咨询与建议

限定检索结果

文献类型

  • 4,024 篇 会议
  • 2,596 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 6,667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,190 篇 工学
    • 2,774 篇 计算机科学与技术...
    • 2,224 篇 软件工程
    • 813 篇 信息与通信工程
    • 619 篇 控制科学与工程
    • 544 篇 电气工程
    • 461 篇 电子科学与技术(可...
    • 344 篇 生物工程
    • 340 篇 机械工程
    • 299 篇 光学工程
    • 285 篇 生物医学工程(可授...
    • 213 篇 仪器科学与技术
    • 212 篇 动力工程及工程热...
    • 167 篇 化学工程与技术
    • 142 篇 材料科学与工程(可...
    • 135 篇 交通运输工程
    • 124 篇 土木工程
    • 111 篇 建筑学
  • 2,052 篇 理学
    • 1,135 篇 数学
    • 518 篇 物理学
    • 417 篇 生物学
    • 299 篇 统计学(可授理学、...
    • 272 篇 系统科学
    • 184 篇 化学
  • 1,099 篇 管理学
    • 688 篇 管理科学与工程(可...
    • 447 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 257 篇 医学
    • 218 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 114 篇 药学(可授医学、理...
  • 142 篇 法学
    • 104 篇 社会学
  • 101 篇 经济学
  • 52 篇 农学
  • 45 篇 教育学
  • 21 篇 文学
  • 20 篇 军事学
  • 14 篇 艺术学

主题

  • 303 篇 laboratories
  • 300 篇 computer science
  • 236 篇 software enginee...
  • 140 篇 application soft...
  • 136 篇 data mining
  • 113 篇 computational mo...
  • 106 篇 feature extracti...
  • 95 篇 costs
  • 94 篇 quality of servi...
  • 92 篇 semantics
  • 88 篇 computer archite...
  • 83 篇 deep learning
  • 83 篇 algorithm design...
  • 81 篇 wireless sensor ...
  • 81 篇 software
  • 79 篇 testing
  • 78 篇 software systems
  • 77 篇 software testing
  • 76 篇 optimization
  • 76 篇 protocols

机构

  • 229 篇 state key labora...
  • 161 篇 college of compu...
  • 118 篇 department of co...
  • 96 篇 national enginee...
  • 70 篇 department of co...
  • 67 篇 school of softwa...
  • 66 篇 state key labora...
  • 64 篇 department of co...
  • 56 篇 department of co...
  • 52 篇 state key labora...
  • 48 篇 peng cheng labor...
  • 48 篇 national key lab...
  • 45 篇 shanghai key lab...
  • 43 篇 key laboratory o...
  • 43 篇 university of ch...
  • 39 篇 tsinghua nationa...
  • 35 篇 school of comput...
  • 31 篇 department of el...
  • 30 篇 department of co...
  • 30 篇 beijing key labo...

作者

  • 52 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 41 篇 junping du
  • 33 篇 mei-ling shyu
  • 33 篇 yu huiqun
  • 32 篇 shu-ching chen
  • 30 篇 shen furao
  • 30 篇 fan guisheng
  • 29 篇 zhao jian
  • 25 篇 chen shu-ching
  • 25 篇 baowen xu
  • 25 篇 zhou mengchu
  • 24 篇 yang yang
  • 22 篇 hamid soltanian-...
  • 21 篇 sylvain martel
  • 21 篇 xu baowen
  • 21 篇 zongli lin
  • 21 篇 buyya rajkumar
  • 20 篇 mengchu zhou
  • 20 篇 ji zhen

语言

  • 5,847 篇 英文
  • 696 篇 其他
  • 127 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering System Software Laboratory"
6667 条 记 录,以下是821-830 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Enhancing Low-Latency and High-Reliability Data Forwarding for In-Vehicle Time-Sensitive Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Sun, Haitong Zhang, Haijun Guan, Wanqing Liu, Xiangnan Ma, Hui Leung, Victor C.M. Hebei Key Laboratory of Space-Air-Ground Intelligent Communication China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing100083 China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm11428 Sweden Department of Computer Science and Software Engineering Shenzhen University Shenzhen518061 China
To satisfy the low delay, low jitter, and high success rate requirements for in-vehicle networks, IEEE 802.1 Task Group proposed Time-Sensitive Networking (TSN), which has aroused increasing attention in managing time... 详细信息
来源: 评论
Multi-Unit Floor Plan Recognition and Reconstruction Using Improved Semantic Segmentation of Raster-Wise Floor Plans
arXiv
收藏 引用
arXiv 2024年
作者: Kratochvila, Lukas de Jong, Gijs Arkesteijn, Monique Bilík, Šimon Zemčík, Tomáš Horak, Karel Rellermeyer, Jan S. Department of Control and Instrumentation Faculty of Electrical Engineering and Communication Brno University of Technology Brno Czech Republic Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science TU Delft Delft Netherlands Department of Management in the Built Environment Faculty of Architecture and the Built Environment TU Delft Delft Netherlands Computer Vision and Pattern Recognition Laboratory Department of Computational Engineering Lappeenranta-Lahti University of Technology LUT Lappeenranta Finland Dependable and Scalable Software Systems Institute of Systems Engineering Faculty of Electrical Engineering and Computer Science Leibniz University Hannover Hannover Germany
Digital twins have a major potential to form a significant part of urban management in emergency planning, as they allow more efficient designing of the escape routes, better orientation in exceptional situations, and... 详细信息
来源: 评论
FM-FCN:A Neural Network with Filtering Modules for Accurate Vital Signs Extraction
收藏 引用
Research 2025年 第1期2024卷 92-106页
作者: Fangfang Zhu Qichao Niu Xiang Li Qi Zhao Honghong Su Jianwei Shuai Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine and State Key Laboratory of Cellular Stress BiologyInnovation Center for Cell Signaling NetworkXiamen UniversityXiamen 361005China Vitalsilicon Technology Co.Ltd. JiaxingZhejiang 314006China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan 114051China Yangtze Delta Region Institute of Tsinghua University ZhejiangJiaxing 314006China Wenzhou Institute University of Chinese Academy of SciencesWenzhou 325001China Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health)Wenzhou 325001China
Neural networks excel at capturing local spatial patterns through convolutional modules,but they may struggle to identify and effectively utilize the morphological and amplitude periodic nature of physiological *** th... 详细信息
来源: 评论
Transparency Paths - Documenting the Diversity of User Perceptions  21
Transparency Paths - Documenting the Diversity of User Perce...
收藏 引用
29th ACM Conference on User Modeling, Adaptation and Personalization, UMAP 2021
作者: Giunchiglia, Fausto Kleanthous, Styliani Otterbacher, Jahna Draws, Tim Department of Information Engineering and Computer Science University of Trento Italy Open University of Cyprus and Cyens Centre of Excellence Cyprus Web Information System and Department of Software Technology Tu Delft Netherlands
We are living in an era of global digital platforms, eco-systems of algorithmic processes that serve users worldwide. However, the increasing exposure to diversity online - of information and users - has led to import... 详细信息
来源: 评论
Transformer-based Multi-Touch Attribution Model for Large-Scale Digital Advertising Paths
Transformer-based Multi-Touch Attribution Model for Large-Sc...
收藏 引用
computer Applications and Information Technology (ISCAIT), International Symposium on
作者: Jiehua Ren Fuqiang Zhou Miaomiao Zhang Leting Shentu School of Software Tongji University NAMI Laboratory Shanghai China Computer Science Department Zhongtian Experimental School Jinhua China School of Physics and Electronic Information Engineering Zhejiang Normal University Jinhua China
As digital advertising becomes more complex and widespread, traditional multi-touch attribution models and statistical methods often struggle to achieve high accuracy. While time-series deep learning models offer impr... 详细信息
来源: 评论
VARIATIONAL AUTO-ENCODER BASED SOLUTIONS TO INTERACTIVE DYNAMIC INFLUENCE DIAGRAMS
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Yinghui Ma, Biyang Zhang, Hanyi Zeng, Yifeng National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science Minnan Normal University Zhangzhou China Department of Computer and Information Sciences Northumbria University Newcastle United Kingdom
Addressing multiagent decision problems in AI, especially those involving collaborative or competitive agents acting concurrently in a partially observable and stochastic environment, remains a formidable challenge. W... 详细信息
来源: 评论
Performance Improvements of Machine Learning-Based Crime Prediction, A Case Study in Bangladesh
Performance Improvements of Machine Learning-Based Crime Pre...
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: SM Nuruzzaman Nobel S M Masfequier Rahman Swapno Md Babul Islam V. P. Meena Francesco Benedetto Dept. of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh Department of Computer Modeling Electronic and System Engineering UNICAL Rende Italy Department of EEE Amrita School of Engineering Bengaluru India Economics Dept SP4TE Laboratory University of ROMA TRE Via Silvio Italy
Crime observation examines information on criminal episodes to identify trends in their types, locations, and timing. Forecasting probable criminal activity in some places exploits previous data and data analysis to p... 详细信息
来源: 评论
Edge Intelligence-Based UAV Human Target Recognition with Improved YOLOV5 Algorithm  23
Edge Intelligence-Based UAV Human Target Recognition with Im...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Cai, Zeyu Qu, Yuben Dong, Chao College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space China Shanghai Jiao Tong University Department of Computer Science and Engineering China
Edge intelligent computing is often combined with the tasks of Unmanned Aerial Vehicle (UAV). Most applications of UAV require the location and identity information of human targets. Traditional human target detection... 详细信息
来源: 评论
Learning the continuous-time optimal decision law from discrete-time rewards
收藏 引用
National Science Open 2024年 第5期3卷 130-147页
作者: Ci Chen Lihua Xie Kan Xie Frank Leroy Lewis Yilu Liu Shengli Xie School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of EducationGuangzhou 510006China School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Guangzhou 510006China UTA Research Institute the University of Texas at ArlingtonFort Worth 76118USA Department of Electrical Engineering and Computer Science University of TennesseeKnoxville 37996USA Oak Ridge National Laboratory Oak Ridge 37830USA Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou 510006China
The concept of reward is fundamental in reinforcement learning with a wide range of applications in natural and social *** an interpretable reward for decision-making that largely shapes the system's behavior has ... 详细信息
来源: 评论