咨询与建议

限定检索结果

文献类型

  • 2,098 篇 会议
  • 1,167 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,659 篇 计算机科学与技术...
    • 1,353 篇 软件工程
    • 445 篇 信息与通信工程
    • 306 篇 控制科学与工程
    • 224 篇 生物工程
    • 177 篇 电气工程
    • 144 篇 机械工程
    • 142 篇 生物医学工程(可授...
    • 121 篇 电子科学与技术(可...
    • 93 篇 安全科学与工程
    • 79 篇 光学工程
    • 76 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 69 篇 化学工程与技术
    • 68 篇 建筑学
    • 62 篇 动力工程及工程热...
  • 848 篇 理学
    • 428 篇 数学
    • 245 篇 生物学
    • 172 篇 物理学
    • 131 篇 统计学(可授理学、...
    • 108 篇 系统科学
    • 78 篇 化学
  • 684 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 251 篇 工商管理
  • 150 篇 医学
    • 137 篇 临床医学
    • 116 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 132 篇 法学
    • 106 篇 社会学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 60 篇 教育学
  • 37 篇 农学
  • 9 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 154 篇 software enginee...
  • 111 篇 information syst...
  • 86 篇 machine learning
  • 82 篇 software
  • 69 篇 deep learning
  • 66 篇 software systems
  • 61 篇 accuracy
  • 60 篇 systems engineer...
  • 57 篇 data mining
  • 57 篇 security
  • 57 篇 training
  • 55 篇 semantics
  • 52 篇 computer science
  • 52 篇 computer archite...
  • 52 篇 artificial intel...
  • 51 篇 computational mo...
  • 51 篇 feature extracti...
  • 45 篇 internet of thin...
  • 43 篇 cloud computing
  • 40 篇 application soft...

机构

  • 61 篇 department of so...
  • 26 篇 department of so...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 22 篇 school of softwa...
  • 19 篇 school of inform...
  • 18 篇 college of compu...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of inform...
  • 13 篇 school of electr...
  • 12 篇 department of so...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 school of intell...
  • 11 篇 sri lanka instit...
  • 10 篇 uts-amss joint r...

作者

  • 67 篇 shabtai asaf
  • 64 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 18 篇 jakimi abdeslam
  • 17 篇 ruisheng zhang
  • 16 篇 fire michael
  • 16 篇 buyya rajkumar
  • 16 篇 abdeslam jakimi
  • 16 篇 shahar yuval
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 12 篇 h. gomaa
  • 12 篇 rajkumar buyya
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai

语言

  • 2,837 篇 英文
  • 462 篇 其他
  • 21 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Information Systems Engineering"
3321 条 记 录,以下是91-100 订阅
排序:
IPL Data Analysis by Web Scraping and Using PowerBI  2
IPL Data Analysis by Web Scraping and Using PowerBI
收藏 引用
2nd International Conference on IT Innovations and Knowledge Discovery, ITIKD 2024
作者: Mogith, P. Mothiswar, T.B.G. Abubak, Mohammad Jagannathan, J. Balaganesh, N. Vellore Institute of Technology Software Engineering Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Cricket fans throughout the world avidly follow the Indian Premier League (IPL), a competition of great fame. The IPL data is examined in this using Exploratory Data Analysis (EDA) approaches to find hidden trends, pa... 详细信息
来源: 评论
Analyzing XSS Attack information Content on Social Media  6
Analyzing XSS Attack Information Content on Social Media
收藏 引用
6th International Conference on Cybernetics and Intelligent System, ICORIS 2024
作者: Hanapi, Khaerunnisa Harlina, Sitti Arifin, Suci Ramadhani Arifin, Arham Oktavianus, Michael Ahyuna Department of Information Systems Dipa Makassar University Makassar Indonesia Department of Informatics Engineering Dipa Makassar University Makassar Indonesia Department of Software Engineering Dipa Makassar University Makassar Indonesia
Social media has become more than just a communication tool;it's now a rapidly evolving platform for sharing information, including cybersecurity threats like XSS attacks. This study investigates if analyzing coll... 详细信息
来源: 评论
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
2024 Innovations in Intelligent systems and Applications Conference, ASYU 2024
作者: Kanca, Elif Gulsoy, Tolgahan Ustubioglu, Arda Ustubioglu, Beste Ayas, Selen Baykal Kablan, Elif Ulutas, Guzin Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论
The Future of Mobile Payments: Blockchain-Based Solutions  24
The Future of Mobile Payments: Blockchain-Based Solutions
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Obaid, Mahmoud Abumwais, Allam Hodrob, Rami Odeh, Suhail Obaid, Murad Arab American University Computer Systems Engineering Jenin Palestine Bethlehem University Software Engineering Bethlehem Palestine Cyprus International University Management Information Systems Northern Cyprus Turkey
Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts... 详细信息
来源: 评论
How to Do Things without Words: Modeling Semantic Drift of Emoji
How to Do Things without Words: Modeling Semantic Drift of E...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Arviv, Eyal Tsur, Oren Software and Information Systems Engineering Ben Gurion University of the Negev Israel
Emoji have become a significant part of our informal textual communication. Previous work, addressing the societal and linguistic functions of emoji, overlooked the relation between the semantics and the visual variat... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
Using transformers and Bi-LSTM with sentence embeddings for prediction of openness human personality trait
收藏 引用
PeerJ Computer Science 2025年 11卷 1-42页
作者: Naz, Anam Khan, Hikmat Ullah Alsahfi, Tariq Alhajlah, Mousa Alshemaimri, Bader Daud, Ali Department of Information Technology University of Sargodha Punjab Sargodha Pakistan Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Applied of Computer Science College King Saud University Riyadh Saudi Arabia Software Engineering Department College of Computing and Information Sciences King Saud University Riyadh Saudi Arabia Faculty of Resilience Rabdan Academy Abu Dhabi United Arab Emirates
Understanding human personality traits is significant as it helps in decision making related to consumers’ behavior, career counselling, team building and top candidates’ selection for recruitment. Among various tra... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based software systems
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论
Performance Evaluation of Clustering Algorithms for Enhancing Test Case Prioritization in Regression Testing  4
Performance Evaluation of Clustering Algorithms for Enhancin...
收藏 引用
4th International Conference on Advanced Research in Computing, ICARC 2024
作者: Puviskar, S. Prabath Wasalthilaka, W.V.S.K. Kumara, B.T.G.S. Sabaragamuwa University of Sri Lanka Department of Computing & Information Systems Sri Lanka Sabaragamuwa University of Sri Lanka Department of Software Engineering Sri Lanka
Regression testing plays a crucial role in maintain software quality as applications evolving and getting more complex. Selection of a regression testing technique significantly influences overall software quality. In... 详细信息
来源: 评论
Audio-Assisted Smart Home Security Monitoring with Few Samples
Audio-Assisted Smart Home Security Monitoring with Few Sampl...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Chi, Haotian Ma, Qi Zhang, Yuxuan Fu, Chenglong Wang, Yuwei Geng, Haijun Du, Xiaojiang Shanxi University School of Automation and Software Engineering Taiyuan China University of North Carolina at Charlotte Department of Software and Information Systems CharlotteNC United States Stevens Institute of Technology Department of Electical and Computer Engineering HobokenNJ United States
Smart home IoT devices have always been the target of various cyber attacks. By leveraging the smart home monitoring infrastructure, event-based anomaly detection is effective to detect anomalies that cause unfavorabl... 详细信息
来源: 评论