咨询与建议

限定检索结果

文献类型

  • 2,236 篇 会议
  • 1,255 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,547 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,181 篇 工学
    • 1,738 篇 计算机科学与技术...
    • 1,414 篇 软件工程
    • 466 篇 信息与通信工程
    • 312 篇 控制科学与工程
    • 234 篇 生物工程
    • 182 篇 电气工程
    • 152 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 95 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 78 篇 化学工程与技术
    • 76 篇 网络空间安全
    • 73 篇 建筑学
    • 65 篇 土木工程
  • 934 篇 理学
    • 459 篇 数学
    • 262 篇 生物学
    • 189 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 87 篇 化学
  • 704 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 260 篇 工商管理
  • 158 篇 医学
    • 142 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 135 篇 法学
    • 107 篇 社会学
  • 94 篇 经济学
    • 93 篇 应用经济学
  • 61 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 88 篇 machine learning
  • 86 篇 software
  • 73 篇 deep learning
  • 66 篇 software systems
  • 66 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 59 篇 semantics
  • 58 篇 security
  • 58 篇 artificial intel...
  • 57 篇 data mining
  • 57 篇 computational mo...
  • 55 篇 computer science
  • 54 篇 computer archite...
  • 53 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 57 篇 department of so...
  • 27 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 66 篇 shabtai asaf
  • 60 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 17 篇 abdeslam jakimi
  • 16 篇 fire michael
  • 15 篇 buyya rajkumar
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,413 篇 英文
  • 108 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3547 条 记 录,以下是331-340 订阅
排序:
Effectiveness of Using Deep Learning for Blister Blight Identification in Sri Lankan Tea
Effectiveness of Using Deep Learning for Blister Blight Iden...
收藏 引用
2023 International Research Conference on Smart Computing and systems engineering, SCSE 2023
作者: Hewawitharana, G.H.A.U. Nawarathne, U.M.L.A. Hassan, A.S.F. Wijerathna, Lochana M. Sinniah, G.D. Vidhanaarachchi, Samitha P. Wickramarathne, Jagath Wijekoon, Janaka L. Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Tea Research Institute of Sri Lanka Plant Pathology Division Talawakelle Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Military Technological College Systems Engineering Department Muscat Oman
Ceylon tea industry faces a major challenge in the form of pathogen-induced crop loss, with Blister Blight (BB) caused by Exobasidium vexans posing the greatest threat, leading to harvest losses of over 30%. This fung... 详细信息
来源: 评论
Deviation of Physiological from Chronological Age Is Associated with Health  32
Deviation of Physiological from Chronological Age Is Associa...
收藏 引用
32nd Medical Informatics Europe Conference, MIE 2022
作者: Peretz, Lin Rappoport, Nadav Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel 1 Ben-Gurion Boulevard Beer-Sheva Israel
Biological age may be of higher importance than chronological age, yet biological age is not trivial to estimate. This study presents a regression model to predict age using routine clinical tests like laboratory test... 详细信息
来源: 评论
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network
arXiv
收藏 引用
arXiv 2023年
作者: Semyonov, Natan Puzis, Rami Shabtai, Asaf Katz, Gilad Department of Software and Information Systems Engineering Ben Gurion University of the Negev Israel
Watermarking is one of the most important copyright protection tools for digital media. The most challenging type of watermarking is the imperceptible one, which embeds identifying information in the data while retain... 详细信息
来源: 评论
Discussion Paper: The Threat of Real Time Deepfakes
arXiv
收藏 引用
arXiv 2023年
作者: Frankovits, Guy Mirsky, Yisroel Ben-Gurion University Department of Software and Information Systems Engineering Beersheba Israel
Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes" are being used to spread misi... 详细信息
来源: 评论
DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches  4
DDoS Detection Using Active and Idle Features of Revised CIC...
收藏 引用
4th International Conference on Advanced Science and engineering, ICOASE 2022
作者: Ali, Basheer Husham Sulaiman, Nasri Al-Haddad, S.A.R. Atan, Rodziah Hassan, Siti Lailatul Mohd Department of Electrical and Electronic Engineering Serdang Malaysia Faculty of Engineering Department of Electrical and Electronic Engineering Serdang Malaysia Department of Computer and Communication Systems Engineering Serdang Malaysia Software Eng. and Information Systems Dept Serdang Malaysia School of Electrical Engineering Universiti Teknologi Mara Shah Alam Malaysia
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down ... 详细信息
来源: 评论
Quantum Computing's Impact on Data Encryption:Methodologies, Implementation, and Future Directions: Exploring the BB84 Protocol and Comparative Analysis with Classical Cryptographic Techniques  2
Quantum Computing's Impact on Data Encryption:Methodologies,...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Kamel, Omar H.Ali El-Din Raslan, Atef Tayh Nour Aly, Tarek Gheith, Mervat Cairo University Faculty of Graduate Studies For Statistical Research Cairo Egypt Higher Institute of Advanced Studies Department of Information Systems Cairo Egypt Cairo University Faculty of Graduate Studies for Statistical Research Software Engineering Department Cairo Egypt
This paper delves into the realm of quantum computing and its potential to revolutionize data encryption methodologies. Leveraging IBM's Qiskit tool, we investigate encryption approaches aimed at bolstering data s... 详细信息
来源: 评论
AI-ASSISTED GERMAN EMPLOYMENT CONTRACT REVIEW: A BENCHMARK DATASET
arXiv
收藏 引用
arXiv 2025年
作者: Wardas, Oliver Matthes, Florian Technical University of Munich School of CIT Software Engineering for Business Information Systems Boltzmannstrasse 3 Garching85748 Germany
Employment contracts are used to agree upon the working conditions between employers and employees all over the world. Understanding and reviewing contracts for void or unfair clauses requires extensive knowledge of t... 详细信息
来源: 评论
Challenges and Opportunities for Enabling the Next Generation of Cross-Domain Dataspaces  2
Challenges and Opportunities for Enabling the Next Generatio...
收藏 引用
2nd International Workshop on Semantics in Dataspaces, SDS 2024
作者: Deshmukh, Rohit A. Collarana, Diego Gelhaar, Joshua Theissen-Lipp, Johannes Lange, Christoph Arnold, Benedikt T. Curry, Edward Decker, Stefan Fraunhofer Institute for Applied Information Technology FIT Sankt Augustin Germany RWTH Aachen University Aachen Germany Fraunhofer Institute for Software and Systems Engineering ISST Dortmund Germany Insight Centre for Data Analytics University of Galway Galway Ireland
Dataspaces are regarded as a standardized solution for sharing data in a trusted way. However, providing and sharing high-quality data across dataspaces poses several scientific and technical challenges, opening new r... 详细信息
来源: 评论
PD-Refiner: An Underlying Surface Inheritance Refiner with Adaptive Edge-Aware Supervision for Point Cloud Denoising  24
PD-Refiner: An Underlying Surface Inheritance Refiner with A...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Chengwei Zhang, Xueyi Yue, Xianghu Lao, Mingrui Jiang, Tao Wang, Jiawei Zhang, Fubo Chen, Longyong National Key Laboratory of Microwave Imaging Aerospace Information Research Institute Chinese Academy of Sciences Beijing China Laboratory for Big Data and Decision National University of Defense Technology Hunan Changsha China Department of Electrical and Computer and Engineering National University of Singapore Singapore Singapore National Key Laboratory of Information Systems Engineering National University of Defense Technology Hunan Changsha China School of Software Engineering Tongji University Shanghai China
Point clouds from real-world scenarios inevitably contain complex noise, significantly impairing the accuracy of downstream tasks. To tackle this challenge, cascading encoder-decoder architecture has become a conventi... 详细信息
来源: 评论
Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition  21
Texture and Orientation-based Feature Extraction for Robust ...
收藏 引用
21st IEEE/ACIS International Conference on software engineering Research, Management and Applications, SERA 2023
作者: Khan, Sajid Ali Bin Abdulrahman Alawairdhi, Mohammed Al-Akhras, Mousa Foundation University Islamabad Department of Software Engineering Islamabad Pakistan Saudi Electronic University College of Computing and Informatics Saudi Arabia The University of Jordan Amman King Abdullah II School for Information Technology Computer Information Systems Department Jordan
Facial expressions are the most effective way to characterize people's motives, emotions, and feelings. Several new methods are proposed each year;however, the accuracy of facial expression recognition still needs... 详细信息
来源: 评论