咨询与建议

限定检索结果

文献类型

  • 18,232 篇 会议
  • 8,871 篇 期刊文献
  • 277 册 图书

馆藏范围

  • 27,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,418 篇 工学
    • 11,750 篇 计算机科学与技术...
    • 9,689 篇 软件工程
    • 3,214 篇 信息与通信工程
    • 2,179 篇 控制科学与工程
    • 1,888 篇 电气工程
    • 1,869 篇 生物工程
    • 1,616 篇 电子科学与技术(可...
    • 1,470 篇 生物医学工程(可授...
    • 1,166 篇 光学工程
    • 1,066 篇 机械工程
    • 863 篇 化学工程与技术
    • 743 篇 仪器科学与技术
    • 721 篇 材料科学与工程(可...
    • 716 篇 动力工程及工程热...
    • 623 篇 安全科学与工程
    • 507 篇 建筑学
  • 8,389 篇 理学
    • 4,167 篇 数学
    • 2,332 篇 物理学
    • 2,206 篇 生物学
    • 1,290 篇 统计学(可授理学、...
    • 978 篇 化学
    • 953 篇 系统科学
  • 4,586 篇 管理学
    • 2,861 篇 管理科学与工程(可...
    • 1,900 篇 图书情报与档案管...
    • 1,462 篇 工商管理
  • 1,441 篇 医学
    • 1,227 篇 临床医学
    • 1,071 篇 基础医学(可授医学...
    • 656 篇 药学(可授医学、理...
  • 737 篇 法学
    • 586 篇 社会学
  • 636 篇 教育学
    • 602 篇 教育学
  • 501 篇 经济学
  • 314 篇 农学
  • 109 篇 文学
  • 67 篇 军事学
  • 40 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,264 篇 software enginee...
  • 1,154 篇 computer science
  • 472 篇 deep learning
  • 417 篇 application soft...
  • 417 篇 computational mo...
  • 390 篇 accuracy
  • 369 篇 machine learning
  • 364 篇 computer archite...
  • 351 篇 training
  • 345 篇 software
  • 317 篇 feature extracti...
  • 283 篇 internet of thin...
  • 278 篇 software systems
  • 261 篇 support vector m...
  • 260 篇 data mining
  • 231 篇 testing
  • 229 篇 programming
  • 212 篇 artificial intel...
  • 195 篇 semantics
  • 183 篇 optimization

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 department of co...
  • 110 篇 school of softwa...
  • 101 篇 state key labora...
  • 90 篇 department of co...
  • 70 篇 department of co...
  • 69 篇 department of co...
  • 57 篇 department of co...
  • 57 篇 department of co...
  • 50 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 45 篇 school of inform...
  • 41 篇 department of co...
  • 41 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 department of co...
  • 40 篇 renewable and su...

作者

  • 55 篇 rajkumar buyya
  • 44 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 andrea alù
  • 36 篇 stuckey peter j.
  • 34 篇 niyato dusit
  • 30 篇 kono junichiro
  • 29 篇 shen furao
  • 28 篇 ivan i. smalyukh
  • 25 篇 muhammad waseem ...
  • 24 篇 wang lei
  • 24 篇 rehman attique u...
  • 24 篇 liu yang
  • 22 篇 khomh foutse
  • 22 篇 jiacun wang
  • 21 篇 qusay h. mahmoud
  • 21 篇 fattahi jaouhar
  • 20 篇 zhi-hui wang
  • 20 篇 dozier gerry
  • 20 篇 kotagiri ramamoh...

语言

  • 24,645 篇 英文
  • 2,524 篇 其他
  • 217 篇 中文
  • 12 篇 德文
  • 11 篇 日文
  • 7 篇 土耳其文
  • 4 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Program Department of Computer Engineering"
27380 条 记 录,以下是851-860 订阅
排序:
Multi-Objective Optimization of Multi-Product Parallel Disassembly Line Balancing Problem Considering Multi-Skilled Workers Using a Discrete Chemical Reaction Optimization Algorithm
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4475-4496页
作者: Xiwang Guo Liangbo Zhou Zhiwei Zhang Liang Qi Jiacun Wang Shujin Qin Jinrui Cao College of Information and Control Engineering Liaoning Petrochemical UniversityFushun113000China Department of Computer Science and Technology Shandong University of Science and TechnologyQingdao266590China Department of Computer Science and Software Engineering Monmouth UniversityWest Long BranchNJ 07764USA Research Center of the Economic and Social Development of Henan East Provincial Joint Shangqiu Normal UniversityShangqiu476000China Department of Computer Science New Jersey City UniversityJersey CityNJ 07305USA
This work investigates a multi-product parallel disassembly line balancing problem considering multi-skilled workers.A mathematical model for the parallel disassembly line is established to achieve maximized disassemb... 详细信息
来源: 评论
Analyzing the Impact of Preprocessing Techniques on the Efficiency and Accuracy of Sentiment Classification Algorithms  15
Analyzing the Impact of Preprocessing Techniques on the Effi...
收藏 引用
15th International Conference on Information, Intelligence, Systems and Applications, IISA 2024
作者: Nikhila Kanigiri, Sai Mekuriyaw, Chachi Goodman, Garrett Alexiou, Michail S. Kennesaw State University Department of Computer Science MariettaGA United States Miami University Computer Science and Software Engineering OxfordOH United States
In the era of data-driven decision-making, the ability to rapidly and accurately analyze vast amounts of textual data is essential. This paper examines the role of text pre-processing techniques in enhancing the effec... 详细信息
来源: 评论
ML-based Anomalies Detection in Wireless Network Link Layer of the Internet of Things (IoT)  5
ML-based Anomalies Detection in Wireless Network Link Layer ...
收藏 引用
5th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2023
作者: Goswami, Pankaj Kumar Goswami, Garima Mahdi, Hussain Falih Vaish, Arti Dewangan, Bhupesh Kumar Choudhury, Tanupriya Teerthanker Mahaveer University Moradabad India University of Diyala Department of Computer and Software Engineering Baquba Iraq OP Jindal University Department of Computer Science and Engineering Punjipathra Raigarh India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India
Internet of things is the most emergent technology, expanding interconnected device networks day by day to enhance the ease of device control and monitoring. IoTs are not covering the commercial utility but also provi... 详细信息
来源: 评论
Improving Federated Learning Efficiency with PruneFL: A Healthcare Perspective  24
Improving Federated Learning Efficiency with PruneFL: A Heal...
收藏 引用
13th International Conference on Computing and Pattern Recognition, ICCPR 2024
作者: Shahid, Alvina Arshad, Muhammad Muneeb Azam, Farooque Anwar, Muhammad Waseem Shafi, Imran Department of Computer and Software Engineering EME College National University of Sciences and Technology Punjab Islamabad Pakistan School of Interdisciplinary Engineering and Sciences National University of Sciences and Technology Punjab Islamabad Pakistan
In healthcare, accessing diverse and large datasets for machine learning poses challenges due to data privacy concerns. Federated learning (FL) addresses this by training models on decentralized data while preserving ... 详细信息
来源: 评论
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany Computer Science and Information Technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of Information Technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of Computer Science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc... 详细信息
来源: 评论
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
A Systematic Review of Approaches for Reviewing Security-Related Aspects in Agile Requirements Specification of Web Applications
A Systematic Review of Approaches for Reviewing Security-Rel...
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Munir, Aqsa Assiri, Mohammed Alam, Saba Naveed Khan, Muzna Butt, Wasi Haider Humayun, Mamoona Department of Computer and Software Engineering Islamabad Pakistan College of Sciences and Humanities Aflaj Prince Sattam Bin Abdulaziz University Department of Computer Science Saudi Arabia College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Department of Software Engineering Saudi Arabia College of Computer and Information Sciences Jouf University Department of Information Systems Al-Jouf Saudi Arabia
Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically... 详细信息
来源: 评论
ForTT-Gen: Network Traffic Generator for Malware Forensics Analysis Training  12
ForTT-Gen: Network Traffic Generator for Malware Forensics A...
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Bistene, Jonas Vasconcelos Das Chagas, Clayton Escouper Dos Santos, Anderson Fernandes Pereira De Souza Dias, Gabriela Moutinho Salles, Ronaldo Moreira Defense Engineering Graduate Program Military Institute of Engineering Rio de Janeiro Brazil Military Institute of Engineering Department of Computer Engineering Rio de Janeiro Brazil Ciicesi Estg Polytechnic of Porto Porto Portugal
The generation and replication of network traffic are essential tasks for testing, analyzing, simulating, and evaluating the behavior and efficiency of systems, protocols, applications, and network services. However, ... 详细信息
来源: 评论
Energy-Efficient Shop Scheduling Using Space-Cooperation Multi-Objective Optimization
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 601-615页
作者: Ding, Jiepin Xia, Jun Yang, Yaning Zhou, Junlong Chen, Mingsong Li, Keqin East China Normal University MoE Engineering Research Center of Software/Hardware Co-Design Technology and Application Shanghai200062 China Ningxia Normal University School of Physics and Electronic Information Engineering Guyuan756500 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China State University of New York Department of Computer Science New PaltzNY12561 United States
Since Industry 5.0 emphasizes that manufacturing enterprises should raise awareness of social contribution to achieve sustainable development, more and more meta-heuristic algorithms are investigated to save energy in... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论