咨询与建议

限定检索结果

文献类型

  • 21,586 篇 会议
  • 9,560 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,495 篇 工学
    • 15,471 篇 计算机科学与技术...
    • 12,929 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,368 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,511 篇 电气工程
    • 1,301 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,152 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 576 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,715 篇 理学
    • 5,147 篇 数学
    • 2,269 篇 生物学
    • 1,661 篇 物理学
    • 1,488 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,859 篇 管理学
    • 3,483 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,585 篇 工商管理
  • 1,060 篇 医学
    • 917 篇 临床医学
    • 826 篇 基础医学(可授医学...
  • 888 篇 法学
    • 694 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 547 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 627 篇 feature extracti...
  • 619 篇 training
  • 597 篇 computational mo...
  • 531 篇 deep learning
  • 528 篇 semantics
  • 473 篇 software
  • 416 篇 application soft...
  • 412 篇 accuracy
  • 409 篇 machine learning
  • 382 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 253 篇 testing
  • 250 篇 data models

机构

  • 1,215 篇 college of compu...
  • 352 篇 school of comput...
  • 273 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 154 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 90 篇 school of comput...
  • 89 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,161 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31448 条 记 录,以下是331-340 订阅
排序:
A Comprehensive Survey on Communication-Efficient Federated Learning in Mobile Edge Environments
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Jia, Ninghui Qu, Zhihao Ye, Baoliu Wang, Yanyan Hu, Shihong Guo, Song Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources College of Computer Science and Software Engineering Nanjing211100 China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing210023 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Kowloon Hong Kong
In traditional centralized machine learning, transmitting raw data to a cloud center incurs high communication costs and raises privacy concerns. This is particularly challenging in mobile edge environments, where dev... 详细信息
来源: 评论
LoRASculpt: Sculpting LoRA for Harmonizing General and Specialized Knowledge in Multimodal Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Jian Huang, Wenke Wan, Guancheng Yang, Qu Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
While Multimodal Large Language Models (MLLMs) excel at generalizing across modalities and tasks, effectively adapting them to specific downstream tasks while simultaneously retaining both general and specialized know... 详细信息
来源: 评论
HybridFL: Hybrid Approach Toward Privacy-Preserving Federated Learning  6th
HybridFL: Hybrid Approach Toward Privacy-Preserving Federate...
收藏 引用
6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023
作者: Ali, Sheraz Mamoon, Saqib Usman, Areeba Abidin, Zain ul Zhao, Chuan School of Information Science and Engineering University of Jinan Jinan250022 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China University of Sargodha Sargodha Pakistan Shandong Provincial Key Laboratory of Network-Based Intelligent Computing University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Software Engineering University of Jinan Jinan250022 China
In this study, we introduce a novel Hybrid Federated Learning (HybridFL) approach aimed at enhancing privacy and accuracy in collaborative machine learning scenarios. Our methodology integrates Differential Privacy (D... 详细信息
来源: 评论
Machine Learning Stroke Prediction in Smart Healthcare:Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5115-5134页
作者: Abdul Ahad Ira Puspitasari Jiangbin Zheng Shamsher Ullah Farhan Ullah Sheikh Tahir Bakhsh Ivan Miguel Pires Department Information System Study Program Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Software Northwestern Polytechnical UniversityXi’an710072China Research Center for Quantum Engineering Design Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Computer Science and Software Engineering Shenzhen UniversityShenzhen518061China Cybersecurity Center Prince Mohammad Bin Fahd University617Al JawharahKhobarDhahran34754Saudi Arabia Cardiff School of Technologies Cardiff Metropolitan UniversityWestern AvenueCardiffCF52YBUK Instituto de Telecomunicacoes Escola Superior de Tecnologia e Gestao de AguedaUniversidade de Aveiroágueda3750-127Portugal
This research explores the use of Fuzzy K-Nearest Neighbor(F-KNN)and Artificial Neural Networks(ANN)for predicting heart stroke incidents,focusing on the impact of feature selection methods,specifically Chi-Square and... 详细信息
来源: 评论
Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests  24
Automatic Adjustment of HPA Parameters and Attack Prevention...
收藏 引用
9th International Conference on Cloud Computing and Internet of Things, CCIOT 2024
作者: Chan, Huah Yong Zhou, Hanlin Ni, Jingfei Wu, Mengchun Deng, Qing School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Malaysia Xiamen Institute of Software Technology Xiamen China Department of Manzhouli Customs Manzhouli China College of Information Science and Engineering Jimei University Xiamen China
In this paper, HTTP status codes are used as custom metrics within the HPA as the experimental scenario. By integrating the Random Forest classification algorithm from machine learning, attacks are assessed and predic... 详细信息
来源: 评论
An Overview of Security Threats, Attack Detection and Defense for Large-Scale Multi-Agent Systems (LSMAS) in Internet of Things (IoT)
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 70-81页
作者: Cai, Jijing Wen, Long Feng, Hailin Fang, Kai Chen, Junxin Wei, Wei Wang, Wei Zhejiang A and F University College of Mathematics and Computer Science Hangzhou311300 China Macau University of Science and Technology School of Innovation Engineering Macau999078 China Dalian University of Technology School of Software Dalian116621 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Shenzhen518172 China
With the global advancement of the Internet of Things (IoT), large-scale multi-agent systems (LSMAS) technology has been increasingly adopted across various industries. Despite the widespread use of IoT, vulnerabiliti... 详细信息
来源: 评论
An Efficient Privacy-Preserving Access Control Scheme for Cloud Computing Services
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xiong, Ling Wang, JunKai Yu, Linsheng Xiong, Neal Wu, Hanzhou Xihua university School of Computer and Software Engineering Chengdu610039 China Sul Ross State University School of Department of Computer Science and Mathematics AlpineTX79830 United States Shanghai University School of Computer and Software Shanghai China
To meet the future system requirements of Cloud Computing Services (CCSs) for large numbers of users, multiple services and high efficiency, authentication and access control technologies will evolve in a more secure ... 详细信息
来源: 评论
Decentralized Federated Graph Learning with Lightweight Zero Trust Architecture for Next-Generation Networking Security
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 1908-1922页
作者: Zhou, Xiaokang Liang, Wei Wang, Kevin I-Kai Yada, Katsutoshi Yang, Laurence T. Ma, Jianhua Jin, Qun Kansai University Faculty of Business Data Science Osaka565-0823 Japan RIKEN Center for Advanced Intelligence Project RIKEN Tokyo103-0027 Japan Hunan University of Technology and Business School of Computer Science Changsha410205 China Xiangjiang Laboratory Changsha410205 China The University of Auckland Department of Electrical Computer and Software Engineering Auckland1010 New Zealand St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada Hosei University Faculty of Computer and Information Sciences Chiyoda-ku102-8160 Japan Waseda University Faculty of Human Sciences Tokorozawa359-1192 Japan
The rapid development and usage of digital technologies in modern intelligent systems and applications bring critical challenges on data security and privacy. It is essential to allow cross-organizational data sharing... 详细信息
来源: 评论
One Gray Code Fits All: Optimizing Access Time with Bi-Directional Programming for QLC SSDs
One Gray Code Fits All: Optimizing Access Time with Bi-Direc...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Shaoqi Li Tianyu Wang Yongbiao Zhu Chenlin Ma Yi Wang Zhaoyan Shen Zili Shao College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Science and Technology Shandong University Qingdao China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
Gray code, a voltage-level-to-data-bit translation scheme, is widely used in QLC SSDs. However, it causes the four data bits in QLC to exhibit significantly different read and write performance with up to 8 × lat... 详细信息
来源: 评论
KANOCLIP: ZERO-SHOT ANOMALY DETECTION THROUGH KNOWLEDGE-DRIVEN PROMPT LEARNING AND ENHANCED CROSS-MODAL INTEGRATION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Chengyuan Zhou, Suyang Kong, Jieping Qi, Lei Xue, Hui College of Software Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
Zero-shot anomaly detection (ZSAD) identifies anomalies without needing training samples from the target dataset, essential for scenarios with privacy concerns or limited data. Vision-language models like CLIP show po... 详细信息
来源: 评论