咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,657 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,320 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,670 篇 软件工程
    • 853 篇 信息与通信工程
    • 678 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 281 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 130 篇 建筑学
  • 1,963 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 493 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 155 篇 化学
  • 1,460 篇 管理学
    • 899 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 350 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 186 篇 经济学
    • 185 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 131 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 102 篇 training
  • 101 篇 accuracy
  • 100 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 76 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 164 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 36 篇 department of in...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 29 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 26 篇 faculty of infor...
  • 26 篇 college of intel...
  • 25 篇 department of co...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 32 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 24 篇 john grundy
  • 23 篇 grundy john
  • 22 篇 xiong zehui
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 20 篇 zidong wang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,139 篇 英文
  • 732 篇 其他
  • 55 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6921 条 记 录,以下是521-530 订阅
排序:
Single and Mitochondrial Gene Inheritance Disorder Prediction Using Machine Learning
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 953-963页
作者: Muhammad Umar Nasir Muhammad Adnan Khan Muhammad Zubair Taher MGhazal Raed A.Said Hussam Al Hamadi Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13120GyeonggidoKorea Faculty of Computing Riphah International UniversityIslamabad45000Pakistan School of Information Technology Skyline University CollegeSharjah1797UAE Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and Technology Universiti Kebangsaan Malaysia43600Malaysia Canadian University Dubai00000UAE Cyber-Physical Systems Khalifa UniversityAbu Dhabi127788UAE
One of the most difficult jobs in the post-genomic age is identifying a genetic disease from a massive amount of genetic ***,the complicated genetic disease has a very diverse genotype,making it challenging to find ge... 详细信息
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng University of Oxford Department of Computer Science United Kingdom Peking University Department of Information and Computing Science School of Mathematical Science China Monash University Department of Software Systems and Cybersecurity Australia Singapore Management University School of Computing and Information Systems Singapore Nanyang Technological University School of Computer Science and Engineering Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论
Investigating the Impacts of Digital Food Supply Chain Traceability on Sustainability: An Australian Study  34
Investigating the Impacts of Digital Food Supply Chain Trace...
收藏 引用
34th Australasian Conference on information systems, ACIS 2023
作者: Kurnia, Sherah Li, Mingye Liu, Libo Cui, Tingru Li, Wen Tortorella, Guilherme Luz Palmer, Martin Ali, Mazen School of Computing and Information Systems University of Melbourne Melbourne Australia Department of Mechanical Engineering University of Melbourne Melbourne Australia Department of Chemical Engineering University of Melbourne Melbourne Australia College of Information Technology University of Bahrain Bahrain
Digital food supply chain traceability (DFSCT) has the potential to address global sustainability concerns. However, limited studies investigate the use of technologies to support food supply chain traceability. Furth... 详细信息
来源: 评论
Triangle Matters! TopDyG: Topology-aware Transformer for Link Prediction on Dynamic Graphs  25
Triangle Matters! TopDyG: Topology-aware Transformer for Lin...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Zhang, Xin Cai, Fei Zheng, Jianming Pan, Zhiqiang Chen, Wanyu Chen, Honghui Chen, Chonghao National Key Laboratory of Information Systems Engineering National University of Defense Technology Changsha China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China College of Electronic Countermeasures National University of Defense Technology Hefei China
Dynamic graph link prediction is widely utilized in the complex web of the real world, such as social networks, citation networks, recommendation systems, etc. Recent Transformer-based link prediction methods on dynam... 详细信息
来源: 评论
From Medical Consultation to Diagnosis Generation Using Deep Learning  19th
From Medical Consultation to Diagnosis Generation Using Deep...
收藏 引用
19th International Conference on Soft computing Models in Industrial and Environmental Applications, SOCO 2024
作者: Ortiz-Perez, David Merino-Balaguer, Alejandro Rodriguez-Juan, Javier Garcia-Rodriguez, Jose Tomás, David J. Nalepa, Grzegorz Department of Computer Science and Technology University of Alicante Carr. de San Vicente del Raspeig Spain Department of Software and Computing Systems University of Alicante Carr. de San Vicente del Raspeig Spain Jagiellonian University Kraków Poland
Sanitary professionals often experience burnout due to long working hours and the stress associated with handling sensitive situations. Consequently, in recent years, significant efforts have been made to automate var... 详细信息
来源: 评论
Investigating the Impacts of Digital Food Supply Chain Traceability on Sustainability: An Australian Study  44
Investigating the Impacts of Digital Food Supply Chain Trace...
收藏 引用
44th International Conference on information systems: Rising like a Phoenix: Emerging from the Pandemic and Reshaping Human Endeavors with Digital Technologies, ICIS 2023
作者: Kurnia, Sherah Li, Mingye Liu, Libo Cui, Tingru Li, Wen Tortorella, Guilherme Luz Palmer, Martin Ali, Mazen School of Computing and Information Systems University of Melbourne Melbourne Australia Department of Mechanical Engineering University of Melbourne Melbourne Australia Department of Chemical Engineering University of Melbourne Melbourne Australia College of Information Technology University of Bahrain Bahrain
Digital food supply chain traceability (DFSCT) has the potential to address global sustainability concerns. However, limited studies investigate the use of technologies to support food supply chain traceability. Furth... 详细信息
来源: 评论
AnomalyGFM: Graph Foundation Model for Zero/Few-shot Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Qiao, Hezhe Niu, Chaoxi Chen, Ling Pang, Guansong School of Computing and Information Systems Singapore Management University Singapore AAII University of Technology Sydney Sydney Australia
Graph anomaly detection (GAD) aims to identify abnormal nodes that differ from the majority of the nodes in a graph, which has been attracting significant attention in recent years. Existing generalist graph models ha... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
computing, Sciences and Communications (ICCSC), International Conference on
作者: Abeer Mathur Abhinav Sudhakar Dubey Pranav Singh Mahara Usha Devi Gandhi Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Information Technology School of Computer Science Engineering & Information Systems Vellore Institute of Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Enhanced brain tumor detection and segmentation using densely connected convolutional networks with stacking ensemble learning
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109703-109703页
作者: Shaikh, Asadullah Amin, Samina Zeb, Muhammad Ali Sulaiman, Adel Al Reshan, Mana Saleh Alshahrani, Hani Department of Information Systems College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia Institute of Computing Kohat University of Science and Technology Kohat26000 Pakistan Department of Computer Science College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia
– Brain tumors (BT), both benign and malignant, pose a substantial impact on human health and need precise and early detection for successful treatment. Analysing magnetic resonance imaging (MRI) image is a common me... 详细信息
来源: 评论
TOWARDS FORMAL MODELING AND VERIFICATION OF UML CLASS DIAGRAMS USING FIRST-ORDER LOGIC AND RESOLUTION
TOWARDS FORMAL MODELING AND VERIFICATION OF UML CLASS DIAGRA...
收藏 引用
International Conference on Green Energy, computing and Intelligent technology 2024, GEn-CITy 2024
作者: Saputra, Aditya Bagoes Basuki, Thomas Anung Tirtawangsa, Jimmy Information Systems Department Universitas YPPI Rembang Rembang Indonesia School of Mathematical and Computer Sciences Heriot-Watt University Malaysia Putrajaya Malaysia School of Computing Telkom University Bandung Indonesia Information Technology Department Institut Teknologi Telkom Jakarta South Jakarta Indonesia
Although Object Management Group (OMG) Unified Modeling Language (UML) introduced Object Constraint Language (OCL) to add formalism as constraints in its models, it still lacks formal semantics and verification. This ... 详细信息
来源: 评论