咨询与建议

限定检索结果

文献类型

  • 2,637 篇 会议
  • 1,477 篇 期刊文献
  • 79 册 图书

馆藏范围

  • 4,193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,525 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,211 篇 软件工程
    • 873 篇 信息与通信工程
    • 475 篇 电子科学与技术(可...
    • 366 篇 电气工程
    • 321 篇 控制科学与工程
    • 228 篇 光学工程
    • 200 篇 生物工程
    • 191 篇 仪器科学与技术
    • 149 篇 生物医学工程(可授...
    • 136 篇 机械工程
    • 128 篇 动力工程及工程热...
    • 93 篇 交通运输工程
    • 81 篇 网络空间安全
    • 76 篇 化学工程与技术
    • 74 篇 材料科学与工程(可...
    • 74 篇 安全科学与工程
  • 1,272 篇 理学
    • 621 篇 数学
    • 445 篇 物理学
    • 235 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 146 篇 系统科学
    • 92 篇 化学
  • 573 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 190 篇 工商管理
  • 193 篇 医学
    • 165 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
  • 117 篇 法学
    • 95 篇 社会学
  • 55 篇 经济学
  • 43 篇 教育学
  • 27 篇 农学
  • 13 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 1 篇 哲学

主题

  • 120 篇 computer science
  • 90 篇 machine learning
  • 87 篇 protocols
  • 81 篇 computational mo...
  • 78 篇 internet of thin...
  • 77 篇 artificial intel...
  • 74 篇 accuracy
  • 71 篇 quality of servi...
  • 65 篇 feature extracti...
  • 62 篇 deep learning
  • 61 篇 computer network...
  • 59 篇 routing
  • 58 篇 wireless sensor ...
  • 58 篇 training
  • 54 篇 wireless communi...
  • 54 篇 bandwidth
  • 54 篇 mobile communica...
  • 52 篇 optimization
  • 51 篇 computer archite...
  • 51 篇 throughput

机构

  • 115 篇 state key labora...
  • 44 篇 department of la...
  • 40 篇 department of in...
  • 39 篇 state key labora...
  • 35 篇 research institu...
  • 32 篇 graduate school ...
  • 30 篇 department of co...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 25 篇 department of sy...
  • 23 篇 department of el...
  • 23 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 peng cheng labor...
  • 20 篇 state key labora...
  • 18 篇 institute of ult...
  • 16 篇 department of sy...
  • 16 篇 school of electr...
  • 14 篇 department of in...
  • 13 篇 state key labora...

作者

  • 65 篇 leonard barolli
  • 60 篇 fatos xhafa
  • 49 篇 arjan durresi
  • 47 篇 guo hong
  • 32 篇 reinhard german
  • 25 篇 shur m.s.
  • 24 篇 falko dressler
  • 24 篇 ryzhii m.
  • 24 篇 ryzhii v.
  • 23 篇 otsuji t.
  • 21 篇 akio koyama
  • 21 篇 xiang cheng
  • 20 篇 ksieniewicz pawe...
  • 20 篇 bartosz krawczyk
  • 20 篇 xingjun wang
  • 19 篇 tao yang
  • 19 篇 hong guo
  • 19 篇 zhang yichen
  • 19 篇 german reinhard
  • 18 篇 cheng xiang

语言

  • 3,709 篇 英文
  • 408 篇 其他
  • 75 篇 中文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Computer Networks and Communication Systems"
4193 条 记 录,以下是21-30 订阅
排序:
EDSA-Ensemble: an Event Detection Sentiment Analysis Ensemble Architecture
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1-18页
作者: PETRESCU, Alexandru TRUICA, Ciprian-Octavian APOSTOL, Elena-Simona PASCHKE, Adrian Computer Science and Engineering Department Faculty of Automatic Control and Computers National University of Science and Technology Politehnica Bucharest Bucharest Romania Fraunhofer Institute for Open Communication Systems Berlin Germany
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论
Hyperparameters Optimization Using GridSearchCV Method for TinyML Models  13th
Hyperparameters Optimization Using GridSearchCV Method for ...
收藏 引用
13th International Conference on Image Processing and communications, IP and C 2023, 13th International Conference on computer Recognition systems, CORES 2023
作者: Puślecki, Tobiasz Walkowiak, Krzysztof Department of Systems and Computer Networks Wroclaw University of Science and Technology Wroclaw Poland
The anticipated expansion of TinyML-related technologies will require methods for efficient ML model development. In this paper, we present a method for obtaining a set of ML models for TinyML systems that satisfies t... 详细信息
来源: 评论
Analysis of the Possibility to Employ Relationship Between the Problem Complexity and the Classification Quality as Model Optimization Proxy  13th
Analysis of the Possibility to Employ Relationship Betwee...
收藏 引用
13th International Conference on Image Processing and communications, IP and C 2023, 13th International Conference on computer Recognition systems, CORES 2023
作者: Komorniczak, Joanna Ksieniewicz, Pawel Woźniak, Michal Department of Systems and Computer Networks Wroclaw University of Science and Technology Wroclaw Poland
Bulk construction of pattern classifiers, whether for optimizing input data configurations or method hyperparameters, is a computationally highly complex task. The main problem is the prediction quality evaluation fun... 详细信息
来源: 评论
A Novel Framework for Gauging Information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Careful Resume: Design and Analysis with Picoquic over Satellite Paths  12
Careful Resume: Design and Analysis with Picoquic over Satel...
收藏 引用
12th Advanced Satellite Multimedia systems Conference and the 18th Signal Processing for Space communications Workshop, ASMS/SPSC 2025
作者: Hofstatter, Matthias Deutschmann, Jörg Secchi, Raffaello Fairhurst, Gorry German, Reinhard Friedrich-Alexander-Universität Erlangen-Nürnberg Computer Networks and Communication Systems Germany University of Aberdeen Department of Engineering United Kingdom
Slow Start increases the congestion window by doubling each round trip until congestion is detected. As a result, reaching optimal speed typically takes several round trip times, especially important in high bandwidth... 详细信息
来源: 评论
Game-Theoretic Approach for Integrated Sensing and Computation Offloading in Vehicular Edge networks: A Utility Maximization Design
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23694-23708页
作者: Wang, Lina Wu, Weihong Dai, Minghui Zh, Haijun University of Science and Technology Beijing department of Communication Engineering China Donghua University School of Computer Science and Technology Shanghai China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing China
In recent years, with the rapid development of the Internet of Vehicles (IoVs) and the widespread application of integrated sensing and communication (ISAC) in the IoVs, the integrated sensing and computation offloadi... 详细信息
来源: 评论
Leveraging power consumption for anomaly detection on IoT devices in smart homes
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14045-14056页
作者: Nimmy, K. Dilraj, M. Sankaran, Sriram Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, ... 详细信息
来源: 评论
Sem-AI: A Unique Framework for Sentiment Analysis and Opinion Mining Using Social Network Data
收藏 引用
SN computer science 2025年 第2期6卷 1-23页
作者: Maruthupandi, J. Sivakumar, S. Kumar, V. Senthil Srikaanth, P. Balaji Department of Computer Science and Engineering New Horizon College of Engineering Karnataka Bangalore India Department of Computer Science and Engineering SRM Institute of Science and Technology Tamilnadu Trichy India Department of Networks and Communication SRM Institute of Science and Technology Tamilnadu Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Chennai India
Social media has become an essential forum for people to share their thoughts and sentiments owing to the quick rise in mobile technology. Business and political organizations might benefit from understanding public s... 详细信息
来源: 评论
Wasserstein enabled Bayesian optimization of composite functions
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第8期14卷 11263-11271页
作者: Candelieri, Antonio Ponti, Andrea Archetti, Francesco Department of Economics Management and Statistics University of Milano-Bicocca Milan Italy Department of Computer Science Systems and Communication University of Milano-Bicocca Milan Italy
Bayesian optimization (BO) based on the Gaussian process model (GP-BO) has become the most used approach for the global optimization of black-box functions and computationally expensive optimization problems. BO has p... 详细信息
来源: 评论