咨询与建议

限定检索结果

文献类型

  • 2,098 篇 会议
  • 1,167 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,659 篇 计算机科学与技术...
    • 1,353 篇 软件工程
    • 445 篇 信息与通信工程
    • 306 篇 控制科学与工程
    • 224 篇 生物工程
    • 177 篇 电气工程
    • 144 篇 机械工程
    • 142 篇 生物医学工程(可授...
    • 121 篇 电子科学与技术(可...
    • 93 篇 安全科学与工程
    • 79 篇 光学工程
    • 76 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 69 篇 化学工程与技术
    • 68 篇 建筑学
    • 62 篇 动力工程及工程热...
  • 848 篇 理学
    • 428 篇 数学
    • 245 篇 生物学
    • 172 篇 物理学
    • 131 篇 统计学(可授理学、...
    • 108 篇 系统科学
    • 78 篇 化学
  • 684 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 251 篇 工商管理
  • 150 篇 医学
    • 137 篇 临床医学
    • 116 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 132 篇 法学
    • 106 篇 社会学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 60 篇 教育学
  • 37 篇 农学
  • 9 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 154 篇 software enginee...
  • 111 篇 information syst...
  • 86 篇 machine learning
  • 82 篇 software
  • 69 篇 deep learning
  • 66 篇 software systems
  • 61 篇 accuracy
  • 60 篇 systems engineer...
  • 57 篇 data mining
  • 57 篇 security
  • 57 篇 training
  • 55 篇 semantics
  • 52 篇 computer science
  • 52 篇 computer archite...
  • 52 篇 artificial intel...
  • 51 篇 computational mo...
  • 51 篇 feature extracti...
  • 45 篇 internet of thin...
  • 43 篇 cloud computing
  • 40 篇 application soft...

机构

  • 61 篇 department of so...
  • 26 篇 department of so...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 22 篇 school of softwa...
  • 19 篇 school of inform...
  • 18 篇 college of compu...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of inform...
  • 13 篇 school of electr...
  • 12 篇 department of so...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 school of intell...
  • 11 篇 sri lanka instit...
  • 10 篇 uts-amss joint r...

作者

  • 67 篇 shabtai asaf
  • 64 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 18 篇 jakimi abdeslam
  • 17 篇 ruisheng zhang
  • 16 篇 fire michael
  • 16 篇 buyya rajkumar
  • 16 篇 abdeslam jakimi
  • 16 篇 shahar yuval
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 12 篇 h. gomaa
  • 12 篇 rajkumar buyya
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai

语言

  • 2,837 篇 英文
  • 462 篇 其他
  • 21 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Information Systems Engineering"
3321 条 记 录,以下是71-80 订阅
排序:
Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel  1
收藏 引用
7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023
作者: Novick, Deborah Last, Mark Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva84105 Israel
This study aims at predicting whether an earthquake of magnitude greater than the regional median of maximum yearly magnitudes will occur during the next year. Prediction is performed by training various machine learn... 详细信息
来源: 评论
Comparative Analysis of Camera Calibration Algorithms for Football Applications  4
Comparative Analysis of Camera Calibration Algorithms for Fo...
收藏 引用
4th International Workshop on information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Sorokivskyi, Oleksandr Hotovych, Volodymyr Nazarevych, Oleg Shymchuk, Grygorii Department of Computer Science Faculty of Computer Information Systems and Software Engineering Ternopil Ivan Puluj National Technical University Ternopil Ukraine
In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca... 详细信息
来源: 评论
Research on Financial Statement Fraud Detection Method Based on Support Vector Machine  1
Research on Financial Statement Fraud Detection Method Based...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Yan, Yuan Wang, Zhenyu Zhang, Shuai Information Management and Information Systems Southwest Jiaotong University Sichuan Chengdu610031 China Software Engineering Beihang University Beijing Beijing100191 China Baoding071003 China
In order to improve the efficiency of financial statement fraud detection, a Support Vector Machine (SVM) model was adopted, combined with feature selection and dimensionality reduction techniques, to analyze the fina... 详细信息
来源: 评论
Implementation and Evaluation of Equitable Practices in an Introductory CS Course  2024
Implementation and Evaluation of Equitable Practices in an I...
收藏 引用
55th ACM Technical Symposium on Computer Science Education, SIGCSE 2024
作者: Najjar, Nadia Basu, Debarati Software and Information Systems University of North Carolina Charlotte United States Engineering Fundamentals Embry-Riddle Aeronautical University United States
Lack of diversity is a major challenge in CS education. One way to broaden participation and increase student success is the adoption of equitable pedagogical and grading practices. Lack of evaluation of such practice... 详细信息
来源: 评论
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
Computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Through Symbolic Execution  5
The Greed Trap: Uncovering Intrinsic Ethereum Honeypots Thro...
收藏 引用
5th International Conference on Blockchain Computing and Applications, BCCA 2023
作者: Norouzi, Mahtab Elgharabawy, Mounir Zhang, Kaiwen Software & IT Engineering École de Technologie Supérieure Montreal Canada Concordia Institute for Information Systems Engineering Concordia University Montreal Canada
Smart contracts are computer programs that run on blockchain networks, enabling secure, transparent, and decentralized transactions. However, the security of smart contracts has always been a critical issue in the blo... 详细信息
来源: 评论
Evaluating software Development Agents: Patch Patterns, Code Quality, and Issue Complexity in Real-World GitHub Scenarios  32
Evaluating Software Development Agents: Patch Patterns, Code...
收藏 引用
32nd IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2025
作者: Chen, Zhi Jiang, Lingxiao School of Computing and Information Systems Singapore Management University Centre for Research on Intelligent Software Engineering Singapore
In recent years, AI-based software engineering has progressed from pre-trained models to advanced agentic workflows, with software Development Agents representing the next major leap. These agents, capable of reasonin... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论