咨询与建议

限定检索结果

文献类型

  • 1,768 篇 会议
  • 1,071 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,884 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,789 篇 工学
    • 1,443 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 356 篇 信息与通信工程
    • 260 篇 控制科学与工程
    • 215 篇 生物工程
    • 158 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 105 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 88 篇 光学工程
    • 82 篇 安全科学与工程
    • 71 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 813 篇 理学
    • 463 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 564 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 184 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 80 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 7 篇 文学

主题

  • 124 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 66 篇 computational mo...
  • 63 篇 accuracy
  • 62 篇 deep learning
  • 61 篇 software
  • 58 篇 training
  • 56 篇 internet of thin...
  • 56 篇 cloud computing
  • 50 篇 resource managem...
  • 50 篇 quality of servi...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 46 篇 security
  • 45 篇 computer archite...
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 37 篇 optimization
  • 37 篇 monitoring

机构

  • 123 篇 college of compu...
  • 71 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 30 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...
  • 15 篇 college of compu...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 xiaofei wang
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 11 篇 leila ismail

语言

  • 2,544 篇 英文
  • 328 篇 其他
  • 15 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2884 条 记 录,以下是1131-1140 订阅
排序:
Multiobjective Sequential Transfer Optimization: Benchmark Problems and Preliminary Results
Multiobjective Sequential Transfer Optimization: Benchmark P...
收藏 引用
Congress on Evolutionary Computation
作者: Xiaoming Xue Liang Feng Cuie Yang Songbai Liu Linqi Song Kay Chen Tan Department of Computer Science City University of Hong Kong Hong Kong SAR China College of Computer Science Chongqing University Chongqing China State Key Lab of Synthetic Automation for Process Industries Northeastern University Shenyang China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR China
In cases of frequent problem-solving of multiobjective optimization tasks from a domain due to changing conditions or problem features, a growing number of individual tasks will be solved and stored in a database, pro... 详细信息
来源: 评论
An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach
arXiv
收藏 引用
arXiv 2022年
作者: Aljedaani, Bakheet Ahmad, Aakash Zahedi, Mansooreh Babar, M. Ali Computer Science Department Aljumum University College Umm Alqura University Makkah Saudi Arabia School of Computing and Communications Lancaster University Leipzig Germany School of Computing and Information Systems University of Melbourne Australia CREST – the Centre for Research on Engineering Software Technologies University of Adelaide Australia Australia
Context: Mobile applications (mobile apps for short) have proven their usefulness in enhancing service provisioning across a multitude of domains that range from smart healthcare, to mobile commerce, and areas of cont... 详细信息
来源: 评论
Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks
Secure AI and Blockchain-enabled Framework in Smart Vehicula...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Rabieinejad, Elnaz Yazdinejad, Abbas Dehghantanha, Ali Parizi, Reza M. Srivastava, Gautam K.N.Toosi University of Technology Information Technology Department Tehran Iran University of Guelph Cyber Science Lab School of Computer Science Ontario Canada Kennesaw State University College of Computing and Software Engineering GA United States Brandon University Department of Mathematics and Computer Science Manitoba Canada
In recent years, Internet of Things (IoT) devices such as drones, smartphones, and smart vehicles have increased, and Smart Vehicular Networks (SVNs) have formed. SVN are one of the vital components in smart cities an... 详细信息
来源: 评论
rWiFiSLAM: Effective WiFi Ranging based SLAM System in Ambient Environments
arXiv
收藏 引用
arXiv 2022年
作者: Wei, Bo Gao, Mingcen Luo, Chengwen Wang, Sen Zhang, Jin School of Computing and Communications Lancaster University Lancaster United Kingdom Google San Francisco United States College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical and Electronic Engineering Imperial College London London United Kingdom
In this paper, we propose rWiFiSLAM, an indoor localisation system based on WiFi ranging measurements. Indoor localisation techniques play an important role in mobile robots when they cannot access good quality GPS si... 详细信息
来源: 评论
On the Correctness of Speculative Consensus
arXiv
收藏 引用
arXiv 2022年
作者: Hellings, Jelle Rahnama, Sajjad Gupta, Suyash Sadoghi, Mohammad Department of Computing and Software McMaster University HamiltonON Canada Exploratory Systems Lab Department of Computer Science University of California Davis DavisCA United States RISELab Department of Electrical Engineering and Computer Science University of California Berkeley BerkeleyCA United States
The introduction of Bitcoin fueled the development of blockchain-based resilient data management systems that are resilient against failures, enable federated data management, and can support data provenance. The key ... 详细信息
来源: 评论
Role of activity-based learning and ChatGPT on students' performance in education
收藏 引用
Computers and Education: Artificial Intelligence 2024年 6卷
作者: Al Shloul, Tamara Mazhar, Tehseen Abbas, Qamar Iqbal, Muhammad Ghadi, Yazeed Yasin Shahzad, Tariq Mallek, Fatma Hamam, Habib General Education Department Liwa College Abu Dhabi15222 United Arab Emirates Department of Computer Science Virtual University of Pakistan Lahore51000 Pakistan Department of Computer Science Faculty of Computing and Information Technology International Islamic University Islamabad 44000 Pakistan Pakistan Department of Computer Science and Software Engineering Al Ain University Abu Dhabi12555 United Arab Emirates Department of Computer Sciences COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Faculty of Engineering University de Moncton MonctonNBE1A3E9 Canada Hodmas University College Taleh Area Mogadishu Somalia Bridges for Academic Excellence Tunis Tunisia School of Electrical Engineering University of Johannesburg Johannesburg2006 South Africa
Purpose: This study investigates the impact of activity-based learning and the utilization of ChatGPT on students' academic performance within the educational framework. Objectives: The study aims to assess the ef... 详细信息
来源: 评论
Forecasting COVID-19 Infections in Gulf Cooperation Council (GCC) Countries using Machine Learning
arXiv
收藏 引用
arXiv 2023年
作者: Ismail, Leila Materwala, Huned Hennebelle, Alain Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates Independent Data Scientist and Engineer Al Ain Abu Dhabi United Arab Emirates
COVID-19 has infected more than 68 million people worldwide since it was first detected about a year ago. Machine learning time series models have been implemented to forecast COVID-19 infections. In this paper, we de... 详细信息
来源: 评论
Interpretation Area-Guided Detection of Adversarial Samples  20
Interpretation Area-Guided Detection of Adversarial Samples
收藏 引用
20th IEEE International Conference on software Quality, Reliability, and Security, QRS 2020
作者: Wei, JiaLi Fan, Ming Xu, Xi Jia, Ang Xu, Zhou Xue, Lei School of Cyber Science and Engineering Xi'an Jiaotong University China School of Big Data and Software Engineering Chongqing University China The Hong Kong Polytechnic University Department of Computing China
Deep learning systems are known to be vulnerable to adversarial samples, which are implemented to change the prediction results by adding small perturbations to benign samples. It is significant to defend against an a... 详细信息
来源: 评论
CHECKING CONTINUOUS STOCHASTIC LOGIC AGAINST QUANTUM CONTINUOUS-TIME MARKOV CHAINS
arXiv
收藏 引用
arXiv 2022年
作者: Mei, Jingyi Xu, Ming Guan, Ji Deng, Yuxin Yu, Nengkun Shanghai Key Lab of Trustworthy Computing East China Normal University China Shanghai Key Lab of Trustworthy Computing & MoE Engineering Research Center of Software/Hardware Co-design Technology and Application East China Normal University China State Key Lab of Computer Science Institute of Software Chinese Academy of Sciences China Department of Computer Science Stony Brook University United States
Verifying quantum systems has attracted a lot of interest in the last decades. In this paper, we study the quantitative model-checking of quantum continuous-time Markov chains (quantum CTMCs). The branching-time prope... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论