咨询与建议

限定检索结果

文献类型

  • 1,668 篇 期刊文献
  • 1,500 篇 会议
  • 43 册 图书

馆藏范围

  • 3,211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,013 篇 工学
    • 1,272 篇 计算机科学与技术...
    • 1,007 篇 软件工程
    • 316 篇 信息与通信工程
    • 268 篇 控制科学与工程
    • 248 篇 电气工程
    • 202 篇 电子科学与技术(可...
    • 201 篇 生物工程
    • 172 篇 生物医学工程(可授...
    • 169 篇 光学工程
    • 130 篇 机械工程
    • 103 篇 化学工程与技术
    • 93 篇 材料科学与工程(可...
    • 83 篇 动力工程及工程热...
    • 78 篇 仪器科学与技术
    • 65 篇 力学(可授工学、理...
    • 53 篇 土木工程
  • 1,363 篇 理学
    • 645 篇 数学
    • 445 篇 物理学
    • 262 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 178 篇 系统科学
    • 152 篇 化学
  • 455 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 191 篇 医学
    • 156 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 71 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 70 篇 法学
    • 59 篇 社会学
  • 54 篇 农学
  • 42 篇 经济学
  • 29 篇 教育学
  • 5 篇 文学
  • 5 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学
  • 2 篇 艺术学

主题

  • 137 篇 laboratories
  • 124 篇 computer science
  • 78 篇 computational mo...
  • 55 篇 computer archite...
  • 55 篇 machine learning
  • 48 篇 application soft...
  • 46 篇 artificial intel...
  • 44 篇 grid computing
  • 43 篇 deep learning
  • 40 篇 training
  • 38 篇 resource managem...
  • 38 篇 hardware
  • 37 篇 cloud computing
  • 36 篇 optimization
  • 36 篇 computer network...
  • 35 篇 processor schedu...
  • 34 篇 concurrent compu...
  • 33 篇 distributed comp...
  • 32 篇 predictive model...
  • 32 篇 costs

机构

  • 57 篇 shanghai key lab...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 39 篇 department for p...
  • 39 篇 department of ph...
  • 39 篇 yerevan physics ...
  • 39 篇 graduate school ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 kirchhoff-instit...
  • 38 篇 institute of phy...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 dipartimento di ...
  • 37 篇 fakultät für phy...
  • 37 篇 institute of phy...
  • 36 篇 faculté des scie...
  • 36 篇 department of mo...
  • 36 篇 centre de calcul...

作者

  • 60 篇 rajkumar buyya
  • 35 篇 m. klein
  • 33 篇 c. alexa
  • 33 篇 j. m. izen
  • 33 篇 s. veneziano
  • 33 篇 g. bella
  • 33 篇 j. strandberg
  • 33 篇 d. calvet
  • 33 篇 c. amelung
  • 33 篇 n. orlando
  • 33 篇 h. a. gordon
  • 33 篇 y. tayalati
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. c. könig
  • 32 篇 f. buehrer
  • 32 篇 a. t. law
  • 32 篇 d. di valentino
  • 32 篇 c. gumpert

语言

  • 2,850 篇 英文
  • 330 篇 其他
  • 30 篇 中文
  • 1 篇 德文
检索条件"机构=Computing Systems Laboratory Computer Science Division"
3211 条 记 录,以下是391-400 订阅
排序:
Distributed Online Convex Optimization with Time-Varying Constraints: Tighter Cumulative Constraint Violation Bounds under Slater's Condition
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Yi, Xinlei Li, Xiuxian Yang, Tao Xie, Lihua Hong, Yiguang Chai, Tianyou Johansson, Karl H. National Key Laboratory of Autonomous Intelligent Unmanned Systems Shanghai Institute of Intelligent Science and Technology China Ministry of Education Frontiers Science Center for Intelligent Autonomous Systems China Massachusetts Institute of Technology Lab for Information & Decision Systems CambridgeMA02139 United States Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China Nanyang Technological University School of Electrical and Electronic Engineering 50 Nanyang Avenue 639798 Singapore Kth Royal Institute of Technology Division of Decision and Control Systems School of Electrical Engineering and Computer Science Sweden Digital Futures Stockholm10044 Sweden
This paper considers distributed online convex optimization with time-varying constraints. In this setting, a network of agents makes decisions at each round, and then only a portion of the loss function and a coordin... 详细信息
来源: 评论
Evaluation Methodologies in Software Protection Research
arXiv
收藏 引用
arXiv 2023年
作者: Sutter, Bjorn D.E. Schrittwieser, Sebastian Coppens, Bart Kochberger, Patrick Computing Systems Lab Ghent University Belgium Christian Doppler Laboratory for Assurance and Transparency in Software Protection Faculty of Computer Science University of Vienna Austria St. Pölten University of Applied Sciences Austria
Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware a... 详细信息
来源: 评论
Exploring Data Geometry for Continual Learning
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Zhi Xu, Chen Li, Feng Jia, Yunde Harandi, Mehrtash Wu, Yuwei Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China Department of Electrical and Computer Systems Eng. Monash University Data61 Australia
Continual learning aims to efficiently learn from a non-stationary stream of data while avoiding forgetting the knowledge of old data. In many practical applications, data complies with non-Euclidean geometry. As such... 详细信息
来源: 评论
Safety Guaranteed Power-Delivered-to-Load Maximization for Magnetic Wireless Power Transfer
Safety Guaranteed Power-Delivered-to-Load Maximization for M...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Wangqiu Zhou Xinyu Wang Hao Zhou Shenyao Jiang Zhi Liu Yusheng Ji LINKE Lab School of Computer Science and Technology University of Science and Technology of China CAS Key Laboratory of Wireless-Optical Communications University of Science and Technology of China Deqing Alpha Innovation Institute Huzhou China Department of Computer and Network Engineering The University of Electro-Communications Tokyo Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Japan
Electromagnetic radiation (EMR) safety has always been a critical reason for hindering the development of magneticenabled wireless power transfer technology. People focus on the actual received energy at charging devi... 详细信息
来源: 评论
Self-Paced Sample Selection for Barely-Supervised Medical Image Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Su, Junming Shen, Zhiqiang Cao, Peng Yang, Jinzhu Zaiane, Osmar R. Computer Science and Engineering Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang China Alberta Machine Intelligence Institute University of Alberta Edmonton Canada
The existing barely-supervised medical image segmentation (BSS) methods, adopting a registration-segmentation paradigm, aim to learn from data with very few annotations to mitigate the extreme label scarcity problem. ... 详细信息
来源: 评论
Distributed Prescribed-Time Observer for Nonlinear systems in Block-Triangular Form
arXiv
收藏 引用
arXiv 2025年
作者: de Heij, Vincent Niazi, M.B. Umar Johansson, Karl H. Ahmed, Saeed Faculty of Science and Engineering University of Groningen Groningen9747 AG Netherlands Division of Decision and Control Systems Digital Futures KTH Royal Institute of Technology StockholmSE-100 44 Sweden Division of Decision and Control Systems Digital Futures KTH Royal Institute of Technology StockholmSE-100 44 Sweden Laboratory for Information and Decision Systems Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology CambridgeMA02139 United States
This paper proposes a distributed prescribed-time observer for nonlinear systems representable in a block-triangular observable canonical form. Using a weighted average of neighbor estimates exchanged over a strongly ... 详细信息
来源: 评论
Exploring Data Geometry for Continual Learning
Exploring Data Geometry for Continual Learning
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zhi Gao Chen Xu Feng Li Yunde Jia Mehrtash Harandi Yuwei Wu Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China Department of Electrical and Computer Systems Eng. Monash University and Data61 Australia
Continual learning aims to efficiently learn from a non-stationary stream of data while avoiding forgetting the knowledge of old data. In many practical applications, data complies with non-Euclidean geometry. As such...
来源: 评论
Two routers network architecture and scheduling algorithms under packet category classification constraint  5
Two routers network architecture and scheduling algorithms u...
收藏 引用
5th International Conference on Future Networks and Distributed systems: The Premier Conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Sarhan, Akram Jemmali, Mahdi Ben Hmida, Abir Department of Information Systems College of Computing and Information Technology University of Jeddah Jeddah Saudi Arabia Department of Computer Science and Information College of Science at Zulfi Majmaah University Majmaah 11952 Saudi Arabia Mars Laboratory University of Sousse Sousse Tunisia Department of Computer Science Higher Institute of Computer Science and Mathematics Monastir University Monastir5000 Tunisia
The sending and exchanging of data have become essential in the current revolution of industry 4.0 and digital transformation and all aspects of life. Ensuring the security of transmitted data continues to be a critic... 详细信息
来源: 评论
Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization
arXiv
收藏 引用
arXiv 2024年
作者: Barron, Ryan Eren, Maksim E. Bhattarai, Manish Wanna, Selma Solovyev, Nicholas Rasmussen, Kim Alexandrov, Boian S. Nicholas, Charles Matuszek, Cynthia Theoretical Division Los Alamos National Laboratory Los Alamos United States Advanced Research in Cyber Systems Los Alamos National Laboratory Los Alamos United States Department of Computer Science and Electrical Engineering University of Maryland Baltimore CountyMD United States
Much of human knowledge in cybersecurity is encapsulated within the ever-growing volume of scientific papers. As this textual data continues to expand, the importance of document organization methods becomes increasin... 详细信息
来源: 评论
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
收藏 引用
science China(Information sciences) 2020年 第3期63卷 20-33页
作者: Chao LIN Debiao HE Sherali ZEADALLY Neeraj KUMAR Kim-Kwang Raymond CHOO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University State Key Laboratory of Cryptology College of Communication and Information University of Kentucky Department of Computer Science and Engineering Thapar University Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San Antonio
A robust and scalable crowd management infrastructure is crucial in addressing operational challenges when deploying high-density sensors and actuators in a smart city. While crowdsourcing is widely used in crowd mana... 详细信息
来源: 评论