咨询与建议

限定检索结果

文献类型

  • 2,236 篇 会议
  • 1,272 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,564 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,199 篇 工学
    • 1,758 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 475 篇 信息与通信工程
    • 317 篇 控制科学与工程
    • 234 篇 生物工程
    • 191 篇 电气工程
    • 154 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 94 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 79 篇 网络空间安全
    • 78 篇 化学工程与技术
    • 72 篇 建筑学
    • 64 篇 动力工程及工程热...
  • 941 篇 理学
    • 460 篇 数学
    • 265 篇 生物学
    • 194 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 122 篇 系统科学
    • 88 篇 化学
  • 707 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 260 篇 工商管理
  • 160 篇 医学
    • 144 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 68 篇 公共卫生与预防医...
  • 138 篇 法学
    • 108 篇 社会学
  • 95 篇 经济学
    • 94 篇 应用经济学
  • 63 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 91 篇 machine learning
  • 84 篇 software
  • 74 篇 deep learning
  • 66 篇 software systems
  • 66 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 58 篇 semantics
  • 58 篇 security
  • 57 篇 data mining
  • 56 篇 artificial intel...
  • 55 篇 computer science
  • 55 篇 computational mo...
  • 54 篇 computer archite...
  • 52 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 56 篇 department of so...
  • 26 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 22 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 67 篇 shabtai asaf
  • 61 篇 elovici yuval
  • 28 篇 puzis rami
  • 27 篇 ismail leila
  • 20 篇 rokach lior
  • 17 篇 fire michael
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 16 篇 buyya rajkumar
  • 15 篇 abdeslam jakimi
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,418 篇 英文
  • 120 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3564 条 记 录,以下是191-200 订阅
排序:
Improving students’programming quality with the continuous inspection process:a social coding perspective
收藏 引用
Frontiers of Computer Science 2020年 第5期14卷 43-60页
作者: Yao Lu Xinjun Mao Tao Wang Gang Yin Zude Li College of Computer National University of Defense TechnologyChangsha410073China Key Laboratory of Software Engineering for Complex Systems Changsha410073China School of Information Science and Engineering Central South UniversityChangsha410012China
College students majoring in computer science and software engineering need to master skills for high-quality ***,rich research has shown that both the teaching and learning of high-quality programming are challenging... 详细信息
来源: 评论
State-of-the-art AI-based Learning Approaches for Deepfake Generation and Detection, Analyzing Opportunities, Threading through Pros, Cons, and Future Prospects
arXiv
收藏 引用
arXiv 2025年
作者: Goyal, Harshika Wajid, Mohammad Saif Wajid, Mohd Anas Khanday, Akib Mohi Ud Din Neshat, Mehdi Gandomi, Amir Indian Institute of Technology Kharagpur India Department of Computer Science and Intelligent Systems Tecnológico de Monterrey Monterrey Mexico Institute for the Future of Education TEC de Monterrey Monterrey Mexico Department of Computer Science and Software Engineering United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates Department of Computer Science Samarkand International University of Technology Samarkand Uzbekistan Faculty of Engineering and Information Technology University of Technology Sydney Ultimo SydneyNSW2007 Australia Obuda University Budapest1034 Hungary School of Computer and Mathematical Sciences University of Adelaide Adelaide5005 Australia
The rapid expansion and advancement of deepfake technology, which is specifically designed to create incredibly lifelike facial imagery and video content, has ignited a remarkable level of interest and curiosity acros... 详细信息
来源: 评论
The extended schematic protection model
收藏 引用
Journal of Computer Security 1992年 第3-4期1卷 335-383页
作者: Ammann, Paul E. Sandhu, Ravi S. Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030 United States
Access control models provide a formalism and framework for specifying control over access to information and other resources in multi-user computer systems. Useful access control models must balance expressive power ...
来源: 评论
Time-intervals-related pattern selection for continuous event prediction
收藏 引用
Pattern Recognition 2025年 168卷
作者: Nevo Itzhak Szymon Jaroszewicz Robert Moskovitch Software and Information Systems Engineering Ben-Gurion University of the Negev Beer Sheva Israel Institute of Computer Science Polish Academy of Sciences Warsaw Poland Faculty of Mathematics and Information Science Warsaw University of Technology Warsaw Poland
Symbolic time intervals (STIs) are used in different domains to represent real-life events with varying durations, like traffic light timing or medical treatments. Multivariate temporal data may include STIs and event...
来源: 评论
Eliminating polyinstantiation securely
收藏 引用
Computers and Security 1992年 第6期11卷 547-562页
作者: Sandhu, Ravi S. Jajodia, Sushil Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030 United States
Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others hav... 详细信息
来源: 评论
Lattice-based enforcement of Chinese Walls
收藏 引用
Computers and Security 1992年 第8期11卷 753-763页
作者: Sandhu, Ravi S. Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030 United States
The Chinese Wall policy was identified and so named by Brewer and Nash. This policy arises in the financial segment of the commercial sector, which provides consulting services to other companies. Consultants naturall... 详细信息
来源: 评论
French language interface for Xml databases  1
French language interface for Xml databases
收藏 引用
1st International Conference of Computer Science and Renewable Energies, ICCSRE 2018
作者: Bais, Hanane Machkour, Mustapha Team of Engineering of Information Systems Information Systems and Vision Laboratory Faculty of Sciences Ibn Zohr University Agadir Morocco
To extract information from a database, it is necessary to formulate queries in terms of the language used by the database, such as Structured Query Language (SQL). However, non-expert users who are not computer skill... 详细信息
来源: 评论
A cost-effective approach using generative AI and gamification to enhance biomedical treatment and real-time biosensor monitoring
收藏 引用
Scientific Reports 2025年 第1期15卷 1-16页
作者: Khan, Abdullah Ayub Laghari, Asif Ali Alsafyani, Majed Baqasah, Abdullah M. Kryvinska, Natalia Almadhor, Ahmad Alroobaea, Roobaea Gregus, Michal Department of Computer Science Bahria University Karachi Campus Karachi 75260 Pakistan Software Collage Shenyang Normal University Shenyang China Department of Computer Science College of Computers and Information Technology Taif University P. O. Box 11099 Taif 21944 Saudi Arabia Department of Information Technology College of Computers and Information Technology Taif University Taif 21974 Saudi Arabia Department of Information Management and Business Systems Faculty of Management Comenius University Bratislava Odbojárov 10 Bratislava 25 82005 Slovakia Department of Computer Engineering and Networks College of Computer and Information Sciences Jouf University Sakaka 72388 Saudi Arabia
Biosensors are crucial to the diagnosis process since they are designed to detect a specific biological analyte by changing from a biological entity into electrical signals that can be processed for further inspection... 详细信息
来源: 评论
information Leakage Problem in High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs
收藏 引用
Chinese Physics Letters 2016年 第7期33卷 14-15页
作者: 刘志昊 陈汉武 刘文杰 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast University Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information TechnologyUniversity of Technology Sydney School of Computer and Software Nanjing University of Information Science & Technology
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication pr... 详细信息
来源: 评论
Systematic Review of Machine Learning-Based Open-Source software Maintenance Effort Estimation
收藏 引用
Recent Advances in Computer Science and Communications 2023年 第3期16卷 27-51页
作者: Miloudi, Chaymae Cheikhi, Laila Abran, Alain Software Project Management Team ENSIAS Mohammed V. University in Rabat Rabat Morocco Department of Software Engineering & Information Technology École de Technologie Supérieure Montréal Canada
Background: software maintenance is known as a laborious activity in the software lifecycle and is often considered more expensive than other activities. Open-Source software (OSS) has gained considerable acceptance i... 详细信息
来源: 评论