咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Systems Engineering and Science"
26095 条 记 录,以下是4691-4700 订阅
排序:
ARCS-R: Mission Critical Combined Reliability and Cybersecurity systems engineering Analysis
ARCS-R: Mission Critical Combined Reliability and Cybersecur...
收藏 引用
Annual Symposium on Reliability and Maintainability (RAMS)
作者: Douglas L. Van Bossuyt Nikolaos Papakonstantinou Britta Hale Ryan Arlitt Srinivasa Rao Palatheerdham Department of Systems Engineering Naval Postgraduate School Docent VTT Technical Research Centre of Finland Department of Computer Science Naval Postgraduate School Masters in Cyber Security University of South Brittany Lorient
This paper explores how reliability analysis and cyber-security analysis can be combined using Artificial Intelligence and Machine Learning (AI/ML), and Large Language Models (LLM) to produce a continuously updated re...
来源: 评论
Assessing the Accuracy and Ethical Implications of Automated Criminal Detection Using a Deep Learning Approach
Assessing the Accuracy and Ethical Implications of Automated...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering (RMKMATE), International Conference on
作者: Jagadeesan S K. Sujigarasharma Manjula R Vetriselvi T School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore Tamil Nadu India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Chennai India Department of IOT School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri...
来源: 评论
Road Signs Recognition by Using YOLOv8 Model
Road Signs Recognition by Using YOLOv8 Model
收藏 引用
International Conference on Intelligent systems: Theories and Applications (SITA)
作者: Abdellah Nabou Atheer L. Salih Ibtissam Ben Rabbaa El-Hassan Abdelwahed Mouaad Ait Ahmed Ouhamou Computer Science Dept Computing Systems Engineering Laboratory (LISI) Cadi Ayyad University Marrakesh Morocco Electrical & Communications Engineering Department DHBW University - Campus Friedrichshafen Germany Computer Science Dept Cadi Ayyad University Marrakesh Morocco
Efficient Road sign recognition is key to improving road safety, navigation and to enhance driver assistance for an intelligent transportation system (ITS). However, achieving efficient road sign and traffic recogniti...
来源: 评论
HEART: Achieving Timely Multi-Model Training for Vehicle-Edge-Cloud-Integrated Hierarchical Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Xiaohong Liwang, Minghui Wang, Xianbin Cheng, Zhipeng Hosseinalipour, Seyyedali Dai, Huaiyu Jiao, Zhenzhen School of Informatics Xiamen University Fujian China Department of Control Science and Engineering The National Key Laboratory of Autonomous Intelligent Unmanned Systems Japan Frontiers Science Center for Intelligent Autonomous Systems Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering Western University ON Canada School of Future Science and Engineering Soochow University Suzhou China Department of Electrical Engineering University at Buffalo-SUNY BuffaloNY United States Department of Electrical and Computer Engineering NC State University RaleighNC United States iF-Labs Beijing Teleinfo Technology Company Ltd. CAICT Beijing China
The rapid growth of AI-enabled Internet of Vehicles (IoV) calls for efficient machine learning (ML) solutions that can handle high vehicular mobility and decentralized data. This has motivated the emergence of Hierarc... 详细信息
来源: 评论
Model Inversion Attacks Through Target-Specific Conditional Diffusion Models
arXiv
收藏 引用
arXiv 2024年
作者: Li, Ouxiang Hao, Yanbin Wang, Zhicai Zhu, Bin Wang, Shuo Zhang, Zaixi Feng, Fuli School of Artificial Intelligence and Data Science University of Science and Technology of China Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China School of Computing and Information Systems Singapore Management University Singapore School of Information Science and Technology University of Science and Technology of China Hefei China Department of Computer Science and Engineering University of Science and Technology of China Hefei China
Model inversion attacks (MIAs) aim to reconstruct private images from a target classifier's training set, thereby raising privacy concerns in AI applications. Previous GAN-based MIAs tend to suffer from inferior g... 详细信息
来源: 评论
Exploring Equilibrium Strategies in Network Games with Generative AI
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yaoqi Du, Hongyang Sun, Geng Xiong, Zehui Niyato, Dusit Han, Zhu The College of Communications Engineering Army Engineering University PLA Nanjing210000 China The School of Computer Science and Engineering NTU Singapore The College of Computer Science and Technology Jilin University Changchun130012 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore The Department of Electrical and Computer Engineering The University of Houston HoustonTX77004 United States
Game theory offers a powerful framework for analyzing strategic interactions among decision-makers, providing tools to model, analyze, and predict their behavior. However, implementing game theory can be challenging d... 详细信息
来源: 评论
Semantic Enabled 6G LEO Satellite Communication for Earth Observation: A Resource-Constrained Network Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Hassan, Sheikh Salman Nguyen, Loc X. Tun, Yan Kyaw Han, Zhu Hong, Choong Seon Department of Computer Science and Engineering Kyung Hee University Yongin17104 Korea Republic of Department of Electronic Systems Aalborg University A . C. Meyers Vænge 15 København2450 Denmark Department of Electrical and Computer Engineering University of Houston HoustonTX77004-4005 United States
Earth observation satellites generate large amounts of real-time data for monitoring and managing time-critical events such as disaster relief missions. This presents a major challenge for satellite-to-ground communic... 详细信息
来源: 评论
AFML: An Asynchronous Federated Meta-Learning Mechanism for Charging Station Occupancy Prediction with Biased and Isolated Data
收藏 引用
IEEE Transactions on Big Data 2024年
作者: Chen, Qiyang Li, Han You, Linlin Qu, Haohao Abdelmoniem, Ahmed M. Yuen, Chau Sun Yat-Sen University School of Intelligent Systems Engineering Shenzhen510006 China Hong Kong Polytechnic University Department of Computing Hong Kong100872 Hong Kong Queen Mary University of London Department of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom Assiut University Department of Computer Science Assiut71515 Egypt Nanyang Technological University School of Electrical and Electronics Engineering Singapore639798 Singapore
Electric vehicles (EVs) are driving green and low-carbon transport in modern cities. It makes charging station occupancy prediction (CSOP) critual for intelligent transportation systems (ITS) to achieve a balance betw... 详细信息
来源: 评论
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel CNNs and BiLSTM Neural Networks  23
Cyberbullying Detection Using Bag-of-Words, TF-IDF, Parallel...
收藏 引用
23rd International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2024
作者: Fattahi, Jaouhar Sghaier, Feriel Mejri, Mohamed Bahroun, Sahbi Ghayoula, Ridha Manai, Elyes Department of Computer Science and Software Engineering Laval University 2325 rue de l'Université QuébecQCG1V 0A6 Canada Ecole Nationale d'Ingénieurs de Carthage Université de Carthage Tunis Tunisia Institut Supérieur d'Informatique Université de Tunis El-Manar Tunis Tunisia Faculty of Engineering Information Systems Department University of Moncton New Brunswick Canada
Cyberbullying, marked by its persistent and intentional aggression online, yields severe repercussions for its victims, extending beyond immediate distress to long-lasting effects such as heightened anxiety, depressio... 详细信息
来源: 评论
Comparison of Commercial Pedometer Applications: A Rigorous Approach
Comparison of Commercial Pedometer Applications: A Rigorous ...
收藏 引用
International Conference on Smart Computing (SMARTCOMP)
作者: Alessio Terzi Federico Montori Lorenzo Gigli Luca Bedogni Marco Di Felice Luciano Bononi Department of Computer Science and Engineering University of Bologna Italy Advanced Research Center in Electronic Systems (ARCES) University of Bologna Italy Department of Physics Informatics and Mathematics University of Modena and Reggio Emilia Italy
In recent years, there has been a growth in the development of numerous software algorithms dedicated to pedometers (or step counters). This surge has subsequently spurred the creation of various context-aware smartph... 详细信息
来源: 评论