咨询与建议

限定检索结果

文献类型

  • 12,922 篇 会议
  • 6,011 篇 期刊文献
  • 265 册 图书

馆藏范围

  • 19,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,677 篇 工学
    • 9,170 篇 计算机科学与技术...
    • 7,611 篇 软件工程
    • 2,402 篇 信息与通信工程
    • 1,569 篇 控制科学与工程
    • 1,279 篇 生物工程
    • 1,012 篇 电气工程
    • 882 篇 生物医学工程(可授...
    • 764 篇 机械工程
    • 747 篇 电子科学与技术(可...
    • 650 篇 光学工程
    • 517 篇 安全科学与工程
    • 430 篇 化学工程与技术
    • 414 篇 动力工程及工程热...
    • 409 篇 仪器科学与技术
    • 396 篇 网络空间安全
    • 388 篇 交通运输工程
  • 5,421 篇 理学
    • 3,038 篇 数学
    • 1,433 篇 生物学
    • 1,191 篇 物理学
    • 895 篇 统计学(可授理学、...
    • 699 篇 系统科学
    • 455 篇 化学
  • 3,601 篇 管理学
    • 2,198 篇 管理科学与工程(可...
    • 1,532 篇 图书情报与档案管...
    • 1,064 篇 工商管理
  • 883 篇 医学
    • 745 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 397 篇 药学(可授医学、理...
    • 396 篇 公共卫生与预防医...
  • 572 篇 法学
    • 445 篇 社会学
  • 374 篇 经济学
  • 349 篇 教育学
  • 216 篇 农学
  • 99 篇 文学
  • 54 篇 军事学
  • 31 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,092 篇 computer science
  • 1,028 篇 software enginee...
  • 409 篇 deep learning
  • 335 篇 computational mo...
  • 330 篇 accuracy
  • 322 篇 application soft...
  • 299 篇 machine learning
  • 275 篇 data mining
  • 259 篇 computer archite...
  • 244 篇 software
  • 244 篇 training
  • 242 篇 support vector m...
  • 234 篇 feature extracti...
  • 230 篇 internet of thin...
  • 206 篇 software systems
  • 187 篇 optimization
  • 183 篇 programming
  • 180 篇 artificial intel...
  • 171 篇 wireless sensor ...
  • 164 篇 educational inst...

机构

  • 345 篇 college of compu...
  • 192 篇 department of co...
  • 130 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 university of sp...
  • 123 篇 università di to...
  • 121 篇 infn sezione di ...
  • 121 篇 academy of scien...
  • 120 篇 indian institute...
  • 114 篇 department of co...
  • 112 篇 charles universi...
  • 111 篇 department of ph...
  • 110 篇 department of co...
  • 108 篇 state key labora...
  • 104 篇 zhejiang univers...
  • 103 篇 imperial college...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 94 篇 a. babaev
  • 94 篇 d. eliseev
  • 93 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 17,189 篇 英文
  • 1,881 篇 其他
  • 154 篇 中文
  • 11 篇 德文
  • 4 篇 日文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Application Department of Computer Science"
19198 条 记 录,以下是4931-4940 订阅
排序:
Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer
Design and Simulation of a Network Infrastructure for a Mult...
收藏 引用
Information Technology (ACIT)
作者: Osama S AlJamal Mahmoud AlJamal Ayoub Alsarhan Mohammad Aljaidi Saif Okour Issa Al-Aiash Ahmad Al-Qerem Essam Al Daoud Ali Elrashidi Department of Computer Science Al Hussein Technical University Amman Jordan Department of Cybersecurity Faculty of Science and Information Technology Irbid National University Irbid Jordan Department of Information Technology The Hashemite University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Software Engineering Irbid National University Irbid Jordan Department of Cybersecurity Zarqa University Zarqa Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
Designing and simulating a network infrastructure for multi-branch organizations is essential for ensuring seamless connectivity and efficient operations. This paper addresses the challenges faced by organizations in ... 详细信息
来源: 评论
A Two-stage Anomaly Detection System for Fog Computing Services  5
A Two-stage Anomaly Detection System for Fog Computing Servi...
收藏 引用
5th IEEE International Conference on Electro-Computing Technologies for Humanity, NIGERCON 2024
作者: Ogundoyin, Sunday Oyinlola Adeniyi Kamil, Ismaila Ojedokun, Isaac Adewale Babalola, John Oluwaseun Nyangaresi, Vincent Omollo Bowen University Electrical and Electronic Engineering Programme Iwo Nigeria University of Ibadan Department of Electrical and Electronic Engineering Ibadan Nigeria Jaramogi Oginga Odinga University of Science and Technology Department of Computer Science and Software Engineering Bando40601 Kenya Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Applied Electronics Chennai602105 India
Fog computing enhances traditional cloud computing by bringing resources closer to edge devices, enabling faster response times and supporting mission-critical applications. However, its distributed nature makes it vu... 详细信息
来源: 评论
Towards Efficient Auction Design with ROI Constraints  24
Towards Efficient Auction Design with ROI Constraints
收藏 引用
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems
作者: Xinyu Tang Hongtao Lv Yingjie Gao Fan Wu Lei Liu Lizhen Cui School of Software & C-FAIR Shandong University Jinan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China School of Software & C-FAIR Shandong University & Shandong Research Institute of Industrial Technology Jinan China
Online advertising stands as a significant revenue source of the Internet. Recently, the trend among advertisers tilting towards the use of auto-bidding tools has heralded the emergence of a new model of bidders opera... 详细信息
来源: 评论
Medical Expert System to Diagnose the Most Common Psychiatric Diseases  21
Medical Expert System to Diagnose the Most Common Psychiatri...
收藏 引用
7th International Conference on engineering and MIS, ICEMIS 2021
作者: Alsagheer, Eman A. Rajab, Hamzah A. Elnajar, Khadiga M.Y. Department of Computer Science Faculty of Information Technology University of Benghazi Benghazi Libya Department of Software Engineering Faculty of Information Technology University of Benghazi Benghazi Libya
Expert Systems are programs that employ artificial intelligence and mimic the performance of human experts in a certain field by gathering and capturing expert information. In this paper, we present a rule-based exper... 详细信息
来源: 评论
Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 6005-6018页
作者: Li, Qian Wu, Di Zhou, Dawei Lin, Chenhao Liu, Shuai Wang, Cong Shen, Chao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an 710049 China Xi’an Jiaotong University School of Computer Science and Technology Xi’an 710049 China Xidian University Xi’an 710071 China Xi’an Jiaotong University School of Software Xi’an 710049 China City University of Hong Kong Department of Computer Science Hong Kong
Federated Learning (FL) enables geographically distributed clients to collaboratively train machine learning models by exchanging local model parameters while preserving data privacy. In practice, FL faces two critica... 详细信息
来源: 评论
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection
Authentic Learning of Machine Learning in Cybersecurity with...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Faruk, Md Jobair Hossain Shahriar, Hossain Qian, Kai Lo, Dan Whitman, Michael Cuzzocrea, Alfredo Wu, Fan Clincy, Victor Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Institute for Cyber Workforce Development Kennesaw State University United States Department Computer Science Kennesaw State University United States IDEA Lab University of Calabria Rende Italy Loria Nancy France Department of Computer Science Tuskegee University United States
The primary goal of the authentic learning approach is to engage and motivate students in a learning environment that encourages all students in learning. This approach provides students with hands-on experiences in s... 详细信息
来源: 评论
Enhancing Content-Based Histopathology Image Retrieval Using QR Code Representation
Enhancing Content-Based Histopathology Image Retrieval Using...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Hamidreza Rouzegar Shahryar Rahnamayan Azam Asilian Bidgoli Masoud Makrehchi Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa ON Canada Engineering Department Brock University St. Catharines ON Canada Faculty of Science Wilfrid Laurier University Waterloo ON Canada
The growing field of Content-Based Medical Image Retrieval (CBMIR) plays an integral role in the diagnosis and treatment plan of numerous diseases, including cancer. However, the effective representation of gigapixel ...
来源: 评论
Impact of COVID-19 on Predicting 2020 US Presidential Elections on Social Media  16th
Impact of COVID-19 on Predicting 2020 US Presidential Electi...
收藏 引用
16th International Conference on Information Technology and applications, ICITA 2022
作者: Khan, Asif Zhang, Huaping Boudjellal, Nada Hayat, Bashir Dai, Lin Ahmad, Arshad Al-Hamed, Ahmed School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China The Faculty of New Information and Communication Technologies University Abdelhamid Mehri Constantine 2 Constantine25000 Algeria Institute of Management Sciences Peshawar Peshawar Pakistan Institute of Software Systems Engineering Johannes Kepler University Linz4040 Austria Department of IT and Computer Science Pak-Austria Fachhochschule: Institute of Applied Sciences and Technology Mang Khanpur Road Haripur22620 Pakistan
By the beginning of 2020, the world woke up to a global pandemic that changed people’s everyday lives and restrained their physical contact. During those times Social Media Platforms (SMPs) were almost the only mean ... 详细信息
来源: 评论
New Bounds on the Accuracy of Majority Voting for Multi-Class Classification
arXiv
收藏 引用
arXiv 2023年
作者: Aeeneh, Sina Zlatanov, Nikola Yu, Jiangshan The Department of Electrical and Computer Systems Engineering Monash University ClaytonVIC3800 Australia The Department of Computer Science and Engineering Innopolis University Respublika Tatarstan Innopolis420500 Russia The Department of Software Systems and Cybersecurity Monash University ClaytonVIC3800 Australia
Majority voting is a simple mathematical function that returns the value that appears most often in a set. As a popular decision fusion technique, the majority voting function (MVF) finds applications in resolving con... 详细信息
来源: 评论
Towards a global machine learning model to fill gaps in flood frequency: Random Forest to estimate MNDWI in Bangladesh
Towards a global machine learning model to fill gaps in floo...
收藏 引用
Machine Intelligence for GeoAnalytics and Remote Sensing (MIGARS), International Conference on
作者: James Houghton Carolynne Hultquist James Atlas Andrew Zimmer Computer Science and Software Engineering University of Canterbury Christchurch NZ School of Earth and Environment University of Canterbury Christchurch NZ Department of Earth Sciences Montana State University Bozeman MT USA
An understanding of historical trends of flooding is essential to capture current risk as more people are exposed to flood hazards than ever before. Flood modeling relies on accurate and frequent remote sensing inputs... 详细信息
来源: 评论