咨询与建议

限定检索结果

文献类型

  • 2,251 篇 会议
  • 1,271 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,205 篇 工学
    • 1,758 篇 计算机科学与技术...
    • 1,428 篇 软件工程
    • 472 篇 信息与通信工程
    • 317 篇 控制科学与工程
    • 236 篇 生物工程
    • 187 篇 电气工程
    • 153 篇 机械工程
    • 151 篇 生物医学工程(可授...
    • 136 篇 电子科学与技术(可...
    • 95 篇 安全科学与工程
    • 87 篇 光学工程
    • 85 篇 仪器科学与技术
    • 79 篇 化学工程与技术
    • 77 篇 网络空间安全
    • 74 篇 建筑学
    • 66 篇 动力工程及工程热...
  • 944 篇 理学
    • 461 篇 数学
    • 265 篇 生物学
    • 193 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 88 篇 化学
  • 709 篇 管理学
    • 466 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 261 篇 工商管理
  • 160 篇 医学
    • 144 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 69 篇 公共卫生与预防医...
  • 138 篇 法学
    • 110 篇 社会学
  • 96 篇 经济学
    • 95 篇 应用经济学
  • 62 篇 教育学
  • 45 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 89 篇 software
  • 88 篇 machine learning
  • 75 篇 deep learning
  • 67 篇 accuracy
  • 66 篇 software systems
  • 61 篇 systems engineer...
  • 61 篇 training
  • 60 篇 semantics
  • 59 篇 security
  • 58 篇 artificial intel...
  • 57 篇 data mining
  • 57 篇 computational mo...
  • 55 篇 computer science
  • 54 篇 computer archite...
  • 54 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 58 篇 department of so...
  • 26 篇 department of so...
  • 26 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 17 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 15 篇 college of compu...
  • 14 篇 school of comput...
  • 13 篇 school of inform...
  • 13 篇 school of electr...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 school of intell...
  • 11 篇 sri lanka instit...

作者

  • 67 篇 shabtai asaf
  • 61 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 18 篇 abdeslam jakimi
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 16 篇 fire michael
  • 15 篇 buyya rajkumar
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,400 篇 英文
  • 152 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3578 条 记 录,以下是671-680 订阅
排序:
Machine Learning Algorithms for Intrusion Detection Performance Evaluation and Comparative Analysis  4
Machine Learning Algorithms for Intrusion Detection Performa...
收藏 引用
4th International Conference on Smart Electronics and Communication, ICOSEC 2023
作者: Irfan, B. Md. Poornima, V. Mohana Kumar, S. Aswal, Upendra Singh Krishnamoorthy, N. Maranan, Ramya Nalsar University of Law Department of Information Technology Telengana Hyderabad500101 India VISTAS Pallavaram Department of Computer Science Chennai India Ramaiah Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru560054 India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun248002 India Vellore Institute of Technology Vellore Campus Department of Software Systems and Engineering Tamilnadu Vellore632014 India Saveetha School of Engineering Simats Department of Research and Innovation Tamil Nadu Chennai600124 India
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection s... 详细信息
来源: 评论
Can one hear the position of nodes?
arXiv
收藏 引用
arXiv 2022年
作者: Puzis, Rami Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
Wave propagation through nodes and links of a network forms the basis of spectral graph theory. Nevertheless, the sound emitted by nodes within the resonating chamber formed by a network are not well studied. The soun... 详细信息
来源: 评论
Scheduling Periodic Real-Time Tasks with Inter-Task Synchronisation
Scheduling Periodic Real-Time Tasks with Inter-Task Synchron...
收藏 引用
Mediterranean Conference on Embedded Computing (MECO)
作者: Luká š Kohú tka Institute of Informatics Information Systems and Software Engineering Slovak University of Technology in Bratislava Bratislava Slovakia
This paper presents a new FPGA-based task scheduler that has a dedicated support of periodic hard real-time tasks in addition to aperiodic tasks. Whenever a period of a periodic task is elapsed, the task is scheduled ...
来源: 评论
Development of Multi Objective Approach for Validation of PID Controller for Buck Converter
Development of Multi Objective Approach for Validation of PI...
收藏 引用
Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), International Conference on
作者: Arun Kumar K Gopi Chand Vegineni C. Suresh Bhagath Chandra Chowdari Marella Sireesha Addanki Palak Chimwal Big Data Architect India Sr.Software Engineer Enrollment and Eligibility Team India Electrical and Electronics Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Samayapuram Trichy Department of Financial Services Insights & Data Capgemini India Principal software developer System soft Technologies llc Information Technology India Department of Electrical Engineering Bipin Tripathi Kumaon Institute of Technology Dwarahat Almora India
Buck converters are a common converter of DCDC used for high energy conversion and power sources. These regulators are utilized in electronic gear to alter the result voltage because of changes in the heap current and... 详细信息
来源: 评论
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks  23
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel...
收藏 引用
23rd International Conference on New Trends in Intelligent software Methodologies, Tools and Techniques, SoMeT 2024
作者: Fattahi, Jaouhar Sghaier, Feriel Mejri, Mohamed Bahroun, Sahbi Ghayoula, Ridha Manai, Elyes Department of Computer Science and Software Engineering Laval University 2325 rue de l'Université QuébecQCG1V 0A6 Canada Ecole Nationale d'Ingénieurs de Carthage Université de Carthage Tunis Tunisia Institut Supérieur d'Informatique Université de Tunis El-Manar Tunis Tunisia Faculty of Engineering Information Systems Department University of Moncton New Brunswick Canada
Cyberbullying, marked by its persistent and intentional aggression online, yields severe repercussions for its victims, extending beyond immediate distress to long-lasting effects such as heightened anxiety, depressio... 详细信息
来源: 评论
Using Mobile Devices to Realize Blended Learning at the University  2
Using Mobile Devices to Realize Blended Learning at the Univ...
收藏 引用
2nd International Conference on Technology Enhanced Learning in Higher Education, TELE 2022
作者: Nass, Oksana Skuliabina, Olga Gushchin, Artem Abuova, Zhanargul Vakhitova, Aizada Diyarova, Lunara Baltic State Technical University Named after D.F. Ustinov Voenmeh Department of Information Systems and Software Engineering St. Petersburg Russia Technologies Zhangir Khan West Kazakhstan Agrarian-Technical University Higher School of Information Uralsk Kazakhstan
Currently, blended learning is becoming a promising form of organization of higher education. Use of smartphones and other mobile devices for the realization of blended learning makes it possible to provide students w... 详细信息
来源: 评论
Analysing the Adversarial Landscape of Binary Stochastic Networks  1
收藏 引用
iCatse International Conference on information Science and Applications, ICISA 2020
作者: Tan, Yi Xiang Marcus Elovici, Yuval Binder, Alexander ST Engineering-SUTD Cyber Security Laboratory Singapore Singapore Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
We investigate the robustness of stochastic ANNs to adversarial attacks. We perform experiments on three known datasets. Our experiments reveal similar susceptibility of stochastic ANNs compared to conventional ANNs w... 详细信息
来源: 评论
Blockchain-Based Decentralized Breast Cancer Patient Monitoring System for Remote Healthcare Security
Blockchain-Based Decentralized Breast Cancer Patient Monitor...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: K.N. Dilshan H.A.C.K. Rathnayake L.P.T.L. Pathirana D.H.S.V. Dhanapala Harinda Fernando Pradeep K.W Abeygunawardhana Faculty of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Faculty of Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Faculty of Information Technology Sri Lanka Institute of Information Technology Malabe Sri Lanka
Breast cancer is a disease that is prevalent all over the world, and that is essential for the efficient treatment and care of breast cancer patients who are monitored remotely. However, traditional conventional centr...
来源: 评论
EXPLOITING META-COGNITIVE FEATURES FOR A MACHINE-LEARNING-BASED ONE-SHOT GROUP-DECISION AGGREGATION
arXiv
收藏 引用
arXiv 2022年
作者: Shinitzky, Hilla Shahar, Yuval Avraham, Dan Vaisman, Yizhak Tsizer, Yakir Leedon, Yaniv The Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
The outcome of a collective decision-making process, such as crowdsourcing, often relies on the procedure through which the perspectives of its individual members are aggregated. Popular aggregation methods, such as t... 详细信息
来源: 评论
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
arXiv
收藏 引用
arXiv 2022年
作者: Lavie, Orel Shabtai, Asaf Katz, Gilad Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Be'er Sheva Israel
Many challenging real-world problems require the deployment of ensembles-multiple complementary learning models-to reach acceptable performance levels. While effective, applying the entire ensemble to every sample is ... 详细信息
来源: 评论