咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Systems Department"
2960 条 记 录,以下是81-90 订阅
排序:
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Groove Gap Waveguide Crossover for Butler Matrices and Beamforming in Millimeter-Wave Satellite Antenna systems
Groove Gap Waveguide Crossover for Butler Matrices and Beamf...
收藏 引用
International Conference on Radioelektronika
作者: Mohammad Alibakhshikenari Peiman Parand Ali Zidour Bal S. Virdee Lida Kouhalvandi Patrick Longhi Takfarinas Saber Ernesto Limiti Electronics Engineering Department University of Rome “Tor Vergata” Rome Italy Department of Electrical Systems Engineering Faculty of Technology University of M'hamed Bougara Boumerdes Algeria Center for Communications Technology London Metropolitan University London UK Department of Electrical and Electronics Engineering Dogus University Istanbul Turkiye Lero Science Foundation Ireland Centre for Software School of Computer Science University of Galway Galway Ireland
This paper presents an innovative H-plane crossover based on groove gap-waveguide (GGW) technology for high-performance millimeter-wave (mm-wave) circuits. The design facilitates the development of key transmission co... 详细信息
来源: 评论
Loss Functions in Deep Learning: A Comprehensive Review
arXiv
收藏 引用
arXiv 2025年
作者: Elharrouss, Omar Mahmood, Yasir Bechqito, Yassine Serhani, Mohamed Adel Badidi, Elarbi Riffi, Jamal Tairi, Hamid Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates Department of Information Systems College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Informatics Faculty of Sciences Dhar El Mahraz Sidi Mohamed Ben Abdellah University Fez Morocco
Loss functions are at the heart of deep learning, shaping how models learn and perform across diverse tasks. They are used to quantify the difference between predicted outputs and ground truth labels, guiding the opti... 详细信息
来源: 评论
software engineering and computer systems  1
收藏 引用
丛书名: Communications in computer and Information Science
1000年
作者: Jasni Mohamad Zain Wan Maseri bt Wan Mohd Eyas El-Qawasmeh
This Three-Volume-Set constitutes the refereed proceedings of the Second International Conference on software engineering and computer systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 190 revised full... 详细信息
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论
software engineering and computer systems  1
收藏 引用
丛书名: Communications in computer and Information Science
1000年
作者: Jasni Mohamad Zain Wan Maseri bt Wan Mohd Eyas El-Qawasmeh
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on software engineering and computer systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 190 revised full p... 详细信息
来源: 评论
An anonymous and privacy-preserving lightweight authentication protocol for secure communication in UAV-assisted IoAV networks
收藏 引用
computer Communications 2025年 239卷
作者: Shariq, Mohd Jamil, Norziana Rawat, Gopal Singh Chaudhry, Shehzad Ashraf Masud, Mehedi Cangelosi, Angelo Department of Information Systems and Security College of IT UAE University P.O.Box 15551 Al Ain Abu Dhabi United Arab Emirates Bennett University Greater Noida201310 India Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul34398 Turkey Department of Computer Science College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Manchester Centre for Robotics and AI University of Manchester United Kingdom
With the rapid proliferation of the Internet of Things (IoT), autonomous vehicles (AVs), or self-driving cars, rely heavily on real-time data sharing and message exchanges over wireless networks. AVs use sensors, arti... 详细信息
来源: 评论
S2KAN-SLAM: Elastic Neural LiDAR SLAM with SDF Submaps and Kolmogorov-Arnold Networks
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Wang, Zhong Zhang, Lin Wang, Hesheng Shanghai Jiao Tong University State Key Laboratory of Avionics Integration and Aviation System-of-Systems Synthesis Department of Automation Key Laboratory of System Control and Information Processing of Ministry of Education Shanghai200240 China Tongji University School of Computer Science and Technology National Pilot Software Engineering School with Chinese Characteristics Shanghai201804 China
Traditional LiDAR SLAM approaches prioritize localization over mapping, yet high-precision dense maps are essential for numerous applications involving intelligent agents. Recent advancements have introduced methods l... 详细信息
来源: 评论
DESIGN OF MECHANISMS FOR ENSURING THE EXECUTION OF TASKS IN PROJECT PLANNING
arXiv
收藏 引用
arXiv 2025年
作者: Mulesa, Oksana Horvat, Petro Radivilova, Tamara Sabadosh, Volodymyr Baranovskyi, Oleksii Duran, Sergii Department of Software Systems Uzhhorod National University Narodna sq. 3 Uzhhorod88000 Ukraine Department of Computer Systems and Networks Uzhhorod National University Narodna sq. 3 Uzhhorod88000 Ukraine V. V. Popovskyy Department of Infocommunication Engineering Kharkiv National University of Radio Electronics Nauky ave. 14 Kharkiv61166 Ukraine Intellias Company Kapushanska str. 177 А Uzhhorod88000 Ukraine Department of Computer Science Blekinge Institute of Technology Blekinge Karlskrona37179 Sweden
This paper reports an analysis of aspects of the project planning stage. The object of research is the decision-making processes that take place at this stage. This work considers the problem of building a hierarchy o... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论