咨询与建议

限定检索结果

文献类型

  • 1,153 篇 会议
  • 818 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,252 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 835 篇 软件工程
    • 247 篇 信息与通信工程
    • 163 篇 控制科学与工程
    • 162 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 生物医学工程(可授...
    • 68 篇 光学工程
    • 64 篇 机械工程
    • 64 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 48 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 43 篇 动力工程及工程热...
  • 586 篇 理学
    • 329 篇 数学
    • 179 篇 生物学
    • 115 篇 物理学
    • 91 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 46 篇 化学
  • 384 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 119 篇 医学
    • 110 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 53 篇 经济学
    • 52 篇 应用经济学
  • 52 篇 教育学
    • 49 篇 教育学
  • 51 篇 法学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 61 篇 machine learning
  • 46 篇 deep learning
  • 44 篇 computational mo...
  • 42 篇 internet of thin...
  • 42 篇 quality of servi...
  • 42 篇 cloud computing
  • 41 篇 grid computing
  • 39 篇 accuracy
  • 38 篇 resource managem...
  • 38 篇 training
  • 32 篇 feature extracti...
  • 32 篇 software
  • 31 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 27 篇 semantics
  • 27 篇 security

机构

  • 121 篇 college of compu...
  • 53 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 23 篇 college of intel...
  • 22 篇 shenzhen univers...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 14 篇 school of comput...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 college of compu...
  • 13 篇 artificial intel...
  • 13 篇 department of in...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 18 篇 leung victor c.m...
  • 16 篇 shen linlin
  • 15 篇 wang xiaofei
  • 14 篇 muhammad adnan k...
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 10 篇 zhengfeng ji

语言

  • 1,914 篇 英文
  • 86 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2010 条 记 录,以下是181-190 订阅
排序:
Beyond Data Collection: Safeguarding User Privacy in Social Robotics
Beyond Data Collection: Safeguarding User Privacy in Social ...
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Mahboobeh Dorafshanian Muhammad Aitsam Mohamed Mejri Alessandro Di Nuovo Department of Computer Science & Software Engineering Laval University QC Canada Department of Computing Sheffield Hallam University Sheffield UK
In an era marked by the advanced capabilities of social robots in personal and public spaces, the issue of pervasive data collection by these entities becomes increasingly pertinent. Social robots, deployed by governm... 详细信息
来源: 评论
Towards Prevention of Sportsmen Burnout:Formal Analysis of Sub-Optimal Tournament Scheduling
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1509-1526页
作者: Syed Rameez Naqvi Adnan Ahmad S.M.Riazul Islam Tallha Akram M.Abdullah-Al-Wadud Atif Alamri Department of Electrical and Computer Engineering COMSATS University IslamabadWah CampusWah47040Pakistan Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Research Chair of Pervasive and Mobile Computing King Saud UniversityRiyadh11543Saudi Arabia
Scheduling a sports tournament is a complex optimization problem,which requires a large number of hard constraints to *** the availability of several such constraints in the literature,there remains a gap sincemost of... 详细信息
来源: 评论
Load Balancing Framework for Cross-Region Tasks in Cloud computing
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1479-1490页
作者: Jaleel Nazir Muhammad Waseem Iqbal Tahir Alyas Muhammad Hamid Muhammad Saleem Saadia Malik Nadia Tabassum Department of Software Engineering The Superior CollegeLahorePakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Department of Statistics and Computer Science University of Veterinary and Animal SciencesLahore54000Pakistan Department of Industrial Engineering Faculty of EngineeringRabighKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology-RabighKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Virtual University of PakistanLahore54000Pakistan
Load balancing is a technique for identifying overloaded and underloaded nodes and balancing the load between *** maximize various performance parameters in cloud computing,researchers suggested various load balancing... 详细信息
来源: 评论
Flexible Memory Rotation (FMR): Rotated Representation with Dynamic Regularization to Overcome Catastrophic Forgetting in Continual Knowledge Graph Learning
Flexible Memory Rotation (FMR): Rotated Representation with ...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Zhu, Lijing Jeon, Dong Hyun Sun, Wenbo Yang, Li Xie, Yixin Niu, Shuteng Bowling Green State University Computer Science Department Bowling Green United States University of Michigan Transportation Research Institute Ann Arbor United States University of North Carolina at Charlotte Computer Science Department Charlotte United States Kennesaw State University College of Computing and Software Engineering Marietta United States
As a special type of Knowledge Graph (KG), Continual Knowledge Graph Learning (CKGL) plays a pivotal role in various areas such as recommendation systems, search engines, and personalized services, where knowledge dyn... 详细信息
来源: 评论
Fast Second-order Method for Neural Networks under Small Treewidth Setting
Fast Second-order Method for Neural Networks under Small Tre...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Li, Xiaoyu Long, Jiangxuan Song, Zhao Zhou, Tianyi Stevens Institute of Technology Department of Computer Science HobokenNJ United States South China University of Technology School of Software Engineering Guangzhou China University of California Berkeley The Simons Institute for the Theory of Computing BerkeleyCA United States University of Southern California Department of Computer Science Los AngelesCA United States
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order... 详细信息
来源: 评论
Multiobjective Sequential Transfer Optimization: Benchmark Problems and Preliminary Results  13
Multiobjective Sequential Transfer Optimization: Benchmark P...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Xue, Xiaoming Feng, Liang Yang, Cuie Liu, Songbai Song, Linqi Tan, Kay Chen City University of Hong Kong Department of Computer Science Hong Kong College of Computer Science Chongqing University Chongqing China Northeastern University State Key Lab of Synthetic Automation for Process Industries Shenyang China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The Hong Kong Polytechnic University Department of Computing Hong Kong
In cases of frequent problem-solving of multiobjective optimization tasks from a domain due to changing conditions or problem features, a growing number of individual tasks will be solved and stored in a database, pro... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN Computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Neural Networks and Deep Learning: Innovations and Applications in Soft computing  7
Neural Networks and Deep Learning: Innovations and Applicati...
收藏 引用
7th International Conference on Contemporary computing and Informatics, IC3I 2024
作者: Abdulkadar, Jahagirdar Imran Mohan, Chinnem Rama Bharati, P. Vijaya Palit, Shamik Rao, Gunda Srinivasa Mudholkar, Pankaj Savitribai Phule Pune University India Narayana Engineering College Department of Computer Science and Engineering Andhra Pradesh Nellore524004 India Vignans Institute of Engineering for Women Department of Cse Andhra Pradesh Visakhapatnam530049 India University of Stirling Department of Computing Science and Software Engineering RAK Campus United Arab Emirates Mallareddy University School of Management and Commerce Kompally500100 India Marwadi University Faculty of Computer Applications Gujarat Rajkot360003 India
The Paper explores different aspects of deep learning techniques and neural networks in the fields of healthcare, time-series forecasting, agriculture, and other relevant sectors through soft computing. The objective ... 详细信息
来源: 评论
Enhancing Drone Video Analytics Security Management using an AERPAW Testbed
Enhancing Drone Video Analytics Security Management using an...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Alicia Esquivel Morel Zack Murry Kevin Kostage Chengyi Qu Prasad Calyam Department of Electrical Engineering and Computer Science University of Missouri Columbia USA Department of Computing and Software Engineering Florida Gulf Coast University Florida USA
Drone-based applications involving real-time video analytics are emerging to serve diverse situational awareness use cases ranging from precision agriculture to disaster response. Hence, there is a need to study robus... 详细信息
来源: 评论
An Approach for Early Detection of Schizophrenia
An Approach for Early Detection of Schizophrenia
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Sachin Paranagama Isiwara Uditha Pamodya Daundasekara Shehani Hettiarachchi Lokesha Weerasinghe Dharshana Kasthurirathna Department of Computer Science and Software Engineering Faculty Of Computing Sri Lanka Institue Of Information Technology Malabe Sri Lanka
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in... 详细信息
来源: 评论