咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,002 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,189 篇 工学
    • 1,975 篇 计算机科学与技术...
    • 1,519 篇 软件工程
    • 955 篇 信息与通信工程
    • 490 篇 电气工程
    • 485 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 169 篇 仪器科学与技术
    • 150 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 116 篇 材料科学与工程(可...
    • 91 篇 核科学与技术
    • 87 篇 网络空间安全
  • 1,649 篇 理学
    • 834 篇 数学
    • 557 篇 物理学
    • 315 篇 生物学
    • 261 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 130 篇 化学
  • 720 篇 管理学
    • 478 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 240 篇 医学
    • 196 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 120 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 160 篇 computer network...
  • 137 篇 computer science
  • 116 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 computational mo...
  • 70 篇 routing
  • 68 篇 delay
  • 67 篇 resource managem...
  • 66 篇 costs
  • 65 篇 monitoring
  • 64 篇 feature extracti...
  • 63 篇 machine learning

机构

  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 138 篇 department of ph...
  • 136 篇 università di to...
  • 136 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 128 篇 università di ca...
  • 127 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 4,854 篇 英文
  • 410 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5352 条 记 录,以下是1171-1180 订阅
排序:
Use Coupled LSTM networks to Solve Constrained Optimization Problems
Use Coupled LSTM Networks to Solve Constrained Optimization ...
收藏 引用
作者: Chen, Zheyu Leung, Kin K. Wang, Shiqiang Tassiulas, Leandros Chan, Kevin Towsley, Don Imperial College London Department of Computing LondonSW7 2AZ United Kingdom Ibm T.J. Watson Research Center Yorktown HeightsNY10598 United States Yale University Institute for Network Science Electrical Engineering Department New HavenCT06520 United States Devcom Army Research Laboratory Army Research Directorate AdelphiMD20783 United States University of Massachusetts Department of Computer Science AmherstMA01003 United States
Gradient-based iterative algorithms have been widely used to solve optimization problems, including resource sharing and network management. When system parameters change, it requires a new solution independent of the... 详细信息
来源: 评论
A smart monitoring system of water distribution network towards IoT platform
A smart monitoring system of water distribution network towa...
收藏 引用
International Conference on Green Energy, Computing and Intelligent Technology (GEn-CITy 2023)
作者: R. Ramli H. Razalli N. M. Sapari Computer Science University of Southampton Malaysia 79100 Iskandar Puteri Johor Malaysia Emerging Technology Lead Group Network Technology Telekom Malaysia Berhad Cyberjaya Malaysia Department of Electrical Power Engineering Faculty of Electrical Engineering Universiti Teknologi Malaysia 81310 Johor Bharu Johor Malaysia
Pipeline systems oversee the transportation of important materials like water, gas, and oil. If such pipe systems are exposed to any trouble, a big economic loss, as well as environmental damages, are being produced. ...
来源: 评论
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi networks
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yuxiang Feng, Xuewei Li, Qi Sun, Kun Wang, Ziqiang Xu, Ke Department of Computer Science and Technology & BNRist Tsinghua University China Institute for Network Sciences and Cyberspace & BNRist Tsinghua University China Zhongguancun Lab China Department of Information Sciences and Technology & CSIS George Mason University United States School of Cyber Science and Engineering Southeast University Bangladesh
In this paper, we uncover a new side-channel vulnerability in the widely used NAT port preservation strategy and an insufficient reverse path validation strategy of Wi-Fi routers, which allows an off-path attacker to ... 详细信息
来源: 评论
Office Building Energy Community: A Case Study on Optimal Market Operation and Grid Impact
Office Building Energy Community: A Case Study on Optimal Ma...
收藏 引用
IEEE International Smart Cities Conference (ISC2)
作者: Juhani Lepistö Jovana Forcan Miodrag Forcan Pirjo Heine Helen Electricity Network Helsinki Finland Department of Computer Science and Systems University of East Sarajevo Faculty of Philosophy East Sarajevo Bosnia and Herzegovina Department of Electroenergetics University of East Sarajevo Faculty of Electrical Engineering East Sarajevo Bosnia and Herzegovina
In this paper, we study an office building connected to an urban distribution network from an energy community perspective. The office building and its electrical equipment have a real-world counterpart from which we ...
来源: 评论
Improving Quality of Experience in Cloud Gaming Using Speculative Execution
Improving Quality of Experience in Cloud Gaming Using Specul...
收藏 引用
International Conference on Mobile Computing and Ubiquitous networking (ICMU)
作者: Takumasa Ishioka Tatsuya Fukui Ryouhei Tsugami Toshihito Fujiwara Satoshi Narikawa Takuya Fujihashi Shunsuke Saruwatari Takashi Watanabe Graduate School of Information Science and Technology Osaka University Japan Department of Information and Computer Science Faculty of Engineering Kyoto Tachibana University Japan NTT Access Network Service Systems Laboratories NTT Corporation Japan
Cloud gaming has surged in popularity with the rise of mobile games. Cloud gaming systems allow players to enjoy the latest high-performance games from any location on their mobile devices. However, cloud gaming prese...
来源: 评论
Social Bots: Detection and Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Kai-Cheng Varol, Onur Nwala, Alexander C. Sayyadiharikandeh, Mohsen Ferrara, Emilio Flammini, Alessandro Menczer, Filippo Luddy School of Informatics Computing and Engineering Indiana University Bloomington United States Network Science Institute Northeastern University United States Faculty of Engineering and Natural Sciences Sabanci University Turkey Department of Applied Science William & Mary United States Thomas Lord Department of Computer Science University of Southern California United States
While social media are a key source of data for computational social science, their ease of manipulation by malicious actors threatens the integrity of online information exchanges and their analysis. In this Chapter,... 详细信息
来源: 评论
User-Centric Data Management in Decentralized Internet of Behaviors System
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Shiqi Wu, Dapeng Wang, Honggang Wang, Ruyan School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China China Chongqing Key Laboratory of Ubiquitous Sensing and Networking China Department of Graduate Computer Science and Engineering Katz School of Science and Health Yeshiva University in New York City United States
The Internet of Behaviors (IoB) is an emerging concept that utilizes devices to collect human behavior and provide intelligent services. Although some research has focused on human behavior analysis and data collectio... 详细信息
来源: 评论
Distributed Beamforming Based Wireless Power Transfer:Analysis and Realization
收藏 引用
Tsinghua Science and Technology 2020年 第6期25卷 758-775页
作者: Xiaoran Fan Han Ding Yanyong Zhang Wade Trappe Zhu Han Rich Howard the Wireless Information Network Laboratory(WINLAB) Rutgers UniversityNew BrunswickNJ 08901USA the Department of Computer Science and Technology Xi'an Jiaotong UniversityXi'an 710049China the Department of Computer Science and Technology University of Science and Technology of ChinaHefei 230052China the Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA.
This paper presents a new Wireless Power Transfer(WPT)approach by aligning the phases of a group of spatially distributed Radio Frequency(RF)transmitters(TX)at the target receiver(RX)*** approach can transfer energy o... 详细信息
来源: 评论
Enhancing Data Security With Adaptive ECC-Based Encryption: A Resource-Aware Approach
收藏 引用
SECURITY AND PRIVACY 2025年 第4期8卷
作者: Fursan Thabit Ozgu Can Chrysostomos Chrysostomou A National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing China Department of Computer Engineering Faculty of Engineering Ege University Izmir Turkey Department of Electrical Engineering Computer Engineering and Informatics Frederick University Nicosia Cyprus
Financial agencies need to safeguard confidential information and mitigate the risks associated with data leakage. Data hosted on cloud servers must be protected by robust security measures. To achieve this objective,... 详细信息
来源: 评论
AlignVE: Visual Entailment Recognition Based on Alignment Relations
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Biwei Cao, Jiuxin Gui, Jie Shen, Jiayun Liu, Bo He, Lei Tang, Yuan Yan Kwok, James Tin-Yau The School of Cyber Science and Engineering Southeast University Nanjing211189 China The Key Laboratory of Computer Network and Information Ministry of Education of China Nanjing211189 China Purple Mountain Laboratories Nanjing210000 China The School of Computer Science and Engineering Southeast University Nanjing211189 China Information Engineering University China The Department of Computer and Information Science University of Macao 999078 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology 999077 Hong Kong
Visual entailment (VE) is to recognize whether the semantics of a hypothesis text can be inferred from the given premise image, which is one special task among recent emerged vision and language understanding tasks. C... 详细信息
来源: 评论