咨询与建议

限定检索结果

文献类型

  • 2,236 篇 会议
  • 1,272 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,564 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,199 篇 工学
    • 1,758 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 475 篇 信息与通信工程
    • 317 篇 控制科学与工程
    • 234 篇 生物工程
    • 191 篇 电气工程
    • 154 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 94 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 79 篇 网络空间安全
    • 78 篇 化学工程与技术
    • 72 篇 建筑学
    • 64 篇 动力工程及工程热...
  • 941 篇 理学
    • 460 篇 数学
    • 265 篇 生物学
    • 194 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 122 篇 系统科学
    • 88 篇 化学
  • 707 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 260 篇 工商管理
  • 160 篇 医学
    • 144 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 68 篇 公共卫生与预防医...
  • 138 篇 法学
    • 108 篇 社会学
  • 95 篇 经济学
    • 94 篇 应用经济学
  • 63 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 91 篇 machine learning
  • 84 篇 software
  • 74 篇 deep learning
  • 66 篇 software systems
  • 66 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 58 篇 semantics
  • 58 篇 security
  • 57 篇 data mining
  • 56 篇 artificial intel...
  • 55 篇 computer science
  • 55 篇 computational mo...
  • 54 篇 computer archite...
  • 52 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 56 篇 department of so...
  • 26 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 22 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 67 篇 shabtai asaf
  • 61 篇 elovici yuval
  • 28 篇 puzis rami
  • 27 篇 ismail leila
  • 20 篇 rokach lior
  • 17 篇 fire michael
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 16 篇 buyya rajkumar
  • 15 篇 abdeslam jakimi
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,418 篇 英文
  • 120 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3564 条 记 录,以下是201-210 订阅
排序:
Data Owner Benefit-Driven Design of People Analytics
收藏 引用
Proceedings of the ACM on Human-Computer Interaction 2023年 第EICS期7卷 1-38页
作者: Zander, Patrik Zieglmeier, Valentin Technical University of Munich TUMSchool of Computation Information and Technology Chair of Software and Systems Engineering Boltzmannstr. 3 Garching85748 Germany
With increasingly digitalized workplaces, the potential for sophisticated analyses of employee data rises. This increases the relevance of people analytics (PA), which are tools for the behavioral analysis of employee... 详细信息
来源: 评论
A New Model Indicator to Trade Foreign Exchange Market
A New Model Indicator to Trade Foreign Exchange Market
收藏 引用
International Conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Ahouat, Chaimae El Bouchti, Karim Reda, Oussama Mohamed Nadi, Oumaima Ziti, Soumia Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Team Rabat Morocco
The Foreign Exchange (FOREX) market is a financial market with a daily volume of around $6.6 trillion. The importance of Forex as the largest market in the world, traders need to have a trading plan to make profits an... 详细信息
来源: 评论
Rethinking People Analytics With Inverse Transparency by Design
收藏 引用
arXiv 2023年 第CSCW2期7卷 1-29页
作者: Zieglmeier, Valentin Pretschner, Alexander Technical University of Munich TUM School of Computation Information and Technology Software and Systems Engineering Boltzmannstr. 3 Garching85748 Germany
Employees work in increasingly digital environments that enable advanced analytics. Yet, they lack oversight over the systems that process their data. That means that potential analysis errors or hidden biases are har... 详细信息
来源: 评论
A combined approach of rock and genetic algorithm for clustering categorical data  7
A combined approach of rock and genetic algorithm for cluste...
收藏 引用
7th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2016
作者: Sowmiya, N. Valarmathi, B. Software and Systems Engineering School of Information Technology and Engineering VIT University VelloreTamil Nadu India
In this paper, a hybrid approach for clustering categorical data is developed. It integrates the ROCK clustering algorithm with genetic algorithm for the betterment of accuracy. The developed approach is tested for fo... 详细信息
来源: 评论
Emotion Analysis on Turkish Texts: A Systematic Mapping Study  6
Emotion Analysis on Turkish Texts: A Systematic Mapping Stud...
收藏 引用
6th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2022
作者: Altmay, Gizem Turhan, Cigdem Atilim University Information Systems Engineering Ankara Turkey Atilim University Software Engineering Ankara Turkey
In recent years, the increase in internet usage also led to an increase in data. Therefore, the importance of classification has increased to understand and analyze the data more easily, and this made emotion analysis... 详细信息
来源: 评论
Modeling agents negotiation in the semantic web environment E-Commerce application  2
Modeling agents negotiation in the semantic web environment ...
收藏 引用
2nd International Conference on information and Communication Technologies: From Theory to Applications, ICTTA 2006
作者: Shaer, Hani Abu Ali, Ramia Kheirbek, Ammar Wardeh, Maya Software Engineering and Information Systems Department Faculty of Information Technology Damascus University Damascus Syria
This paper defines the agents basic functionalities regarding negotiation, especially exchanging negotiation offers on the basis of agents ontologies. This paper also outlines a novel approach in choosing and implemen... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论
Modeling multi-agent society structure for the web E-Commerce application  2
Modeling multi-agent society structure for the web E-Commerc...
收藏 引用
2nd International Conference on information and Communication Technologies: From Theory to Applications, ICTTA 2006
作者: Shaer, Hani Abu Ali, Ramia Kheirbek, Ammar Wardeh, Maya Software Engineering and Information Systems Department Faculty of Information Technology Damascus University Damascus Syria
This paper defines a formal model that organizes agents into a social hierarchal structure so that they can easily communicate and negotiate. It also delineates the main algorithms agents can employ in order to achiev... 详细信息
来源: 评论
Expressive power of the schematic protection model
收藏 引用
Journal of Computer Security 1992年 第1期1卷 59-98页
作者: Sandhu, Ravi S. Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030-4444 United States
This paper we show that the Schematic Protection Model (SPM) subsumes several well-known protection models as particular instances. We show this for a diverse collection of models including the Bell-LaPadula multileve...
来源: 评论
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms  38
DeSparsify: Adversarial Attack Against Token Sparsification ...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Yehezkel, Oryan Zolfi, Alon Baras, Amit Elovici, Yuval Shabtai, Asaf Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel
Vision transformers have contributed greatly to advancements in the computer vision domain, demonstrating state-of-the-art performance in diverse tasks (e.g., image classification, object detection). However, their hi...
来源: 评论