咨询与建议

限定检索结果

文献类型

  • 1,768 篇 会议
  • 1,071 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,884 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,789 篇 工学
    • 1,443 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 356 篇 信息与通信工程
    • 260 篇 控制科学与工程
    • 215 篇 生物工程
    • 158 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 105 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 88 篇 光学工程
    • 82 篇 安全科学与工程
    • 71 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 813 篇 理学
    • 463 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 564 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 184 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 80 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 7 篇 文学

主题

  • 124 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 66 篇 computational mo...
  • 63 篇 accuracy
  • 62 篇 deep learning
  • 61 篇 software
  • 58 篇 training
  • 56 篇 internet of thin...
  • 56 篇 cloud computing
  • 50 篇 resource managem...
  • 50 篇 quality of servi...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 46 篇 security
  • 45 篇 computer archite...
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 37 篇 optimization
  • 37 篇 monitoring

机构

  • 123 篇 college of compu...
  • 71 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 30 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...
  • 15 篇 college of compu...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 xiaofei wang
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 11 篇 leila ismail

语言

  • 2,544 篇 英文
  • 328 篇 其他
  • 15 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2884 条 记 录,以下是1061-1070 订阅
排序:
Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xiaofei Zhao, Yunfeng Qiu, Chao Hu, Qinghua Leung, Victor C.M. College of Intelligence and Computing Tianjin University Tianjin300072 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Amidst the robust impetus from artificial intelligence (AI) and big data, edge intelligence (EI) has emerged as a nascent computing paradigm, synthesizing AI with edge computing (EC) to become an exemplary solution fo... 详细信息
来源: 评论
Adjusting Logit in Gaussian Form for Long-Tailed Visual Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Li, Mengke Cheung, Yiu-Ming Lu, Yang Hu, Zhikai Lan, Weichao Huang, Hui Shenzhen China The Department of Computer Science Hong Kong Baptist University Hong Kong The Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
It is not uncommon that real-world data are distributed with a long tail. For such data, the learning of deep neural networks becomes challenging because it is hard to classify tail classes correctly. In the literatur... 详细信息
来源: 评论
An Efficient Quantum Private Comparison Protocol Based on Cluster State and Bell State  8th
An Efficient Quantum Private Comparison Protocol Based on Cl...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Li, Chaoyang Qing, Hua Xu, Gang Chen, Xiubo Xin, Xiangjun Dong, Mianxiong Ota, Kaoru College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450002 China School of Computing Science and Technology North China University of Technology Beijing100144 China Information Security Centre State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications Beijing100876 China Department of Sciences and Informatics Muroran Institution of Technology Muroran050-8585 Japan
Quantum private comparison (QPC) is the quantum method that can compare the equality of the distrustful participants’ private information without leaking them. The 4-particle cluster state has a strong violation of l... 详细信息
来源: 评论
Empowering Donors: How Blockchain Technology Can Help Ensure Their Contributions Reach the Right Recipients
Empowering Donors: How Blockchain Technology Can Help Ensure...
收藏 引用
Business Analytics for Technology and Security (ICBATS), International Conference on
作者: Sahar Ajmal Muteeb Bin Muzammil Muhammad Shoaib Muhammad Hassaan Mehmood Department of Software Engineering National University of Computer and Emmerging Sciences Chiniot-Faisalabad Pakistan College of Computing Riphah International University Faisalabad Pakistan Department of Computer Science University of Engineering and Technology Lahore Pakistan School of Computer Science NCBA&E Lahore Pakistan Applied School Research Center Applied Science Private University Amman Jordan
Charity giving is a fundamental aspect of society, but there are concerns about the accountability and transparency of the donation process. Blockchain technology has emerged as a potential solution, offering a secure... 详细信息
来源: 评论
Evaluating Open-Domain Dialogues in Latent Space with Next Sentence Prediction and Mutual Information
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Kun Yang, Bohao Lin, Chenghua Rong, Wenge Villavicencio, Aline Cui, Xiaohui Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science The University of Sheffield United Kingdom State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Beihang University China
The long-standing one-to-many issue of the open-domain dialogues poses significant challenges for automatic evaluation methods, i.e., there may be multiple suitable responses which differ in semantics for a given conv... 详细信息
来源: 评论
Simple KMP Pattern-Matching on Indeterminate Strings
Simple KMP Pattern-Matching on Indeterminate Strings
收藏 引用
2020 Prague Stringology Conference, PSC 2020
作者: Mhaskar, Neerja Smyth, W.F. Algorithms Research Group Department of Computing & Software McMaster University Canada School of Engineering & Information Technology Murdoch University WA Australia
In this paper we describe a simple, fast, space-efficient approach to finding all matches of an indeterminate pattern p = p[1..m] in an indeterminate string x = x[1..n], where both p and x are defined on a "small... 详细信息
来源: 评论
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
收藏 引用
The Journal of Supercomputing 2022年 第6期78卷 8890-8924页
作者: Rehman, Eid Haseeb-ud-Din, Muhammad Malik, Arif Jamal Khan, Tehmina Karmat Abbasi, Aaqif Afzaal Kadry, Seifedine Khan, Muhammad Attique Rho, Seungmin Department of Software Engineering Foundation University Islamabad Islamabad Pakistan Faculty of Applied Computing and Technology Noroff University College Kristiansand Norway Department of Computer Science HITEC University Taxila Taxila Pakistan Chung-Ang University - Seoul Campus: Chung-Ang University Seoul Korea
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT security is significant. The...
来源: 评论
Feature Fusion from Head to Tail for Long-Tailed Visual Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Li, Mengke Hu, Zhikai Lu, Yang Lan, Weichao Cheung, Yiu-Ming Huang, Hui Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University Hong Kong Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China
The imbalanced distribution of long-tailed data presents a considerable challenge for deep learning models, as it causes them to prioritize the accurate classification of head classes but largely disregard tail classe... 详细信息
来源: 评论
Perceptions Toward Using Artificial Intelligence and Technology for Asthma Attack Risk Prediction: Qualitative Exploration of Maori Views
收藏 引用
JMIR Formative Research 2024年 8卷 e59811页
作者: Jayamini, Widana Kankanamge Darsha Mirza, Farhaan Bidois-Putt, Marie-Claire Naeem, M. Asif Chan, Amy Hai Yan Department of Computer Science School of Engineering Computer and Mathematical Sciences Auckland University of Technology Auckland New Zealand Department of Software Engineering Faculty of Computing and Technology University of Kelaniya Kelaniya Sri Lanka School of Pharmacy Faculty of Medical and Health Sciences University of Auckland Auckland New Zealand Department of Data Science & Artificial Intelligence National University of Computer and Emerging Sciences (NUCES) Islamabad Pakistan
Background: Asthma is a significant global health issue, impacting over 500,000 individuals in New Zealand and disproportionately affecting Maori communities in New Zealand, who experience worse asthma symptoms and at... 详细信息
来源: 评论
Historical places monuments identification system
Historical places monuments identification system
收藏 引用
2020 IEEE Region 10 Conference, TENCON 2020
作者: Godewithana, Navod Jayasena, Khema Nagarawaththa, Chamodi Croos, Praveenth Harshanath, Buddika Alosius, Jesuthasan Faculty of Computing Sri Lanka Institute of Information Technology Department of Software Engineering Colombo Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Information Technology Colombo Sri Lanka
Sri Lanka, which is known as 'the pearl of the Indian ocean' provides great survival and civilization history dating back to the 3rd century. Most of the archaeological sites are attracted by not only Sri Lank... 详细信息
来源: 评论