咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,452 篇 计算机科学与技术...
    • 1,209 篇 软件工程
    • 358 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 164 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 83 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 569 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 159 篇 医学
    • 142 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 67 篇 computational mo...
  • 63 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 38 篇 optimization
  • 38 篇 data models

机构

  • 125 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 31 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,719 篇 英文
  • 157 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是461-470 订阅
排序:
Reasoning about Strategic Abilities in Stochastic Multi-agent Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yedi Song, Fu Chen, Taolue Wu, Xuzhi Department of Computing Science National University of Singapore Singapore State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China School of Computing and Mathematical Sciences Birkbeck University of London United Kingdom College of Computer Science and Software Engineering Shenzhen University China
Reasoning about strategic abilities is key to AI systems comprising multiple agents, which provide a unified framework for formalizing various problems in game theory, social choice theory, etc. In this work, we propo... 详细信息
来源: 评论
Exploiting the sequential nature of genomic data for improved analysis and identification
收藏 引用
Computers in Biology and Medicine 2024年 183卷 109307-109307页
作者: Nawaz, M. Saqib Nawaz, M. Zohaib Junyi, Zhang Fournier-Viger, Philippe Qu, Jun-Feng College of Computer Science and Software Engineering Shenzhen University China Faculty of Computing and Information Technology Department of Computer Science University of Sargodha Pakistan School of Computer Engineering Hubei University of Arts and Science Hubei Xiangyang China
Genomic data is growing exponentially, posing new challenges for sequence analysis and classification, particularly for managing and understanding harmful new viruses that may later cause pandemics. Recent genome sequ... 详细信息
来源: 评论
Developing Trustworthy Reinforcement Learning Applications for Next-Generation Open Radio Access Networks
Developing Trustworthy Reinforcement Learning Applications f...
收藏 引用
Canadian Conference on Electrical and Computer engineering (CCECE)
作者: Ahmad M. Nagib Hatem Abou-zeid Hossam S. Hassanein School of Computing Queen’s University Canada Faculty of Computers and Artificial Intelligence Cairo University Egypt Department of Electrical and Software Engineering University of Calgary Canada
Artificial intelligence is envisioned to transform the design and operation of 6G networks. Reinforcement learning (RL), in particular, has emerged as a fundamental approach toward this goal with strong support from t... 详细信息
来源: 评论
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 6061-6077页
作者: Muhammad Akram Muhammad Waseem Iqbal Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science The Institute of Management Sciences(PAK-AIMS)Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis... 详细信息
来源: 评论
Explainable AI for Healthcare: An Approach Towards Interpretable Healthcare Models
Explainable AI for Healthcare: An Approach Towards Interpret...
收藏 引用
Information Technology (ACIT)
作者: Kanwal Zahoor Narmeen Zakaria Bawany Usman Ghani Department of Computer Science and Software Engineering Center for Computing Research Jinnah University for Women Institute of Business Administration Karachi Pakistan
Artificial intelligence (AI) along with deep learning techniques has become an integral part of almost all aspects of life. One of the domains significantly impacted by this technological revolution is healthcare. Dee...
来源: 评论
An Efficient High-Dimensional Gene Selection Approach based on Binary Horse Herd Optimization Algorithm for Biological Data Classification
arXiv
收藏 引用
arXiv 2023年
作者: Mehrabi, Niloufar Boroujeni, Sayed Pedram Haeri Pashaei, Elnaz School of Computing Clemson University ClemsonSC United States Department of Software Engineering Istanbul Aydin University Istanbul Turkey
The Horse Herd Optimization Algorithm (HOA) is a new meta-heuristic algorithm based on the behaviors of horses at different ages. The HOA was introduced recently to solve complex and high-dimensional problems. This pa... 详细信息
来源: 评论
Empowering Donors: How Blockchain Technology Can Help Ensure Their Contributions Reach the Right Recipients  2
Empowering Donors: How Blockchain Technology Can Help Ensure...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ajmal, Sahar Muzammil, Muteeb Bin Shoaib, Muhammad Mehmood, Muhammad Hassaan National University of Computer and Emmerging Sciences Department of Software Engineering Faisalabad Pakistan Riphah International University College of Computing Faisalabad Pakistan University of Engineering and Technology Department of Computer Science Lahore Pakistan School of Computer Science NCBA&E Lahore Pakistan Applied School Research Center Applied Science Private University Amman11937 Jordan
Charity giving is a fundamental aspect of society, but there are concerns about the accountability and transparency of the donation process. Blockchain technology has emerged as a potential solution, offering a secure... 详细信息
来源: 评论
Privacy-Aware Web APIs Recommendation for Consumer Mashup Creation Based on Iterative Quantification
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 1-1页
作者: Zhang, Ruowei Qi, Lianyong Yan, Chao Chen, Zige Gong, Wenwen Xu, Yanwei Rafique, Wajid School of Computer Science Qufu Normal University China China Tsinghua University China College of Intelligence and Computing Tianjin University China Department of Electrical and Software Engineering University of Calgary Canada
With the emergence of the "unmanned" field, unmanned supermarket software has entered consumers’ lives in line with the pace of development of the times. Nowadays, developers of unmanned supermarket softwar... 详细信息
来源: 评论
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow
A Plugin for Kotlin based Android Apps to Detect Security Br...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Md Arabin Islam Talukder Sumaiya Farzana Mishu Hossain Shahriar ABM Kamrul Islam Riad Fan Wu Akond Rahman College of Computing and Software Engineering Kennesaw State University Marietta GA USA Department of Computer Science Tuskegee University Tuskegee Alabama USA Department of Computer Science and Software Engineering Auburn University Auburn Alabama USA
Android developers have already adopted Kotlin as their preferred language. Kotlin is more well-accepted than Java because of its simplicity, readability, and new features like scope functions, extension functions, nu...
来源: 评论
Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime
Optimal Multidimensional Differentially Private Mechanisms i...
收藏 引用
IEEE International Symposium on Information Theory
作者: Wael Alghamdi Shahab Asoodeh Flavio P. Calmon Juan Felipe Gomez Oliver Kosut Lalitha Sankar School of Engineering and Applied Sciences Harvard University Department of Computing and Software McMaster University School of Electrical Computer and Energy Engineering Arizona State University
We construct vector differentially-private (DP) mechanisms that are asymptotically optimal in the limit of the number of compositions growing without bound. First, we derive via the central limit theorem a reduction f...
来源: 评论