咨询与建议

限定检索结果

文献类型

  • 569 篇 会议
  • 18 册 图书
  • 3 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 255 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 99 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 37 篇 电气工程
    • 28 篇 电子科学与技术(可...
    • 23 篇 仪器科学与技术
    • 22 篇 机械工程
    • 21 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 16 篇 生物医学工程(可授...
    • 16 篇 生物工程
    • 15 篇 交通运输工程
    • 12 篇 光学工程
    • 11 篇 化学工程与技术
    • 7 篇 力学(可授工学、理...
    • 7 篇 建筑学
  • 108 篇 理学
    • 62 篇 数学
    • 19 篇 生物学
    • 18 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 14 篇 系统科学
  • 105 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
    • 13 篇 临床医学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
    • 9 篇 社会学
  • 6 篇 教育学
  • 2 篇 农学

主题

  • 35 篇 computer science
  • 32 篇 computer archite...
  • 21 篇 application soft...
  • 21 篇 computer network...
  • 20 篇 distributed comp...
  • 19 篇 real-time system...
  • 17 篇 internet
  • 13 篇 control systems
  • 12 篇 hardware
  • 11 篇 routing
  • 11 篇 real time system...
  • 11 篇 resource managem...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 artificial intel...
  • 11 篇 robustness
  • 10 篇 learning systems
  • 10 篇 distributed comp...
  • 10 篇 vehicles
  • 10 篇 delay

机构

  • 4 篇 school of comput...
  • 4 篇 malaysian instit...
  • 4 篇 school of comput...
  • 4 篇 department of mi...
  • 4 篇 school of busine...
  • 3 篇 college of compu...
  • 3 篇 computer science...
  • 3 篇 national frontie...
  • 3 篇 alberta machine ...
  • 3 篇 the center for a...
  • 3 篇 department of co...
  • 3 篇 computer systems...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 2 篇 national institu...
  • 2 篇 ai centre facult...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 institute of com...
  • 2 篇 high-performance...

作者

  • 5 篇 kuan-ching li
  • 5 篇 li kuan-ching
  • 4 篇 chao-tung yang
  • 4 篇 yang chao-tung
  • 3 篇 m. takizawa
  • 3 篇 rajit manohar
  • 3 篇 d. taniar
  • 3 篇 t. enokido
  • 3 篇 samet hanan
  • 3 篇 cao peng
  • 3 篇 wang ying-hong
  • 3 篇 zaiane osmar r.
  • 3 篇 yang jinzhu
  • 3 篇 adelfio marco d.
  • 3 篇 takio kurita
  • 2 篇 makowski dariusz
  • 2 篇 ben amara najoua...
  • 2 篇 y. shibata
  • 2 篇 mabrouk anouar b...
  • 2 篇 sayahi ikbel

语言

  • 568 篇 英文
  • 13 篇 中文
  • 8 篇 其他
  • 1 篇 乌克兰文
检索条件"任意字段=19th International Multiconference on Advanced Computer Systems"
590 条 记 录,以下是1-10 订阅
排序:
PROV2VEC: Learning Provenance Graph Representation for Anomaly Detection in computer systems  24
PROV2VEC: Learning Provenance Graph Representation for Anoma...
收藏 引用
19th international Conference on Availability, Reliability, and Security (ARES)
作者: Bhattarai, Bibek Huang, H. Howie George Washington Univ GraphLab Washington DC 20052 USA
Modern cyber attackers use advanced zero-day exploits, highly targeted spear phishing, and other social engineering techniques to gain access, and also use evasion techniques to maintain a prolonged presence within th... 详细信息
来源: 评论
Human Technology Frontier: A Retrospective and Challenges for the Future in the Era of Artificial Intelligence  19th
Human Technology Frontier: A Retrospective and Challenges fo...
收藏 引用
19th international Conference on Dependability of computer systems (DepCoS-RELCOMEX)
作者: Rozenblit, Jerzy W. Univ Arizona Dept Elect & Comp Engn Tucson AZ 85721 USA
As intelligent systems and technologies mature, a shift in the modality of use is occurring, namely computer-based systems are no longer an assistive extension of the human operator but are an inherent part of human e... 详细信息
来源: 评论
A Comparative Study of YOLO Models for Enhanced Vehicle Detection in Complex Aerial Scenarios  19
A Comparative Study of YOLO Models for Enhanced Vehicle Dete...
收藏 引用
19th international Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Azis, Huzain Nasrullah Abdullah, Munaisyah Ismail, Suriana Purnawansyah Syafie, Lukman Department of Computer Science Universitas Muslim Indonesia Makassar Indonesia Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia
the use of Unmanned Aerial Vehicles (UAVs) in aerial imaging is expanding rapidly, particularly in traffic monitoring and intelligent transportation systems. Detecting small and occluded vehicles in aerial images pose... 详细信息
来源: 评论
2024 IEEE 19th international Conference on the Perspective Technologies and Methods in MEMS Design, MEMSTECH 2024 - Proceedings
2024 IEEE 19th International Conference on the Perspective T...
收藏 引用
19th IEEE international Conference on the Perspective Technologies and Methods in MEMS Design, MEMSTECH 2024
the proceedings contain 31 papers. the topics discussed include: Bilow – knee-prothesis study;electrodynamic modeling the motion devices of MEMS;application of bayes theory model to determine the optimal variant of t...
来源: 评论
Classical Machine Learning and Large Models for Text-Based Emotion Recognition  19
Classical Machine Learning and Large Models for Text-Based E...
收藏 引用
19th international Conference on Future Networks and Communications, FNC 2024 / 21st international Conference on Mobile systems and Pervasive Computing, MobiSPC 2024 / 14th international Conference on Sustainable Energy Information Technology, SEIT 2024
作者: Esfahani, Seyed Hamed Noktehdan Adda, Mehdi Department of Mathematics and Computer Science University of Quebec RimouskiQC Canada
In the era of digital communication, detecting emotions has become crucial for applications ranging from customer service to mental health assessment. this study examines emotion recognition in text through various ma... 详细信息
来源: 评论
DynKDD: Dynamic Graph-Based Network Intrusion Detection Using Graph Neural Networks  19
DynKDD: Dynamic Graph-Based Network Intrusion Detection Usin...
收藏 引用
19th international Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Mir, Aabid A. Zuhairi, Megat F. Musa, Shahrulniza Namoun, Addallah Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia AI Centre Faculty of Computer and Information Systems Islamic University of Madinah Madinah Saudi Arabia
the inability to capture the temporal dynamics of network interactions limits traditional intrusion detection systems (IDSs) in detecting sophisticated threats that evolve over time. this research introduces DynKDD, a... 详细信息
来源: 评论
Leveraging Large Language Models for Smart Pharmacy systems: Enhancing Drug Safety and Operational Efficiency  19
Leveraging Large Language Models for Smart Pharmacy Systems:...
收藏 引用
19th international Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Osheba, Abdelrahman Abou-El-Ela, Ahmed Adel, Osama Maaod, Youssef Abuhmed, Tamer El-Sappagh, Shaker Faculty of Computer Science and Engineering Galala University Egypt College of Computing and Informatics Sungkyunkwan University Korea Republic of
Adverse drug reactions (ADRs) remain a crucial challenge in healthcare systems, highly contributing to patient mortality. We present an innovative smart pharmacy system that utilizes advanced large language models (LL... 详细信息
来源: 评论
Best-Practices-Based Training for Improving Cybersecurity in Power Grids  19th
Best-Practices-Based Training for Improving Cybersecurity i...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Kavallieratos, Georgios Amro, Ahmed Gkioulos, Vasileios Stamatescu, Grigore Rantos, Kostantinos Lagkas, thomas Demertzis, Konstantinos Paterakis, Fotis Lekidis, Alexios Dalamagkas, Christos Kotsiuba, Igor Katsikas, Sokratis Norwegian University of Science and Technology Gjøvik Norway TÜV Austria Romania 139B Calea Plevnei Bucharest060011 Romania Department of Automation and Industrial Informatics University Politehnica of Bucharest 313 Splaiul Independentei Bucharest060042 Romania Department of Informatics Democritus University of Thrace Kavala65404 Greece School of Science Department of Computer Science Kavala Campus International Hellenic University Kavala65404 Greece Athens Greece Innovation Hub of Public Power Corporation S.A. Attica Greece Durham University Durham United Kingdom
the increased financial value of the power grids and the multitude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to s... 详细信息
来源: 评论
19th international Conference on Artificial Intelligence: Methodology, systems, and Applications, AIMSA 2024
19th International Conference on Artificial Intelligence: Me...
收藏 引用
19th international Conference on Artificial Intelligence: Methodology, systems, and Applications, AIMSA 2024
the proceedings contain 18 papers. the special focus in this conference is on Artificial Intelligence: Methodology, systems, and Applications. the topics include: Cross-Lingual Style Transfer TTS for High-Quality...
来源: 评论
Grid-Based Decompositions for Spatial Data Under Local Differential Privacy  19th
Grid-Based Decompositions for Spatial Data Under Local Diff...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Balioglu, Berkay Kemal Khodaie, Alireza Taweel, Ameer Gursoy, M.Emre Department of Computer Engineering Koç University Istanbul Turkey
Local differential privacy (LDP) has recently emerged as a popular privacy standard. With the growing popularity of LDP, recent works have applied LDP to spatial data, and grid-based decompositions have been a common ... 详细信息
来源: 评论