咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering of Systems"
26095 条 记 录,以下是491-500 订阅
排序:
BnGraphemizer: A Grapheme-based Tokenizer for Bengali Handwritten Text Recognition  9
BnGraphemizer: A Grapheme-based Tokenizer for Bengali Handwr...
收藏 引用
9th IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2023
作者: Basher, Mohammad Jahid Ibna Noor, Mohammad Raghib Afroze, Sadia Ahmed, Ikbal Hoque, Mohammed Moshiul Chittagong University of Engineering & Technology Department of Computer Science and Engineering Chittagong Bangladesh University of Dhaka Department of Management Information Systems Dhaka Bangladesh CCN University of Engineering & Technology Computer Science and Engineering Cumilla Bangladesh
Bengali Handwritten Text Recognition (HTR) is a challenging task due to the text's cursive disposition and significant variations in the graphemic unit, the smallest written unit in alphasyllabary languages. These... 详细信息
来源: 评论
"Risky or Trustworthy?": User Behavior towards Biometric Authentication Method  7
"Risky or Trustworthy?": User Behavior towards Biometric Aut...
收藏 引用
7th Information systems International Conference, ISICO 2023
作者: Kusyanti, Ari Catherina, Harin Puspa Ayu Effendrik, Popong Santoso, Nurudin Ekowati, Nurul Syamsi Department of Computer Science Universitas Brawijaya Indonesia Department of Information Systems Universitas Brawijaya Indonesia Department of Electrical Engineering Politeknik Negeri Malang Indonesia
Smartphones as a means of communication are not only used to send and receive messages and make phone calls. Today's smartphones are also intended to store personal data and sensitive information hence it is vulne... 详细信息
来源: 评论
Mobile Edge Computing for Multi-Services Digital Twin-Enabled IoT Heterogeneous Networks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年 第3期11卷 1845-1853页
作者: Liu, Weiqi Hossain, Mohammad Arif Ansari, Nirwan Auburn University at Montgomery Department of Computer Science and Computer Information Systems MontgomeryAL36117 United States Middle Tennessee State University Department of Engineering Technology MurfreesboroTN37132 United States New Jersey Institute of Technology Advanced Networking Laboratory Department of Electrical and Computing Engineering NewarkNJ07102 United States
A scheme for edge computing-enabled offloading in a digital twin (DT) enabled heterogeneous network (HetNet) of multi-services IoT devices (IDs) is proposed. This scheme optimizes the association and handover of IDs, ... 详细信息
来源: 评论
Rule and Encryption based Secure Routing for Internet of Vehicle Networks  2
Rule and Encryption based Secure Routing for Internet of Veh...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Anand, M. Muthurajkumar, S. Selvi, M. Thangaramya, K. Svn, Santhosh Kumar Kannan, A. Anna University Madras Institute of Technolog Department of Computer Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de... 详细信息
来源: 评论
Optimizing Gene Expression Analysis Using Clustering Algorithms  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Bikku, Thulasi Ramu, J. Sekhar, J. Chandra Pratap, V. Krishna Pujari, Jeevana Jyothi Computer Science and Engineering Amrita School of Computing Amaravati Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632014 India
Gene expression analysis plays a crucial role in understanding biological processes and diseases. However, the high-dimensional nature of gene expression data poses challenges for its analysis and interpretation. Clus... 详细信息
来源: 评论
Submodular Participatory Budgeting  1
收藏 引用
18th International Conference on Algorithmic Aspects in Information and Management, AAIM 2024
作者: Yuan, Jing Tang, Shaojie Department of Computer Science and Engineering University of North Texas Denton United States Department of Management Science and Systems School of Management University at Buffalo Buffalo United States
Participatory budgeting refers to the practice of allocating public resources by collecting and aggregating individual preferences. Most existing studies in this field often assume an additive utility function, where ... 详细信息
来源: 评论
Shortest Job First with Gateway-based Resource Management Strategy for Fog Enabled Cloud Computing  4
Shortest Job First with Gateway-based Resource Management St...
收藏 引用
4th IEEE International Conference on Data engineering and Communication systems, ICDECS 2024
作者: Anbazhagan, K. Kumar, Rotash Thilagavathy, R. Anuradha, D. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Government Engineering College Department of Electronics and Communication Engineering Rajasthan Jhalawar India College of Engineering and Technology Srm Institute of Science and Technology Kattankulathur Department of Computing Technologies Chennai India Panimalar Engineering College Department of Computer Science and Business Systems Chennai India
In recent years, fog computing has extended cloud services to the network edge, lowering network latency and congestion and overcoming cloud computing restrictions. Many hurdles, however, must be overcome before the b... 详细信息
来源: 评论
System of System Architecture for Cybersecurity of Power systems Operations  11
System of System Architecture for Cybersecurity of Power Sys...
收藏 引用
11th International Conference on Electrical and Electronics engineering, ICEEE 2024
作者: Ur Rahman, Ehab Ashiku, Lirim Dagli, Cihan Bo, Rui Missouri University of Science and Technology Department of Electrical and Computer Engineering RollaMO United States Missouri Universtity of Science and Technology Engineering Management and Systems Engineering RollaMO United States
Smart grids are at risk of cyber-attacks due to more connected devices being introduced. Different kinds of attacks may incur different consequences in the operation of smart grids. Attackers have identified different... 详细信息
来源: 评论
A New Approach for Quantum Phase Estimation Based Algorithms for Machine Learning  8th
A New Approach for Quantum Phase Estimation Based Algorithm...
收藏 引用
8th International Conference on Smart City Applications, SCA 2023
作者: Ouedrhiri, Oumayma Banouar, Oumayma El Hadaj, Salah Raghay, Said Department of Computer Science and Mathematics University of Quebec at Trois-Riviéres Trois-Riviéres Canada Faculty of Sciences and Techniques Laboratory of Computer Science Engineering and Systems Marrakesh Morocco
One of the greatest developments in computer science is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin... 详细信息
来源: 评论
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论