咨询与建议

限定检索结果

文献类型

  • 34,447 篇 会议
  • 27,186 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 61,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,530 篇 工学
    • 20,984 篇 计算机科学与技术...
    • 16,354 篇 软件工程
    • 6,820 篇 信息与通信工程
    • 5,714 篇 电子科学与技术(可...
    • 5,706 篇 电气工程
    • 4,910 篇 控制科学与工程
    • 3,727 篇 光学工程
    • 3,428 篇 生物工程
    • 2,808 篇 生物医学工程(可授...
    • 2,499 篇 化学工程与技术
    • 2,447 篇 材料科学与工程(可...
    • 2,402 篇 机械工程
    • 2,091 篇 仪器科学与技术
    • 1,595 篇 动力工程及工程热...
    • 1,196 篇 力学(可授工学、理...
    • 925 篇 土木工程
  • 24,821 篇 理学
    • 10,803 篇 物理学
    • 10,647 篇 数学
    • 4,244 篇 生物学
    • 3,363 篇 统计学(可授理学、...
    • 2,930 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,401 篇 管理学
    • 4,436 篇 管理科学与工程(可...
    • 3,157 篇 图书情报与档案管...
    • 1,910 篇 工商管理
  • 2,671 篇 医学
    • 2,206 篇 临床医学
    • 1,742 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,091 篇 法学
    • 923 篇 社会学
  • 620 篇 农学
  • 609 篇 经济学
  • 401 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 114 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,108 篇 computational mo...
  • 874 篇 application soft...
  • 702 篇 computer archite...
  • 610 篇 bandwidth
  • 600 篇 feature extracti...
  • 568 篇 artificial intel...
  • 555 篇 testing
  • 546 篇 costs
  • 543 篇 data mining
  • 543 篇 machine learning
  • 532 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 463 篇 robustness
  • 458 篇 deep learning
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 801 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 603 篇 department of co...
  • 602 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 525 篇 department of ph...
  • 517 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 511 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 505 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 243 篇 beiter a.
  • 233 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 bellee v.
  • 229 篇 blake t.
  • 225 篇 c. amelung
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,521 篇 英文
  • 2,672 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
61998 条 记 录,以下是491-500 订阅
排序:
Data-driven modeling of power system dynamics:Challenges,state of the art,and future work
收藏 引用
iEnergy 2023年 第3期2卷 200-221页
作者: Heqing Huang Yuzhang Lin Yifan Zhou Yue Zhao Peng Zhang Lingling Fan Department of Electrical and Computer Engineering University of Massachusetts LowellLowellMA 01852USA Department of Electrical and Computer Engineering Stony Brook UniversityStony BrookNY 11794USA Interdisciplinary Science Department Brookhaven National LaboratoryUptonNY 11973USA Department of Electrical and Computer Engineering University of South FloridaTampaFL 33620USA
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi... 详细信息
来源: 评论
A Framework for Scalable Object Storage and Retrieval Considering Privacy Concerns: A Case Study on the Signature Detection  9
A Framework for Scalable Object Storage and Retrieval Consid...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Khomami, Mohammad Mehdi Daliri Saghiri, Ali Mohammad Rezvanian, Alireza Meybodi, Mohammad Reza Computer Engineering Amirkabir University of Technology Soft Computing Laboratory Department Tehran Iran University of Science and Culture Department of Computer Engineering Tehran Iran
Nowadays, we are faced with a huge amount of private data generated in different ecosystems, including the Internet of Things, social networks, peer-to-peer networks, and e-commerce, to mention a few. The performance ... 详细信息
来源: 评论
Enhanced Multi-Target Surveillance and Tracking Algorithm for Collaborative Drones in IoT Environment  1
Enhanced Multi-Target Surveillance and Tracking Algorithm fo...
收藏 引用
1st International Conference on Engineering and Advanced Technology, ICEEAT 2023
作者: Zahia, Mabrek Brahim, Farou Zineddine, Kouahla Hamid, Seridi University 8 Mai 1945 LabStic Laboratory Department of Computer Science Guelma Algeria
In the realm of IoT-enabled surveillance systems, drones play a pivotal role in detecting and tracking suspects within defined areas. However, a significant challenge arises when a single drone identifies multiple sus... 详细信息
来源: 评论
Extending OpenStack Monasca for Predictive Elasticity Control
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 315-339页
作者: Giacomo Lanciano Filippo Galli Tommaso Cucinotta Davide Bacciu Andrea Passarella Scuola Normale Superiore Pisa 56126Italy the Real-Time Systems Laboratory(RETIS) TelecommunicationsComputer Engineeringand Photonics Institute(TeCIP)Scuola Superiore Sant’AnnaPisa 56127Italy Department of Computer Science University of PisaPisa 56127Italy National Research Council Pisa56127Italy
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resou... 详细信息
来源: 评论
A privacy-preserving approach for detecting smishing attacks using federated deep learning
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第1期17卷 547-553页
作者: Remmide, Mohamed Abdelkarim Boumahdi, Fatima Ilhem, Bousmaha Boustia, Narhimene LRDSI Laboratory Department of Computer Science Faculty of Sciences University of Blida 1 Blida Algeria Electronics Department Faculty of Technology University of Blida 1 Blida Algeria
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com... 详细信息
来源: 评论
Kolmogorov-Smirnov based method for detecting black hole attack in vehicular ad-hoc networks
Kolmogorov-Smirnov based method for detecting black hole att...
收藏 引用
2023 International Symposium on Green Technologies and Applications, ISGTA 2023
作者: Cherkaoui, Badreddine Houssaini, Mohammed-Alamine El Kasri, Mohammed Beni-Hssane, Abderrahim Erritali, Mohammed LAROSERI Laboratory Mathematics and Computer Science Department High School of Technology Chouaïb Doukkali University Sidi Bennour Morocco ESEF Chouaib Doukkali University El Jadida Morocco LAROSERI Laboratory Computer Science Department Facultyof Sciences Chouaïb Doukkali University El Jadida Morocco TIAD Laboratory Computer science department Sciences and Technics Faculty University of Sultan Moulay Slimane Béni-Mellal Morocco
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially in decentralized and open architectures, ad-hoc vehicular networks make prot... 详细信息
来源: 评论
Challenges and future directions of secure federated learning:a survey
收藏 引用
Frontiers of computer science 2022年 第5期16卷 173-180页
作者: Kaiyue ZHANG Xuan SONG Chenhan ZHANG Shui YU Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia SUSTech-UTokyo Joint Research Center on Super Smart City Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but... 详细信息
来源: 评论
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
收藏 引用
computer Modeling in Engineering & sciences 2024年 第2期138卷 1427-1467页
作者: Mohammed Abdalsalam Chunlin Li Abdelghani Dahou Natalia Kryvinska School of Computer Science and Technology Wuhan University of TechnologyWuhan430070China LDDI Laboratory Faculty of Science and TechnologyUniversity of Ahmed DRAIAAdrar01000Algeria Information Systems Department Faculty of ManagementComenius UniversityBratislava82005Slovakia
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... 详细信息
来源: 评论
A Hypothesis Testing-based Framework for Cyber Deception with Sludging  60
A Hypothesis Testing-based Framework for Cyber Deception wit...
收藏 引用
60th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2024
作者: Kumar, Abhinav Brahma, Swastik Geng, Baocheng Kamhoua, Charles A. Varshney, Pramod K. University of Cincinnati Department of Computer Science OH United States University of Alabama Department of Computer Science BirminghamAL United States Network Security Branch DEVCOM Army Research Laboratory MD United States Syracuse University Dept. of Electrical Eng. and Computer Science NY United States
In this paper, we present a novel hypothesis testing framework to model an attacker's decision-making during the reconnaissance phase and employ the framework to design strategic deception strategies that can prov... 详细信息
来源: 评论
A Comparison of the Finest Electrical Energy Forecast Models
A Comparison of the Finest Electrical Energy Forecast Models
收藏 引用
2023 International Conference on Decision Aid sciences and Applications, DASA 2023
作者: Rania, Farah Brahim, Farou Zineddine, Kouahla Hamid, Seridi University 8 May 1945 LabStic Laboratory Department of Computer Science Guelma Algeria
Predicting today's utilization of energy will determine how powerful it is in the future. Generators can change their output by foreseeing the demand for electricity. As a result, shortages or overproduction are p... 详细信息
来源: 评论