咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 215 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 852 篇 计算机科学与技术...
    • 736 篇 软件工程
    • 223 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,532 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1597 条 记 录,以下是601-610 订阅
排序:
Detecting Sybil Attack In Wireless Sensor Networks Using Machine Learning Algorithms
收藏 引用
IOP Conference Series: Materials science and engineering 2021年 第1期1042卷
作者: Mandala Mounica R. Vijayasaraswathi R. Vasavi M.Tech Student of Software Engineering Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad Telangana India Assistant Professor Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute Of Engineering and Technology Hyderabad Telangana India
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, t...
来源: 评论
Requirements Dependency Extraction by Integrating Active Learning with Ontology-Based Retrieval
Requirements Dependency Extraction by Integrating Active Lea...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Gouri Deshpande Quim Motger Cristina Palomares Ikagarjot Kamra Katarzyna Biesialska Xavier Franch Guenther Ruhe Jason Ho dept. of Computer Science University of Calgary Calgary Canada dept. of Service and Information System Engineering (ESSI) Universitat Politècnica de Catalunya Barcelona Spain dept. of Electrical and Software Engineering University of Calgary Calgary Canada Blackline Safety. Inc Calgary Canada
Context: Incomplete or incorrect detection of requirement dependencies has proven to result in reduced release quality and substantial rework. Additionally, the extraction of dependencies is challenging since requirem... 详细信息
来源: 评论
Towards automated boundary value testing with program derivatives and search
arXiv
收藏 引用
arXiv 2019年
作者: Feldt, Robert Dobslaw, Felix Dept. of Computer Science and Engineering Div. of Software Engineering Chalmers University of Technology Gothenburg Sweden
A natural and often used strategy when testing software is to use input values at boundaries, i.e. where behavior is expected to change the most, an approach often called boundary value testing or analysis (BVA). Even... 详细信息
来源: 评论
A two-level stacking model for detecting abnormal users in Wechat activities
A two-level stacking model for detecting abnormal users in W...
收藏 引用
Information Technology and computer Application (ITCA), International Conference on
作者: Jiayuan Ling Gangmin Li Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China
Machine learning algorithms are widely employed in plenty of classification or regression problems. While in real business world, it is confronted with huge and disorder data pattern. To recognize different kinds of u... 详细信息
来源: 评论
Deep Fusion Net for Coral Classification in Fluorescence and Reflectance Images
Deep Fusion Net for Coral Classification in Fluorescence and...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Uzair Nadeem Mohammed Bennamoun Ferdous Sohel Roberto Togneri Dept. of Computer Science and Software Engineering The University of Western Australia College of Science Health Engineering & Education Murdoch University Australia
Coral reefs are vital for marine ecosystem and fishing industry. Automatic classification of corals is essential for the preservation and study of coral reefs. However, significant intra-class variations and inter-cla... 详细信息
来源: 评论
Integrated software Development Methodology for Real-time Precise Control of UAV
Integrated Software Development Methodology for Real-time Pr...
收藏 引用
作者: Jung Kyu Park Eun Young Park Heung Seok Jeon Dept.of Computer Software Engineering Changshin Univ. Dept.Biomedical Laboratory science Shinhan University Dept.of Computer Engineering Konkuk University
Recently, drones have been widely used in education and industry. In this paper, we propose a navigation and control algorithm to develop unmanned drones quickly. To limit the proposed framework, we analysed the exist... 详细信息
来源: 评论
Cell quantization tool for anterior chamber OCT images
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2020年 第7期69卷 1073-1080页
作者: Lee, Yeongseop Kang, Taeseen Han, Yongseop Kim, Jinhyun Kim, Kyong Hoon Lee, Seongjin Dept. of Aerospace and Software Engineering Gyeongsang National University Korea Republic of Dept. of Informatics Gyeongsang National University Korea Republic of Dept of Ophthalmology Gyeongsang National University Changwon Hospital Changwon Korea Republic of Dept of Ophthalmology College of Medicine Gyeongsang National University Jinju Korea Republic of Dept of Information and Communication Engineering Gyeongsang University Korea Republic of School of Computer Science and Engineering Kyungpook National University Korea Republic of
In general, ophthalmologists visually grade the state of a patient by counting the cells within the anterior chamber OCT image. The manual cell counting method is highly inaccurate and spends a lot of time to determin... 详细信息
来源: 评论
MoCoP: Towards a Model Clone Portal
MoCoP: Towards a Model Clone Portal
收藏 引用
International Workshop on Modeling in software engineering (MISE)
作者: Önder Babur Matthew Stephan Dept. of Mathematics & Computer Science Eindhoven University of Technology Eindhoven The Netherlands Dept. of Computer Science & Software Engineering Miami University Oxford Ohio USA
Widespread and mature practice of model-driven engineering is leading to a growing number of modeling artifacts and challenges in their management. Model clone detection (MCD) is an important approach for managing and... 详细信息
来源: 评论
Question to Question Similarity Analysis using Morphological, Syntactic, Semantic, and Lexical Features
Question to Question Similarity Analysis using Morphological...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: Muntaha Al-Asa'd Nour Al-Khdour Mutaz Bni Younes Enas Khwaileh Mahmoud Hammad Mohammad AL-Smadi Dept. of Computer Science Jordan University of Science and Technology Irbid Jordan Dept. of Software Engineering Jordan University of Science and Technology Irbid Jordan
In the digitally connected world that we are living in, people expect to get answers to their questions spontaneously. This fact increased the burden on the Question/Answer platforms such as Stack Overflow and many ot... 详细信息
来源: 评论
Network2Vec: Learning Node Representation Based on Space Mapping in Networks
Network2Vec: Learning Node Representation Based on Space Map...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Zhenhua Huang Zhenyu Wang Rui Zhang Yangyang Zhao Xiaohui Xie Sharad Mehrotra School of Software Engineering South China University of Technology Dept. of Computer Science University of California Irvine
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms. To address this limitation, network embedding (i.e., graph representation) has been inten... 详细信息
来源: 评论