咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Systems Department"
2960 条 记 录,以下是31-40 订阅
排序:
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns  24
Design, Modeling and Simulation of Cybercriminal Personality...
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Jeongkeun Shin Geoffrey B. Dobson L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA and Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims' human factors affect...
来源: 评论
VisioSLR: A Vision Data-Driven Framework for Sign Language Video Recognition and Performance Evaluation on Fine-Tuned YOLO Models
收藏 引用
Procedia computer Science 2025年 257卷 85-92页
作者: Leila Ismail Nada Shahin Henok Tesfaye Alain Hennebelle Intelligent Distributed Computing and Systems (INDUCE) Lab Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates Independent Researcher
With the emergence of AI for good, there has been an increasing interest in building computer vision data-driven deep learning inclusive AI solutions. Sign language Recognition (SLR) has gained attention recently. It ... 详细信息
来源: 评论
Harnessing the Power of AI with Deep Learning: Innovations and Implications
Harnessing the Power of AI with Deep Learning: Innovations a...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Upender, Talluri Sathiyamoorthy, C. Udayakumar, K. Kirubakaran, D. Purushothaman, V. Raja, Kiruba Thangam CMR College of Engineering and Technology Department of CSE Medchal Telangana Hyderabad India Department of Commerce Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of CSE Tamil Nadu Chennai India R.M.K. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Chennai Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India VIT University Department of Software and Systems Engineering Tamil Nadu Vellore India
The rapid advancements in artificial intelligence (AI) and deep learning have revolutionized various sectors, enabling unprecedented levels of innovation and efficiency. This paper delves into the transformative impac... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
Intelligent Data Communication Technologies and Internet of Things (IDCIoT), International Conference on
作者: N. Srinivasa Gupta B. Valarmathi Ishaan Hiwanj Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India
Predicting water quality is essential to preserving human health and environmental sustain ability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accura... 详细信息
来源: 评论
Optimizing Existing SHM systems: Retasking as a Self-Healing Solution for Improved Fault Tolerance
Optimizing Existing SHM Systems: Retasking as a Self-Healing...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Aaron Mano Cherian D. Ajitha Avanish Gouraha Dipanshu Mandal School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamilnadu India Department of Software Systems School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamilnadu India
This paper focuses on self-healing algorithms in structural health monitoring (SHM) systems centered around the enhancement of resilience and adaptability of the systems. In this study, imports from existing methods (... 详细信息
来源: 评论
Real-Time Freeway Traffic Anomalous Event Detection System via Radar Detector Sensors  25
Real-Time Freeway Traffic Anomalous Event Detection System v...
收藏 引用
Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical systems (with CPS-IoT Week 2025)
作者: Austin Coursey Junyi Ji Zhiyao Zhang William Barbour Marcos Quinones-Grueiro Tyler Derr Gautam Biswas Daniel B. Work Institute for Software Integrated Systems Vanderbilt University Nashville TN USA and Department of Computer Science Vanderbilt University Nashville TN USA Institute for Software Integrated Systems Vanderbilt University Nashville TN USA and Department of Civil and Environmental Engineering Vanderbilt University Nashville TN USA Institute for Software Integrated Systems Vanderbilt University Nashville TN USA Department of Computer Science Vanderbilt University Nashville TN USA Institute for Software Integrated Systems Vanderbilt University Nashville TN USA Department of Computer Science Vanderbilt University Nashville TN USA and Department of Civil and Environmental Engineering Vanderbilt University Nashville TN USA
Undetected anomalous incidents on the freeway, such as crashes, can cause increased congestion and secondary crashes. To address this problem, we recently released a real freeway traffic anomalous event detection data... 详细信息
来源: 评论
Exploratory Data Analysis and Predicting Indian Crime Against Women Using Machine Learning Approaches
Exploratory Data Analysis and Predicting Indian Crime Agains...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: N. Srinivasa Gupta B. Valarmathi K. Santhi T.Chellatamilan Sameeksha Nanda Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India
Crime forecasting is a critical endeavor aimed at preventing future criminal actions, specifically the rising rate of violence against women in India. This study proposes the model to predict crimes committed against ... 详细信息
来源: 评论
Enhancing Human Posture Detection with Hybrid Deep VGG16 and Attention Mechanism Network
收藏 引用
Procedia computer Science 2025年 258卷 1209-1218页
作者: Ogundokun Roseline Oluwaseun Rytis Maskeliūnas Federick Oscar Oluwakayode A. Oki Department of Software Engineering Kaunas University of Technology Kaunas 44249 Lithuania Department of Computer Science Landmark University Omu-Aran Nigeria Department of Computer Systems Engineering Tshwane University of Technology (TUT) Pretoria South Africa Adioo Technology Abuja Nigeria Department of Information Technology East London Walter Sisulu University South Africa
Human Posture Detection (HPD) and classification are the initial steps toward various computer vision applications related to security, advertisement, and healthcare. Even though more than three decades have passed, m... 详细信息
来源: 评论
LED there be DoS: Exploiting variable bitrate IP cameras for network DoS
arXiv
收藏 引用
arXiv 2025年
作者: Goldberg, Emmanuel Brodt, Oleg Elyashar, Aviad Puzis, Rami Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Cyber Labs@BGU Ben-Gurion University of the Negev Israel Department of Computer Science Shamoon College of Engineering Israel
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling high-quality video streaming while conserving network bandwidth. However, as the name suggests, variable-bitrate IP cameras can g... 详细信息
来源: 评论