咨询与建议

限定检索结果

文献类型

  • 3,302 篇 会议
  • 2,015 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,160 篇 工学
    • 1,978 篇 计算机科学与技术...
    • 1,528 篇 软件工程
    • 954 篇 信息与通信工程
    • 488 篇 电气工程
    • 472 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 190 篇 光学工程
    • 171 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 119 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 87 篇 网络空间安全
    • 84 篇 安全科学与工程
  • 1,649 篇 理学
    • 825 篇 数学
    • 556 篇 物理学
    • 315 篇 生物学
    • 251 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 129 篇 化学
  • 723 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 242 篇 医学
    • 196 篇 临床医学
    • 164 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 122 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 159 篇 computer network...
  • 138 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 87 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 79 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 64 篇 costs
  • 64 篇 machine learning

机构

  • 151 篇 national and kap...
  • 151 篇 centro brasileir...
  • 150 篇 istanbul technic...
  • 149 篇 yerevan physics ...
  • 148 篇 universidad iber...
  • 148 篇 university of sp...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 146 篇 indian institute...
  • 146 篇 charles universi...
  • 143 篇 university of de...
  • 141 篇 rwth aachen univ...
  • 141 篇 department of ph...
  • 139 篇 università di to...
  • 139 篇 imperial college...
  • 136 篇 infn sezione di ...
  • 135 篇 zhejiang univers...
  • 132 篇 department of ph...
  • 131 篇 università di ca...
  • 131 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,113 篇 英文
  • 149 篇 其他
  • 84 篇 中文
  • 9 篇 日文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5354 条 记 录,以下是91-100 订阅
排序:
Research on Security Data of Federated Learning Privacy LSTM Model Based on Generative Adversarial network
Research on Security Data of Federated Learning Privacy LSTM...
收藏 引用
2023 International Conference on Machine Learning and Cybernetics, ICMLC 2023
作者: Xu, Wang Zhuoming, Liang School of Computer Neusoft Institute Guangdong Department of Network Engineering China South China Nomal University Network Center China
As a new wireless transmission architecture technology, cSO can effectively reduce the influence of fading channels and provide cSO links for low channel quality. Secondly, in the ultra-large traffic cSO, The fitting ... 详细信息
来源: 评论
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT
收藏 引用
Digital Communications and networks 2023年 第4期9卷 836-845页
作者: Siguang Chen Bei Tang Kun Wang School of Internet of Things Nanjing University of Posts and TelecommunicationsNanjing210003China Jiangsu Engineering Research Center of Communications and Network Technology Nanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA90095USA
In view of the randomness distribution of multiple users in the dynamic large-scale Internet of Things(IoT)scenario,comprehensively formulating available resources for fog nodes in the area and achieving computation s... 详细信息
来源: 评论
Developing Real-World Applications with Algorithmic Intelligence in Reinforcement Learning for Robotics  2
Developing Real-World Applications with Algorithmic Intellig...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Bhanumathi, M. Sangeetha, M. Harin Fernandez, F. Mary Ganesh Ramachandran, A. Saravanan, S.K. Chennai India Department of Computer Engineering University of Technology and Applied Sciences Nizwa Oman Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computer Science Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computers Science and Engineering BigData and Network Security Saveetha School of Engineering Simats Tamil Nadu Chennai India
In the study, three leading reinforcement learning algorithms Deep Q-network (DQN), Proximal Policy Optimization (PPO) and Asynchronous Advantage Actor - Critic (A3Cc are applied in a number of real-world robotics tas... 详细信息
来源: 评论
VCApather: A network as a Service Solution for Video Conference Applications  34
VCApather: A Network as a Service Solution for Video Confere...
收藏 引用
34th Workshop on network and Operating System Support for Digital Audio and Video, NOSSDAV 2024
作者: He, Dongbiao Lin, Canshu Yu, Xian Westphal, Cedric Ming, Zhongxing Cui, Laizhong Zhou, Xu Garcia-Luna-Aceves, J.J. Sangfor Technologies Inc China College of Computer Science and Software Engineering Shenzhen University China Computer Network Information Center Chinese Academy of Sciences China China Electrical and Computer Engineering Department University of Toronto Canada Futurewei
We propose a network service as a solution for video conference applications by constructing network layer routing strategies. Our approach takes into account the characteristics of conferencing flows, addresses vario... 详细信息
来源: 评论
Advancements in Object Detection for Accurate and Efficient Visual Recognition Using Machine Learning  2
Advancements in Object Detection for Accurate and Efficient ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Fernandez, F. Mary Harin Ramachandran, A. Ganesh Saravanan, S.K. Bhanumathi, M. Sangeetha, M. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computer Science Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computers Science and Engineering BigData and Network Security Saveetha School of Engineering SIMATS Tamil Nadu Chennai India Chennai India Computer Engineering Department University of Technology and Applied Sciences Nizwa Oman
Object detection in images and videos is a vital task in computer vision where its application goes beyond the automobile driving and surveillance, to healthcare. The paper introduces an object detection model which i... 详细信息
来源: 评论
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wireless Sensor networks
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wire...
收藏 引用
2024 International Conference on Distributed Systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Chaturvedi, Abhay Kukreti, Sanjeev Durga Bhavani, A. Nizampatnam, Venkata Naga Ravi Kiran Kaur, Davinder Natrayan, L. Gla University Department of Electronics & Communication Engineering Chaumuhan India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Bms Institute of Technology and Management Department of Computer Science and Engineering Bengaluru India Expert Network Security Engineer Acxiom Llc Department of Computer Networks AustinTX United States Symbiosis Law School Department of Law Pune India Saveetha School of Engineering Simats Department of Mechanical Engineering Kuthambakkam India
Important fields including healthcare, environmental monitoring, and military operations are seeing a rise in the use of wireless sensor networks (WSNs). But they are susceptible to complex cyber dangers, especially z... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
Modeling and Performance Analysis of UAV-Aided Millimeter Wave Cellular networks with Stochastic Geometry
收藏 引用
China Communications 2024年 第6期21卷 146-162页
作者: Li Junruo Wang Yuanjie Cui Qimei Hou Yanzhao Tao Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and TelecommunicationsBeijing 100876China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China Department of Broadband Communication Peng Cheng LaboratoryShenzhen 518055China
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G *** leveraging the power of stochastic... 详细信息
来源: 评论
Biometric Identification Systems with Both Chosen and Generated Secret Keys by Allowing Correlation
Biometric Identification Systems with Both Chosen and Genera...
收藏 引用
作者: Yachongka, Vamoua Yagi, Hideki Department of Electrical and Computer Engineering Yokohama National University Yokohama-shi240-8501 Japan Department of Computer and Network Engineering the University of Electro-Communications Chofushi182-8585 Japan
We propose a biometric identification system where the chosen- and generated-secret keys are used simultaneously, and investigate its fundamental limits from information theoretic perspectives. The system consists of ... 详细信息
来源: 评论
Explainable Artificial Intelligence in Drones: A Brief Review  14
Explainable Artificial Intelligence in Drones: A Brief Revie...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Banimelhem, Omar Al-Khateeb, Baghdad Jordan University of Science and Technology Department of Network Engineering and Security Irbid Jordan Jordan University of Science and Technology Department of Computer Engineering Irbid Jordan
The lack of clarity of most artificial intelligence algorithms which have many applications has led to the emergence of explainable artificial intelligence (XAI), which includes machine learning algorithms that introd... 详细信息
来源: 评论