咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 10,024 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,298 篇 工学
    • 9,665 篇 计算机科学与技术...
    • 7,741 篇 软件工程
    • 3,253 篇 信息与通信工程
    • 3,071 篇 控制科学与工程
    • 2,099 篇 电气工程
    • 1,828 篇 电子科学与技术(可...
    • 1,657 篇 生物工程
    • 1,305 篇 机械工程
    • 1,305 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 815 篇 动力工程及工程热...
    • 800 篇 仪器科学与技术
    • 702 篇 化学工程与技术
    • 620 篇 材料科学与工程(可...
    • 555 篇 安全科学与工程
    • 543 篇 交通运输工程
  • 8,771 篇 理学
    • 4,516 篇 数学
    • 2,318 篇 物理学
    • 1,980 篇 生物学
    • 1,538 篇 统计学(可授理学、...
    • 1,464 篇 系统科学
    • 821 篇 化学
  • 3,831 篇 管理学
    • 2,529 篇 管理科学与工程(可...
    • 1,428 篇 图书情报与档案管...
    • 1,290 篇 工商管理
  • 1,387 篇 医学
    • 1,158 篇 临床医学
    • 980 篇 基础医学(可授医学...
    • 564 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 703 篇 法学
    • 579 篇 社会学
  • 461 篇 经济学
  • 313 篇 教育学
  • 279 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 484 篇 deep learning
  • 355 篇 systems engineer...
  • 343 篇 computational mo...
  • 335 篇 machine learning
  • 325 篇 artificial intel...
  • 318 篇 application soft...
  • 292 篇 computer archite...
  • 266 篇 control systems
  • 261 篇 internet of thin...
  • 235 篇 support vector m...
  • 235 篇 feature extracti...
  • 224 篇 accuracy
  • 215 篇 optimization
  • 206 篇 neural networks
  • 204 篇 software enginee...
  • 198 篇 information syst...
  • 196 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 45 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 53 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 42 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars
  • 18 篇 tsiftsis theodor...

语言

  • 24,627 篇 英文
  • 1,265 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Systems Engineering and Science"
26148 条 记 录,以下是491-500 订阅
排序:
Optimizing Gene Expression Analysis Using Clustering Algorithms  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Bikku, Thulasi Ramu, J. Sekhar, J. Chandra Pratap, V. Krishna Pujari, Jeevana Jyothi Computer Science and Engineering Amrita School of Computing Amaravati Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632014 India
Gene expression analysis plays a crucial role in understanding biological processes and diseases. However, the high-dimensional nature of gene expression data poses challenges for its analysis and interpretation. Clus... 详细信息
来源: 评论
Submodular Participatory Budgeting  1
收藏 引用
18th International Conference on Algorithmic Aspects in Information and Management, AAIM 2024
作者: Yuan, Jing Tang, Shaojie Department of Computer Science and Engineering University of North Texas Denton United States Department of Management Science and Systems School of Management University at Buffalo Buffalo United States
Participatory budgeting refers to the practice of allocating public resources by collecting and aggregating individual preferences. Most existing studies in this field often assume an additive utility function, where ... 详细信息
来源: 评论
Shortest Job First with Gateway-based Resource Management Strategy for Fog Enabled Cloud Computing  4
Shortest Job First with Gateway-based Resource Management St...
收藏 引用
4th IEEE International Conference on Data engineering and Communication systems, ICDECS 2024
作者: Anbazhagan, K. Kumar, Rotash Thilagavathy, R. Anuradha, D. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Government Engineering College Department of Electronics and Communication Engineering Rajasthan Jhalawar India College of Engineering and Technology Srm Institute of Science and Technology Kattankulathur Department of Computing Technologies Chennai India Panimalar Engineering College Department of Computer Science and Business Systems Chennai India
In recent years, fog computing has extended cloud services to the network edge, lowering network latency and congestion and overcoming cloud computing restrictions. Many hurdles, however, must be overcome before the b... 详细信息
来源: 评论
System of System Architecture for Cybersecurity of Power systems Operations  11
System of System Architecture for Cybersecurity of Power Sys...
收藏 引用
11th International Conference on Electrical and Electronics engineering, ICEEE 2024
作者: Ur Rahman, Ehab Ashiku, Lirim Dagli, Cihan Bo, Rui Missouri University of Science and Technology Department of Electrical and Computer Engineering RollaMO United States Missouri Universtity of Science and Technology Engineering Management and Systems Engineering RollaMO United States
Smart grids are at risk of cyber-attacks due to more connected devices being introduced. Different kinds of attacks may incur different consequences in the operation of smart grids. Attackers have identified different... 详细信息
来源: 评论
A New Approach for Quantum Phase Estimation Based Algorithms for Machine Learning  8th
A New Approach for Quantum Phase Estimation Based Algorithm...
收藏 引用
8th International Conference on Smart City Applications, SCA 2023
作者: Ouedrhiri, Oumayma Banouar, Oumayma El Hadaj, Salah Raghay, Said Department of Computer Science and Mathematics University of Quebec at Trois-Riviéres Trois-Riviéres Canada Faculty of Sciences and Techniques Laboratory of Computer Science Engineering and Systems Marrakesh Morocco
One of the greatest developments in computer science is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论
Coupling Mobile Brain Imaging and Virtual Reality Omnidirectional Treadmill to Explore Attenuated Situational Awareness during Distracted Walking
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2024年 第3期16卷 1063-1076页
作者: Chuang, Chun-Hsiang Chiu, Tsai-Feng Hsu, Hao-Che Lin, Shih-Syun National Tsing Hua University Research Center for Education and Mind Sciences College of Education The Institute of Information Systems and Applications College of Electrical Engineering and Computer Science Hsinchu300 Taiwan National Tsing Hua University Research Center for Education and Mind Sciences Hsinchu300 Taiwan National Yang Ming Chiao Tung University Department of Computer Science Hsinchu300193 Taiwan National Taiwan Ocean University Department of Computer Science and Engineering Keelung20224 Taiwan
Walking while engaging in distracting activities affects our perception of changes happening on the road, leading to exposure to hazardous conditions. This study aimed to evidence that pedestrians who become distracte... 详细信息
来源: 评论
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri690525 India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Campus Kerala Amritapuri690525 India Lehigh University Department of Electrical and Computer Engineering BethlehemPA18015 United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论