咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,657 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,320 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,670 篇 软件工程
    • 853 篇 信息与通信工程
    • 678 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 281 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 130 篇 建筑学
  • 1,963 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 493 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 155 篇 化学
  • 1,460 篇 管理学
    • 899 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 350 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 186 篇 经济学
    • 185 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 131 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 102 篇 training
  • 101 篇 accuracy
  • 100 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 76 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 164 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 36 篇 department of in...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 29 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 26 篇 faculty of infor...
  • 26 篇 college of intel...
  • 25 篇 department of co...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 32 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 24 篇 john grundy
  • 23 篇 grundy john
  • 22 篇 xiong zehui
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 20 篇 zidong wang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,139 篇 英文
  • 732 篇 其他
  • 55 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6921 条 记 录,以下是401-410 订阅
排序:
Machine Learning-Enhanced Signal Integrity Analysis for High-Frequency Bio-Sensing Circuits
Machine Learning-Enhanced Signal Integrity Analysis for High...
收藏 引用
Communication & computing (WCONF), World Conference on
作者: Hanadi Alkhudhayr Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Rabigh Saudi Arabia
Complex approaches for signal integrity analysis in high-frequency bio-sensing circuits have been developed. This article describes “Machine Learning-Enhanced Signal Integrity Analysis.” It analyses data using rando... 详细信息
来源: 评论
Tailored Convolutional Neural Network for Brain Tumor Detection Using Self-attention and Spatial Attention Mechanisms
Tailored Convolutional Neural Network for Brain Tumor Detect...
收藏 引用
Trends in Quantum computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: Raed Alsini Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Brain tumors are masses of unusual cells in the brain system and are known to be highly deadly, affecting people of all ages. Magnetic resonance imaging (MRI) is a standard approach to identifying brain malignancies. ... 详细信息
来源: 评论
Comparative Study of Deep Learning Parameter Selection for Multi-Output Regression on Head Pose Estimation
Comparative Study of Deep Learning Parameter Selection for M...
收藏 引用
2022 IEEE International Conference on Industrial technology, ICIT 2022
作者: Dhanawansa, Vidushani Samarasinghe, Pradeepa Yogarajah, Pratheepan Gardiner, Bryan Karunasena, Anuradha Sri Lanka Institute of Information Technology Faculty of Computing Sri Lanka Engineering and Intelligent Systems Ulster University School of Computing United Kingdom
This paper presents a systemic analysis on the implications of the loss function, batch size and optimiser function applied within the multi-output regression problem domain of Head Pose estimation. To the best of our... 详细信息
来源: 评论
Comparative Study of Parameter Selection for Enhanced Edge Inference for a Multi-Output Regression model for Head Pose Estimation
Comparative Study of Parameter Selection for Enhanced Edge I...
收藏 引用
2022 IEEE Region 10 International Conference, TENCON 2022
作者: Lindamulage, Asiri Kodagoda, Nuwan Reyal, Shyam Samarasinghe, Pradeepa Yogarajah, Pratheepan Sri Lanka Institute of Information Technology Faculty of Computing Sri Lanka School of Computing Engineering and Intelligent Systems Ulster University United Kingdom
Magnitude-based pruning is a technique used to optimise deep learning models for edge inference. We have achieved over 75% model size reduction with a higher accuracy than the original multi-output regression model fo... 详细信息
来源: 评论
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection  25
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on Data Science and systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Qi, Jiaxing Huang, Shaohan Luan, Zhongzhi Yang, Shu Fung, Carol Yang, Hailong Qian, Depei Shang, Jing Xiao, Zhiwen Wu, Zhihui Sino-German Joint Software Institute Beihang University Beijing100191 China The Concordia Institute for Information Systems Engineering Concordia University Quebec Canada The China Mobile Information Technology Center China
The increasing volume of log data produced by software-intensive systems makes it impractical to analyze them manually. Many deep learning-based methods have been proposed for log-based anomaly detection. These method... 详细信息
来源: 评论
CVE Records of Known Exploited Vulnerabilities  8
CVE Records of Known Exploited Vulnerabilities
收藏 引用
8th International Conference on Computer and Communication systems, ICCCS 2023
作者: Lim, Jackson Lau, Yi Lin Ming Chan, Leshawn Khin Tristan Paul Goo, Jia Ming Zhang, Huahua Zhang, Zhiyuan Guo, Huaqun Singapore Institute of Technology Infocomm Technology Cluster Singapore Ningbo Innovation Center Zhejiang University China NingboTech University China School of Computing and Information Systems Singapore Management University Singapore
Understanding vulnerability trends is critical to the risk management process. The goal of this paper is to raise the awareness and inform the users about the Common Vulnerabilities and Exposures (CVE) associated with... 详细信息
来源: 评论
WISER: Weak Supervision and Supervised Representation Learning to Improve Drug Response Prediction in Cancer  41
WISER: Weak Supervision and Supervised Representation Learni...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Shubham, Kumar Jayagopal, Aishwarya Danish, Syed Mohammed Prathosh, A.P. Rajan, Vaibhav Department of Electrical Communication Engineering Indian Institute of Science Karnataka Bengaluru India Department of Information Systems and Analytics School of Computing National University of Singapore Singapore Indian Institute of Technology Bihar Patna India
Cancer, a leading cause of death globally, occurs due to genomic changes and manifests heterogeneously across patients. To advance research on personalized treatment strategies, the effectiveness of various drugs on c... 详细信息
来源: 评论
DeepDect: A Facial Deepfake Video Detection Application using Ensemble Learning  12
DeepDect: A Facial Deepfake Video Detection Application usin...
收藏 引用
12th IEEE Conference on systems, Process and Control, ICSPC 2024
作者: Tay, Wan Xin Chua, Hui Na Jasser, Muhammed Basheer Issa, Bayan Wong, Richard T.K. Sunway University No. 5 Jalan Universiti School of Engineering and Technology Department of Computing and Information Systems Selangor Darul Ehsan Bandar Sunway47500 Malaysia University of Aleppo Faculty of Informatics Engineering Syria
The emerging technology of deepfake video poses significant threats to information integrity and public trust. Deepfake videos come in various forms, including face swaps, lip-syncing, and full-body simulations. Detec... 详细信息
来源: 评论
Model for Recognition of Sign Language and Hand Gesture by Hard Hearing People
Model for Recognition of Sign Language and Hand Gesture by H...
收藏 引用
2023 International Conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Manjula, R. Jagadeesan, S. Ramalingam, Venkadeshan Vetriselvi, T. Johnpeter, T. Srm Institute of Science and Technology College of Engineering and Technology Department of Computing Technologies Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Tamilnadu Vellore India Information Technology Department University of Technology and Applied Sciences-Shinas Branch Sultanate of Oman Oman Vellore Institute of Technology School of Computer Science and Engineering Department of Iot Tamilnadu Vellore India K.Ramakrishnan College of Engineering Department of Computer Science and Engineering Trichy India
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm... 详细信息
来源: 评论
Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6659-6671页
作者: Kang, Guosheng Wang, Yang Liu, Jianxun Cao, Buqing Xiao, Yong Xu, Yu Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China University of Cambridge Cambridge Baker Systems Genomics Initiative British Heart Foundation Cardiovascular Epidemiology Unit Department of Public Health and Primary Care CambridgeCB1 8RN United Kingdom
With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction be... 详细信息
来源: 评论