咨询与建议

限定检索结果

文献类型

  • 449 篇 会议
  • 381 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 544 篇 工学
    • 352 篇 计算机科学与技术...
    • 271 篇 软件工程
    • 164 篇 信息与通信工程
    • 86 篇 电气工程
    • 78 篇 电子科学与技术(可...
    • 78 篇 控制科学与工程
    • 57 篇 生物工程
    • 39 篇 机械工程
    • 37 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 21 篇 光学工程
    • 20 篇 土木工程
    • 19 篇 生物医学工程(可授...
    • 19 篇 网络空间安全
    • 18 篇 建筑学
    • 16 篇 航空宇航科学与技...
  • 248 篇 理学
    • 135 篇 数学
    • 63 篇 生物学
    • 38 篇 物理学
    • 38 篇 系统科学
    • 37 篇 统计学(可授理学、...
  • 143 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 51 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 37 篇 法学
    • 24 篇 社会学
    • 13 篇 法学
  • 16 篇 医学
    • 15 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 5 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 33 篇 computer science
  • 29 篇 laboratories
  • 23 篇 computer network...
  • 22 篇 computer archite...
  • 18 篇 bandwidth
  • 17 篇 wireless sensor ...
  • 16 篇 throughput
  • 15 篇 network topology
  • 15 篇 neural networks
  • 15 篇 resource managem...
  • 15 篇 quality of servi...
  • 15 篇 servers
  • 15 篇 computational mo...
  • 15 篇 distributed comp...
  • 15 篇 delay
  • 15 篇 training
  • 14 篇 application soft...
  • 14 篇 optimization
  • 13 篇 deep learning
  • 13 篇 deep neural netw...

机构

  • 29 篇 department of co...
  • 22 篇 key laboratory o...
  • 21 篇 school of comput...
  • 20 篇 department of co...
  • 17 篇 school of cyber ...
  • 13 篇 national enginee...
  • 10 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 services computi...
  • 10 篇 peng cheng labor...
  • 10 篇 hubei engineerin...
  • 10 篇 cluster and grid...
  • 9 篇 state key labora...
  • 9 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of ne...
  • 7 篇 hubei key labora...

作者

  • 19 篇 hai jin
  • 15 篇 xiang-yang li
  • 15 篇 yunhao liu
  • 14 篇 changjun jiang
  • 13 篇 han zhu
  • 13 篇 jin hai
  • 11 篇 niyato dusit
  • 11 篇 cheng wang
  • 10 篇 liu xiwei
  • 10 篇 shaojie tang
  • 9 篇 wang wei
  • 8 篇 xiwei liu
  • 8 篇 ai bo
  • 8 篇 wei zhang
  • 7 篇 wang cheng
  • 7 篇 hu shengshan
  • 7 篇 jiang changjun
  • 7 篇 huang chongwen
  • 7 篇 wang ning
  • 6 篇 mei-ling shyu

语言

  • 685 篇 英文
  • 120 篇 其他
  • 31 篇 中文
检索条件"机构=Computer Networks and Distributed System Laboratory Department of Computer Science and Technology"
834 条 记 录,以下是1-10 订阅
排序:
Hotspotter: An Incentivized Crowdsensing system for WiFi and Cellular Network Coverage Visualization  29
Hotspotter: An Incentivized Crowdsensing System for WiFi and...
收藏 引用
29th IEEE Asia Pacific Conference on Communications, APCC 2024
作者: Ortiz, Sebastian Luis S. Enriquez, Justin Gabriel R. Tan, Wilson M. Festin, Cedric Angelo M. University of the Philippines - Diliman Networks and Distributed Systems Laboratory Department of Computer Science Metro Manila Philippines
Reliable internet access is a key enabler for economic growth. Although the Philippine government launched initiatives to improve connectivity, connection speeds remained below the global average, especially for mobil... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of computer science & technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1504-1514页
作者: Yuben QU Zhenhua WEI Zhen QIN Tao WU Jinghao MA Haipeng DAI Chao DONG The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Colllege of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Xi'an Research Institute of High Technology Department of Information and Communication Noncommissioned Officer Academy of PAP National University of Defense Technology Department of Computer Science and Technology Nanjing University
Unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC), as a way of coping with delaysensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC... 详细信息
来源: 评论
Behaviour-diverse automatic penetration testing:a coverage-based deep reinforcement learning approach
收藏 引用
Frontiers of computer science 2025年 第3期19卷 15-24页
作者: Yizhou YANG Longde CHEN Sha LIU Lanning WANG Haohuan FU Xin LIU Zuoning CHEN Zhongguancun Laboratory Beijing 100081China Zhejiang Lab Hangzhou 311121China National Research Centre of Parallel Computer Engineering and Technology Wuxi 214000China Faculty of Geographical Science Beijing Normal UniversityBeijing 100875China Department of Earth System Science Tsinghua UniversityBeijing 100084China
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca... 详细信息
来源: 评论
Task Placement and Resource Allocation for Edge Machine Learning: A GNN-Based Multi-Agent Reinforcement Learning Paradigm
收藏 引用
IEEE Transactions on Parallel and distributed systems 2023年 第12期34卷 3073-3089页
作者: Li, Yihong Zhang, Xiaoxi Zeng, Tianyu Duan, Jingpu Wu, Chuan Wu, Di Chen, Xu Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Peng Cheng Laboratory Department of Communications Shenzhen518066 China Southern University of Science and Technology Institute of Future Networks Shenzhen518055 China University of Hong Kong Department of Computer Science Hong Kong Hong Kong
Machine learning (ML) tasks are one of the major workloads in today's edge computing networks. Existing edge-cloud schedulers allocate the requested amounts of resources to each task, falling short of best utilizi... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Faizan Ayub, Muhammad Li, Xiong Mahmood, Khalid Shamshad, Salman Kumar Das, Ashok Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart grids (SGs) rely on home area networks (HANs) and neighborhood area networks (NANs) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these a... 详细信息
来源: 评论
Compact Multitasking Multichromosome Genetic Algorithm for Heuristic Selection in Ontology Matching
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6752-6766页
作者: Xue, Xingsi Lin, Jerry Chun-Wei Su, Tong Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian Fuzhou350118 China Silesian University of Technology Department of Distributed Systems and IT Devices Akademicka Gliwice44-100 Poland Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China
Ontology matching (OM) is critical for knowledge integration and system interoperability on the semantic web, tasked with identifying semantically related entities across different ontologies. Despite its importance, ... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 2061-2071页
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论
A Secure and Cost-Effective Training Framework Atop Serverless Computing for Object Detection in Blasting
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 2139-2154页
作者: Tianming Zhang Zebin Chen Haonan Guo Bojun Ren Quanmin Xie Mengke Tian Yong Wang Department of Computer and Science Shanghai Jiaotong UniversityShanghai200240China Aerospace System Engineering Shanghai Shanghai200240China State Key Laboratory of Precision Blasting Jianghan UniversityWuhan430056China Beijing Microelectronics Technology Institute Beijing100076China
The data analysis of blasting sites has always been the research goal of relevant *** rise of mobile blasting robots has aroused many researchers’interest in machine learning methods for target detection in the field... 详细信息
来源: 评论