咨询与建议

限定检索结果

文献类型

  • 15,782 篇 会议
  • 10,093 篇 期刊文献
  • 445 册 图书

馆藏范围

  • 26,320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,375 篇 工学
    • 9,733 篇 计算机科学与技术...
    • 7,776 篇 软件工程
    • 3,299 篇 信息与通信工程
    • 3,115 篇 控制科学与工程
    • 2,127 篇 电气工程
    • 1,842 篇 电子科学与技术(可...
    • 1,662 篇 生物工程
    • 1,339 篇 机械工程
    • 1,308 篇 生物医学工程(可授...
    • 1,000 篇 光学工程
    • 823 篇 动力工程及工程热...
    • 802 篇 仪器科学与技术
    • 715 篇 化学工程与技术
    • 628 篇 材料科学与工程(可...
    • 568 篇 安全科学与工程
    • 557 篇 交通运输工程
  • 8,812 篇 理学
    • 4,540 篇 数学
    • 2,337 篇 物理学
    • 1,991 篇 生物学
    • 1,556 篇 统计学(可授理学、...
    • 1,468 篇 系统科学
    • 829 篇 化学
  • 3,864 篇 管理学
    • 2,558 篇 管理科学与工程(可...
    • 1,449 篇 图书情报与档案管...
    • 1,308 篇 工商管理
  • 1,397 篇 医学
    • 1,165 篇 临床医学
    • 981 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 523 篇 公共卫生与预防医...
  • 716 篇 法学
    • 593 篇 社会学
  • 461 篇 经济学
  • 317 篇 教育学
  • 278 篇 农学
  • 72 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,111 篇 computer science
  • 507 篇 deep learning
  • 352 篇 systems engineer...
  • 347 篇 computational mo...
  • 347 篇 machine learning
  • 331 篇 artificial intel...
  • 317 篇 application soft...
  • 289 篇 computer archite...
  • 272 篇 internet of thin...
  • 264 篇 control systems
  • 243 篇 accuracy
  • 240 篇 feature extracti...
  • 238 篇 support vector m...
  • 223 篇 optimization
  • 211 篇 neural networks
  • 203 篇 software enginee...
  • 199 篇 training
  • 198 篇 information syst...
  • 192 篇 laboratories
  • 186 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 47 篇 department of la...
  • 47 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 35 篇 school of comput...
  • 33 篇 department of co...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 95 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 35 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 27 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars
  • 18 篇 li li

语言

  • 22,585 篇 英文
  • 3,489 篇 其他
  • 237 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 6 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 芬兰文
  • 1 篇 荷兰文
检索条件"机构=†Department of Computer Science and Systems Engineering"
26320 条 记 录,以下是901-910 订阅
排序:
Evaluating the Impact on Usability and Acceptance of ECAs in m-Health Applications for Older Adults  11
Evaluating the Impact on Usability and Acceptance of ECAs in...
收藏 引用
11th International Conference on Information and Communication Technologies for Ageing Well and e-Health, ICT4AWE 2025
作者: Gilaberte, Raquel Lacuesta Bagdasari, Eva Cerezo Navarro-Alamán, Javier EUPT Universidad de Zaragoza Spain EINA Universidad de Zaragoza Spain Department of Computer Science and Engineering of Systems EUPT Universidad de Zaragoza Spain
In the context of m-health applications, developing user-friendly interfaces to improve usability and acceptance by older adults has become a prominent research topic. The use of embodied conversational agents (ECAs) ... 详细信息
来源: 评论
Extending OpenStack Monasca for Predictive Elasticity Control
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 315-339页
作者: Giacomo Lanciano Filippo Galli Tommaso Cucinotta Davide Bacciu Andrea Passarella Scuola Normale Superiore Pisa 56126Italy the Real-Time Systems Laboratory(RETIS) TelecommunicationsComputer Engineeringand Photonics Institute(TeCIP)Scuola Superiore Sant’AnnaPisa 56127Italy Department of Computer Science University of PisaPisa 56127Italy National Research Council Pisa56127Italy
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resou... 详细信息
来源: 评论
Dementia Disorder Analysis Using Optimized Deep ResiNet Based on Cognitive Approach  1st
Dementia Disorder Analysis Using Optimized Deep ResiNet Base...
收藏 引用
1st International Conference on Data engineering and Machine Intelligence, ICDEMI 2023
作者: Duraipandian, Kavitha Ambigapathy, Murugan Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India
Early warning signs of dementia may include memory loss, difficulty with problem-solving, confusion, changes in mood and behavior, and impaired communication skills. People impacted by dementia often make a loss on th... 详细信息
来源: 评论
Supremal and Robust Control Against Actuator Jamming Attacks in Cyber-Physical systems
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第9期9卷 5435-5447页
作者: Duo, Wenli Wang, Shouguang Zhou, MengChu You, Dan Winiewski, Remigiusz Bazydlo, Grzegorz Albeshri, Aiiad Macau University of Science and Technology Institute of Systems Engineering 999078 China Zhejiang Gongshang University School of Information and Electronic Engineering Hangzhou310018 China New Jersey Institute of Technology Helen and John C. Hartmann Department of Electrical and Computer Engineering NewarkNJ07102 United States University of Zielona Góra Institute of Control and Computation Engineering Zielona Góra65-516 Poland King Abdulaziz University Department of Computer Science Jeddah21481 Saudi Arabia
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c... 详细信息
来源: 评论
Traffic Density Estimation by Distributed Proxy Model Learning for Internet of Vehicle
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19972-19980页
作者: Li, Qilei Cheng, Jing-An Gao, Mingliang Chen, Jinyong Jeon, Gwanggil Shandong University of Technology School of Electrical and Electronic Engineering Zibo255000 China Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom Incheon National University Department of Embedded Systems Engineering Incheon22012 Korea Republic of
Autonomous driving has been significantly advanced in today’s society, which revolutionized daily routines and facilitated the development of the Internet of Vehicles (IoV). A crucial aspect of this system is underst... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Smart Helmet And Monitoring For Miners With Enhanced Protection  2
Smart Helmet And Monitoring For Miners With Enhanced Protect...
收藏 引用
2nd International Conference on Edge Computing and Applications, ICECAA 2023
作者: Banik, Arnob Mishra, Divakar Manikandan, N. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India School of Computer Science and Engineering Vellore Institute of Technology Department of Database Systems Tamil Nadu Vellore India
Internet of Things (IoT) has lately been expanded across various applications, drawing significant attention to its design, where a loud industrial atmosphere can exist in the mining area. The central essence of this ... 详细信息
来源: 评论
Drone Gesture Control using OpenCV and Tello  8
Drone Gesture Control using OpenCV and Tello
收藏 引用
8th Conference on Information Communication Technology and Society, ICTAS 2024
作者: Khoza, Nokuthula Owolawi, Pius Malele, Vusumuzi Soshanguve Campus Tshwane University of Technology Faculty of Information and Communication Technology Department of Computer Systems Engineering Pretoria South Africa North-West University Unit for Data Science and Computing School of Computer Science and Information Systems Vanderbijlpark Campus Vanderbijlpark South Africa
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came... 详细信息
来源: 评论
Querying Data Exchange Settings beyond Positive Queries  4
Querying Data Exchange Settings beyond Positive Queries
收藏 引用
4th International Workshop on the Resurgence of Datalog in Academia and Industry, Datalog-2.0 2022
作者: Calautti, Marco Greco, Sergio Molinaro, Cristian Trubitsyna, Irina Department of Information Engineering and Computer Science University of Trento Italy Department of Computer Science Modeling Electronics and Systems Engineering University of Calabria Italy
Data exchange, the problem of transferring data from a source schema to a target schema, has been studied for several years. The semantics of answering positive queries over the target schema has been defined in early... 详细信息
来源: 评论
Scanning the Issue
收藏 引用
IEEE Transactions on Intelligent Transportation systems 2025年 第1期26卷 3-21页
作者: Simona Sacone Department of Computer Science Bioengineering Robotics and Systems Engineering University of Genova Genova Italy
“Scanning the Issue.“
来源: 评论