咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,670 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,324 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,671 篇 软件工程
    • 854 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 282 篇 电子科学与技术(可...
    • 210 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 152 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 131 篇 建筑学
  • 1,962 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 492 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 154 篇 化学
  • 1,463 篇 管理学
    • 902 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 512 篇 工商管理
  • 351 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 130 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 104 篇 accuracy
  • 97 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 80 篇 security
  • 78 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 165 篇 school of comput...
  • 51 篇 school of comput...
  • 41 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 department of in...
  • 37 篇 school of inform...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 school of comput...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 27 篇 college of compu...
  • 25 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 35 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 26 篇 xiong zehui
  • 23 篇 john grundy
  • 22 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 19 篇 zidong wang
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,150 篇 英文
  • 733 篇 其他
  • 56 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6934 条 记 录,以下是361-370 订阅
排序:
Research Progress and Trend of Temporal Knowledge Graph Representation and Reasoning
收藏 引用
Ruan Jian Xue Bao/Journal of software 2024年 第8期35卷 3923-3951页
作者: Wang, Yu-Han Chen, Zi-Yang Zhao, Xiang Tan, Zhen Xiao, Wei-Dong Cheng, Xue-Qi Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology Changsha410073 China College of Systems Engineering National University of Defense Technology Changsha410073 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
As a research hotspot in artificial intelligence in recent years, knowledge graphs have been applied to many fields in reality. However, with the increasingly diversified application scenarios of knowledge graphs, peo... 详细信息
来源: 评论
A Collaborative Consumption Digital Platform for Government Organizations using Design Science
收藏 引用
Digital Government: Research and Practice 2022年 第1期3卷 1–14页
作者: Gebeyehu, Seffi Twinomurinzi, Hossana Faculty of Computing Bahirdar Technology Institute Bahirdar University P.O.Box 26 Bahirdar Ethiopia Applied Information Systems Department School of Consumer Intelligence and Information Systems College of Business and Economics Office 17 Auckland Park Bunting Road Campus Johannesburg South Africa
The growth of digital technologies that enable the sharing of resources, underutilized assets, and services, is bringing new ways of shared consumption commonly called the "sharing economy"or "collabora... 详细信息
来源: 评论
Optimal Logistics Activities Based Deep Learning Enabled Traffic Flow Prediction Model
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5269-5282页
作者: Basim Aljabhan Mahmoud Ragab Sultanah M.Alshammari Abdullah S.Al-Malaise Al-Ghamdi Ports and Maritime Transportation Department Faculty of Maritime StudiesKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia S 7Information Systems Department HECI SchoolDar Alhekma UniversityJeddahSaudi Arabia
Traffic flow prediction becomes an essential process for intelligent transportation systems(ITS).Though traffic sensor devices are manually controllable,traffic flow data with distinct length,uneven sampling,and missi... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Investigating the Performance in SDN Based Data Centers Under Different Network Topologies  2
Investigating the Performance in SDN Based Data Centers Unde...
收藏 引用
2nd International Conference on Advanced Research in computing, ICARC 2022
作者: Hemachandra, K.G.R.P. Jayasena, K.P.N. Rankothge, Windhya Wijesiri, M.P.M. Sabaragamuwa University of Sri Lanka Department of Computing and Information Systems Belihuloya Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Systems Engineering Malabe Sri Lanka
A data center architecture can be determined as the basic structure of a cloud computing data center. However, the expected outcome cannot be obtained even though the tools, technologies, and elements are advanced. It... 详细信息
来源: 评论
A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第3期16卷 136-150页
作者: Alsarhan, Ayoub Al-Ghuwairi, Abdel-Rahman Alshdaifat, Esra’a Idhaim, Hasan alkhawaldeh, Omar Department of Information Technology Hashemite University Zarqa Jordan Software Engineering Department Hashemite University Zarqa Jordan Computer Information Systems Department Hashemite University Zarqa Jordan Hashemite University Zarqa Jordan
Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers’ (CSPs) ability to respond to client demands. In cloud market, the requests are announce... 详细信息
来源: 评论
Computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, computing, and Intelligent technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论
Utilizing Organizational Patterns to Build High-Performing Remote Teams  28
Utilizing Organizational Patterns to Build High-Performing R...
收藏 引用
28th European Conference on Pattern Languages of Programs, EuroPLoP 2023
作者: Toldy, Kristián Khail, Waheedullah Sulaiman Vranic, Valentino Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia Helmholtz-Zentrum Berlin für Materialien Energie Gmbh Germany
In recent years, remote work has become a more popular option for companies across various industries. While remote work provides numerous benefits, such as flexibility and increased work-life balance, it also present... 详细信息
来源: 评论
Fuzz-classification(p,l)-Angel:An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1131-1140页
作者: Tehsin Kanwal Hasina Attaullah Adeel Anjum Abid Khan Gwanggil Jeon Department of Computer Science COMSATS University IslamabadPakistan Department of Information Technology Quaid-e-Azam University IslamabadPakistan College of Science and Engineering School of Computing and MathsUniversity of DerbyDE221GBUK Department of Embedded Systems Engineering Incheon National UniversitySouth Korea
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio... 详细信息
来源: 评论
Multi-Granularity Detector for Vulnerability Fixes
arXiv
收藏 引用
arXiv 2023年
作者: Nguyen, Truong Giang Le-Cong, Thanh Kang, Hong Jin Widyasari, Ratnadira Yang, Chengran Zhao, Zhipeng Xu, Bowen Zhou, Jiayuan Xia, Xin Hassan, Ahmed E. Le, Xuan-Bach D. Lo, David The School of Computing and Information Systems Singapore Management University Singapore The Software Engineering Application Technology Lab Huawei China School of Computing Queen’s University Canada School of Computing and Information Systems The University of Melbourne Australia
With the increasing reliance on Open Source software, users are exposed to third-party library vulnerabilities. software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA r... 详细信息
来源: 评论