咨询与建议

限定检索结果

文献类型

  • 1,153 篇 会议
  • 809 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,244 篇 工学
    • 1,003 篇 计算机科学与技术...
    • 835 篇 软件工程
    • 247 篇 信息与通信工程
    • 163 篇 控制科学与工程
    • 162 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 生物医学工程(可授...
    • 68 篇 光学工程
    • 64 篇 机械工程
    • 63 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 48 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 43 篇 动力工程及工程热...
  • 586 篇 理学
    • 329 篇 数学
    • 179 篇 生物学
    • 115 篇 物理学
    • 91 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 46 篇 化学
  • 384 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 119 篇 医学
    • 110 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 53 篇 经济学
    • 52 篇 应用经济学
  • 52 篇 教育学
    • 49 篇 教育学
  • 51 篇 法学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 79 篇 computer science
  • 65 篇 software enginee...
  • 58 篇 machine learning
  • 45 篇 deep learning
  • 44 篇 computational mo...
  • 42 篇 quality of servi...
  • 42 篇 cloud computing
  • 41 篇 internet of thin...
  • 41 篇 grid computing
  • 39 篇 accuracy
  • 38 篇 resource managem...
  • 38 篇 training
  • 32 篇 feature extracti...
  • 32 篇 software
  • 31 篇 computer archite...
  • 30 篇 application soft...
  • 29 篇 laboratories
  • 27 篇 semantics
  • 27 篇 protocols
  • 26 篇 security

机构

  • 121 篇 college of compu...
  • 53 篇 department of co...
  • 34 篇 department of co...
  • 32 篇 state key labora...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 22 篇 college of intel...
  • 22 篇 shenzhen univers...
  • 20 篇 department of co...
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 school of comput...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 college of compu...
  • 13 篇 artificial intel...
  • 13 篇 department of in...
  • 12 篇 school of softwa...

作者

  • 46 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 18 篇 leung victor c.m...
  • 16 篇 shen linlin
  • 15 篇 wang xiaofei
  • 14 篇 muhammad adnan k...
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 10 篇 zhengfeng ji

语言

  • 1,867 篇 英文
  • 86 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
1963 条 记 录,以下是131-140 订阅
排序:
Sinhala Named Entity Recognition Model: Domain-Specific Classes in Sports  4
Sinhala Named Entity Recognition Model: Domain-Specific Clas...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Wijesinghe, W.M.S.K. Tissera, Muditha Department of Statistics and Computer Science Faculty of Science University of Kelaniya Sri Lanka Department of Software Engineering Faculty of Computing & Technology University of Kelaniya Sri Lanka
Named Entity Recognition (NER) is one of the crucial and vital subtasks that must be solved in most Natural Language Processing (NLP) tasks. However, constructing a NER system for the Sinhala Language is challenging. ... 详细信息
来源: 评论
Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6659-6671页
作者: Kang, Guosheng Wang, Yang Liu, Jianxun Cao, Buqing Xiao, Yong Xu, Yu Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China University of Cambridge Cambridge Baker Systems Genomics Initiative British Heart Foundation Cardiovascular Epidemiology Unit Department of Public Health and Primary Care CambridgeCB1 8RN United Kingdom
With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction be... 详细信息
来源: 评论
Robust Length of Stay Prediction Model for Indoor Patients
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 5519-5536页
作者: Ayesha Siddiqa Syed Abbas Zilqurnain Naqvi Muhammad Ahsan Allah Ditta Hani Alquhayz M.A.Khan Muhammad Adnan Khan Department of Mechatronics and Control Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Information Sciences Division of Science and TechnologyUniversity of EducationLahore54000Pakistan Department of Computer Science and Information College of Science in ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13557Korea
Due to unforeseen climate change,complicated chronic diseases,and mutation of viruses’hospital administration’s top challenge is to know about the Length of stay(LOS)of different diseased patients in the *** managem... 详细信息
来源: 评论
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming  36
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based A...
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Tashtarian, Farzad Bentaleb, Abdelhak Amirpour, Hadi Taraghi, Babak Timmerer, Christian Hellwagner, Hermann Zimmermann, Roger Alpen-Adria-Universitat Klagenfurt Christian Doppler Laboratory Athena Austria Concordia University Department of Computer Science and Software Engineering Canada National University of Singapore School of Computing Singapore
Video content in Live HTTP Adaptive Streaming (HAS) is typically encoded using a pre-defined, fixed set of bitrate-resolution pairs (termed Bitrate Ladder), allowing play-back devices to adapt to changing network cond... 详细信息
来源: 评论
Recent Advances in Edge computing for 6G
Recent Advances in Edge Computing for 6G
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Alawadhi, Abdulwadood Almogahed, Abdullah University of Science and Technology Faculty of Engineering and Computing Department of Computers and Information Technology Yemen Taiz University Faculty of Engineering and Information Technology Department of Software Engineering Taiz Yemen
Edge computing is a new technology that enables 6G development by bringing cloud capabilities closer to end users to overcome traditional cloud flaws such as high latency and a lack of security. Few studies identify r... 详细信息
来源: 评论
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1747-1756页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Bashir, Ali Kashif Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Manchester Metropolitan University Department of Computing and Mathematics ManchesterM15 6BH United Kingdom Woxsen University Woxsen School of Business Hyderabad502345 India Lebanese American University Department of Computer Science and Mathematics Beirut1102 2801 Lebanon Illinois Institute of Technology Information Technology and Management ChicagoIL60555 United States
Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel t... 详细信息
来源: 评论
Insider Attack Detection Using Deep Belief Neural Network in Cloud computing
收藏 引用
Computer Systems science & engineering 2022年 第5期41卷 479-492页
作者: A.S.Anakath R.Kannadasan Niju P.Joseph P.Boominathan G.R.Sreekanth School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002TamilnaduIndia Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science CHRIST(Deemed to be University)Bengaluru560029India Department of Information Security School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science and Engineering Kongu Engineering CollegeErode638060TamilnaduIndia
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor... 详细信息
来源: 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论