咨询与建议

限定检索结果

文献类型

  • 1,667 篇 期刊文献
  • 1,499 篇 会议
  • 42 册 图书

馆藏范围

  • 3,208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,001 篇 工学
    • 1,271 篇 计算机科学与技术...
    • 1,008 篇 软件工程
    • 315 篇 信息与通信工程
    • 270 篇 控制科学与工程
    • 245 篇 电气工程
    • 203 篇 生物工程
    • 200 篇 电子科学与技术(可...
    • 175 篇 生物医学工程(可授...
    • 174 篇 光学工程
    • 130 篇 机械工程
    • 103 篇 化学工程与技术
    • 89 篇 材料科学与工程(可...
    • 83 篇 动力工程及工程热...
    • 77 篇 仪器科学与技术
    • 66 篇 力学(可授工学、理...
    • 52 篇 土木工程
  • 1,366 篇 理学
    • 642 篇 数学
    • 446 篇 物理学
    • 265 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 154 篇 化学
  • 454 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 184 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 196 篇 医学
    • 161 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 71 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 69 篇 法学
    • 58 篇 社会学
  • 55 篇 农学
  • 42 篇 经济学
  • 29 篇 教育学
  • 5 篇 文学
  • 5 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学
  • 2 篇 艺术学

主题

  • 137 篇 laboratories
  • 124 篇 computer science
  • 79 篇 computational mo...
  • 56 篇 computer archite...
  • 55 篇 machine learning
  • 48 篇 application soft...
  • 46 篇 artificial intel...
  • 44 篇 grid computing
  • 42 篇 deep learning
  • 40 篇 training
  • 38 篇 resource managem...
  • 38 篇 hardware
  • 36 篇 cloud computing
  • 36 篇 computer network...
  • 35 篇 optimization
  • 35 篇 processor schedu...
  • 34 篇 concurrent compu...
  • 33 篇 feature extracti...
  • 33 篇 distributed comp...
  • 32 篇 costs

机构

  • 57 篇 shanghai key lab...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 39 篇 graduate school ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 dipartimento di ...
  • 38 篇 kirchhoff-instit...
  • 38 篇 institute of phy...
  • 37 篇 faculté des scie...
  • 37 篇 department of mo...
  • 37 篇 centre de calcul...
  • 37 篇 west university ...
  • 37 篇 research center ...

作者

  • 60 篇 rajkumar buyya
  • 35 篇 m. klein
  • 33 篇 c. alexa
  • 33 篇 j. m. izen
  • 33 篇 s. veneziano
  • 33 篇 g. bella
  • 33 篇 j. strandberg
  • 33 篇 d. calvet
  • 33 篇 c. amelung
  • 33 篇 n. orlando
  • 33 篇 h. a. gordon
  • 33 篇 y. tayalati
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. c. könig
  • 32 篇 f. buehrer
  • 32 篇 a. t. law
  • 32 篇 d. di valentino
  • 32 篇 c. gumpert

语言

  • 3,014 篇 英文
  • 162 篇 其他
  • 30 篇 中文
  • 1 篇 德文
检索条件"机构=Computing Systems Laboratory Computer Science Division"
3208 条 记 录,以下是111-120 订阅
排序:
Resource-Constrained Heuristic for Max-SAT
arXiv
收藏 引用
arXiv 2024年
作者: Matejek, Brian Elenius, Daniel Gentry, Cale Stoker, David Cobb, Adam Computer Science Laboratory SRI International United States Advanced Technology and Systems Division SRI International United States
We propose a resource-constrained heuristic for instances of Max-SAT that iteratively decomposes a larger problem into smaller subcomponents that can be solved by optimized solvers and hardware. The unconstrained oute... 详细信息
来源: 评论
Exploring Auditory Hand Guidance for Eyes-free 3D Path Tracing
Exploring Auditory Hand Guidance for Eyes-free 3D Path Traci...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI EA 2025
作者: Abe, Yuki Hara, Kotaro Sakamoto, Daisuke Ono, Tetsuo Human-Computer Interaction Lab. Hokkaido University Hokkaido Sapporo Japan School of Computing and Information Systems Singapore Management University Singapore Singapore Division of Computer Science and Information Technology Hokkaido University Hokkaido Sapporo Japan Faculty of Engineering Kyoto Tachibana University Kyoto Japan
Guiding a user’s hand along a 3D path can help individuals avoid obstacles and manipulate everyday items with eyes-free. While prior work focused on haptic approaches using robots, auditory approaches for 3D path gui... 详细信息
来源: 评论
SETTP: Style Extraction and Tunable Inference via Dual-Level Transferable Prompt Learning  27
SETTP: Style Extraction and Tunable Inference via Dual-Level...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Jin, Chunzhen Huang, Yongfeng Wang, Yaqi Cao, Peng Zaïane, Osmar Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University Shenyang China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang China Amii University of Alberta EdmontonAB Canada
Text style transfer, an important research direction in natural language processing, aims to adapt the text to various preferences but often faces challenges with limited resources. In this work, we introduce a novel ...
来源: 评论
Predicting Drug Effects from High-Dimensional, Asymmetric Drug Datasets by Using Graph Neural Networks: A Comprehensive Analysis of Multitarget Drug Effect Prediction
Predicting Drug Effects from High-Dimensional, Asymmetric Dr...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Avishek Bose Guojing Cong Learning Systems Group Data and AI Systems Section Computer Science and Mathematics Division Oak Ridge National Laboratory Oak Ridge TN USA
Graph neural networks (GNNs) have emerged as one of the most effective ML techniques for drug effect prediction from drug molecular graphs. Despite having immense potential, GNN models lack performance when using data... 详细信息
来源: 评论
A Lightweight Encoder-Decoder Framework for Carpooling Route Planning
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Gao, Yucen Ma, Li Yu, Zhemeng Zhang, Songjian Gao, Hui Fang, Jun Gao, Xiaofeng Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems College of Computer Science and Engineering Shanghai200240 China Didi Global Inc. Beijing100190 China
Carpooling Route Planning (CRP) has become an important issue with the growth of low-carbon traffic systems. We investigate a novel, meaningful and challenging scenario for CRP in industry, called Multi-Candidate Carp... 详细信息
来源: 评论
Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction
Devil in the Noise: Detecting Advanced Persistent Threats wi...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Caio M. C. Viana Carlos H. G. Ferreira Fabricio Murai Aldri Luiz Dos Santos Lourenço Alves Pereira Júnior Computer Science Division Aeronautics Institute of Technology Brazil Department of Computing and Systems Federal University of Ouro Preto Brazil Data Science & Computer Science Worcester Polytechnic Institute Worcester MA USA Department of Computer Science Federal University of Minas Gerais Brazil
The use of host intrusion detection systems shows promising results in detecting APT campaigns due to the use of systems logs as source data to get more information about system environment. However, dealing with the ... 详细信息
来源: 评论
Scalable and Consistent Graph Neural Networks for Distributed Mesh-based Data-driven Modeling  24
Scalable and Consistent Graph Neural Networks for Distribute...
收藏 引用
Proceedings of the SC '24 Workshops of the International Conference on High Performance computing, Network, Storage, and Analysis
作者: Shivam Barwey Riccardo Balin Bethany Lusch Saumil Patel Ramesh Balakrishnan Pinaki Pal Romit Maulik Venkatram Vishwanath Transportation and Power Systems Argonne National Laboratory Lemont USA Leadership Computing Facility Argonne National Laboratory Lemont USA Computational Science Division Argonne National Laboratory Lemont USA Information Sciences and Technology Pennsylvania State University University Park USA Mathematics and Computer Science Argonne National Laboratory Lemont USA
This work develops a distributed graph neural network (GNN) methodology for mesh-based modeling applications using a consistent neural message passing layer. As the name implies, the focus is on enabling scalable oper... 详细信息
来源: 评论
On the Security of Double-Block-Length Hash Functions with Rate 1
收藏 引用
Chinese Journal of Electronics 2023年 第3期21卷 566-570页
作者: GONG Zheng LUO Yiyuan LAI Xuejia CHEN Kefei School of Computer Science South China Normal University Guangzhou China Department of Computer Science Shanghai Jiaotong University Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
The security of double-block-length hash functions with rate 1, which are based on a block cipher with a block length of n bits and a key length of 2n bits, was analyzed by Satoh et al. and Hirose. In this paper, we r... 详细信息
来源: 评论
EnFed: An Energy-aware Opportunistic Federated Learning in Resource Constrained Environments for Human Activity Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Mukherjee, Anwesha Buyya, Rajkumar Department of Computer Science Mahishadal Raj College West Bengal Mahishadal721628 India Laboratory School of Computing and Information Systems University of Melbourne Australia
This paper proposes an energy-efficient federated learning method and its application in human activity monitoring and recognition. In the proposed approach, the device that needs a model for an application requests i... 详细信息
来源: 评论
A Joint Time and Energy-Efficient Federated Learning-based Computation Offloading Method for Mobile Edge computing
arXiv
收藏 引用
arXiv 2024年
作者: Mukherjee, Anwesha Buyya, Rajkumar The Department of Computer Science Mahishadal Raj College West Bengal Mahishadal721628 India Laboratory School of Computing and Information Systems University of Melbourne Australia
Computation offloading at lower time and lower energy consumption is crucial for resource limited mobile devices. This paper proposes an offloading decision-making model using federated learning. Based on the task typ... 详细信息
来源: 评论