咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是61-70 订阅
排序:
The Impact of 5G technology on Agile Project Management: A Cross-Industry Analysis  5
The Impact of 5G Technology on Agile Project Management: A C...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Mishra, Mahesh Kumar Selvaraj, Krishnamoorthy Santosh, Kathari Aarif, Mohd Suma Christal Mary, S. Kiran Bala, B. Delta System and Software Inc 2320 Grover Cleveland Dr McKinneyTX75072 United States Encloud Service Llc Dept of Erp KellerTX United States Cmr Institute of Technology Bengaluru Department of Mba Bengaluru India Iosrp UP Noida India Panimalar Engineering College Department of Information Technology Poonamalle Chennai India K.Ramakrishnan College of Engineering Department of Artificial Intelligence and Data Science Trichy India
Project management and organisation are completely transformed by the introduction of 5G technology, which has brought in a new era of connection. This research investigates how 5G networks will affect Enterprise Reso... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks
Internet of Things (IoT): survey of most important security ...
收藏 引用
Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Ahmed Alaskri Nuredin Ali Salem Ahmed Hala Shaari Software Engineering Dep. Collage of Computer Technology Tripoli Libya Computer Engineering Department Faculty of Engineering Tripoli Libya Web Technologies Department Faculty of Information Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (...
来源: 评论
Cyber-physical webAssembly: Secure Hardware Interfaces and Pluggable Drivers
arXiv
收藏 引用
arXiv 2024年
作者: Van Kenhove, Michiel Seidler, Maximilian Vandenberghe, Friedrich Dujardin, Warre Hennen, Wouter Vogel, Arne Sebrechts, Merlijn Goethals, Tom De Turck, Filip Volckaert, Bruno IDLab Department of Information Technology Ghent University - imec Ghent Belgium System Software Group Department of Computer Science Friedrich-Alexander-Universität Erlangen-Nürnberg Germany
The rapid expansion of Internet of Things (IoT), edge, and embedded devices in the past decade has introduced numerous challenges in terms of security and configuration management. Simultaneously, advances in cloud-na...
来源: 评论
Defeasible-PROV: Conflict Resolution in Smart Building Devices
Defeasible-PROV: Conflict Resolution in Smart Building Devic...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Abdullah Al Farooq Zac Taylor Kyle Ruona Thomas Moyer School of Computing and Data Science Wentworth Institute of Technology Boston MA Department of Software and Information System The University of North Carolina Charlotte
Programmable Logic Controllers (PLCs) are an integral component for managing automation processes of smart buildings. PLCs use protocols which make these control systems vulnerable to many common attacks due to which ...
来源: 评论
An automated framework for advertisement detection and removal from sports videos using audio-visual cues
收藏 引用
Frontiers of Computer Science 2021年 第2期15卷 185-188页
作者: Abeer TOHEED Ali JAVED Aun IRTAZA Hassan DAWOOD Hussain DAWOOD Ahmed S.ALFAKEEH Department of Software Engineering University of Engineering and Technology-TaxilaTaxila47050Pakistan Department of Computer&Network Engineering University of JeddahJeddah21577Saudi Arabia Information System Department King Abdulaziz UniversityJeddah21577Saudi Arabia
1 Introduction Advertisements detection and replacement with different ads based on the user preferences is employed during sports rebroadcasts that offers more value to both the distributor and *** advertisements det... 详细信息
来源: 评论
Towards Classifying File Segments in Memory Using Machine-Learning
Towards Classifying File Segments in Memory Using Machine-Le...
收藏 引用
HCT information technology Trends (ITT)
作者: Mohammed I. Al-Saleh Akram Alkouz Abdulsalam Alarabeyyat Majed Bouchahma Computer Science Department Jordan University of Science and Technology Computer Information System Higher Colleges of Technology Jordan-Salt Software Engineering Department Al-Balqa’ Applied University
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator’s time and enhance outcomes. Memory investigatio...
来源: 评论
BI-based Reasoning about Quantum Programs with Heap Manipulations
arXiv
收藏 引用
arXiv 2024年
作者: Su, Bonan Zhou, Li Feng, Yuan Ying, Mingsheng Department of Computer Science and Technology Tsinghua University Beijing China Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Centre for Quantum Software and Information University of Technology Sydney Ultimo Australia
We provide well-founded semantics for a quantum programming language Qwhile-hp with heap manipulations, where allocation statements follow a dirty pattern, meaning that newly allocated qubits can nondeterministically ... 详细信息
来源: 评论
web service composition in cloud: A fuzzy rule model
收藏 引用
Recent Advances in Computer Science and Communications 2020年 第3期13卷 446-453页
作者: Alhadithy, Hussien Al-Shargabi, Bassam Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Computer Information System Faculty of Information Technology Middle East University Amman Jordan
Background: Cloud Computing has drawn much attention in the industry due to its cost-efficient schema along with more prospects, such as elasticity and scalability nature of Cloud Com-puting. One of the main service m... 详细信息
来源: 评论
Simulative Investigations of Crowd Evacuation by Incorporating Reinforcement Learning Scheme  22
Simulative Investigations of Crowd Evacuation by Incorporati...
收藏 引用
Proceedings of the 6th International Conference on Algorithms, Computing and systems
作者: Nitinun Sinpan Pruk Sasithong Sushank Chaudhary Suvit Poomrittigul Natt Leelawat Lunchakorn Wuttisittikulkij Wireless Communication Ecosystem Reseach Unit Chulalongkorn University Thailand Department of Software Engineering and Information System Pathumwan Institute of Technology Thailand Diaster and Risk Management Information System Research Unit Chulalongkorn University Thailand
Safe and effective evacuation is very essential to decrease casualties in an emergency event. The social force model is used to simulate the movement of evacuee and leader crowd evacuation with leader in an experiment... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论