咨询与建议

限定检索结果

文献类型

  • 1,770 篇 会议
  • 1,091 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,809 篇 工学
    • 1,459 篇 计算机科学与技术...
    • 1,210 篇 软件工程
    • 367 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 215 篇 生物工程
    • 169 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 光学工程
    • 84 篇 安全科学与工程
    • 75 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 817 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 167 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 69 篇 化学
  • 570 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 161 篇 医学
    • 144 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 71 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 7 篇 文学

主题

  • 124 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 66 篇 deep learning
  • 64 篇 accuracy
  • 61 篇 software
  • 58 篇 training
  • 56 篇 internet of thin...
  • 56 篇 cloud computing
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 50 篇 quality of servi...
  • 48 篇 grid computing
  • 48 篇 security
  • 45 篇 computer archite...
  • 43 篇 application soft...
  • 41 篇 artificial intel...
  • 37 篇 optimization
  • 37 篇 monitoring

机构

  • 124 篇 college of compu...
  • 72 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 30 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 college of compu...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of big da...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 xiaofei wang
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 niyato dusit
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 11 篇 muhammad waseem ...
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 11 篇 li qing

语言

  • 2,459 篇 英文
  • 436 篇 其他
  • 16 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2906 条 记 录,以下是1221-1230 订阅
排序:
Robust Self-Expression Learning with Adaptive Noise Perception
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Yangbo Zhou, Jie Lu, Jianglin Wan, Jun Gao, Can Lin, Qingshui College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China SMILE Lab Department of ECE College of Engineering Northeastern University Boston02115 United States School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan430073 China Basic Teaching Department Liaoning Technical University Huludao125105 China
Self-expression learning methods often obtain a coefficient matrix to measure the similarity between pairs of samples. However, directly using the raw data to represent each sample under the self-expression framework ... 详细信息
来源: 评论
Age of information in physical-layer network coding enabled two-way relay networks
arXiv
收藏 引用
arXiv 2021年
作者: Pan, Haoyuan Chan, Tse-Tin Leung, Victor C.M. Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Computing The Hang Seng University of Hong Kong Hong Kong
This paper investigates the information freshness of two-way relay networks (TWRN) operated with physical-layer network coding (PNC). Information freshness is quantified by age of information (AoI), defined as the tim... 详细信息
来源: 评论
Collaborative Multi-Agent Reinforcement Learning for Automated Feature Transformation with Graph-Driven Path Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Xiaohan Wang, Dongjie Ning, Zhiyuan Qiao, Ziyue Long, Qingqing Zhu, Haowei Du, Yi Wu, Min Zhou, Yuanchun Xiao, Meng Computer Network Information Center Chinese Academy of Sciences University of the Chinese Academy of Sciences China Computer Network Information Center Chinese Academy of Sciences China Department of Electrical Engineering and Computer Science University of Kansas United States School of Computing and Information Technology Great Bay University Dongguan China School of Software Tsinghua University China Institute for Infocomm Research Agency for Science Technology and Research Singapore
Feature transformation methods aim to find an optimal mathematical feature-feature crossing process that generates high-value features and improves the performance of downstream machine learning tasks. Existing framew... 详细信息
来源: 评论
AFF-Dehazing: Attention-based feature fusion network for low-light image Dehazing
AFF-Dehazing: Attention-based feature fusion network for low...
收藏 引用
作者: Zhou, Yu Chen, Zhihua Sheng, Bin Li, Ping Kim, Jinman Wu, Enhua Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Department of Computing The Hong Kong Polytechnic University Kowloon Hong Kong School of Information Technologies The University of Sydney Sydney Australia State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Faculty of Science and Technology University of Macau China
Images captured in haze conditions, especially at nighttime with low light, often suffer from degraded visibility, contrasts, and vividness, which makes it difficult to carry out the following vision tasks. In this ar... 详细信息
来源: 评论
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET
An Efficient Blockchain-based Privacy-Preserving Authenticat...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Shiyuan Xu Xue Chen Weimin Kong Yibo Cao Yunhua He Ke Xiao School of Information Engineering North China University of Technology Beijing China Department of Computer Science The University of Hong Kong Pok Fu Lam Hong Kong Department of Computing The Hong Kong Polytechnic University Hung Hom Hong Kong College of Software Tianjin Normal University Tianjin China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
With emerging technology, the blockchain-based Vehicle Ad-hoc Network (VANET) can alleviate traffic congestion and optimize resource management to improve the transportation system's efficiency significantly. Howe...
来源: 评论
Artificial Intelligence-based Service Chains Scheduling for Medical Emergency in Healthcare
Artificial Intelligence-based Service Chains Scheduling for ...
收藏 引用
International Conference on Contemporary computing and Informatics (IC3I)
作者: Mukesh Soni Maher Ali Rusho Haewon Byeon Azzah AlGhamdi Shaikh Abdul Hannan Parth Rameshchandra Dave Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Tathawade Pune Marashtra Department of Lockheed Martin Engineering Management University of Colorado Boulder Colorado Department of AI and Software & Medical Big Data Research Centre Inje University Gimhae Republic of Korea Computer Information Systems Department College of Computer Science and Information Technology Imam Abdalrhman Bin Faisal University Khobar Saudi Arabia Faculty of Computing and Information AlBaha University AlBaha Kingdom of Saudi Arabia Department of Computer Engineering L. D. College of Engineering Ahmedabad Gujarat India
This study analyses the weekly scheduling challenge of health and medical information network service function chains to meet medical emergency categorization and grading needs. Emergency services are divided into fou... 详细信息
来源: 评论
Conflict-Free Genetic Algorithm with Nash Equilibrium Seeking for Game-Based Battery Swapping Station Recommendation
Conflict-Free Genetic Algorithm with Nash Equilibrium Seekin...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Chang-Long Sun Xin-Xin Xu Chun-Hua Chen Jun Hong Zhenan He Dengxiu Yu Sam Kwong Zhi-Hui Zhan School of Computer Science and Engineering South China University of Technology Guangzhou China School of Computer Science and Technology Ocean University of China Qingdao China School of Software Engineering South China University of Technology Guangzhou China College of Computer Science Sichuan University Chengdu China School of Artificial Intelligence Northwestern Polytechnical University Xi'an China Department of Computing and Decision Science Lingnan University Hong Kong SAR College of Artificial Intelligence Nankai University Tianjin China
The rapid growth of electric vehicles (EVs) has led to significant challenges in providing efficient and sustainable charging solutions. This paper addresses the battery swapping station (BSS) recommendation problem b... 详细信息
来源: 评论
Improving Critical Node Detection Using Neural Network-based Initialization in a Genetic Algorithm
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chanjuan Ge, Shike Chen, Zhihan Pei, Wenbin Zhu, Enqiang Mei, Yi Ishibuchi, Hisao The School of Computer Science and Technology Dalian University of Technology 116024 China The Institute of Software Chinese Academy of Science Beijing100190 China The Institute of Computing Science and Technology Guangzhou University Guangzhou510006 China The School of Engineering and Computer Science Victoria University of Wellington Wellington6012 New Zealand The Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
The Critical Node Problem (CNP) is concerned with identifying the critical nodes in a complex network. These nodes play a significant role in maintaining the connectivity of the network, and removing them can negative... 详细信息
来源: 评论
A novel quantum visual secret sharing scheme
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Xu, Yinsong Zhang, Maojun Chen, Junxiu Yang, Ching-Nung Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Division Department of Computer Science and Information Engineering National Dong Hwa University Taiwan97441 Taiwan
Inspired by Naor et al.’s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the f... 详细信息
来源: 评论
Multi-objective Optimization for Multi-UAV-assisted Mobile Edge computing
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Geng Wang, Yixian Sun, Zemin Wu, Qingqing Kang, Jiawen Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China School of Automation Guangdong University of Technology Guangzhou510006 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
Recent developments in unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) have provided users with flexible and resilient computing services. However, meeting the computing-intensive and latency-sensitive... 详细信息
来源: 评论