咨询与建议

限定检索结果

文献类型

  • 664 篇 期刊文献
  • 619 篇 会议
  • 23 册 图书

馆藏范围

  • 1,306 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 791 篇 工学
    • 523 篇 计算机科学与技术...
    • 435 篇 软件工程
    • 152 篇 控制科学与工程
    • 126 篇 信息与通信工程
    • 85 篇 电气工程
    • 65 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 55 篇 机械工程
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 31 篇 化学工程与技术
    • 28 篇 仪器科学与技术
    • 28 篇 材料科学与工程(可...
    • 25 篇 力学(可授工学、理...
    • 24 篇 土木工程
    • 23 篇 安全科学与工程
  • 512 篇 理学
    • 277 篇 数学
    • 127 篇 物理学
    • 114 篇 系统科学
    • 88 篇 统计学(可授理学、...
    • 84 篇 生物学
    • 40 篇 化学
  • 184 篇 管理学
    • 130 篇 管理科学与工程(可...
    • 65 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 66 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 26 篇 公共卫生与预防医...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 24 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 computer science
  • 68 篇 laboratories
  • 58 篇 software enginee...
  • 36 篇 grid computing
  • 35 篇 application soft...
  • 32 篇 software systems
  • 31 篇 cloud computing
  • 27 篇 computational mo...
  • 27 篇 machine learning
  • 26 篇 quality of servi...
  • 26 篇 mathematics
  • 25 篇 resource managem...
  • 23 篇 deep learning
  • 22 篇 systems engineer...
  • 21 篇 costs
  • 21 篇 artificial intel...
  • 20 篇 processor schedu...
  • 19 篇 computer archite...
  • 17 篇 distributed comp...
  • 17 篇 testing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 school of electr...
  • 21 篇 software enginee...
  • 21 篇 seventh research...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 15 篇 school of mathem...
  • 15 篇 key laboratory o...
  • 14 篇 college of compu...
  • 14 篇 software enginee...
  • 12 篇 state key labora...
  • 10 篇 university of ch...
  • 9 篇 academy of mathe...
  • 9 篇 cloud computing ...
  • 8 篇 key laboratory o...
  • 8 篇 school of electr...
  • 7 篇 university colle...
  • 7 篇 grid computing a...
  • 7 篇 school of softwa...

作者

  • 48 篇 rajkumar buyya
  • 32 篇 junping du
  • 30 篇 yingmin jia
  • 21 篇 fashan yu
  • 19 篇 buyya rajkumar
  • 18 篇 ismail leila
  • 15 篇 veera boonjing
  • 14 篇 liu ya-feng
  • 12 篇 materwala huned
  • 10 篇 sarun intakosum
  • 10 篇 bei zeng
  • 10 篇 cheng betty h. c...
  • 10 篇 zhengfeng ji
  • 10 篇 badri mourad
  • 9 篇 p.k. mckinley
  • 8 篇 badri linda
  • 8 篇 bakas spyridon
  • 8 篇 liu xin
  • 8 篇 abdellah chehri
  • 8 篇 yu wei

语言

  • 1,244 篇 英文
  • 53 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Software Systems Engineering Laboratory Department of Mathematics and Computer Science"
1306 条 记 录,以下是71-80 订阅
排序:
An Adaptive Decision-Making Approach for Better Selection of Blockchain Platform for Health Insurance Frauds Detection with Smart Contracts: Development and Performance Evaluation  14
An Adaptive Decision-Making Approach for Better Selection of...
收藏 引用
14th International Conference on Ambient systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Kaafarani, Rima Ismail, Leila Zahwe, Oussama ICCS-Lab Computer Science Department American University of Culture and Education Beirut1507 Lebanon Laboratory School of Computing and Information Systems The University of Melbourne Melbourne Australia Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Abu Dhabi United Arab Emirates National Water and Energy Center United Arab Emirates University Abu Dhabi United Arab Emirates
Blockchain technology has piqued the interest of businesses of all types, while consistently improving and adapting to business requirements. Several blockchain platforms have emerged, making it challenging to select ... 详细信息
来源: 评论
Model-based Generation of Attack-Fault Trees
arXiv
收藏 引用
arXiv 2023年
作者: Groner, Raffaela Witte, Thomas Raschke, Alexander Hirn, Sophie Pekaric, Irdin Frick, Markus Tichy, Matthias Felderer, Michael Institute of Software Engineering and Programming Languages Ulm University Germany Department of Computer Science University of Innsbruck Austria Department of Information Systems and Computer Science University of Liechtenstein Liechtenstein Germany Department of Mathematics and Computer Science University of Cologne Germany
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and ... 详细信息
来源: 评论
Enhancing e-KYC Security and Privacy: Harnessing Quantum Computing and Blockchain in Web 3.0
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第4期3卷 1-23页
作者: G. M. Faruk Ahmed Imran Hasan Md Soumike Hassan Rahul Khan Abu Jor Al Gefari Zain Buksh Joseph Liu A B M Shawkat Ali Cybersecurity Cell Rupali Bank Limited Dhaka Bangladesh Department of Computer Science and Engineering Islamic University Kushtia Bangladesh Department of Statistics Jahangirnagar University Dhaka Bangladesh Department of Pharmacy Bangladesh University Dhaka Bangladesh Rajshahi Science and Technology University Natore Bangladesh Department of Computer Science and Mathematics The University of Fiji Lautoka Fiji Department of Software Systems and Cybersecurity Monash University Melbourne Australia
By implementing a successful and effective Electronic-Know Your Customer (e-KYC) infrastructure, conventional defects and expenses may be greatly reduced. Strong authentication procedures are used by existing e-KYC so... 详细信息
来源: 评论
RAT: A Refactoring-Aware Tool for Tracking Code History
RAT: A Refactoring-Aware Tool for Tracking Code History
收藏 引用
International Conference on software engineering - Companion, ICSE, Companion
作者: Feifei Niu Junqian Shao Chaofan Xu Christoph Mayr-Dorn Wesley K. G. Assunção Liguo Huang Chuanyi Li Jidong Ge Bin Luo Alexander Egyed State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science North Carolina State University North Carolina USA Department of Computer Science and Engineering Southern Methodist University Dallas Texash USA
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source... 详细信息
来源: 评论
Global scale solar energy harnessing: An advanced intra-hourly diffuse solar irradiance predicting framework for solar energy projects
收藏 引用
Neural Computing and Applications 2024年 第18期36卷 10585-10598页
作者: El-kenawy, El-Sayed M. Bailek, Nadjem Bouchouicha, Kada Zerouali, Bilel Hassan, Muhammed A. Kuriqi, Alban Jamil, Basharat Colak, Ilhami Khalil, Adel Ibrahim, Abdelhameed Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Mansoura35111 Egypt Laboratory of Mathematics Modeling and Applications Department of Mathematics and Computer Science Faculty of Sciences and Technology Ahmed Draia University of Adrar Adrar01000 Algeria Energies and Materials Research Laboratory Faculty of Sciences and Technology University of Tamanghasset Tamanrasset10034 Algeria MEU Research Unit Middle East University Amman Jordan Adrar01000 Algeria Vegetal Chemistry-Water-Energy Laboratory Faculty of Civil Engineering and Architecture Department of Hydraulic Hassiba Benbouali University of Chlef Ouled Fares Chlef02180 Algeria Mechanical Power Engineering Department Faculty of Engineering Cairo University Giza12613 Egypt School of Architecture University of Waterloo 7 Melville St S CambridgeONN1S 2H4 Canada CERIS Instituto Superior Tecnico Universidade de Lisboa Lisbon Portugal Civil Engineering Department University for Business and Technology PristinaKosovo10000 High Temperature Processes Unit IMDEA Energy Institute Av. Ramón de La Sagra 3 Móstoles Madrid28935 Spain Faculty of Engineering and Architectures Nisantasi University Istanbul Turkey Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura35516 Egypt
Diffuse horizontal irradiance (DHI) forecasts are critical for adopting solar photovoltaic technology. Yet, they can lack reliability given the limited and uncertain meteorological data available for desert areas. Thi... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Performance Analysis of Distributed Filtering under Mismatched Noise Covariances
arXiv
收藏 引用
arXiv 2024年
作者: Lyu, Xiaoxu Wen, Guanghui Shi, Ling Duan, Peihu Duan, Zhisheng The Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong The Laboratory of Security Operation and Control for Intelligent Autonomous Systems Department of Systems Science School of Mathematics Southeast University Nanjing211189 China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering Science College of Engineering Peking University Beijing100871 China
This paper systematically investigates the performance of consensus-based distributed filtering under mismatched noise covariances. First, we introduce three performance evaluation indices for such filtering problems,... 详细信息
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation  14
Towards a Deep Learning Pain-Level Detection Deployment at U...
收藏 引用
14th International Conference on Ambient systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Ismail, Leila Waseem, Muhammad Danish Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates National Water and Energy Center United Arab Emirates University United Arab Emirates
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
Multi-Unit Floor Plan Recognition and Reconstruction Using Improved Semantic Segmentation of Raster-Wise Floor Plans
arXiv
收藏 引用
arXiv 2024年
作者: Kratochvila, Lukas de Jong, Gijs Arkesteijn, Monique Bilík, Šimon Zemčík, Tomáš Horak, Karel Rellermeyer, Jan S. Department of Control and Instrumentation Faculty of Electrical Engineering and Communication Brno University of Technology Brno Czech Republic Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science TU Delft Delft Netherlands Department of Management in the Built Environment Faculty of Architecture and the Built Environment TU Delft Delft Netherlands Computer Vision and Pattern Recognition Laboratory Department of Computational Engineering Lappeenranta-Lahti University of Technology LUT Lappeenranta Finland Dependable and Scalable Software Systems Institute of Systems Engineering Faculty of Electrical Engineering and Computer Science Leibniz University Hannover Hannover Germany
Digital twins have a major potential to form a significant part of urban management in emergency planning, as they allow more efficient designing of the escape routes, better orientation in exceptional situations, and... 详细信息
来源: 评论