Computer and Software Engineering Montreal Canada
Due to the risks associated with vulnerabilities in smart contracts, their security has gained significant attention in recent years. However, there is a lack of open datasets on smart contract vulnerabilities and the... 详细信息
来源: 评论
Product Recommendation System using Deep Learning based Recurrent Neural Network
Product Recommendation System using Deep Learning based Recu...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a... 详细信息
来源: 评论
Ownership Verification for Digital Art Using Smart Contract and Blockchain Technology  17
Ownership Verification for Digital Art Using Smart Contract ...
收藏 引用
17th International Conference on Open Source Systems and Technologies, ICOSST 2023
作者: Ullah, Shout Bazai, Sibghat Ullah Zaland, Zubair Ghafoor, Muhammad Imran Haider, Arsalan Hussain, Laiq BUITEMS Department of Software Engineering Quetta Pakistan BUITEMS Department of Computer Engineering Quetta Pakistan Pakistan Television Corporation Department of Engineering Lahore Pakistan BUITEMS Department of Electrical Engineering Quetta Pakistan
The rapid growth of digital art has necessitated the development of secure ownership verification systems due to the inherent ease of duplication and distribution within the digital realm. This paper delves into the i... 详细信息
来源: 评论
On Evaluation of Bangla Word Analogies
On Evaluation of Bangla Word Analogies
收藏 引用
2023 Conference on Empirical Methods in Natural Language Processing, EMNLP 2023
作者: Akter, Mousumi Sarkar, Souvika Karmaker, Shubhra Kanti Lab Department of Computer Science & Software Engineering Auburn University AL United States
This paper presents a benchmark dataset of Bangla word analogies for evaluating the quality of existing Bangla word embeddings. Despite being the 7th largest spoken language in the world, Bangla is still a low-resourc... 详细信息
来源: 评论
Artificial Intelligence For Realtime Face Recognition Attendance Using College Classrooms and Buses
Artificial Intelligence For Realtime Face Recognition Attend...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Ahila, A. Hosanna Princye, P. Poonguzhali, A. Kavivendhan Deepa, M. Arthy, A. Saravanakumar, R. Sri Sairam College of Engineering Department of Electronics and Communication Engineering Anekal Bangalore India Francis Xavier Engineering College Department of Computer Science and Business Systems Tamil Nadu Tirunelveli India Iconix Software Solution Software Analyst Tamil Nadu Tirunelveli India
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho... 详细信息
来源: 评论
A Novel Method for Pneumothorax Diagnosis and Segmentation Using Deep Convolution Neural Network
A Novel Method for Pneumothorax Diagnosis and Segmentation U...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho... 详细信息
来源: 评论
Trustworthiness Evaluation of Deep Learning Accelerators Using UVM-based Verification with Error Injection
Trustworthiness Evaluation of Deep Learning Accelerators Usi...
收藏 引用
2024 Design and Verification Conference and Exhibition Europe, DVCon Europe 2024
作者: Aboudeif, Randa Awaad, Tasneem A. AbdElsalam, Mohamed Ismail, Yehea Electronics and Communications Engineering Department The American University in Cairo Cairo Egypt Siemens Digital Industries Software Cairo Egypt Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt
Testing the reliability and trustworthiness of high-performance computing (HPC) applications has made Deep Learning Accelerators (DLAs) verification critically important. In this paper, we introduce a hardware verific... 详细信息
来源: 评论