咨询与建议

限定检索结果

文献类型

  • 4,162 篇 会议
  • 2,715 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 7,003 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,395 篇 工学
    • 3,365 篇 计算机科学与技术...
    • 2,696 篇 软件工程
    • 884 篇 信息与通信工程
    • 711 篇 控制科学与工程
    • 469 篇 生物工程
    • 446 篇 电气工程
    • 316 篇 机械工程
    • 307 篇 生物医学工程(可授...
    • 284 篇 电子科学与技术(可...
    • 221 篇 光学工程
    • 169 篇 仪器科学与技术
    • 168 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 141 篇 安全科学与工程
    • 136 篇 建筑学
  • 1,985 篇 理学
    • 1,026 篇 数学
    • 530 篇 生物学
    • 504 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 157 篇 化学
  • 1,495 篇 管理学
    • 927 篇 管理科学与工程(可...
    • 676 篇 图书情报与档案管...
    • 516 篇 工商管理
  • 361 篇 医学
    • 308 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 164 篇 公共卫生与预防医...
  • 251 篇 法学
    • 213 篇 社会学
  • 192 篇 经济学
    • 191 篇 应用经济学
  • 158 篇 教育学
    • 148 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 194 篇 deep learning
  • 183 篇 machine learning
  • 143 篇 computational mo...
  • 128 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 104 篇 training
  • 103 篇 accuracy
  • 96 篇 internet of thin...
  • 96 篇 cloud computing
  • 94 篇 semantics
  • 93 篇 feature extracti...
  • 90 篇 software
  • 88 篇 data mining
  • 84 篇 information tech...
  • 84 篇 predictive model...
  • 82 篇 security
  • 79 篇 optimization
  • 78 篇 data models
  • 75 篇 educational inst...

机构

  • 169 篇 school of comput...
  • 50 篇 school of comput...
  • 41 篇 university of ch...
  • 41 篇 state key labora...
  • 39 篇 information syst...
  • 38 篇 department of in...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 36 篇 department of in...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 school of softwa...
  • 27 篇 department of in...
  • 27 篇 college of compu...
  • 27 篇 school of comput...
  • 25 篇 department of co...
  • 25 篇 school of comput...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 institute of sof...

作者

  • 42 篇 niyato dusit
  • 35 篇 buyya rajkumar
  • 31 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 grundy john
  • 20 篇 bailey james
  • 19 篇 zidong wang
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 5,957 篇 英文
  • 995 篇 其他
  • 60 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
7003 条 记 录,以下是651-660 订阅
排序:
An Improved Multi-Objective Particle Swarm Optimization Routing on MANET
收藏 引用
Computer systems Science & Engineering 2023年 第2期44卷 1187-1200页
作者: G.Rajeshkumar M.Vinoth Kumar K.Sailaja Kumar Surbhi Bhatia Arwa Mashat Pankaj Dadheech Department of Computer Science and Engineering Erode Sengunthar Engineering CollegePerunduraiErode638057Tamil NaduIndia Department of Information Science and Engineering Dayananda Sagar Academy of Technology and ManagementBangalore560082India Department of Master of Computer Applications M.S.Ramaiah Institute of TechnologyBangalore560054India Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversityRiyadh11533Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityRabigh21911Saudi Arabia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipur302017RajasthanIndia
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ... 详细信息
来源: 评论
${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第1期22卷 710-722页
作者: Xiaoning Liu Yifeng Zheng Xingliang Yuan Xun Yi School of Computing Technologies RMIT University Melbourne VIC Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen Guangdong China School of Computing and Information Systems University of Melbourne Melbourne VIC Australia
Organizations these days capitalize on crowdsourcing to learn collective wisdom from a population of individuals. Vast amounts of data have been gathered, making the crowdsourcing platforms a lucrative target to steal... 详细信息
来源: 评论
Enhancing Secure Development in Globally Distributed software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 5031-5049页
作者: Marya Iqbal Yaser Hafeez Nabil Almashfi Amjad Alsirhani Faeiz Alserhani Sadia Ali Mamoona Humayun Muhammad Jamal University Institute of Information Technology PMAS-Arid Agriculture UniversityRawalpindiPakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaAl Jouf72388Saudi Arabia Department of Mathematics Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindiPakistan
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var... 详细信息
来源: 评论
Securing the Future after Pager Bombs:Lifecycle Protection of Smart Devices via Blockchain Intelligence
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2355-2358页
作者: Fei Lin Qinghua Ni Jing Yang Juanjuan Li Nan Zheng Levente Kovács Radu Prodan Mariagrazia Dotoli Qing-Long Han Fei-Yue Wang the Department of Engineering Science Faculty of Innovation EngineeringMacao University of Science and TechnologyMacao 999078China the State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China the School of Artificial Intelligence University of Chinese Academy of SciencesBei-jing 100049China IEEE Obuda University John von Neumann Faculty of InformaticsBecsi Str.96/bH-1034 BudapestHungary the Institute of Information Technology University of Klagenfurt9020 Klagenfurt am WortherseeAustria the Department of Electrical and Information Engineering Polytechnic of Bari70126 BariItaly the School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourne VIC 3122Australia the State Key Laboratory for Management and Control of Complex Systems Chinese Academy of SciencesBeijing 100190
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabi... 详细信息
来源: 评论
GemmaWithLoRA: A New Approach to Click Fraud Detection
GemmaWithLoRA: A New Approach to Click Fraud Detection
收藏 引用
2024 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2024
作者: Dai, Bingzhou Wang, Lei Zhao, Xiaoyong Guo, Yu Obaidat, Mohammad S. School of Information Management Beijing Information Science & Technology University Beijing China Information Systems Institute Beijing Advanced Innovation Center for Materials Genome Engineering Beijing Information Science & Technology University Beijing China Beijing Advanced Innovation Center for Materials Genome Engineering and Shunde Innovation School University of Science and Technology Beijing China King Abdullah II School of Information Technology University of Jordan School of Engineering Amity University School of Computing SRM University Amman Jordan
With the rapid development of artificial intelligence technology, pre-Trained large language models (LLMs) have demonstrated their powerful application potential in various fields. Click fraud is a serious issue in th... 详细信息
来源: 评论
Device-Free 3D Drone Localization in RIS-Assisted mmWave MIMO Networks
Device-Free 3D Drone Localization in RIS-Assisted mmWave MIM...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: He, Jiguang Vanwynsberghe, Charles Chen, Hui Huang, Chongwen Fakhreddine, Aymen Great Bay University School of Computing and Information Technology Dongguan China Technology Innovation Institute Abu Dhabi9639 United Arab Emirates Chalmers University of Technology Department of Electrical Engineering Gothenburg Sweden Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China University of Klagenfurt Institute of Networked and Embedded Systems Klagenfurt Austria
In this paper, we investigate the potential of reconfigurable intelligent surfaces (RISs) in facilitating passive/device-free three-dimensional (3D) drone localization within existing cellular infrastructure operating... 详细信息
来源: 评论
Polymorphic Security Enhancements for Corporate Environments Utilizing Behavior Analytics
Polymorphic Security Enhancements for Corporate Environments...
收藏 引用
International Conference on Computer and Applications (ICCA)
作者: Wijesinghe W.M.A. J Abeysinghe Y.P. P Rukshana M.A. F Adhikari A.M.P. S Kavinga Yapa Abeywardhana Deemantha Siriwardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-chan... 详细信息
来源: 评论
Et Tu certifications: robustness certificates yield better adversarial examples  24
Et Tu certifications: robustness certificates yield better a...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Andrew C. Cullen Shijie Liu Paul Montague Sarah M. Erfani Benjamin I.P. Rubinstein School of Computing and Information Systems University of Melbourne Parkville Australia Defence Science and Technology Group Adelaide Australia
In guaranteeing the absence of adversarial examples in an instance's neighbourhood, certification mechanisms play an important role in demonstrating neural net robustness. In this paper, we ask if these certificat...
来源: 评论
Research on Edge computing Offloading Based on Reinforcement Learning in Multi-user Scenarios  6th
Research on Edge Computing Offloading Based on Reinforcement...
收藏 引用
6th International Conference on Smart Grid and Internet of Things, SGIoT 2022
作者: Yu, Zi-Hang Zeng, Jian-Jun Liu, Sai Zhang, Zhen-Jiang Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing100044 China College of Intelligence and Computing Beijing InchTek Technology Tianjin University Beijing100044 China
Under the blessing of the new generation of information technology represented by 5G, a large number of new models and new businesses represented by smart logistics, industrial Internet, and smart transportation have ... 详细信息
来源: 评论
Enhancing Medical Anatomy Education through Virtual Reality (VR): Design, Development, and Evaluation
arXiv
收藏 引用
arXiv 2024年
作者: Than, Myint Zu Yap, Kian Meng Department of Computing and Information Systems School of Engineering and Technology Sunway University Malaysia School of Engineering and Technology Sunway University Malaysia
Modern medicine demands innovations in medical education, particularly in the learning of human anatomy, traditionally taught through textbooks, dissections, and lectures. Virtual Reality (VR) has emerged as a promisi... 详细信息
来源: 评论