咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,657 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,320 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,670 篇 软件工程
    • 853 篇 信息与通信工程
    • 678 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 281 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 130 篇 建筑学
  • 1,963 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 493 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 155 篇 化学
  • 1,460 篇 管理学
    • 899 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 350 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 186 篇 经济学
    • 185 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 131 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 102 篇 training
  • 101 篇 accuracy
  • 100 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 76 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 164 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 36 篇 department of in...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 29 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 26 篇 faculty of infor...
  • 26 篇 college of intel...
  • 25 篇 department of co...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 32 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 24 篇 john grundy
  • 23 篇 grundy john
  • 22 篇 xiong zehui
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 20 篇 zidong wang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,139 篇 英文
  • 732 篇 其他
  • 55 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6921 条 记 录,以下是491-500 订阅
排序:
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Large Language Models
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Larg...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hong, Xin Gong, Yuan Sethu, Vidhyasaharan Dang, Ting School of Computing and Information Systems University of Melbourne Melbourne Australia CSAIL SLS Massachusetts Institute of Technology Boston United States School of Electrical Engineering and Telecommunications University of New South Wales Sydney Australia
Recent advancements in Large Language Models (LLMs) have demonstrated great success in many Natural Language Processing (NLP) tasks. In addition to their cognitive intelligence, exploring their capabilities in emotion... 详细信息
来源: 评论
Performance and Accuracy Assessment of Detecting Network Intrusions with eSOM-Based Techniques
Performance and Accuracy Assessment of Detecting Network Int...
收藏 引用
2024 International Conference Automatics and Informatics, ICAI 2024
作者: Simeonidis, Dimitrios Petrov, Pavel Penchev, Georgi Petrova, Stefka Dimitrov, Georgi Petrivskyi, Volodymyr University of Economics - Varna Department of Informatics Varna Bulgaria College of Tourism Department of Tourism Varna Bulgaria University of Library Studies and Information Technologies Department of Information Technology Sofia Bulgaria Taras Shevchenko National University Department of Software Systems and Technologies Kyiv Ukraine
In this study are provided results about performance evaluation of Emergent Self-Organizing Map-based Intrusion Detection System in simulated wireless network environment. The experiment included detection of various ... 详细信息
来源: 评论
Imbalanced Graph Classification with Multi-scale Oversampling Graph Neural Networks
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Rongrong Pang, Guansong Chen, Ling Faculty of Engineering and Information Technology University of Technology Sydney Sydney Australia School of Computing and Information Systems Singapore Management University Singapore
One main challenge in imbalanced graph classification is to learn expressive representations of the graphs in underrepresented (minority) classes. Existing generic imbalanced learning methods, such as oversampling and... 详细信息
来源: 评论
Impersonated Human Speech Chatbot with Adaptive Frequency Spectrum  3
Impersonated Human Speech Chatbot with Adaptive Frequency Sp...
收藏 引用
3rd International Conference on Intelligent Communication and Computational Techniques, ICCT 2023
作者: Chettiar, Gautam Shukla, Amogh Nalwaya, Preet Sethi, Karman Prakash, Surya Vellore Institute of Technology Dept. of Communication Engineering Vellore India Department of Software Systems Vellore Institute of Technology Vellore India Indian Institute of Information Technology Allahabad Department of Electronics and Communication Engineering Prayagraj India
Recent trends in artificial intelligence and natural language processing models have led to the generation of highly efficient and versatile intelligent chatbot models., which have the potential to supplant human spee... 详细信息
来源: 评论
Energy-Saving VM in SDN-Driven Cloud Data Center with the Operational Vacation Policy  3
Energy-Saving VM in SDN-Driven Cloud Data Center with the Op...
收藏 引用
3rd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023
作者: Dash, Bibhuti Bhusan Patra, Sudhansu Shekhar Barik, Lalbihari Ghosh, Akash Pandey, Trilok Nath Gourisaria, Mahendra Kumar KIIT Deemed to Be University School of Computer Applications Bhubaneswar India King Abdul Aziz University Faculty of Computing and Information Technology in Rabigh Department of Information Systems Saudi Arabia Vellore Institute of Technology School of Computer Science and Engineering Chennai India
The increasing use of the Internet of Things (IoT), which has resulted in an exponential growth in network traffic, has serious implications on energy consumption and network performance. To reduce power consumption i... 详细信息
来源: 评论
INCREASE: Inductive Graph Representation Learning for Spatio-Temporal Kriging  23
INCREASE: Inductive Graph Representation Learning for Spatio...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Zheng, Chuanpan Fan, Xiaoliang Wang, Cheng Qi, Jianzhong Chen, Chaochao Chen, Longbiao Fujian Key Laboratory of Sensing and Computing for Smart Cities School of Informatics Xiamen University Xiamen China School of Computing and Information Systems University of Melbourne Melbourne Australia College of Computer Science and Technology Zhejiang University Hangzhou China
Spatio-temporal kriging is an important problem in web and social applications, such as Web or Internet of Things, where things (e.g., sensors) connected into a web often come with spatial and temporal properties. It ... 详细信息
来源: 评论
Offloading Decision Making in Mobile Edge computing: A Survey  2
Offloading Decision Making in Mobile Edge Computing: A Surve...
收藏 引用
2nd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2022
作者: Abu-Taleb, Najlaa Abdulrahman Hasan Abdulrazzak, Fuad Zahary, Ammar Thabit Al-Mqdashi, Abdulmajid M. Thamar University Faculty of Computer Science and Information Systems Thamar Yemen University of Science and Technology Faculty of Computing and IT Sana'a Yemen
Mobile Edge computing (MEC) is considered as a promising solution to augment the computational capabilities of mobile devices. Because of frequently changing locations, mobile users often see dynamically changing netw... 详细信息
来源: 评论
An Aircraft Identification System Using Convolution Neural Networks  12
An Aircraft Identification System Using Convolution Neural N...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced computing systems: technology and Applications, IDAACS 2023
作者: Turchenko, Viktor Turchenko, Iryna Vasylkiv, Nadiia West Ukrainian National University Department for Information Computer Systems and Control Ternopil46000 Ukraine McMaster University Department of Computing and Software HamiltonL8S 4L8 Canada Research Institute for Intelligent Computer Systems West Ukrainian National University Ternopil Ukraine
The task of aircraft identification using their registration number is important as visual identification remains the only method of their identification in case of air traffic control systems or radar failure. In thi... 详细信息
来源: 评论
Cluster Availability Model with information Update Following Node Recovery
Cluster Availability Model with Information Update Following...
收藏 引用
2023 Wave Electronics and its Application in information and Telecommunication systems, WECONF 2023
作者: Bogatyrev, V.A. Bogatyrev, S.V. Sivov, V.V. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia ITMO University Faculty of Software Engineering and Computer Technology Saint-Petersburg Russia
A model for evaluating the availability of a fault-tolerant cluster with a constraint on the maximum query service time is proposed. Node recovery in the cluster involves replacing the entire computational node with t... 详细信息
来源: 评论
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 190-204页
作者: Farhan Ullah Shamsher Ullah Gautam Srivastava Jerry Chun-Wei Lin School of Software Northwestern Polytechnical UniversityXian710072ShaanxiChina Knowledge Unit of Systems and Technology University of Management and TechnologySialkot 51040Pakistan Department of Math and Computer Science Brandon UniversityBrandonMB R7A 6A9Canada Department of Computer Science and Math Lebanese American UniversityBeirut1102Lebanon Western Norway University of Applied Sciences BergenNorway Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat... 详细信息
来源: 评论