咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,657 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,921 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,320 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,670 篇 软件工程
    • 853 篇 信息与通信工程
    • 678 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 281 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 130 篇 建筑学
  • 1,963 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 493 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 155 篇 化学
  • 1,460 篇 管理学
    • 899 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 350 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 186 篇 经济学
    • 185 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 131 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 102 篇 training
  • 101 篇 accuracy
  • 100 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 76 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 164 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 36 篇 department of in...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 29 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 26 篇 faculty of infor...
  • 26 篇 college of intel...
  • 25 篇 department of co...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 32 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 24 篇 john grundy
  • 23 篇 grundy john
  • 22 篇 xiong zehui
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 20 篇 zidong wang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,139 篇 英文
  • 732 篇 其他
  • 55 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6921 条 记 录,以下是581-590 订阅
排序:
Robust Auto-Scaling with Probabilistic Workload Forecasting for Cloud Databases
Robust Auto-Scaling with Probabilistic Workload Forecasting ...
收藏 引用
International Conference on Data Engineering
作者: Haitian Hang Xiu Tang Jianling Sun Lingfeng Bao David Lo Haoye Wang College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China School of Computing and Information Systems Singapore Management University Singapore School of Computer and Computing Science Hangzhou City University China
Auto-scaling is crucial for achieving elasticity in cloud databases as well as other cloud systems. Predictive auto-scaling, which leverages forecasting techniques to adjust resources based on predicted workload, has ... 详细信息
来源: 评论
A Hybrid Heuristic Algorithm for Solving COVID-19’s Social Distancing at Universities Campus
收藏 引用
Computer systems Science & Engineering 2022年 第6期41卷 933-944页
作者: Hassan Al-Tarawneh Khalid Al-Kaabneh Aysh Alhroob Hazem Migdady Issam Alhadid Department of Data sciences and Artificial Intelligence Al-Ahlyyia Amman UniversityAmmanJordan Department of Software Engineering Isra UniversityAmmanJordan Department of CSMIS Oman college of management and technologyMuscatOman Faculty of Information Technology and Systems University of JordanAqabaJordan
Social distancing during COVID-19 has become one of the most important measures in reducing the risks of the spread of the virus. Implementing thesemeasures at universities is crucial and directly related to the phys... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques
Enhancing Automated Android Application Security through Hyb...
收藏 引用
Human-Computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: G.E. Manukulasooriya R.S.I. Munasingha Harinda Fernando H.K.I. Uthpali A.V.S.H. Yeshani Deemantha Siriwardana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论
Development of Classification System for Corporate Portal User Requests  7
Development of Classification System for Corporate Portal Us...
收藏 引用
7th International Conference on information Technologies in Engineering Education, Inforino 2024
作者: Chelyshev, Eduard Bobryakov, Alexander Raskatova, Marina Shcherbakov, Dmitry Naryadkina, Nadezhda National Research University 'MPEI' Dept. of Computing Machines Systems and Networks Moscow Russia National Research University 'MPEI' Dept. of Control and Information Technology Moscow Russia National Research University 'MPEI' Smolensk branch Smolensk Russia National Research University 'MPEI' Dept. of Industrial Thermal Power Systems Moscow Russia
The paper is devoted to the development of classification system for corporate portal user requests using machine learning algorithms. Text corpus preprocessing including irrelevant characters removal, normalization a... 详细信息
来源: 评论
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
Computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
Scaling Auditory Cognition via Test-Time Compute in Audio Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Dang, Ting Gao, Yan Jia, Hong School of Computing and Information Systems The University of Melbourne Australia Department of Computer Science and Technology University of Cambridge United Kingdom
Large language models (LLMs) have shown exceptional versatility in natural language processing, prompting recent efforts to extend their multimodal capabilities to speech processing through the development of audio la... 详细信息
来源: 评论
LDREG: LOCAL DIMENSIONALITY REGULARIZED SELF-SUPERVISED LEARNING  12
LDREG: LOCAL DIMENSIONALITY REGULARIZED SELF-SUPERVISED LEAR...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Huang, Hanxun Campello, Ricardo J.G.B. Erfani, Sarah Ma, Xingjun Houle, Michael E. Bailey, James School of Computing and Information Systems The University of Melbourne Australia Department of Mathematics and Computer Science University of Southern Denmark Denmark School of Computer Science Fudan University China Department of Computer Science New Jersey Institute of Technology United States
Representations learned via self-supervised learning (SSL) can be susceptible to dimensional collapse, where the learned representation subspace is of extremely low dimensionality and thus fails to represent the full ...
来源: 评论
On Measuring Confounding Bias in Mixed Multidimensional Data: Case of Coerced Multiple Linear Regression Adjustment  8th
On Measuring Confounding Bias in Mixed Multidimensional Dat...
收藏 引用
8th International Conference on information and Communication technology for Intelligent systems, ICTIS 2024
作者: Peious, Sijo Arakkal Kaushik, Minakshi Shah, Syed Attique Sharma, Rahul Suran, Shweta Draheim, Dirk Information Systems Group Tallinn University of Technology Tallinn Estonia School of Computing and Digital Technology—CDT Birmingham City University Birmingham United Kingdom The Open University Walton Hall Milton Keynes United Kingdom Ajay Kumar Garg Engineering College Ghaziabad India
Currently, we witness a significantly increased understanding, that disaggregation of data is the key to better-informed decision-making and enactment. The UN 2030 Agenda for Sustainable Development prominently stress... 详细信息
来源: 评论
Blockchain and IIoT Enabled Solution for Social Distancing and Isolation Management to Prevent Pandemics
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 687-709页
作者: Muhammad Saad Maaz Bin Ahmad Muhammad Asif Muhammad Khalid Khan Toqeer Mahmood Elsayed Tag Eldin Hala Abdel Hameed College of Computing and Information Sciences Karachi Institute of Economics&TechnologyKarachiPakistan Department of Computer Science Lahore Garrison UniversityLahorePakistan Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Faculty of Engineering and Technology Future University in Egypt New Cairo11835Egypt Faculty of Computer and Information Systems Fayoum UniversityFaiyumEgypt Khaybar Applied College Taibah UniversityMedinaSaudi Arabia
Pandemics have always been a nightmare for humanity,especially in developing *** lockdowns are considered one of the effective ways to deal with spreading such ***,developing countries cannot afford such solutions bec... 详细信息
来源: 评论
Towards Data-Driven Network Intrusion Detection systems: Features Dimensionality Reduction and Machine Learning
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第14期16卷 123-135页
作者: Maabreh, Majdi Obeidat, Ibrahim Elsoud, Esraa Abu Alnajjai, Asma Alzyoud, Rahaf Darwish, Omar Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University P.O. Box 330127 Zarqa13133 Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Information Security and Applied Computing Department Eastern Michigan University MI United States
Cyber attacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. Fortunately, various machine/deep learning models have demonstrated excellent a... 详细信息
来源: 评论