咨询与建议

限定检索结果

文献类型

  • 3,822 篇 会议
  • 2,346 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 6,197 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,695 篇 工学
    • 2,276 篇 计算机科学与技术...
    • 1,811 篇 软件工程
    • 731 篇 信息与通信工程
    • 669 篇 控制科学与工程
    • 541 篇 电气工程
    • 480 篇 电子科学与技术(可...
    • 348 篇 生物工程
    • 311 篇 机械工程
    • 267 篇 生物医学工程(可授...
    • 249 篇 光学工程
    • 229 篇 仪器科学与技术
    • 222 篇 动力工程及工程热...
    • 173 篇 化学工程与技术
    • 134 篇 交通运输工程
    • 125 篇 材料科学与工程(可...
    • 117 篇 土木工程
  • 2,038 篇 理学
    • 1,000 篇 数学
    • 610 篇 物理学
    • 399 篇 生物学
    • 294 篇 统计学(可授理学、...
    • 259 篇 系统科学
    • 179 篇 化学
  • 988 篇 管理学
    • 664 篇 管理科学与工程(可...
    • 350 篇 图书情报与档案管...
    • 277 篇 工商管理
  • 298 篇 医学
    • 254 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
  • 156 篇 法学
    • 123 篇 社会学
  • 119 篇 经济学
    • 119 篇 应用经济学
  • 74 篇 农学
  • 58 篇 教育学
  • 27 篇 文学
  • 19 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学

主题

  • 159 篇 computer science
  • 115 篇 deep learning
  • 97 篇 computer archite...
  • 97 篇 computational mo...
  • 97 篇 feature extracti...
  • 93 篇 machine learning
  • 92 篇 accuracy
  • 85 篇 laboratories
  • 83 篇 optimization
  • 74 篇 data mining
  • 74 篇 training
  • 73 篇 hardware
  • 68 篇 control systems
  • 64 篇 artificial intel...
  • 62 篇 testing
  • 60 篇 educational inst...
  • 60 篇 wireless sensor ...
  • 59 篇 algorithm design...
  • 57 篇 costs
  • 55 篇 application soft...

机构

  • 174 篇 department of co...
  • 87 篇 department of co...
  • 53 篇 key laboratory o...
  • 47 篇 school of softwa...
  • 40 篇 department of co...
  • 38 篇 tsinghua nationa...
  • 38 篇 national enginee...
  • 37 篇 department of co...
  • 35 篇 key laboratory o...
  • 29 篇 college of compu...
  • 26 篇 school of system...
  • 25 篇 vlsi and system ...
  • 24 篇 department of co...
  • 23 篇 department of co...
  • 23 篇 university of ch...
  • 23 篇 key laboratory f...
  • 22 篇 the key laborato...
  • 21 篇 department of el...
  • 20 篇 ieee
  • 18 篇 state key labora...

作者

  • 32 篇 hai jin
  • 26 篇 zhou mengchu
  • 21 篇 abdelwahed motwa...
  • 21 篇 guangwen yang
  • 21 篇 dutta paramartha
  • 20 篇 liuchen chang
  • 19 篇 mengchu zhou
  • 19 篇 changjun jiang
  • 18 篇 mohamed k.nour
  • 17 篇 haohuan fu
  • 17 篇 jiang changjun
  • 16 篇 ligang hou
  • 16 篇 ishfaq yaseen
  • 16 篇 jin hai
  • 15 篇 robbi rahim
  • 15 篇 gaol ford lumban
  • 15 篇 wang jinhui
  • 15 篇 han zhu
  • 15 篇 hou ligang
  • 14 篇 xiang-yang li

语言

  • 5,892 篇 英文
  • 158 篇 其他
  • 141 篇 中文
  • 12 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer System and Technology"
6197 条 记 录,以下是361-370 订阅
排序:
Performance Analysis of Disruptive Instances in Cloud Environment
Performance Analysis of Disruptive Instances in Cloud Enviro...
收藏 引用
International Communication systems and Networks and Workshops, COMSNETS
作者: Pranab Nandy Rounak Saha Anurag Satpathy Sandip Chakraborty Sourav Kanti Addya Department of Computer Science and Engineering Cloud and Smart System Services Lab National Institute of Technology Karnataka Surathkal India Department of Computer Science and Engineering Cloud and Smart System Services Lab Missouri University of Science and Technology USA Department of Computer Science and Engineering Cloud and Smart System Services Lab Indian Institute of Technology Kharagpur India
Virtualization enables the service providers (SPs) to logically partition the resources into virtual machines (VM) instances. Real-world SPs such as Amazon, Google, Microsoft Azure, IBM, and Oracle provide different f...
来源: 评论
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
收藏 引用
computer systems Science & Engineering 2023年 第5期45卷 1199-1210页
作者: Himanshu Sharma karthikeyan Rajagopal G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa Anwer Mustafa Hilal Department of Computer Science&Engineering JECRC UniversityJaipurIndia Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia School of Electronics Engineering Vellore Institute of TechnologyChennaiIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular *** generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be import... 详细信息
来源: 评论
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
收藏 引用
computer systems Science & Engineering 2023年 第5期45卷 1679-1694页
作者: Mashael M Asiri Heba G.Mohamed Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki Department of Computer Science College of Science&Art atMahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly... 详细信息
来源: 评论
Control and Stability of Large-scale Power system with Highly Distributed Renewable Energy Generation:Viewpoints from Six Aspects
收藏 引用
CSEE Journal of Power and Energy systems 2023年 第1期9卷 8-14页
作者: Qing-Hua Wu Anjan Bose Chanan Singh Joe H.Chow Gang Mu Yuanzhang Sun Zhaoxi Liu Zhigang Li Yang Liu School of Electric Power Engineering South China University of TechnologyGuangzhou 510640China School of Electrical Engineering&Computer Science Washington State UniversityPullmanWA 99164USA Department of Electrical and Computer Engineering Texas A&M UniversityCollege StationTX 77843USA Department of Electrical Computer and Systems EngineeringRensselaer Polytechnic Institute(RPI)TroyNYUSA Key Laboratory of Modern Power System Simulation and Control&Renewable Energy Technology Ministry of Education(Northeast Electric Power University)Jilin 132012China School of Electrical Engineering and Automation Wuhan UniversityWuhan 430072China
Power systems are moving toward a low-carbon or carbon-neutral future where high penetration of renewables is *** conventional fossil-fueled synchronous generators in the transmission network being replaced by renewab... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Cocktail Party Effect Using Parallel Intra and Inter Self-attention  3rd
Cocktail Party Effect Using Parallel Intra and Inter Self-at...
收藏 引用
3rd International Conference on Advances in Information and Communication technology, ICTA 2024
作者: Tan, Ha Minh Quoc, Nguyen Kim Vu, Duc-Quang Dang, An Thi, Duyen Nguyen Faculty of Information Technology Nguyen Tat Thanh University Thai Nguyen Viet Nam Department of Computer Science and Information System Thai Nguyen University of Education Thai Nguyen Viet Nam Faculty of Computer Science Phenikaa University Ha Noi Viet Nam Thai Nguyen University of Information and Communication Technology Thai Nguyen Viet Nam
The self-attention architecture is also considered to be a significant contribution in sequence processing tasks. It has the ability to highlight the distinctive features of a sequence, has been very successful in nat... 详细信息
来源: 评论
Anomaly Detection using Machine Learning Techniques in Wireless Sensor Networks
Anomaly Detection using Machine Learning Techniques in Wirel...
收藏 引用
2020 International Conference on Mathematics and Data Science, ICMDS 2020
作者: Ifzarne, Samir Tabbaa, Hiba Hafidi, Imad Lamghari, Nidal Department of Computer System and Technology ENSA Khouribga Morocco
The number of Wireless sensor network (WSN) deployments have been growing so exponentially over the recent years. Due to their small size and cost-effective, WSN are attracting many industries to use them in various a... 详细信息
来源: 评论
Arrays in Practice An Empirical Study of Array Access Patterns on the JVM
arXiv
收藏 引用
arXiv 2024年
作者: Åkerblom, Beatrice Castegren, Elias Department of Computer and System Sciences Stockholm University Sweden Department of Information Technology Uppsala University Sweden
The array is a data structure used in a wide range of programs. Its compact storage and constant time random access makes it highly efficient, but arbitrary indexing complicates the analysis of code containing array a... 详细信息
来源: 评论
Robotic Anchoring system with Two Locomotion Modes for Preoperative Localization of Colorectal Cancer
Robotic Anchoring System with Two Locomotion Modes for Preop...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Wang, Jiale Ren, Hao Yang, Liu Zhao, Haoxiang Zhang, Ruijia Shen, Yajing Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong City University of Hong Kong Department of Biomedical Engineering Kowloon Hong Kong Institute of Robotics and Automatic Information System Nankai University China
At present, colorectal cancer is one of the most prevalent cancers in the world. Colectomy serves as an effective treatment option for this disease. Preoperative localization plays a vital role in the colectomy proced... 详细信息
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论