咨询与建议

限定检索结果

文献类型

  • 616 篇 期刊文献
  • 589 篇 会议
  • 20 册 图书

馆藏范围

  • 1,225 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 784 篇 工学
    • 555 篇 计算机科学与技术...
    • 453 篇 软件工程
    • 143 篇 信息与通信工程
    • 97 篇 控制科学与工程
    • 83 篇 电气工程
    • 82 篇 生物工程
    • 60 篇 机械工程
    • 58 篇 电子科学与技术(可...
    • 55 篇 光学工程
    • 54 篇 生物医学工程(可授...
    • 41 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 安全科学与工程
    • 23 篇 仪器科学与技术
  • 421 篇 理学
    • 188 篇 数学
    • 122 篇 物理学
    • 96 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 30 篇 化学
    • 25 篇 大气科学
  • 216 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 87 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 24 篇 法学
  • 17 篇 教育学
  • 16 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 42 篇 cloud computing
  • 37 篇 computational mo...
  • 25 篇 machine learning
  • 24 篇 deep learning
  • 21 篇 feature extracti...
  • 20 篇 reinforcement le...
  • 20 篇 training
  • 19 篇 semantics
  • 18 篇 computer archite...
  • 18 篇 distributed comp...
  • 18 篇 artificial intel...
  • 17 篇 laboratories
  • 16 篇 internet of thin...
  • 16 篇 grid computing
  • 16 篇 resource managem...
  • 15 篇 trajectory
  • 15 篇 accuracy
  • 13 篇 learning systems
  • 13 篇 quality of servi...
  • 13 篇 security

机构

  • 53 篇 school of comput...
  • 39 篇 yunnan key labor...
  • 32 篇 laboratory schoo...
  • 29 篇 school of inform...
  • 24 篇 laboratory schoo...
  • 19 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 16 篇 scuola di ingegn...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 infn sezione di ...
  • 16 篇 dipartimento di ...
  • 16 篇 università degli...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...
  • 16 篇 university of mi...

作者

  • 93 篇 buyya rajkumar
  • 59 篇 rajkumar buyya
  • 19 篇 ismail leila
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 t. akutsu
  • 16 篇 j. c. bayley
  • 16 篇 f. hellman
  • 16 篇 s. eguchi
  • 16 篇 m. kinley-hanlon
  • 16 篇 t. mcrae
  • 16 篇 a. parisi
  • 16 篇 s. rowan
  • 16 篇 s. m. aronson
  • 16 篇 v. p. mitrofanov
  • 16 篇 a. j. tanasijczu...
  • 16 篇 l.-w. luo

语言

  • 1,041 篇 英文
  • 169 篇 其他
  • 15 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems"
1225 条 记 录,以下是641-650 订阅
排序:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency
Practical Secure Two-Party EdDSA Signature Generation with K...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Qi Feng Debiao He Min Luo Zengxiang Li Kim-Kwang Raymond Choo Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering Wuhan University Ministry of Education Wuhan China Digital Research Institute ENN Group Beijing China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX USA
In cryptocurrency and blockchain-based distributed ledgers, transfer of money (digital coins) can be presented as a transaction. Due to the irreversibility nature of blockchain transactions, a single fraudulent use of... 详细信息
来源: 评论
Robust multimodal federated learning for non-IID multimodal data with incompleteness
收藏 引用
Future Generation Computer systems 2026年 174卷
作者: Songcan Yu Kaiming Zhu Feiyuan Liang Junbo Wang Krishna Kant Ling Yin Department of Computer Science and Technology Sichuan Police College Luzhou 646000 PR China Police Integration Computing Key Laboratory of Sichuan Province Chengdu 610206 PR China School of Intelligent Systems Engineering Sun Yat-Sen University Shenzhen 518107 PR China Department of Computer and Information Sciences Temple University Philadelphia USA Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen 518055 PR China
Federated learning (FL) provides a privacy-aware distributed learning framework using private data belonging to multiple users (or clients). Often the data is generated continuously by the sensors deployed by differen...
来源: 评论
Individual particle persistence antagonizes global ordering in populations of nematically-aligning self-propelled particles
arXiv
收藏 引用
arXiv 2025年
作者: Nava-Sedeño, Josue Manik Klages, Rainer Hatzikirou, Haralampos Deutsch, Andreas Sevilla, Francisco J. Departmento de Matemáticas Facultad de Ciencias Universidad Nacional Autónoma de México Circuito Exterior Ciudad Universitaria Ciudad de México04510 Mexico Centre for Complex Systems School of Mathematical Sciences Queen Mary University of London Mile End Road LondonE1 4NS United Kingdom London Mathematical Laboratory 8 Margravine Gardens LondonW6 8RH United Kingdom Technische Universität Dresden Center for Information Services and High Performance Computing Nöthnitzer Straße 46 Dresden01062 Germany Mathematics Department Khalifa University PO Box 127788 Abu Dhabi United Arab Emirates Instituto de Física Universidad Nacional Autónoma de México Apdo. Postal 20-364 Ciudad de México01000 Mexico
The transition from individual to collective motion plays a significant role in many biological processes. While the implications of different types of particle-particle interactions for the emergence of particular mo...
来源: 评论
Assertion-based approaches to auditing complex elections, with application to party-list proportional elections
arXiv
收藏 引用
arXiv 2021年
作者: Blom, Michelle Budurushi, Jurlind Rivest, Ronald L. Stark, Philip B. Stuckey, Peter J. Teague, Vanessa Vukcevic, Damjan School of Computing and Information Systems University of Melbourne Parkville Australia Cloudical Deutschland GmbH Berlin Germany Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology CambridgeMA United States Department of Statistics University of California BerkeleyCA United States Department of Data Science and AI Monash University Clayton Australia Thinking Cybersecurity Pty. Ltd. Melbourne Australia School of Mathematics and Statistics University of Melbourne Parkville Australia Melbourne Integrative Genomics University of Melbourne Parkville Australia
Risk-limiting audits (RLAs), an ingredient in evidence-based elections, are increasingly common. They are a rigorous statistical means of ensuring that electoral results are correct, usually without having to perform ... 详细信息
来源: 评论
Foundational Competencies and Responsibilities of a Research Software Engineer
arXiv
收藏 引用
arXiv 2023年
作者: Goth, Florian Alves, Renato Braun, Matthias Castro, Leyla Jael Chourdakis, Gerasimos Christ, Simon Cohen, Jeremy Druskat, Stephan Erxleben, Fredo Grad, Jean-Noël Hagdorn, Magnus Hodges, Toby Juckeland, Guido Kempf, Dominic Lamprecht, Anna-Lena Linxweiler, Jan Löffler, Frank Martone, Michele Schwarzmeier, Moritz Seibold, Heidi Thiele, Jan Philipp Waldow, Harald von Wittke, Samantha Institute for Theoretical Physics and Astrophysics University of Würzburg Germany European Molecular Biology Laboratory Heidelberg Germany Cluster of Excellence IntCDC University of Stuttgart Germany ZB MED Information Centre for Life Sciences Cologne Germany School of Computation Information and Technology Technical University of Munich Garching Germany Institute for Parallel and Distributed Systems University of Stuttgart Stuttgart Germany Leibniz University Hannover Department of Cell Biology and Biophysics Computational Biology Germany Imperial College London London United Kingdom Institute for Software Technology Berlin Germany Humboldt-Universität zu Berlin Department of Computer Science Berlin Germany Helmholtz-Zentrum Dresden-Rossendorf Germany Institute for Computational Physics University of Stuttgart Germany Geschäftsbereich IT Charité Universitätsmedizin Berlin Germany The Carpentries United States Heidelberg University Scientific Software Center Germany Institute of Computer Science University of Potsdam Germany Technische Universität Braunschweig Germany Michael Stifel Center Jena Friedrich Schiller University Jena Germany Leibniz Supercomputing Centre Garching Germany Mathematical Modeling and Analysis TU Darmstadt Germany IGDORE Munich Germany Weierstrass Institute Berlin Germany Leibniz University Hannover Institute of Applied Mathematics Scientific Computing Hannover Germany Johann Heinrich von Thünen Institute Centre for Information Management Germany
The term Research Software Engineer, or RSE, emerged a little over 10 years ago as a way to represent individuals working in the research community but focusing on software development. The term has been widely adopte... 详细信息
来源: 评论
A Generalized Attack on Some Variants of the RSA Cryptosystem  25th
A Generalized Attack on Some Variants of the RSA Cryptosyste...
收藏 引用
25th International Conference on Selected Areas in Cryptography, SAC 2018
作者: Nitaj, Abderrahmane Pan, Yanbin Tonien, Joseph Laboratoire de Mathématiques Nicolas Oresme Université de Caen Normandie Caen France Key Laboratory of Mathematics Mechanization NCMIS Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China School of Computing and Information Technology University of Wollongong Wollongong Australia
Let be an RSA modulus with unknown factorization. The RSA cryptosystem can be attacked by using the key equation. Similarly, some variants of RSA, such as RSA combined with singular elliptic curves, LUC and RSA with G... 详细信息
来源: 评论
Aircraft Type Classification in Remote Sensing Images using Deep Learning
Aircraft Type Classification in Remote Sensing Images using ...
收藏 引用
International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
作者: Youssef Ben Youssef Mohamed Merrouchi Elhassane Abdelmounim Taoufiq Gadi Interdisciplinary Laboratory of Applied Sciences National School of Applied Sciences Berrechid Morocco Lab computing imaging and modeling of complex systems FST of Settat Hassan first University Settat Morocco Lab of Signal Analysis and Information Processing FST of Settat Hassan first University Settat Morocco
In aeronautic, redundancy of data is strongly desired to make optimal decisions. A large data source is available with the development of the technology used in remote sensing images. Remote Sensing Image Classificati... 详细信息
来源: 评论
Random Occlusion Recovery with Noise Channel for Person Re-identification  16th
Random Occlusion Recovery with Noise Channel for Person Re-i...
收藏 引用
16th International Conference on Intelligent computing, ICIC 2020
作者: Zhang, Kun Wu, Di Yuan, Changan Qin, Xiao Wu, Hongjie Zhao, Xingming Zhang, Lijun Du, Yuchuan Wang, Hanli Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Tongji University Shanghai China Guangxi Academy of Science Nanning530025 China School of Computer and Information Engineering Nanning Normal University Nanning530299 China School of Computer Science and Technology Soochow University Suzhou215006 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China Fudan University Shanghai200433 China Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Ministry of Education Shanghai China Collaborative Innovation Center of Intelligent New Energy Vehicle and School of Automotive Studies Tongji University Shanghai201804 China The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Department of Transportation Engineering Tongji University Shanghai201804 China Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing and Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Person re-identification, as the basic task of a multi-camera surveillance system, plays an important role in a variety of surveillance applications. However, the current mainstream person re-identification model base... 详细信息
来源: 评论
Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
收藏 引用
Journal of cloud computing 2025年 第1期14卷 1-1页
作者: Zhou, Jincheng Lilhore, Umesh Kumar M, Poongodi Hai, Tao Simaiya, Sarita Abang Jawawi, Dayang Norhayati Alsekait, Deema Mohammed Ahuja, Sachin Biamba, Cresantus Hamdi, Mounir School of Computer and Information and Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Qiannan Normal University for Nationalities Duyun China Department of Computer Science and Engineering Chandigarh University Mohali India College of Science and Engineering Hamad Bin Khalifa University Qatar Foundation Doha Qatar School of Computing Faculty of Engineering Universiti Teknologi Malaysia (UTM) Johor Malaysia Department of Computer Science and Information Technology Princess Nourah Bint Abdul Rahman University Applied College Riyadh Saudi Arabia Department of Culture Studies Religious Studies and Educational Sciences University of Gävle Gävle Sweden
来源: 评论
Geo-cloudlet: Time and Power Efficient Geospatial Query Resolution using cloudlet
Geo-Cloudlet: Time and Power Efficient Geospatial Query Reso...
收藏 引用
International Conference on Advanced computing, ICAC
作者: Jaydeep Das Anwesha Mukherjee Soumya K. Ghosh Rajkumar Buyya Advanced Technology Development Centre Indian Institute of Technology Kharagpur West Bengal India Department of Computer Science Mahishadal Raj College Purba Medinipur West Bengal India Department of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal India Cloud Computing and Distributed Systems (CLOUDS) Lab School of Computing and Information Systems The University of Melbourne VIC Australia
Geospatial data analysis is an emerging area of research today due to the potential to enable varied location-aware services. The existing centralized cloud-based analysis becomes time and computing-intensive for huge...
来源: 评论