咨询与建议

限定检索结果

文献类型

  • 616 篇 期刊文献
  • 585 篇 会议
  • 20 册 图书

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 789 篇 工学
    • 559 篇 计算机科学与技术...
    • 458 篇 软件工程
    • 144 篇 信息与通信工程
    • 97 篇 控制科学与工程
    • 94 篇 电气工程
    • 83 篇 生物工程
    • 60 篇 机械工程
    • 59 篇 电子科学与技术(可...
    • 56 篇 光学工程
    • 55 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
  • 422 篇 理学
    • 189 篇 数学
    • 123 篇 物理学
    • 95 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 29 篇 化学
    • 25 篇 大气科学
  • 216 篇 管理学
    • 137 篇 管理科学与工程(可...
    • 93 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 25 篇 法学
  • 17 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 40 篇 cloud computing
  • 38 篇 computational mo...
  • 25 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 feature extracti...
  • 20 篇 artificial intel...
  • 20 篇 training
  • 19 篇 reinforcement le...
  • 19 篇 computer archite...
  • 19 篇 semantics
  • 18 篇 distributed comp...
  • 17 篇 laboratories
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 16 篇 accuracy
  • 15 篇 internet of thin...
  • 14 篇 quality of servi...
  • 14 篇 trajectory
  • 13 篇 learning systems
  • 13 篇 edge computing

机构

  • 51 篇 school of comput...
  • 38 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 28 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...
  • 16 篇 università di tr...

作者

  • 93 篇 buyya rajkumar
  • 56 篇 rajkumar buyya
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 ismail leila
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 1,157 篇 英文
  • 51 篇 其他
  • 13 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1221 条 记 录,以下是31-40 订阅
排序:
FocalCount: Towards Class-Count Imbalance in Class-Agnostic Counting
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Huilin Yuan, Jingling Yang, Zhengwei Guo, Yu Zhong, Xian He, Shengfeng Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology China School of Computing and Information Systems Singapore Management University Singapore School of Computer Science Wuhan University China School of Navigation Wuhan University of Technology China
In class-agnostic object counting, the goal is to estimate the total number of object instances in an image without distinguishing between specific categories. Existing methods often predict this count without conside...
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论
Modeling resource consumption in the US air transportation system via minimum-cost percolation
arXiv
收藏 引用
arXiv 2025年
作者: Kim, Minsuk Diggans, C. Tyler Radicchi, Filippo Center for Complex Networks and Systems Research Luddy School of Informatics Computing and Engineering Indiana University BloomingtonIN47408 United States Air Force Research Laboratory’s Information Directorate RomeNY13441 United States
We introduce a dynamic percolation model aimed at describing the consumption, and eventual exhaustion, of resources in transportation networks. In the model, rational agents progressively consume the edges of a networ... 详细信息
来源: 评论
Efficient Algorithms for Minimizing the Kirchhoff Index via Adding Edges
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Xiaotian Zehmakan, Ahad N. Zhang, Zhongzhi Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China Research Institute of Intelligent Complex Systems Fudan University Shanghai200433 China School of Computing Australian National University Canberra Australia
The Kirchhoff index, which is the sum of the resistance distance between every pair of nodes in a network, is a key metric for gauging network performance, where lower values signify enhanced performance. In this pape... 详细信息
来源: 评论
J-OPT: A joint host and network optimization algorithm for energy-efficient workflow scheduling in cloud data centers  19
J-OPT: A joint host and network optimization algorithm for e...
收藏 引用
12th IEEE/ACM International Conference on Utility and cloud computing, UCC 2019
作者: Jayanetti, Amanda Buyya, Rajkumar Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems University of Melbourne Australia
Workflows are a popular application model used for representing scientific as well as commercial applications, and cloud data centers are increasingly used in the execution of workflow applications. Existing approache... 详细信息
来源: 评论
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Tian, Jianwen Ma, Haoyu Gao, Debin Kuang, Xiaohui Academy of Military Sciences Institute of System Engineering China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100045 China Singapore Management University School of Computing and Information Systems Singapore
Malware attack has been a serious threat to the security and privacy of both individual and corporation users of the Android platform. Business entities seek to protect themselves by means of monitoring privacy-relate... 详细信息
来源: 评论
Family of Mutually Uncorrelated Codes for DNA Storage Address Design
IEEE Transactions on Nanobioscience
收藏 引用
IEEE Transactions on Nanobioscience 2025年 PP卷 PP页
作者: Liu, Zhenlu Cao, Ben Shao, Qi Zheng, Yanfen Wang, Bin Zhou, Shihua Zheng, Pan Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China University of Canterbury Upper Riccarton Department of Accounting and Information Systems Christchurch8140 New Zealand
Deoxyribonucleic acid (DNA) has become an ideal medium for long-term storage and retrieval due to its extremely high storage density and long-term stability. But access efficiency is an existing bottleneck in DNA stor... 详细信息
来源: 评论
QoS-Based Beamforming and Compression Design for Cooperative Cellular Networks via Lagrangian Duality
收藏 引用
IEEE Transactions on Signal Processing 2025年
作者: Fan, Xilai Liu, Ya-Feng Liu, Liang Chang, Tsung-Hui Chinese Academy of Sciences State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Beijing100190 China The Hong Kong Polytechnic University Department of Electronic and Information Engineering Hong Kong Hong Kong The Chinese University of HongKong School of Science and Engineering Shenzhen Shenzhen China Shenzhen Research Institute of Big Data China
This paper considers the quality-of-service (QoS)-based joint beamforming and compression design problem in the downlink cooperative cellular network, where multiple relay-like base stations (BSs), connected to the ce... 详细信息
来源: 评论
Correction to: A comprehensive performance evaluation of container migration strategies
收藏 引用
computing 2025年 第4期107卷 1-2页
作者: Feitosa, Leonel Barbosa, Vandirleya Sabino, Arthur Lima, Luiz Nelson Fé, Iure Silva, Luis Guilherme Callou, Gustavo Carvalho, Juliana Leão, Erico Nguyen, Tuan Anh Rego, Paulo Silva, Francisco Airton Laboratory of Applied Research to Distributed Systems (PASID) Federal University of Piauí (UFPI) Picos Brazil Department of Computing Federal Rural University of Pernambuco (UFRPE) Recife Brazil Department of Software Engineering Faculty of Information Technology University of Industry and Trade (HUIT) Ho Chi Minh City Vietnam Department of Computer Science Federal University of Ceará (UFC) Fortaleza Brazil
来源: 评论
Foreign‐Object Detection in High‐Voltage Transmission Line Based on Improved YOLOv8m
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhenyue Yuan, Guowu Zhou, Hao Ma, Yi Ma, Yutang School of Information Science and Engineering Yunnan University Kunming650504 China Electric Power Research Institute Yunnan Power Grid Co. Ltd. Kunming650214 China Yunnan Key Laboratory of Intelligent Systems and Computing Kunming650504 China
The safe operation of high‐voltage transmission lines ensures the power grid’s security. Various foreign objects attached to the transmission lines, such as balloons, kites and nesting birds, can significantly affec... 详细信息
来源: 评论