咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Systems Department"
2960 条 记 录,以下是171-180 订阅
排序:
Securing Multi-Tenant Cloud Environments with Fully Homomorphically Encrypted Secure Multiparty Computation
Securing Multi-Tenant Cloud Environments with Fully Homomorp...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Jagannathan, J. R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India
The aim of this work is to examine the application of FHE-SMPC as a viable security model for protecting the tenant isolation in multi-tenant cloud model. In multi-tenant environments, where various customers use the ... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Ramesh, P.S. Sudha, I. Jagannathan, J. Pandiarajan, Rajkumar Ponmalar, A. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy Of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India R.M.K. Engineering College Tamilnadu Chennai India
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature... 详细信息
来源: 评论
Process Discovery Automation: Benefits and Limitations  1
Process Discovery Automation: Benefits and Limitations
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Process discovery algorithms incorporating domain knowledge can have varying levels of user involvement. It ranges from fully automated algorithms to interactive approaches where the user makes critical decisions abou... 详细信息
来源: 评论
Advanced Machine Learning Algorithms for 1Predictive Analytics in Healthcare to Enhance Patient Outcomes with Data-Driven Insights
Advanced Machine Learning Algorithms for 1Predictive Analyti...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Pandiarajan, Rajkumar Jagannathan, J. Ramesh, P.S. Ponmalar, A. Sudha School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
This research aims to explore the use of modern complex defensive machine learning algorithms in the provision of predictive analytics for health improvement. Incorporating electronic health records, medical image inf... 详细信息
来源: 评论
Research and development of an information system for speech recognition based on neural network algorithms metrics  4
Research and development of an information system for speech...
收藏 引用
4th IEEE International Conference on Smart Information systems and Technologies, SIST 2024
作者: Kanashev, Maksat Mukasheva, Assel Yedilkhan, Didar Rakhmetulaeva, Sabina Gnatyuk, Sergiy Nazym, Mirambayeva Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The Department of Computer Engineering Astana IT University Astana Kazakhstan The Department of Information Systems International University of Information Technologies Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th... 详细信息
来源: 评论
Enhancing Healthcare Data Security in Cloud Computing systems through Advanced Homomorphic Encryption Techniques Integrated with Cuckoo Search Optimization Algorithm
Enhancing Healthcare Data Security in Cloud Computing System...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Sudha, I. Ramesh, P.S. Ponmalar, A. Jagannathan, J. Pandiarajan, Rajkumar Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav... 详细信息
来源: 评论
Advanced Multi-Spectral Image Processing Techniques for Enhanced Remote Sensing and Comprehensive Environmental Monitoring in Diverse Ecosystems
Advanced Multi-Spectral Image Processing Techniques for Enha...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Jagannathan, J. Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India
The research is aimed at improvement of multi-spectral image analysis for remote sensing and monitoring the environment at various ecosystems. A combined spectral imagery encompasses several spectrums at a time compar... 详细信息
来源: 评论
Project Assessment in Offshore software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
The Queue’s Automated Creation of Doctor’s Calls by Patients in the Hospital with Visualization via the Mobile Application
收藏 引用
Journal of Mobile Multimedia 2023年 第3期19卷 897-934页
作者: Zhuravska, Iryna Dvoretskyi, Mykhailo Kulakovska, Inessa Boiko, Anzhela Dvoretska, Svitlana Department of Computer Engineering Petro Mohyla Black Sea National University Mykolaiv Ukraine Software Engineering Department Petro Mohyla Black Sea National University Mykolaiv Ukraine Department of Intelligent Information Systems Petro Mohyla Black Sea National University Mykolaiv Ukraine
The spread of the COVID-19 virus is challenging society to provide medical care to a growing number of patients in the hospital. It is important to determine the patient from whom an urgent appeal was received earlier... 详细信息
来源: 评论
Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities
Extending ISO 15118-20 EV Charging: Preventing Downgrade Att...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Ross Porter Morteza Biglari-Abhari Benjamin Tan Duleepa Thrimawithana Electrical Computer Systems & Software Engineering Department University of Auckland Auckland New Zealand Department of Electrical and Software Engineering University of Calgary Calgary Canada
Previous works have identified that EV charging can be weaponised to attack the power grid. As a case study, we consider the newest charging protocol ISO 15118–20, which provides a high-level communication protocol f... 详细信息
来源: 评论