咨询与建议

限定检索结果

文献类型

  • 2,403 篇 会议
  • 1,128 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 3,627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,081 篇 工学
    • 1,446 篇 计算机科学与技术...
    • 1,088 篇 软件工程
    • 654 篇 信息与通信工程
    • 307 篇 电子科学与技术(可...
    • 279 篇 控制科学与工程
    • 273 篇 电气工程
    • 176 篇 生物工程
    • 136 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 120 篇 光学工程
    • 110 篇 机械工程
    • 104 篇 动力工程及工程热...
    • 74 篇 安全科学与工程
    • 72 篇 交通运输工程
    • 72 篇 网络空间安全
    • 64 篇 化学工程与技术
    • 60 篇 材料科学与工程(可...
  • 974 篇 理学
    • 510 篇 数学
    • 264 篇 物理学
    • 201 篇 生物学
    • 181 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 83 篇 化学
  • 512 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 197 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 168 篇 医学
    • 145 篇 临床医学
    • 114 篇 基础医学(可授医学...
    • 71 篇 公共卫生与预防医...
  • 95 篇 法学
    • 70 篇 社会学
  • 56 篇 经济学
  • 42 篇 教育学
  • 24 篇 农学
  • 13 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 232 篇 computer science
  • 98 篇 application soft...
  • 93 篇 protocols
  • 86 篇 quality of servi...
  • 85 篇 computational mo...
  • 75 篇 computer archite...
  • 75 篇 artificial intel...
  • 71 篇 machine learning
  • 66 篇 wireless sensor ...
  • 66 篇 distributed comp...
  • 64 篇 internet of thin...
  • 64 篇 resource managem...
  • 62 篇 computer network...
  • 59 篇 deep learning
  • 57 篇 software enginee...
  • 57 篇 mobile communica...
  • 57 篇 accuracy
  • 56 篇 monitoring
  • 56 篇 cloud computing
  • 55 篇 routing

机构

  • 44 篇 department of la...
  • 40 篇 department of in...
  • 36 篇 research institu...
  • 33 篇 distributed syst...
  • 31 篇 department of co...
  • 31 篇 graduate school ...
  • 26 篇 grid computing a...
  • 24 篇 department of el...
  • 22 篇 department of co...
  • 22 篇 state key labora...
  • 19 篇 institute of ult...
  • 18 篇 department of di...
  • 17 篇 school of comput...
  • 15 篇 peng cheng labor...
  • 15 篇 department of in...
  • 14 篇 distributed syst...
  • 14 篇 department of el...
  • 14 篇 department of in...
  • 13 篇 state key labora...
  • 13 篇 department of co...

作者

  • 64 篇 rajkumar buyya
  • 64 篇 leonard barolli
  • 62 篇 fatos xhafa
  • 48 篇 arjan durresi
  • 25 篇 shur m.s.
  • 24 篇 ryzhii m.
  • 24 篇 ryzhii v.
  • 23 篇 buyya rajkumar
  • 23 篇 otsuji t.
  • 22 篇 cahill vinny
  • 22 篇 v. cahill
  • 21 篇 akio koyama
  • 21 篇 reinhard german
  • 20 篇 dustdar schahram
  • 20 篇 kountouris mario...
  • 18 篇 tao yang
  • 18 篇 mitin v.
  • 16 篇 gjergji mino
  • 15 篇 cheng xiang
  • 15 篇 falko dressler

语言

  • 3,436 篇 英文
  • 147 篇 其他
  • 41 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Communication and Distributed Systems"
3627 条 记 录,以下是381-390 订阅
排序:
Towards Message Brokers for Generative AI: Survey, Challenges, and Opportunities
arXiv
收藏 引用
arXiv 2023年
作者: Saleh, Alaa Morabito, Roberto Tarkoma, Sasu Pirttikangas, Susanna Lovén, Lauri The Center for Ubiquitous Computing University of Oulu Finland The Department of Communication Systems EURECOM France The Department of Computer Science University of Helsinki Finland
In today’s digital world, Generative Artificial Intelligence (GenAI) such as Large Language Models (LLMs) is becoming increasingly prevalent, extending its reach across diverse applications. This surge in adoption ha... 详细信息
来源: 评论
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization  24th
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anony...
收藏 引用
24th International Conference on Web Information systems Engineering, WISE 2023
作者: You, Mingshan Ge, Yong-Feng Wang, Kate Wang, Hua Cao, Jinli Kambourakis, Georgios Institute for Sustainable Industries and Liveable Cities Victoria University Melbourne Australia School of Health and Biomedical Sciences RMIT University Melbourne Australia Department of Computer Science and Information Technology La Trobe University Melbourne Australia Department of Information and Communication Systems Engineering University of the Aegean Karlovasi Greece
Data anonymization is a fundamental and practical privacy-preserving data publication (PPDP) method, while searching for the optimal anonymization scheme using traditional methods has been proven to be NP-hard. Some r... 详细信息
来源: 评论
Performance Analysis and Early Detection of Lung Cancer with Spiking Neural Networks  5
Performance Analysis and Early Detection of Lung Cancer with...
收藏 引用
5th International Conference on Emerging systems and Intelligent Computing, ESIC 2025
作者: Ghatage, Annasab Krishna Sumitha, V. S. Priya Srinivasan, P. Muhammed Anshad, P.Y. Mallaiah, Badepally Murugan, A. Durai M.S. Ichalkaranji India Kg College of Arts and Science Department of Electronics and Communication Systems Tamilnadu Coimbatore India Sona College of Technology Department of Electronics and Communication Engineering Tamilnadu Salem India Mes Institute of Technology & Management Department of Computer Science Kerala India Cvr College of Engineering Department of Information Technology Telangana Hyderabad India M.Kumarasamy College of Engineering Department of Computer Science And Business Systems Karur India
Cancer of the lung occurs when non-native lung cells grow uncontrollably. The increased incidence of this disease has raised both sexes mortality rates. Lung cancer is a disease that cannot be eradicated, although its... 详细信息
来源: 评论
Comprehensive Overview of Multi-agent systems for Controlling Smart Grids
收藏 引用
CSEE Journal of Power and Energy systems 2022年 第1期8卷 115-131页
作者: Om Prakash Mahela Mahdi Khosravy Neeraj Gupta Baseem Khan Hassan Haes Alhelou Rajendra Mahla Nilesh Patel Pierluigi Siano Power System Planning Division Rajasthan Rajya Vidyut Prasaran Nigam Ltd.Jaipur-302005India Media Integrated Communication Laboratory Graduate School of EngineeringOsaka UniversityOsakaJapan Computer Science and Engineering Department Oakland UniversityRochesterUSA Department of Electrical and Computer Engineering Hawassa UniversityHawassa 1530Ethiopia Faculty of Mechanical and Electrical Engineering Tishreen UniversityLattakiaSyria Department of Electrical Engineering National Institute of Technology Kurukshetra Department of Management&Innovation Systems University of Salerno84084 SalernoItaly
Agents are intelligent entities that act flexibly and autonomously and make wise decisions based on their intelligence and experience.A multi-agent system(MAS)contains multiple,intelligent,and interconnected collabora... 详细信息
来源: 评论
Irregular sleep pattern identification and analysis from social media dataset using hybrid deep learning based attention mechanism
收藏 引用
Data and Information Management 2025年
作者: Islam, Mohammed Jawwadul Rafi, Mohammad Fahad Al Podder, Pranto Siddika, Aysha Kabir, Moumy Khan, Euna Mehnaz Islam, Najmul Mukta, Saddam Bangladesh LUT School of Engineering Science LUT University Finland Department of Computer and Systems Sciences Stockholm University Sweden Department of Computer Science and Engineering University of Minnesota United States Web Communication Design Information Technology University of Southern Denmark Denmark
Following an irregular bedtime routine and having different amounts of sleep each night might increase a person's risk of obesity, cardiovascular problems, high blood pressure, insulin levels, and other metabolic ... 详细信息
来源: 评论
Analyzing α-divergence in Gaussian Rate-Distortion-Perception Theory
Analyzing α-divergence in Gaussian Rate-Distortion-Percepti...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless communications (SPAWC)
作者: Martha V. Sourla Giuseppe Serra Photios A. Stavrou Marios Kountouris School of Electrical & Computer Engineering Technical University of Crete Chania Greece Communication Systems Department EURECOM France Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence (DaSCI) University of Granada Spain
The problem of the estimation of the information rate-distortion-perception function (RDPF), which is a relevant information-theoretic quantity in goal-oriented lossy compression and semantic information reconstructio... 详细信息
来源: 评论
Enabling Protection for Critical Infrastructure through Security and Privacy in the Industrial Internet of Things  9
Enabling Protection for Critical Infrastructure through Secu...
收藏 引用
9th International Conference on communication and Electronics systems, ICCES 2024
作者: Yasotha, B. Vijayanandh, T. Thirumoorthy, P. Priya, M.Sangeetha Sasidaran, S. Prakalya, S.B. Srmist Department of Data Science and Business Systems Kattankulathur India School of Computing Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science & Engineering Avadi Tamil Nadu Chennai India Dhanalakshmi College of Engineering Department of Electrical and Electronics Engineering Chennai India Chennai India Panimalar Engineering College Department of Information Technology Chennai600123 India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Electronics and Communication Engineering Chennai India
Industrial Internet of Things can improve critical infrastructure in energy, transportation, and manufacturing. However, IIoT device and system integration opened security weaknesses that bad actors may exploit, causi... 详细信息
来源: 评论
Towards a Transformer-Based Pre-trained Model for IoT Traffic Classification
Towards a Transformer-Based Pre-trained Model for IoT Traffi...
收藏 引用
IEEE Symposium on Network Operations and Management
作者: Bruna Bazaluk Mosab Hamdan Mustafa Ghaleb Mohammed S. M. Gismalla Flavio S. Correa da Silva Daniel Macêdo Batista Department of Computer Science University of São Paulo Brazil Interdisciplinary Research Center for Intelligent Secure Systems KFUPM Saudi Arabia Center for Communication Systems and Sensing KFUPM Saudi Arabia
The classification of IoT traffic is important to improve efficiency and security of IoT-based networks, and state-of-the-art classification methods are based on Deep Learning. However, most of the current results req... 详细信息
来源: 评论
Drone Gesture Control using OpenCV and Tello
Drone Gesture Control using OpenCV and Tello
收藏 引用
Conference on Information communication Technology and Society (ICTAS)
作者: Nokuthula Khoza Pius Owolawi Vusumuzi Malele Department of Computer Systems Engineering Faculty of Information and Communication Technology Soshanguve Campus Tshwane University of Technology Pretoria South Africa Unit for Data Science and Computing School of Computer Science and Information Systems Vanderbijlpark Campus North-West University Vanderbijlpark South Africa
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came...
来源: 评论
Towards a Transformer-Based Pre-trained Model for IoT Traffic Classification
arXiv
收藏 引用
arXiv 2024年
作者: Bazaluk, Bruna Hamdan, Mosab Ghaleb, Mustafa Gismalla, Mohammed S.M. da Silva, S. Flavio Correa Batista, Daniel Macêdo Department of Computer Science University of São Paulo Brazil Interdisciplinary Research Center for Intelligent Secure Systems KFUPM Saudi Arabia Center for Communication Systems and Sensing KFUPM Saudi Arabia
The classification of IoT traffic is important to improve the efficiency and security of IoT-based networks. As the state-of-the-art classification methods are based on Deep Learning, most of the current results requi... 详细信息
来源: 评论