咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,160 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,031 篇 工学
    • 1,642 篇 计算机科学与技术...
    • 1,346 篇 软件工程
    • 434 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 223 篇 生物工程
    • 174 篇 电气工程
    • 143 篇 机械工程
    • 141 篇 生物医学工程(可授...
    • 120 篇 电子科学与技术(可...
    • 90 篇 安全科学与工程
    • 78 篇 光学工程
    • 73 篇 仪器科学与技术
    • 71 篇 网络空间安全
    • 69 篇 化学工程与技术
    • 65 篇 建筑学
  • 838 篇 理学
    • 424 篇 数学
    • 244 篇 生物学
    • 167 篇 物理学
    • 132 篇 统计学(可授理学、...
    • 108 篇 系统科学
    • 79 篇 化学
  • 670 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 299 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 146 篇 医学
    • 135 篇 临床医学
    • 117 篇 基础医学(可授医学...
    • 66 篇 公共卫生与预防医...
  • 129 篇 法学
    • 103 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 60 篇 教育学
    • 60 篇 教育学
  • 36 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 艺术学

主题

  • 154 篇 software enginee...
  • 112 篇 information syst...
  • 86 篇 machine learning
  • 82 篇 software
  • 67 篇 deep learning
  • 66 篇 software systems
  • 61 篇 accuracy
  • 60 篇 systems engineer...
  • 57 篇 data mining
  • 56 篇 training
  • 55 篇 semantics
  • 55 篇 security
  • 52 篇 computer science
  • 52 篇 computer archite...
  • 51 篇 feature extracti...
  • 51 篇 artificial intel...
  • 49 篇 computational mo...
  • 45 篇 internet of thin...
  • 43 篇 cloud computing
  • 40 篇 application soft...

机构

  • 61 篇 department of so...
  • 26 篇 department of so...
  • 25 篇 department of in...
  • 24 篇 state key labora...
  • 22 篇 school of softwa...
  • 19 篇 school of inform...
  • 18 篇 college of compu...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 12 篇 department of so...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 school of intell...
  • 11 篇 sri lanka instit...
  • 10 篇 uts-amss joint r...

作者

  • 67 篇 shabtai asaf
  • 64 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 18 篇 jakimi abdeslam
  • 17 篇 ruisheng zhang
  • 16 篇 fire michael
  • 16 篇 buyya rajkumar
  • 16 篇 abdeslam jakimi
  • 16 篇 shahar yuval
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 2,927 篇 英文
  • 353 篇 其他
  • 20 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering"
3303 条 记 录,以下是81-90 订阅
排序:
XAI4RE – Using Explainable AI for Responsible and Ethical AI  25
XAI4RE – Using Explainable AI for Responsible and Ethical A...
收藏 引用
Adjunct Proceedings of the 33rd ACM Conference on User Modeling, Adaptation and Personalization
作者: Avital Shulner-Tal Julia Sheidin Braude College of Engineering Software Engineering & Information Systems Karmiel Israel
As Artificial Intelligence (AI) systems are increasingly integrated into high-stakes domains, the demand for transparency has become paramount. The opacity of "black-box" models poses significant challenges ... 详细信息
来源: 评论
Daily activity monitoring system designed for elderly people using hidden Markov models based on real world datasets
收藏 引用
International Journal of Intelligent systems Technologies and Applications 2023年 第1期21卷 40-55页
作者: Bouali, Chaima Habert, Olivier Tahiri, Abderrahim Laboratory of Information Systems and Software Engineering National School of Applied Sciences Tetouan Morocco Laboratoire de Conception Optimisation et Modélisation des Systèmes Metz France
This work describes how our abnormal behaviour detection system functions for seniors in their home. Our research is based on the data gathered by a domotic box that is available for purchase. The box was initially in... 详细信息
来源: 评论
Analyzing XSS Attack information Content on Social Media  6
Analyzing XSS Attack Information Content on Social Media
收藏 引用
6th International Conference on Cybernetics and Intelligent System, ICORIS 2024
作者: Hanapi, Khaerunnisa Harlina, Sitti Arifin, Suci Ramadhani Arifin, Arham Oktavianus, Michael Ahyuna Department of Information Systems Dipa Makassar University Makassar Indonesia Department of Informatics Engineering Dipa Makassar University Makassar Indonesia Department of Software Engineering Dipa Makassar University Makassar Indonesia
Social media has become more than just a communication tool;it's now a rapidly evolving platform for sharing information, including cybersecurity threats like XSS attacks. This study investigates if analyzing coll... 详细信息
来源: 评论
Deep Learning-Based Audio Splicing Forgery Detection Using PVTv2 Transformer
Deep Learning-Based Audio Splicing Forgery Detection Using P...
收藏 引用
2024 Innovations in Intelligent systems and Applications Conference, ASYU 2024
作者: Kanca, Elif Gulsoy, Tolgahan Ustubioglu, Arda Ustubioglu, Beste Ayas, Selen Baykal Kablan, Elif Ulutas, Guzin Department of Software Engineering Karadeniz Technical University Trabzon Turkey Department of Management Information Systems Trabzon University Trabzon Turkey Department of Computer Engineering Karadeniz Technical University Trabzon Turkey
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ... 详细信息
来源: 评论
The Future of Mobile Payments: Blockchain-Based Solutions  24
The Future of Mobile Payments: Blockchain-Based Solutions
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Obaid, Mahmoud Abumwais, Allam Hodrob, Rami Odeh, Suhail Obaid, Murad Arab American University Computer Systems Engineering Jenin Palestine Bethlehem University Software Engineering Bethlehem Palestine Cyprus International University Management Information Systems Northern Cyprus Turkey
Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts... 详细信息
来源: 评论
How to Do Things without Words: Modeling Semantic Drift of Emoji
How to Do Things without Words: Modeling Semantic Drift of E...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Arviv, Eyal Tsur, Oren Software and Information Systems Engineering Ben Gurion University of the Negev Israel
Emoji have become a significant part of our informal textual communication. Previous work, addressing the societal and linguistic functions of emoji, overlooked the relation between the semantics and the visual variat... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based software systems
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论
Performance Evaluation of Clustering Algorithms for Enhancing Test Case Prioritization in Regression Testing  4
Performance Evaluation of Clustering Algorithms for Enhancin...
收藏 引用
4th International Conference on Advanced Research in Computing, ICARC 2024
作者: Puviskar, S. Prabath Wasalthilaka, W.V.S.K. Kumara, B.T.G.S. Sabaragamuwa University of Sri Lanka Department of Computing & Information Systems Sri Lanka Sabaragamuwa University of Sri Lanka Department of Software Engineering Sri Lanka
Regression testing plays a crucial role in maintain software quality as applications evolving and getting more complex. Selection of a regression testing technique significantly influences overall software quality. In... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论