咨询与建议

限定检索结果

文献类型

  • 11,140 篇 会议
  • 5,174 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 16,549 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,173 篇 工学
    • 8,102 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,994 篇 信息与通信工程
    • 1,297 篇 控制科学与工程
    • 1,092 篇 生物工程
    • 855 篇 电气工程
    • 726 篇 生物医学工程(可授...
    • 671 篇 机械工程
    • 595 篇 电子科学与技术(可...
    • 549 篇 光学工程
    • 415 篇 安全科学与工程
    • 349 篇 仪器科学与技术
    • 339 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 314 篇 建筑学
  • 4,508 篇 理学
    • 2,639 篇 数学
    • 1,232 篇 生物学
    • 823 篇 物理学
    • 742 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 350 篇 化学
  • 3,142 篇 管理学
    • 1,907 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 937 篇 工商管理
  • 709 篇 医学
    • 617 篇 临床医学
    • 547 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 370 篇 社会学
  • 324 篇 经济学
    • 321 篇 应用经济学
  • 321 篇 教育学
    • 312 篇 教育学
  • 173 篇 农学
  • 72 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,070 篇 computer science
  • 1,015 篇 software enginee...
  • 303 篇 application soft...
  • 287 篇 computational mo...
  • 285 篇 deep learning
  • 269 篇 data mining
  • 244 篇 machine learning
  • 239 篇 computer archite...
  • 222 篇 software
  • 201 篇 software systems
  • 187 篇 training
  • 186 篇 internet of thin...
  • 183 篇 support vector m...
  • 183 篇 feature extracti...
  • 179 篇 programming
  • 179 篇 accuracy
  • 172 篇 semantics
  • 171 篇 educational inst...
  • 168 篇 wireless sensor ...
  • 166 篇 laboratories

机构

  • 340 篇 college of compu...
  • 196 篇 department of co...
  • 156 篇 state key labora...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 82 篇 department of co...
  • 76 篇 school of inform...
  • 74 篇 department of co...
  • 72 篇 department of co...
  • 68 篇 department of co...
  • 64 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 44 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 42 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 29 篇 shen furao
  • 29 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 dozier gerry
  • 20 篇 wang lei

语言

  • 15,995 篇 英文
  • 444 篇 其他
  • 119 篇 中文
  • 10 篇 德文
  • 4 篇 法文
  • 3 篇 日文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=The Department of Computer Science and Software Engineering"
16549 条 记 录,以下是4991-5000 订阅
排序:
Security modeling and analysis in a software architecture design
Security modeling and analysis in a software architecture de...
收藏 引用
2008 International Conference on software engineering Theory and Practice, SETP 2008
作者: Dai, Lirong Cooper, Kendra Department of Computer Science and Software Engineering Seattle University P.O. 222000 Seattle WA 98122 United States Department of Computer Science MS 31 University of Texas at Dallas Richardson TX P.O. 830688 United States
The problem of effectively designing and analyzing software to meet security requirements is an important research topic. This paper presents an approach to model and analyze security aspects for software architecture... 详细信息
来源: 评论
Dependency Practices for Vulnerability Mitigation
arXiv
收藏 引用
arXiv 2023年
作者: Jafari, Abbas Javan Costa, Diego Elias Abdellatif, Ahmad Shihab, Emad Lab The Department of Computer Science and Software Engineering Concordia University Montreal Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Relying on dependency packages accelerates software development, but it also increases the exposure to security vulnerabilities that may be present in dependencies. While developers have full control over which depend... 详细信息
来源: 评论
A biometric-based IoT device identity authentication scheme  1st
A biometric-based IoT device identity authentication scheme
收藏 引用
1st EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019
作者: Xue, Qingshui Ju, Xingzhong Zhu, Haozhi Zhu, Haojin Li, Fengying Zheng, Xiangwei School of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201418 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China School of Information Science and Engineering Shandong Normal University Jinan250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014 China
IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of pos... 详细信息
来源: 评论
A stepwise multi-centroid classification learning algorithm with GPU implementation
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8886卷 347-358页
作者: Cresswell-Miley, Cain Neshatian, Kourosh Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
By viewing the training of classifiers as an optimisation problem, we have developed a method in this paper to train a new type of nearest centroid classifier with multiple centroids per class, using Particle Swarm Op... 详细信息
来源: 评论
Stable Initialization Scheme for K-Means Clustering
收藏 引用
Wuhan University Journal of Natural sciences 2009年 第1期14卷 24-28页
作者: XU Junling XU Baowen ZHANG Weifeng ZHANG Wei HOU Jun School of Computer Science and Engineering Southeast University Nanjing 211189 Jiangsu China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China Department of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
Though K-means is very popular for general clustering, its performance, which generally converges to numerous local minima, depends highly on initial cluster centers. In this paper a novel initialization scheme to sel... 详细信息
来源: 评论
Simulating new markets by introducing new accepting policies for the conventional continuous double auction
Simulating new markets by introducing new accepting policies...
收藏 引用
2008 Spring Simulation Multiconference, SpringSim'08
作者: Honari, Sina Gomrokchi, Maziar Ebadi, Mojtaba Fos-Hati, Amin Bentahar, Jamal Premier Ideas Support Center School of Engineering Shiraz University Shiraz Iran Computer Science and Software Engineering Department Concordia University Canada Concordia Institute for Information Systems Engineering Concordia University Canada
In recent years a huge number of online auctions that use Multi Agent systems have been created. As a result there are numerous auctions that provide the same product. In this case each customer can buy a product with... 详细信息
来源: 评论
Kororā: A secure live virtual machine job migration framework for cloud systems integrity
收藏 引用
Array 2023年 19卷
作者: Deylami, Hanif Gutierrez, Jairo Sinha, Roopak Department of Computer Science and Software Engineering Auckland University of Technology New Zealand
The article introduces an innovative framework called Kororā, which aims to enhance the security and integrity of live virtual machine migration in a public cloud computing environment. The framework incorporates a t... 详细信息
来源: 评论
Virtual Laboratory Learning Experience in engineering: An Extended Technology Acceptance Model (TAM)  3
Virtual Laboratory Learning Experience in Engineering: An Ex...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2023
作者: Ahmed Alnagrat, Ahmed Jamah Ahmed, Khamiss M. S. Alkhallas, Muhannad Ismail Almakhzoom, Osama Abulaqasim Ibrahim Syed Idrus, Syed Zulkarnain Che Ismail, Rizalafande Higher Institute of Science and Technology Wadi Al-Shati Department of Computer Science and Information Technology Wadi al-Shati Fezzan Libya Sebha University Faculty of Information Technology Department of Computer Science Sebha Libya Faculty of Engineering Technology in Zuwarah Department of Software Engineering Zuwarah Libya Department of Communication Perlis Kangar01000 Malaysia Arau02600 Malaysia
This research presents an enhanced version of the Technology Acceptance Model (TAM), which integrates usability and learning objectives to evaluate the effect of adopting virtual laboratories on student performance. D... 详细信息
来源: 评论
Parametric search: three new applications
收藏 引用
中国高等学校学术文摘·数学 2010年 第1期5卷 65-73页
作者: Naoki KATOH Wencheng WANG Yinfeng XU Binhai ZHU Department of Architecture and Architectural Engineering Kyoto University Nishikyo Kyoto 615-8540 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China School of Management Xi'an Jiaotong University State Key Lab for Manufacturing Systems Engineering Xi'an 710049 China Department of Computer Science Montana State University Bozeman MT 59717-3880 USA
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinator... 详细信息
来源: 评论
Evaluation of multi-radio extensions to dsr for wireless multi-hop networks
Evaluation of multi-radio extensions to dsr for wireless mul...
收藏 引用
WINSYS 2007 - 2nd International Conference on Wireless Information Networks and Systems
作者: Biaz, Saad Qi, Bing Wu, Shaoen Ji, Yiming Dept. of Computer Science and Software Engineering Auburn University Dustan Hall 107 AL 36849 United States Department of Computer Science University of South Carolina Harg ray Building Beaufort SC 29909 United States
Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equi... 详细信息
来源: 评论