咨询与建议

限定检索结果

文献类型

  • 332 篇 会议
  • 197 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 200 篇 计算机科学与技术...
    • 168 篇 软件工程
    • 51 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 电子科学与技术(可...
    • 31 篇 电气工程
    • 27 篇 生物医学工程(可授...
    • 23 篇 力学(可授工学、理...
    • 20 篇 机械工程
    • 20 篇 动力工程及工程热...
    • 20 篇 土木工程
    • 19 篇 化学工程与技术
    • 14 篇 材料科学与工程(可...
    • 14 篇 交通运输工程
    • 12 篇 光学工程
    • 11 篇 仪器科学与技术
    • 10 篇 建筑学
  • 182 篇 理学
    • 101 篇 数学
    • 47 篇 物理学
    • 46 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 20 篇 化学
    • 20 篇 系统科学
  • 68 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 24 篇 医学
    • 21 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
  • 10 篇 法学
  • 9 篇 经济学
  • 9 篇 教育学
  • 4 篇 农学
  • 4 篇 军事学

主题

  • 79 篇 computational mo...
  • 36 篇 computer simulat...
  • 19 篇 analytical model...
  • 18 篇 computer science
  • 17 篇 artificial intel...
  • 15 篇 discrete event s...
  • 15 篇 humans
  • 14 篇 application soft...
  • 14 篇 biological syste...
  • 12 篇 computational in...
  • 11 篇 decision making
  • 9 篇 visualization
  • 9 篇 animation
  • 8 篇 predictive model...
  • 7 篇 software enginee...
  • 7 篇 uncertainty
  • 7 篇 optimal control
  • 7 篇 data models
  • 6 篇 laboratories
  • 6 篇 semantics

机构

  • 29 篇 school of comput...
  • 22 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 school of inform...
  • 8 篇 virginia modelin...
  • 7 篇 virginia modelin...
  • 6 篇 faculty of engin...
  • 6 篇 virginia modelin...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 center for secur...
  • 5 篇 modeling and sim...
  • 4 篇 institució catal...
  • 4 篇 arizona center f...
  • 4 篇 department of th...
  • 4 篇 facultad de cien...
  • 4 篇 uow malaysia kdu...
  • 4 篇 school of econom...
  • 4 篇 data security go...

作者

  • 19 篇 wan jian
  • 17 篇 sachin shetty
  • 16 篇 yu jun
  • 14 篇 zeigler bernard ...
  • 13 篇 shetty sachin
  • 12 篇 zhang jilin
  • 10 篇 pandian vasant
  • 10 篇 elias munapo
  • 10 篇 j. joshua thomas
  • 10 篇 gerhard-wilhelm ...
  • 10 篇 yilmaz levent
  • 9 篇 mohammad shamsul...
  • 9 篇 rachik mostafa
  • 9 篇 vladimir panchen...
  • 8 篇 sarjoughian hess...
  • 8 篇 yu zhou
  • 7 篇 tao dacheng
  • 7 篇 jiang congfeng
  • 7 篇 h.s. sarjoughian
  • 7 篇 jun yu

语言

  • 521 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Modeling and Simulation"
541 条 记 录,以下是51-60 订阅
排序:
FedECCR: Federated Learning Method with Encoding Comparison and Classification Rectification  19th
FedECCR: Federated Learning Method with Encoding Comparison...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Zeng, Yan Zheng, Hui Wang, Xin Zhang, Beibei Zhou, Mingyao Zhang, Jilin Ren, YongJian School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Zhejiang Lab Hangzhou311100 China Hangzhou Huawei Communication Technology Co. Ltd. Hangzhou310052 China
Federated learning is a distributed training method that integrates multi-party data information using privacy-preserving technologies through dispersed client data sets to jointly construct a global model under the c... 详细信息
来源: 评论
Transmission Power Control for Interference Reduction in Cellular D2D Networks
Transmission Power Control for Interference Reduction in Cel...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Mehrdad Sadehvand Neda Moghim Behrouz Shahgholi Ghahfarokhi Sachin Shetty Department of Computer Engineering University of Isfahan Isfahan I.R.Iran Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk USA
Interference is one of the most critical issues in the cellular Device-to-Device (D2D) networks. The sharing of radio resources in cellular and D2D communications offers spectrum efficiency advantages for the cellular...
来源: 评论
FedAG:A Federated Learning Method Based on Data Importance Weighted Aggregation
FedAG:A Federated Learning Method Based on Data Importance W...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Xu, Mengchu Zeng, Yan Xue, Meiting Zhang, Ji-Lin Wan, Jian Zhou, Mingyao Wen, Yilin Shi, Yukun Hangzhou Dianzi University School of Computer Science and Technology Hangzhou China Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education Hangzhou China Zhejiang Engineering Research Center of Data Security Governance Hangzhou China Hangzhou Dianzi University School of Cyberspace Hangzhou China Huawei Enterprise Communication Technology Co Hangzhou China
Federated learning is a distributed machine learning approach that trains models with multiple clients and data locally. However, the existing methods ignore the differences between local models caused by the data het... 详细信息
来源: 评论
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment
Multiclass Classification Approaches for Intrusion Detection...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Saksham Mittal Amit Kumar Mishra Mohammad Wazid D. P. Singh Ashok Kumar Das Sachin Shetty Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Center for Cybersecurity Education and Research Old Dominion University Suffolk VA USA
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The ubiquitous nature of IoT and aerial computi...
来源: 评论
Facs-Charm: A Hybrid Agent-Based and Discrete-Event simulation Approach for Covid-19 Management at Regional Level  22
Facs-Charm: A Hybrid Agent-Based and Discrete-Event Simulati...
收藏 引用
Proceedings of the Winter simulation Conference
作者: Anastasia Anagnostou Derek Groen Simon J. E. Taylor Diana Suleimenova Nura Abubakar Arindam Saha Kate Mintram Maziar Ghorbani Habiba Daroge Tasin Islam Yani Xue Edward Okine Nana Anokye Modeling and Simulation Group Department of Computer Science Brunel University London Uxbridge UK Global Public Health Department of Health Sciences Brunel University London Uxbridge UK
Pandemics have huge impact on all aspect of people's lives. As we have experienced during the Coronavirus pandemic, healthcare, education and the economy have been put under extreme strain. It is important therefo...
来源: 评论
Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G
arXiv
收藏 引用
arXiv 2023年
作者: Banerjee, Soumya Gochhayat, Sarada Prasad Shetty, Sachin Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Department of Electrical and Computer Engineering Villanova University VillanovaPA United States
An end-to-end fiber-based network has the potential to offer multi-gigabit fixed access to end-users. However, a fiber network’s biggest hurdle is delivering that fiber access to the end-user. Especially in places wh... 详细信息
来源: 评论
Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid
Trustworthy Artificial Intelligence Framework for Proactive ...
收藏 引用
simulation Winter Conference
作者: Md. Shirajum Munir Sachin Shetty Danda B. Rawat Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA Department of Electrical and Computer Science Howard University Washington D.C. USA
The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to...
来源: 评论
EXPLORING XENOPHOBIC EVENTS THROUGH GDELT DATA ANALYSIS
arXiv
收藏 引用
arXiv 2023年
作者: Jayanetti, Himarsha R. Frydenlund, Erika Weigle, Michele C. Department of Computer Science Old Dominion University NorfolkVA United States Virginia Modeling Analysis and Simulation Center Old Dominion University SuffolkVA United States
This study explores xenophobic events related to refugees and migration using the GDELT 2.0 database and APIs through visualizations. We conducted two case studies – the first being an analysis of refugee-related new... 详细信息
来源: 评论
Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures
Achieving Runtime State Verification Assurance in Critical C...
收藏 引用
2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021
作者: Rivera, Abel O. Gomez Tosh, Deepak K. Shetty, Sachin University of Texas at El Paso Department of Computer Science TX United States Virginia Modeling Analysis and Simulation Center Old Dominion University TX United States
Industrial Cyber-Physical Systems (ICPS) are an essential backbone of national critical infrastructures. They help monitor and control crucial cyber-enabled services such as energy generation. Commonly ICPS monitors t... 详细信息
来源: 评论
EM-PAD: An Effective Mechanism for Phishing Attack Detection
EM-PAD: An Effective Mechanism for Phishing Attack Detection
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Aakash Saksham Mittal Mohammad Wazid Amit Kumar Mishra Ashok Kumar Das Sachin Shetty Mohsen Guizani Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computational Modeling and Simulation Engineering Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE
In the present era, the increasing number of network devices and ubiquitous computing leads to the flow of enormous amounts of data traffic, including sensitive and confidential information, on the internet and carryi... 详细信息
来源: 评论