咨询与建议

限定检索结果

文献类型

  • 3,234 篇 期刊文献
  • 2,932 篇 会议
  • 80 册 图书

馆藏范围

  • 6,246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,065 篇 工学
    • 1,567 篇 计算机科学与技术...
    • 1,165 篇 软件工程
    • 550 篇 信息与通信工程
    • 463 篇 电子科学与技术(可...
    • 454 篇 电气工程
    • 358 篇 控制科学与工程
    • 265 篇 核科学与技术
    • 253 篇 生物工程
    • 238 篇 光学工程
    • 236 篇 生物医学工程(可授...
    • 225 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 158 篇 机械工程
    • 157 篇 材料科学与工程(可...
    • 127 篇 动力工程及工程热...
    • 117 篇 力学(可授工学、理...
    • 96 篇 冶金工程
  • 2,932 篇 理学
    • 1,769 篇 物理学
    • 790 篇 数学
    • 374 篇 生物学
    • 327 篇 化学
    • 281 篇 统计学(可授理学、...
    • 197 篇 地球物理学
    • 176 篇 系统科学
  • 545 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 171 篇 工商管理
  • 257 篇 医学
    • 214 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 73 篇 法学
  • 69 篇 农学
  • 62 篇 经济学
  • 55 篇 教育学
  • 15 篇 文学
  • 6 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学
  • 2 篇 艺术学

主题

  • 544 篇 computer science
  • 235 篇 hadron colliders
  • 116 篇 application soft...
  • 98 篇 computational mo...
  • 95 篇 hadrons
  • 93 篇 hardware
  • 91 篇 costs
  • 85 篇 computer archite...
  • 83 篇 higgs bosons
  • 83 篇 machine learning
  • 82 篇 delay
  • 78 篇 neural networks
  • 78 篇 algorithm design...
  • 77 篇 bandwidth
  • 74 篇 protocols
  • 71 篇 particle decays
  • 71 篇 artificial intel...
  • 68 篇 throughput
  • 68 篇 proton-proton in...
  • 63 篇 switches

机构

  • 1,028 篇 department of ph...
  • 1,028 篇 cavendish labora...
  • 985 篇 physikalisches i...
  • 981 篇 oliver lodge lab...
  • 636 篇 infn sezione di ...
  • 624 篇 infn laboratori ...
  • 619 篇 fakultät physik ...
  • 616 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 577 篇 school of physic...
  • 571 篇 horia hulubei na...
  • 551 篇 school of physic...
  • 549 篇 iccub universita...
  • 546 篇 h.h. wills physi...
  • 539 篇 department of ph...
  • 532 篇 imperial college...
  • 525 篇 nikhef national ...
  • 522 篇 stfc rutherford ...
  • 518 篇 university of ch...
  • 514 篇 school of physic...

作者

  • 273 篇 barter w.
  • 264 篇 a. gomes
  • 257 篇 beiter a.
  • 249 篇 c. alexa
  • 249 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 245 篇 blake t.
  • 243 篇 bellee v.
  • 242 篇 d. calvet
  • 240 篇 c. amelung
  • 236 篇 bowcock t.j.v.
  • 234 篇 g. spigo
  • 233 篇 f. siegert
  • 233 篇 brundu d.
  • 231 篇 betancourt c.
  • 230 篇 borsato m.
  • 230 篇 s. chen
  • 227 篇 amato s.
  • 225 篇 bencivenni g.

语言

  • 5,954 篇 英文
  • 258 篇 其他
  • 35 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer Science&Computer Engineering La Trobe University"
6246 条 记 录,以下是421-430 订阅
排序:
Neuronal Modeling Tool Using DynaSim  5
Neuronal Modeling Tool Using DynaSim
收藏 引用
5th IEEE Research and Applications of Photonics in Defense Conference, RAPID 2022
作者: Gieser, Anna Vitola, Sabina Enochson, Avery Wolf, Henry Striker, Ryan Cleveland, Jerika Braaten, Benjamin D. Ewert, Daniel Mitra, Dipankar Allen, Jeffery Allen, Monica North Dakota State University Department of Electrical and Computer Engineering Fargo United States Minnesota State University Bell Program Department of Integrated Engineering MankatoMN United States Program of Minnesota State University Department of Integrated Engineering at Iron Range Engineering MankatoMN United States University of Wisconsin - la Crosse Department of Computer Science and Computer Engineering La CrosseWI United States Munitions Directorate Air Force Research Laboratory Eglin Air Force Base FL32542 United States
Human cognitive processes remain an area of strong interest and ongoing research. One tool to gain greater insight into this process is neuronal modeling. The following features are desirable in a neuronal modeling to... 详细信息
来源: 评论
laSE: A Forward-Looking Item Selection Strategy for CD-CAT
LASE: A Forward-Looking Item Selection Strategy for CD-CAT
收藏 引用
Machine Intelligence Theory and Applications (MiTA), International Conference on
作者: Xi Cao Lijun Yin Ying Lin Jun Zhang Department of Computer Science and Information Technology La Trobe University Melbourne Australia Department of Psychology Sun Yat-sen University Guangzhou China Hanyang University Seoul South Korea Nankai University Tianjin China
Cognitive diagnostic computerized adaptive testing (CD-CAT) is a cutting-edge testing approach in educational environments. It combines the merits of computerized adaptive testing (CAT) and cognitive diagnosis models ... 详细信息
来源: 评论
Cryptanalysis of TRUTH: Fixing a Protocol to Make it 5G-Compliant
Cryptanalysis of TRUTH: Fixing a Protocol to Make it 5G-Comp...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: J. Munilla M. Burmester P. Caballero-Gil Dpt. of Telecommunication Engineering University of Málaga Málaga Spain Department of Computer Science Florida State Unviersity Tallahassee Florida USA Dept. of Computer Science and AI University of La Laguna La Laguna Tenerife Spain
Trust and security are critical deployment require-ments for Industrial Internet of Things (IIoT) networks. A recent protocol, called TRUTH, integrates security mechanisms for authentication and privacy alongside a De... 详细信息
来源: 评论
A First Order Meta Stackelberg Method for Robust Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Pan, Yunian Li, Tao Li, Henger Xu, Tianyi Zheng, Zizhan Zhu, Quanyan Department of Electrical and Computer Engineering New YorkNY United States Department of Computer Science Tulane University New OrleansLA United States
Previous research has shown that federated learning (FL) systems are exposed to an array of security risks. Despite the proposal of several defensive strategies, they tend to be non-adaptive and specific to certain ty... 详细信息
来源: 评论
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation
MDDE: multitasking distributed differential evolution for pr...
收藏 引用
作者: Ge, Yong-Feng Orlowska, Maria Cao, Jinli Wang, Hua Zhang, Yanchun Department of Computer Science and Information Technology La Trobe University Melbourne Australia Faculty of Information Technology Polish-Japanese Academy of Information Technology Warsaw Poland Institute for Sustainable Industries and Liveable Cities Victoria University Footscray Australia
Database fragmentation has been used as a protection mechanism of database’s privacy by allocating attributes with sensitive associations into separate data fragments. A typical relational database consists of multip... 详细信息
来源: 评论
Optimizing Privacy and Utility Tradeoffs for Group Interests Through Harmonization
arXiv
收藏 引用
arXiv 2024年
作者: Mandal, Bishwas Amariucai, George Wei, Shuangqing Department of Computer Science Kansas State University ManhattanKS66506 United States Division of Electrical & Computer Engineering Louisiana State University Baton RougeLA70803 United States
We propose a novel problem formulation to address the privacy-utility tradeoff, specifically when dealing with two distinct user groups characterized by unique sets of private and utility attributes. Unlike previous s...
来源: 评论
Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4
arXiv
收藏 引用
arXiv 2024年
作者: Mandal, Bishwas Amariucai, George Wei, Shuangqing Department of Computer Science Kansas State University ManhattanKS66506 United States Division of Electrical & Computer Engineering Louisiana State University Baton RougeLA70803 United States
We investigate the application of large language models (LLMs), specifically GPT-4, to scenarios involving the tradeoff between privacy and utility in tabular data. Our approach entails prompting GPT-4 by transforming... 详细信息
来源: 评论
Deadline-aware workload scheduling for edge-enhanced iot devices: A blockchain-enabled approach to incentive-based computing
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷
作者: Chaudhry, Muhammad Tayyab Yousafzai, Abdullah Zia, Ali Abid, Shahbaz Akhtar Ahmad, Farooq Department of Computer Science COMSATS University Islamabad Punjab Lahore Pakistan Artificial Intelligence and Cyber Futures Institute Charles Sturt University BathurstNSW2795 Australia Australian National University CanberraACT Australia School of Computing Engineering and Mathematical Sciences La Trobe University MelbourneNSW Australia
This paper explore Blockchain-enabled incentive-driven workload scheduling for deadline-sensitive computational tasks over edge devices in mission critical applications such as healthcare, autonomous vehicles, and sma... 详细信息
来源: 评论
Distributed Signal Strength Prediction using Satellite Map empowered by Deep Vision Transformer
Distributed Signal Strength Prediction using Satellite Map e...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Yu, Haiyao Hou, Zhanwei Gu, Yifan Cheng, Peng Ouyang, Wanli Li, Yonghui Vucetic, Branka University of Sydney School of Electrical and Information Engineering SydneyNSW Australia Computer Science & Information Technology La Trobe University MelbourneVIC Australia
The accurate prediction of received signal strength (RSS) is the key to coverage optimization and interference management in network planning, as well as proactive resource allocation and anticipated network managemen... 详细信息
来源: 评论
Deep Learning-based Wildfire Smoke Detection using Uncrewed Aircraft System Imagery
Deep Learning-based Wildfire Smoke Detection using Uncrewed ...
收藏 引用
International Conference on Ubiquitous Robots (UR)
作者: Khan Raqib Mahmud Lingxiao Wang Xiyuan Liu L. Jiahao Sunzid Hassan Computer Science Department Louisiana Tech University Ruston LA USA Electrical Engineering Department Louisiana Tech University Ruston LA USA Mathematics and Statistics Department Louisiana Tech University Ruston LA USA
Recent years have seen notable advancements in wildfire smoke detection, particularly in Uncrewed Aircraft Systems (UAS)-based detection employing diverse deep learning (DL) approaches. Despite the promise exhibited b... 详细信息
来源: 评论