咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,670 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,324 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,671 篇 软件工程
    • 854 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 466 篇 生物工程
    • 414 篇 电气工程
    • 313 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 282 篇 电子科学与技术(可...
    • 210 篇 光学工程
    • 166 篇 仪器科学与技术
    • 159 篇 动力工程及工程热...
    • 152 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 131 篇 建筑学
  • 1,962 篇 理学
    • 1,017 篇 数学
    • 528 篇 生物学
    • 492 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 154 篇 化学
  • 1,463 篇 管理学
    • 902 篇 管理科学与工程(可...
    • 665 篇 图书情报与档案管...
    • 512 篇 工商管理
  • 351 篇 医学
    • 302 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
  • 245 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 25 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 189 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 130 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 104 篇 accuracy
  • 97 篇 cloud computing
  • 96 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 87 篇 data mining
  • 83 篇 information tech...
  • 83 篇 predictive model...
  • 80 篇 security
  • 78 篇 data models
  • 75 篇 educational inst...
  • 75 篇 optimization

机构

  • 165 篇 school of comput...
  • 51 篇 school of comput...
  • 41 篇 state key labora...
  • 39 篇 university of ch...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 department of in...
  • 37 篇 school of inform...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 school of comput...
  • 27 篇 department of in...
  • 27 篇 school of softwa...
  • 27 篇 college of compu...
  • 25 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 35 篇 buyya rajkumar
  • 30 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 26 篇 xiong zehui
  • 23 篇 john grundy
  • 22 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 20 篇 bailey james
  • 19 篇 zidong wang
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,150 篇 英文
  • 733 篇 其他
  • 56 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6934 条 记 录,以下是621-630 订阅
排序:
Device-Free 3D Drone Localization in RIS-Assisted mmWave MIMO Networks
Device-Free 3D Drone Localization in RIS-Assisted mmWave MIM...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: He, Jiguang Vanwynsberghe, Charles Chen, Hui Huang, Chongwen Fakhreddine, Aymen Great Bay University School of Computing and Information Technology Dongguan China Technology Innovation Institute Abu Dhabi9639 United Arab Emirates Chalmers University of Technology Department of Electrical Engineering Gothenburg Sweden Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China University of Klagenfurt Institute of Networked and Embedded Systems Klagenfurt Austria
In this paper, we investigate the potential of reconfigurable intelligent surfaces (RISs) in facilitating passive/device-free three-dimensional (3D) drone localization within existing cellular infrastructure operating... 详细信息
来源: 评论
Et Tu certifications: robustness certificates yield better adversarial examples  24
Et Tu certifications: robustness certificates yield better a...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Andrew C. Cullen Shijie Liu Paul Montague Sarah M. Erfani Benjamin I.P. Rubinstein School of Computing and Information Systems University of Melbourne Parkville Australia Defence Science and Technology Group Adelaide Australia
In guaranteeing the absence of adversarial examples in an instance's neighbourhood, certification mechanisms play an important role in demonstrating neural net robustness. In this paper, we ask if these certificat...
来源: 评论
Polymorphic Security Enhancements for Corporate Environments Utilizing Behavior Analytics
Polymorphic Security Enhancements for Corporate Environments...
收藏 引用
International Conference on Computer and Applications (ICCA)
作者: Wijesinghe W.M.A. J Abeysinghe Y.P. P Rukshana M.A. F Adhikari A.M.P. S Kavinga Yapa Abeywardhana Deemantha Siriwardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-chan... 详细信息
来源: 评论
Research on Edge computing Offloading Based on Reinforcement Learning in Multi-user Scenarios  6th
Research on Edge Computing Offloading Based on Reinforcement...
收藏 引用
6th International Conference on Smart Grid and Internet of Things, SGIoT 2022
作者: Yu, Zi-Hang Zeng, Jian-Jun Liu, Sai Zhang, Zhen-Jiang Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing100044 China College of Intelligence and Computing Beijing InchTek Technology Tianjin University Beijing100044 China
Under the blessing of the new generation of information technology represented by 5G, a large number of new models and new businesses represented by smart logistics, industrial Internet, and smart transportation have ... 详细信息
来源: 评论
Enhancing Medical Anatomy Education through Virtual Reality (VR): Design, Development, and Evaluation
arXiv
收藏 引用
arXiv 2024年
作者: Than, Myint Zu Yap, Kian Meng Department of Computing and Information Systems School of Engineering and Technology Sunway University Malaysia School of Engineering and Technology Sunway University Malaysia
Modern medicine demands innovations in medical education, particularly in the learning of human anatomy, traditionally taught through textbooks, dissections, and lectures. Virtual Reality (VR) has emerged as a promisi... 详细信息
来源: 评论
Enhancing Agricultural Efficiency with IoT-Enabled Precision Irrigation Management Using LoRaWAN technology
Enhancing Agricultural Efficiency with IoT-Enabled Precision...
收藏 引用
International Conference on Computational Intelligence and Communication Networks (CICN)
作者: J.A.S.K. Jayasinghe T.M.H.L. Thennakoon U.G.C. Ruchira N.G.C.L. Wimalasena J.A.D.C.A. Jayakody Dinithi Pandithage Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The Internet of Things-empowered precision irrigation management system with LoRaWAN technology is presented given the growing food requirements across the world and pressing calls for judicious use of water in agricu... 详细信息
来源: 评论
Exploring Gamification Risks and Implications in Agile software Development Enterprises: An Empirical Study  24
Exploring Gamification Risks and Implications in Agile Softw...
收藏 引用
Proceedings of the 2024 13th International Conference on software and information Engineering
作者: Fayrouz M. Elsalmy Nada H. Sherief Walid R. Abdelmoez Information Systems Departement College of Computing and Information Technology Arab Academy for Science Technology and Maritime Transport (AASTMT) Alexandria Egypt Softawre Engineering Department College of Computing and Information Technology Arab Academy for Science Technology and Maritime Transport (AASTMT) Alexandria Egypt
This research highlights a gap in applying gamification to agile software development enterprises. While gamification risks and negative side effects have been addressed in principle, limited research explored their i... 详细信息
来源: 评论
Assessing Quality of Service Performance in SDN Controllers: POX vs. OpenDaylight
Assessing Quality of Service Performance in SDN Controllers:...
收藏 引用
Advancements in computing (ICAC), International Conference on
作者: Shashika Lokuliyana Pipuni Wijesiri Anuradha Jayakody Pradeep K.W. Abeygunawardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
This research offers a comparative analysis of Qual-ity of Service (QoS) within software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show tha... 详细信息
来源: 评论
Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications
收藏 引用
Computers, Materials & Continua 2021年 第6期67卷 3649-3667页
作者: Alaa Omran Almagrabi A.K.Bashir Department of Information Systems Faculty of Computing and Information Technology(FCIT)King Abdul Aziz University(KAU)JeddahKingdom of Saudi Arabia School of Information and Communication Engineering University of Electronic Science and Technology of China(UESTC)ChengduChina
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and *** assimilation of blockchain systems lever... 详细信息
来源: 评论
iContinuum: An Emulation Toolkit for Intent-Based computing Across the Edge-to-Cloud Continuum
iContinuum: An Emulation Toolkit for Intent-Based Computing ...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Negin Akbari Adel N. Toosi John Grundy Hourieh Khalajzadeh Mohammad S. Aslanpour Shashikant Ilager Department of Software Systems and Cybersecurity Monash University Australia School of Info Technology Deakin University Australia Institute of Information Systems Engineering TU Wien Austria
The Internet of Things (IoT) has led to a surge in smart devices, generating vast volumes of data. Cloud computing offers scalability but does not suffice for many real-time and privacy-sensitive IoT applications. Thi... 详细信息
来源: 评论