咨询与建议

限定检索结果

文献类型

  • 15,581 篇 会议
  • 10,029 篇 期刊文献
  • 439 册 图书

馆藏范围

  • 26,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,258 篇 工学
    • 9,654 篇 计算机科学与技术...
    • 7,732 篇 软件工程
    • 3,282 篇 信息与通信工程
    • 3,061 篇 控制科学与工程
    • 2,141 篇 电气工程
    • 1,837 篇 电子科学与技术(可...
    • 1,653 篇 生物工程
    • 1,320 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 992 篇 光学工程
    • 807 篇 动力工程及工程热...
    • 794 篇 仪器科学与技术
    • 702 篇 化学工程与技术
    • 616 篇 材料科学与工程(可...
    • 556 篇 安全科学与工程
    • 545 篇 交通运输工程
  • 8,769 篇 理学
    • 4,521 篇 数学
    • 2,332 篇 物理学
    • 1,975 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 816 篇 化学
  • 3,826 篇 管理学
    • 2,522 篇 管理科学与工程(可...
    • 1,433 篇 图书情报与档案管...
    • 1,285 篇 工商管理
  • 1,388 篇 医学
    • 1,155 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 564 篇 药学(可授医学、理...
    • 512 篇 公共卫生与预防医...
  • 705 篇 法学
    • 579 篇 社会学
  • 462 篇 经济学
  • 312 篇 教育学
  • 277 篇 农学
  • 71 篇 文学
  • 54 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,115 篇 computer science
  • 482 篇 deep learning
  • 354 篇 systems engineer...
  • 341 篇 computational mo...
  • 336 篇 machine learning
  • 323 篇 artificial intel...
  • 317 篇 application soft...
  • 289 篇 computer archite...
  • 264 篇 control systems
  • 261 篇 internet of thin...
  • 236 篇 support vector m...
  • 232 篇 feature extracti...
  • 214 篇 optimization
  • 208 篇 neural networks
  • 208 篇 accuracy
  • 200 篇 software enginee...
  • 198 篇 information syst...
  • 195 篇 training
  • 193 篇 laboratories
  • 183 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 44 篇 department of co...
  • 44 篇 department of el...
  • 43 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 38 篇 department of in...
  • 38 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 academy of mathe...
  • 30 篇 department of in...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 91 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 42 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 35 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 26 篇 hong choong seon
  • 26 篇 jiang liu
  • 26 篇 shen xuemin
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 20 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 bentahar jamal
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,920 篇 英文
  • 880 篇 其他
  • 215 篇 中文
  • 32 篇 日文
  • 6 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Systems Science"
26049 条 记 录,以下是111-120 订阅
排序:
Advanced Air Mobility: Innovations, Applications, Challenges, and Future Potential
收藏 引用
Journal of Air Transportation 2025年 第2期33卷 169-187页
作者: Raza, Waleed Renkhoff, Justus Ogirimah, Olayemi Bawa, Gurvir Kaur Stansbury, Richard S. Department of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Daytona BeachFL32114 United States Department of Information Systems University of Maryland BaltimoreMD21250 United States
来源: 评论
Private Inference in Quantized Models
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3957-3973页
作者: Deng, Zirui Ramkumar, Vinayak Bitar, Rawad Raviv, Netanel Washington University in St. Louis Department of Computer Science and Engineering St. LouisMO63130 United States Tel Aviv University Department of Electrical Engineering-Systems Tel Aviv-Yafo6997801 Israel Institute for Communications Engineering Technical University of Munich Munich80333 Germany
A typical setup in many machine learning scenarios involves a server that holds a model and a user that possesses data, and the challenge is to perform inference while safeguarding the privacy of both parties. Private... 详细信息
来源: 评论
Multi-Mode Inflow Prediction for Urban Transportation systems  14th
Multi-Mode Inflow Prediction for Urban Transportation System...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Hung, Chih-Chieh Hung, Min-Hsien Chang, Jia-Wei Department of Management Information Systems National Chung Hsing University Taichung Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung Taiwan
Traffic congestion poses significant challenges to modern cities, leading to increased energy use, pollution, and long commute times. Optimizing public transit systems and encouraging their use is an effective solutio... 详细信息
来源: 评论
Using Local Gradient Compensation in Federated Learning for Improving Privacy and Performance  14th
Using Local Gradient Compensation in Federated Learning for ...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Chang, Jia-Wei Chen, Wei-Cheng Hung, Chih-Chieh Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung Taiwan Department of Management Information Systems National Chung Hsing University Taichung Taiwan
Federated learning (FL) has emerged as a leading approach for decentralized model training, preserving data privacy by exchanging only model parameters. However, recent studies have exposed vulnerabilities, revealing ... 详细信息
来源: 评论
Wavelet-Enhanced Deep Learning Ensemble for Accurate Stock Market Forecasting: A case study of Nifty 50 Index
收藏 引用
IEEE Access 2025年 13卷 87036-87047页
作者: Singh, Priya Jha, Manoj Patel, Harshita Maulana Azad National Institute of Technology Department of Mathematics Bioinformatics & Computer Applications Bhopal 462003 India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Portfolio theory underpins portfolio management, a much-researched yet uncharted field. Stock market prediction is a challenging and essential endeavour in financial research, owing to the nonlinear, volatile, and sto... 详细信息
来源: 评论
Adaptive Quantum and Graph-Attentive Security Framework for DoS Attack Mitigation in VANETs  2
Adaptive Quantum and Graph-Attentive Security Framework for ...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Anjum, Asma Rao, P. S. V. Srinivasa Sindhu, M. Bhatt, Pooja Priya, M.R. Maranan, Ramya HKBK College of Engineering Department of Computer Science and Engineering Karnataka Bengaluru560045 India Joginpally B R Engineering College Department of Computer Science and Engineering Telangana Hyderabad500075 India R.M.K Engineering College Department of Computer Science and Business Systems Tamil Nadu Thiruvallur601206 India Parul institute of Engineering and Technology Parul University Computer Science and Engineering Faculty of Engineering and Technology Post Limda Gujarat 391760 India NIE First Grade College Department of Computer Science Karnataka Mysuru570008 India Saveetha School of Engineering SIMATS Department of Research and Innovation Tamil Nadu Chennai602105 India
Vehicular Ad Hoc Networks (VANETs) are considered crucial for real-time vehicle-to-vehicle communication, which in turn enhances the efficiency of traffic and road safety. VANETs are very vulnerable to Denial-of-Servi... 详细信息
来源: 评论
Remote Patient Healthcare Monitoring and Pose Recognition over Video Sensors
收藏 引用
Traitement du Signal 2025年 第2期42卷 995-1005页
作者: Alabdullah, Bayan Tayyab, Muhammad Alhasson, Haifa F. Alshammari, Naif S. Jalal, Ahmad Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia Department of Computer Science Air University Islamabad44000 Pakistan Department of Information Technology College of Computer Qassim University Buraydah52571 Saudi Arabia Department of Computer Sciences College of Computer and Information Sciences Majmaah University Majmaah11952 Saudi Arabia Department of Computer Science and Engineering College of Informatics Korea University Seoul02841 Korea Republic of
Considering the fact of increasing population and as a result, the number of patients is constantly increasing the delivery of medical services must be prompt and of good quality. There is no question that any perfect... 详细信息
来源: 评论
Towards Securing Water systems Communications from Adversarial Attacks using AI Assurance  5
Towards Securing Water Systems Communications from Adversari...
收藏 引用
5th IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2025
作者: Yardimci, Mehmet Oguz Batarseh, Feras A. Virginia Tech Department of Computer Science ArlingtonVA United States Virginia Tech Department of Biological Systems Engineering ArlingtonVA United States
Water systems are increasingly susceptible to cyberattacks due to their reliance on networked communications for monitoring and control. This paper introduces an AI-Assured approach to detect anomalies in water distri... 详细信息
来源: 评论
Generalized Two-Point Visual Control Model of Human Steering for Accurate State Estimation1
收藏 引用
ASME Letters in Dynamic systems and Control 2025年 第1期5卷 011004页
作者: Mai, Rene E. Sears, Katherine Roessling, Grace Julius, Agung Mishra, Sandipan Department of Mechanical Aerospace and Nuclear Engineering Rensselaer Polytechnic Institute TroyNY12180 United States Department of Cognitive Science Rensselaer Polytechnic Institute TroyNY12180 United States Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute TroyNY12180 United States
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either ins... 详细信息
来源: 评论
"There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age  18th
"There is a Damn Hello on the Social Media!" Insights into P...
收藏 引用
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024
作者: Große, Christine Division of Computer Science Electrical and Space Engineering Department of Digital Services and Systems Luleå University of Technology Luleå971 87 Sweden
The ability to handle threats, such as disinformation, manipulation of public opinion, and disruption of critical supplies, is becoming increasingly important, thus, necessitating, among other strategies, efforts to e... 详细信息
来源: 评论