咨询与建议

限定检索结果

文献类型

  • 1,717 篇 会议
  • 1,022 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,403 篇 工学
    • 1,034 篇 计算机科学与技术...
    • 750 篇 软件工程
    • 263 篇 信息与通信工程
    • 184 篇 控制科学与工程
    • 134 篇 电气工程
    • 115 篇 生物工程
    • 108 篇 电子科学与技术(可...
    • 80 篇 生物医学工程(可授...
    • 69 篇 机械工程
    • 61 篇 光学工程
    • 59 篇 材料科学与工程(可...
    • 47 篇 动力工程及工程热...
    • 40 篇 化学工程与技术
    • 38 篇 力学(可授工学、理...
    • 37 篇 仪器科学与技术
    • 37 篇 建筑学
  • 1,073 篇 理学
    • 783 篇 数学
    • 195 篇 物理学
    • 185 篇 统计学(可授理学、...
    • 142 篇 生物学
    • 92 篇 系统科学
    • 51 篇 化学
    • 37 篇 地球物理学
  • 298 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 136 篇 图书情报与档案管...
    • 107 篇 工商管理
  • 83 篇 教育学
    • 76 篇 教育学
  • 80 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 47 篇 法学
    • 42 篇 社会学
  • 34 篇 经济学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 哲学
  • 5 篇 历史学
  • 5 篇 军事学
  • 1 篇 艺术学

主题

  • 315 篇 computer science
  • 75 篇 application soft...
  • 53 篇 educational inst...
  • 53 篇 computational mo...
  • 48 篇 mathematics
  • 46 篇 costs
  • 41 篇 routing
  • 41 篇 concurrent compu...
  • 41 篇 testing
  • 39 篇 computer archite...
  • 38 篇 algorithm design...
  • 38 篇 polynomials
  • 38 篇 distributed comp...
  • 37 篇 delay
  • 36 篇 artificial intel...
  • 35 篇 resource managem...
  • 35 篇 data mining
  • 34 篇 algebra
  • 34 篇 computer network...
  • 31 篇 neural networks

机构

  • 23 篇 department of ma...
  • 21 篇 department of co...
  • 18 篇 department of ma...
  • 16 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 dunlap institute...
  • 15 篇 mit kavli instit...
  • 14 篇 centre interdisc...
  • 13 篇 perimeter instit...
  • 12 篇 david a. dunlap ...
  • 12 篇 canadian institu...
  • 12 篇 department of ma...
  • 12 篇 department of ph...
  • 12 篇 dominion radio a...
  • 12 篇 research centre ...
  • 11 篇 vermont complex ...
  • 11 篇 department of co...
  • 11 篇 center for gravi...
  • 9 篇 department of ma...

作者

  • 37 篇 eldar yonina c.
  • 34 篇 srivastava gauta...
  • 32 篇 amit konar
  • 30 篇 atulya k. nagar
  • 26 篇 gautam srivastav...
  • 24 篇 hébert-dufresne ...
  • 19 篇 allard antoine
  • 18 篇 hill alex s.
  • 17 篇 landecker t.l.
  • 16 篇 gaensler b.m.
  • 16 篇 v. sunderam
  • 15 篇 ordog anna
  • 14 篇 pratyusha rakshi...
  • 13 篇 newburgh laura
  • 13 篇 wulf dallas
  • 13 篇 yonina c. eldar
  • 13 篇 mena-parra juan
  • 12 篇 siegel seth r.
  • 12 篇 shlezinger nir
  • 12 篇 bandura kevin

语言

  • 2,683 篇 英文
  • 69 篇 其他
  • 9 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computer Science and Math"
2761 条 记 录,以下是71-80 订阅
排序:
A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
收藏 引用
Tsinghua science and Technology 2020年 第5期25卷 589-603页
作者: Junwei Tang Ruixuan Li Kaipeng Wang Xiwu Gu Zhiyong Xu School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Math and Computer Science Department Suffolk UniversityBostonMA 02101USA and also with Shenzhen Institute of Advanced TechnologyChinese Academy of ScienceShenzhen 518055China
We propose a novel hybrid method to analyze the security vulnerabilities in Android *** method combines static analysis,which consists of metadata and data flow analyses with dynamic analysis,which includes dynamic ex... 详细信息
来源: 评论
Extracting occupancy information from sensor data using machine learning: LU-PRISM Program  13
Extracting occupancy information from sensor data using mach...
收藏 引用
13th IEEE Integrated STEM Education Conference, ISEC 2023
作者: Rai, Sanish Longwood University Computer Science Department of Math and Computer Science United States
Two undergraduate students will work with the faculty to implement machine learning models on extracting meaningful information from building sensor data. As a part of the LU-PRISM (Longwood University Perspectives on... 详细信息
来源: 评论
Reciprocal resource sharing in P2P environments
Reciprocal resource sharing in P2P environments
收藏 引用
4th International Conference on Autonomous Agents and Multi agent Systems, AAMAS 05
作者: Banerjee, Dipyaman Saha, Sabyasachi Sen, Sandip Dasgupta, Prithviraj Department of Math and Computer Science University of Tulsa Computer Science Department University of Nebraska Omaha
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of goods in a traditional market, resource ex... 详细信息
来源: 评论
Predicting agent strategy mix of evolving populations
Predicting agent strategy mix of evolving populations
收藏 引用
4th International Conference on Autonomous Agents and Multi agent Systems, AAMAS 05
作者: Saha, Sabyasachi Sen, Sandip Department of Math and Computer Science University of Tulsa
We study agent societies where self-interested agents interact repeatedly over extended time periods. In particular, we are interested in environments where agents can form mutually beneficial relationships by exchang... 详细信息
来源: 评论
Dot matrices and genetics algorithms for MSA
Dot matrices and genetics algorithms for MSA
收藏 引用
Summer computer Simulation Conference, SCSC 2013 and Work in Progress, WIP 2013, Part of the 2013 Summer Simulation Multiconference, SummerSim 2013
作者: Tsiligaridis, John Ochoa, Fabian Math and Computer Science Department United States
Multiple Sequence Alignment (MSA) is among the best important tasks in computational biology. Genetic Algorithms are stochastic approaches for efficient and robust search. With the increasing rate of determination of ... 详细信息
来源: 评论
Modeling opponent decision in repeated one-shot negotiations
Modeling opponent decision in repeated one-shot negotiations
收藏 引用
4th International Conference on Autonomous Agents and Multi agent Systems, AAMAS 05
作者: Saha, Sabyasachi Biswas, Anish Sen, Sandip Department of Math and Computer Science University of Tulsa
In many negotiation and bargaining scenarios, a particular agent may need to interact repeatedly with another agent. Typically, these interactions take place under incomplete information, i.e., an agent does not know ... 详细信息
来源: 评论
SPECIES OF ROTA-BAXTER ALGEBRAS BY ROOTED TREES, TWISTED BIALGEBRAS AND FOCK FUNCTORS
arXiv
收藏 引用
arXiv 2025年
作者: Foissy, Loïc Guo, Li Peng, Xiao-Song Xie, Yunzhou Zhang, Yi Univ. Littoral Côte d’Opale UR 2597 LMPA Laboratoire de Mathématiques Pures et Appliquées Joseph Liouville CalaisF-62100 France Department of Mathematics and Computer Science Rutgers University NewarkNJ07102 United States School of Mathematics and Statistics Jiangsu Normal University Jiangsu Xuzhou221116 China Department of Mathematics Imperial College London LondonSW7 2AZ United Kingdom School of Mathematics and Statistics Nanjing University of Information Science & Technology Jiangsu Nanjing210044 China
As a fundamental and ubiquitous combinatorial notion, species has attracted sustained interest, generalizing from set-theoretical combinatorial to algebraic combinatorial and beyond. The Rota-Baxter algebra is one of ... 详细信息
来源: 评论
Central limit theorem for time to broadcast in radio networks
收藏 引用
Probability in the Engineering and Informational sciences 1995年 第2期9卷 201-209页
作者: Ravishankar, Krishnamurthi Singh, Suresh Department of Math and Computer Science SUNY at New Paltz New PaltzNY12561 United States Department of Computer Science University of South Carolina ColumbiaSC29208 United States
We study the problem of broadcasting in a system where nodes are equipped with radio transmitters with constant radius of transmission. A message originating at a node has to be transmitted to all the other nodes in t... 详细信息
来源: 评论
Next-Gen Metaverse Security Through Intrusion Detection Enhanced by Transformers and GANs
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Djenouri, Youcef Belbachir, Ahmed Nabil Belhadi, Asma Michalak, Tomasz Srivastava, Gautam University of South-Eastern Norway Kongsberg Norway Norwegian Research Center NORCE Grimstad Norway OsloMet University Oslo Norway University of Warsaw Poland Brandon University Department of Math and Computer Science BrandonMBR7A 6A9 Canada China Medical University Research Centre for Interneural Computing Taichung40402 Taiwan Chitkara University Institute of Engineering and Technology Centre for Research Impact and Outcome Chitkara University Punjab Rajpura140401 India
As the metaverse grows in popularity and complexity, securing its virtual environment is critical. Metaverse intrusion detection involves identifying and preventing unauthorized access, malicious activities, and poten... 详细信息
来源: 评论
Numerical experience with multiple update quasi-Newton methods for unconstrained optimization
收藏 引用
Journal of mathematical Modelling and Algorithms 2007年 第2期6卷 231-238页
作者: Moghrabi, Issam A. R. Math and Computer Science Department Faculty of Science Beirut Arab University Beirut Lebanon
The authors have derived what they termed quasi-Newton multi step methods in [2]. These methods have demonstrated substantial numerical improvements over the standard single step Secant-based BFGS. Such methods use a ... 详细信息
来源: 评论