咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 31 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 100 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 40 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 17 篇 信息与通信工程
    • 7 篇 生物工程
    • 6 篇 光学工程
    • 6 篇 控制科学与工程
    • 4 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
  • 27 篇 理学
    • 17 篇 数学
    • 9 篇 生物学
    • 6 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 2 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 3 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 4 篇 法学
    • 4 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学

主题

  • 12 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 routing
  • 7 篇 pervasive comput...
  • 6 篇 target tracking
  • 5 篇 peer to peer com...
  • 5 篇 computer network...
  • 5 篇 delay
  • 5 篇 telecommunicatio...
  • 4 篇 optimization
  • 4 篇 social network s...
  • 4 篇 trajectory
  • 4 篇 costs
  • 4 篇 security
  • 4 篇 wireless network...
  • 3 篇 conferences
  • 3 篇 us government
  • 3 篇 application soft...
  • 3 篇 network servers
  • 3 篇 mobile agents

机构

  • 7 篇 graduate institu...
  • 7 篇 department of co...
  • 6 篇 state key labora...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 3 篇 ntt secure platf...
  • 3 篇 department of ma...
  • 3 篇 the state key la...
  • 2 篇 stanford institu...
  • 2 篇 center for resea...
  • 2 篇 high performance...
  • 2 篇 mohamed bin zaye...
  • 2 篇 computer center ...
  • 2 篇 fairleigh dickin...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...
  • 2 篇 department of ma...
  • 2 篇 college of compu...
  • 2 篇 department of co...

作者

  • 12 篇 boleslaw k. szym...
  • 10 篇 eyuphan bulut
  • 8 篇 szymanski bolesl...
  • 7 篇 zijian wang
  • 5 篇 bulut eyuphan
  • 5 篇 s.k. das
  • 4 篇 sahin cem geyik
  • 4 篇 geyik sahin cem
  • 4 篇 b. k. szymanski
  • 4 篇 jiannong cao
  • 3 篇 niyato dusit
  • 3 篇 wang zijian
  • 3 篇 abualigah laith
  • 3 篇 forestiero agost...
  • 2 篇 li yen-huan
  • 2 篇 frank mueller
  • 2 篇 jameleddine hass...
  • 2 篇 benjamin simon c...
  • 2 篇 palma raul
  • 2 篇 shih chi-sheng

语言

  • 90 篇 英文
  • 10 篇 其他
检索条件"机构=Department of Computer Science Secure Computing and Networking Center"
100 条 记 录,以下是1-10 订阅
Mobility-Aware Deep Reinforcement Learning with Seq2seq Mobility Prediction for Offloading and Allocation in Edge computing
收藏 引用
IEEE Transactions on Mobile computing 2024年 第6期23卷 6803-6819页
作者: Wu, Chao-Lun Chiu, Te-Chuan Wang, Chih-Yu Pang, Ai-Chun Academia Sinica Research Center for Information Technology Innovation Taipei115 Taiwan National Tsing Hua University Department of Computer Science Hsinchu300 Taiwan National Taiwan University Institute of Networking and Multimedia Taipei10617 Taiwan National Taiwan University High Performance and Scientific Computing Center Taipei10617 Taiwan
Mobile/multi-access edge computing (MEC) is developed to support the upcoming AI-aware mobile services, which require low latency and intensive computation resources at the edge of the network. One of the most challen... 详细信息
来源: 评论
Deep Learning Based End-to-End Specular Reflection Removal for Medical Endoscopic Images  23
Deep Learning Based End-to-End Specular Reflection Removal f...
收藏 引用
2023 Research in Adaptive and Convergent Systems, RACS 2023
作者: Shih, Chi-Sheng Liao, Yu-Cheng Tan, Ching-Ting Graduate Institute of Networking and Multimedia Department of Computer Science and Information Engineering High Performance and Scientific Computing Center National Taiwan University Taipei Taiwan Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan Department of Otolaryngology National Taiwan University Hospital Taipei Taiwan
Endoscopic images usually have many overexposed regions due to strong and focused light sources and, consequently, physicians need to change the camera angle for a clear view from time to time. This work targets remov... 详细信息
来源: 评论
PokkahScan - An Intelligent Drone for detection of Pokkah Boeng Disease in Sugarcane Using Transfer Learning and eXplainable AI  15
PokkahScan - An Intelligent Drone for detection of Pokkah Bo...
收藏 引用
15th International Conference on computing Communication and networking Technologies, ICCCNT 2024
作者: Ravikumar, Rahul Sujith Kumaar, M.V. Krishna, Shirish Jayasurkanth, M. Yasshwanth, V.R. Saravanan, Sanjay Kishore Thangavel, Senthil Kumar Thangeswari, S. Somasundaram, K. Shanmugam, Selvanayaki Kolandapalayam Amrita School of Artificial Intelligence Amrita Vishwa Vidyapeetham Center for Computational Engineering & Networking Coimbatore India Amrita Vishwa Vidyapeetham Amrita School of Engineering Department of Aerospace Engineering Coimbatore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Coimbatore India Tamilnadu Agricultural University Department of Plant Pathology Coimbatore India Amrita School of Physical Sciences Department of Mathematics Coimbatore India Ashland University Department of Mathematics and Computer Science OH United States
Traditional systems for crop disease detection often rely on manual inspection methods, which are time-consuming, labor-intensive, and prone to human error. In this context, the necessity of using transfer learning be... 详细信息
来源: 评论
File Fragment Classification using Light-Weight Convolutional Neural Networks
arXiv
收藏 引用
arXiv 2023年
作者: Ghaleb, Mustafa Saaim, Kunwar Felemban, Muhamad Al-Saleh, Saleh Al-Mulhem, Ahmad The Department of Computer Engineering The Interdisciplainry Research Center for Intelligent Secure Systems at KFUPM Dhahran Saudi Arabia The Department of Computing Science University of Alberta Canada
In digital forensics, file fragment classification is an important step toward completing file carving process. There exist several techniques to identify the type of file fragments without relying on meta-data, such ... 详细信息
来源: 评论
Robust Image Steganography Approach Based on Edge Detection Combined With CNN Algorithm
收藏 引用
IEEE Access 2025年 13卷 109099-109115页
作者: Rana Al-Rawashdeh Md Mahfuzur Rahman Mahmood Niazi Department of Information and Computer Science College of Computing and Mathematics King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Interdisciplinary Research Center for Intelligent Secure Systems (IRC-ISS) King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia
Image steganography conceals secret data within a cover image to generate a new image (stego image) in a manner that makes the secret data undetectable. The main problem in image steganography is to find the right bal... 详细信息
来源: 评论
M2-Fi: Multi-person Respiration Monitoring via Handheld WiFi Devices
M2-Fi: Multi-person Respiration Monitoring via Handheld WiFi...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Jingyang Hu Hongbo Jiang Tianyue Zheng Jingzhi Hu Hongbo Wang Hangcheng Cao Zhe Chen Jun Luo College of Computer Science and Electronic Engineering Hunan University China School of Computer Science and Engineering Nanyang Technological University (NTU) Singapore Department of Computer Science City University of Hong Kong China Intelligent Networking and Computing Research Center and School of Computer Science Fudan University China
Wi-Fi signals are commonly used for conventional communication, yet they can also realize low-cost and non-invasive human sensing. However, Wi-Fi sensing in Multi-person scenarios is still a challenging problem. In th... 详细信息
来源: 评论
A Data-Driven Approach Towards Software Regression Testing Quality Optimization  25
A Data-Driven Approach Towards Software Regression Testing Q...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Moubayed, Abdallah Alhindawi, Nouh Alsakran, Jamal Injadat, MohammadNoor Kanan, Mohammad King Fahd University of Petroleum & Minerals Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems Dhahran Saudi Arabia Arizona State University School of Computing and Augmented Intelligence GilbertAZ United States Jadara University Department of Software Engineering Irbid Jordan Fairleigh Dickinson University Canada Zarqa University Data Science & Artificial Intelligence Department Zarqa Jordan University of Business and Technology Department of Industrial Engineering Jeddah Saudi Arabia
Software testing is very important in software development to ensure its quality and reliability. As software systems have become more complex, the number of test cases has increased, which presents the challenge of e... 详细信息
来源: 评论
Self-Supervised Multi-LiDAR Object View Generation Using Single LiDAR  29
Self-Supervised Multi-LiDAR Object View Generation Using Sin...
收藏 引用
29th IEEE International Conference on Embedded and Real-Time computing Systems and Applications, RTCSA 2023
作者: Kuo, Yi-Hung Shih, Chi-Sheng Lin, Hsiang-Jui Hung, Shih-Hao Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan National Taiwan University Department of Computer Science and Information Engineering Taipei Taiwan High Performance and Scientific Computing Center National Taiwan University Taipei Taiwan Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
3D object detection using point clouds has been widely used for self-driving vehicles, roadside vehicle detection, and tracking. However, the detection accuracy using single-LiDAR-scanned point clouds suffers from occ... 详细信息
来源: 评论
Detection of Linguistic Bad Smells in GRL Models: An NLP Approach
Detection of Linguistic Bad Smells in GRL Models: An NLP App...
收藏 引用
Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
作者: Nouf Alturayeif Jameleddine Hassine Information and Computer Science Department KFUPM Dhahran Saudi Arabia Computing Department Imam Abdurahman Bin Faisal University Dammam Saudi Arabia Information and Computer Science Department KFUPM Interdisciplinary Research Center for Intelligent Secure Systems KFUPM Dhahran Saudia Arabia
Goal-Oriented Requirements Engineering (GORE) plays a crucial role in facilitating effective communication between stakeholders in system development. Through the use of goal models, GORE provides a structured approac...
来源: 评论
Machine Learning and Network Traffic to Distinguish Between Malware and Benign Applications  1st
Machine Learning and Network Traffic to Distinguish Between ...
收藏 引用
1st International Conference on Pervasive Knowledge and Collective Intelligence on Web and Social Media, PerSOM 2022
作者: Abualigah, Laith Abualigah, Sayel Almahmoud, Mothanna Forestiero, Agostino Sachdeva, Gagan Hanandeh, Essam S. Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman Jordan Faculty of Information Technology Middle East University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang George Town Malaysia Computer Science Department Prince Hussein Bin Abdullah Faculty for Information Technology Al Al-Bayt University Mafraq25113 Jordan Department of Computer Information Systems Jordan University of Science and Technology Ar-Ramtha Jordan Performance Computing and Networking National Research Council of Italy Rende87036 Italy First Abu Dhabi Bank Abu Dhabi United Arab Emirates Department of Computer Information System Zarqa University Zarqa Jordan
Virus detection software is widely used for servers, systems, and devices that seek to maintain security and reliability. Although these programs provide an excellent safety level, the traditional defense methods fail... 详细信息
来源: 评论