咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computing and Software Engineering"
2889 条 记 录,以下是361-370 订阅
排序:
CEER:Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters
收藏 引用
Computer Systems Science & engineering 2023年 第6期45卷 2587-2602页
作者: Sayyed Mudassar Shah Tariq Hussain Babar Shah Farman Ali Khalid Zaman Kyung-Sup Kwak Institute of Computer Science&Information Technology the University of Agriculture Peshawar25000Pakistan High Performance Computing and Networking Institute National Research Council(ICAR-CNR)Naples80131Italy College of Technological Innovation Zayed UniversityDubai19282UAE Department of Software Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Inha UniversityIncheon22212Korea
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration *** most of these applications,the network is composed of several sensor nodes deployed at different depths in th... 详细信息
来源: 评论
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems
收藏 引用
Computer Modeling in engineering & Sciences 2022年 第4期131卷 23-26页
作者: Qi Liu Xiaodong Liu Radu Grosu Ching-Nung Yang School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Computing Edinburgh Napier UniversityEdinburgh018373UK Institute of Computer Engineering Vienna University of TechnologyWien1040Austria Department of Computer Science and Information Engineering National Dong Hwa UniversityHualien97401Taiwan
Cyber Physical Systems(CPS)have been appealing in recent years as a result of the rapid emergence of unique hardware and software compositions that create smart,autonomously behaving ***-to-end procedures and new type... 详细信息
来源: 评论
Exploring Attention and Self-Supervised Learning Mechanism for Graph Similarity Learning
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2024年 第6期36卷 11106-11120页
作者: Guangqi Wen Xin Gao Wenhui Tan Peng Cao Jinzhu Yang Weiping Li Osmar R. Zaiane College of Computer Science and Engineering Northeastern University Shenyang China School of Software and Microelectronics Peking University Beijing China Department of Computing Science University of Alberta Edmonton AB Canada
Graph similarity estimation is a challenging task due to the complex graph structures. Though important and well-studied, three critical aspects are yet to be fully handled in a unified framework: 1) how to learn rich... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage Systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Ramesh, P.S. Sudha, I. Jagannathan, J. Pandiarajan, Rajkumar Ponmalar, A. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy Of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India R.M.K. Engineering College Tamilnadu Chennai India
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature... 详细信息
来源: 评论
Advanced Machine Learning Algorithms for 1Predictive Analytics in Healthcare to Enhance Patient Outcomes with Data-Driven Insights
Advanced Machine Learning Algorithms for 1Predictive Analyti...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Pandiarajan, Rajkumar Jagannathan, J. Ramesh, P.S. Ponmalar, A. Sudha School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
This research aims to explore the use of modern complex defensive machine learning algorithms in the provision of predictive analytics for health improvement. Incorporating electronic health records, medical image inf... 详细信息
来源: 评论
Advanced Multi-Spectral Image Processing Techniques for Enhanced Remote Sensing and Comprehensive Environmental Monitoring in Diverse Ecosystems
Advanced Multi-Spectral Image Processing Techniques for Enha...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Jagannathan, J. Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India
The research is aimed at improvement of multi-spectral image analysis for remote sensing and monitoring the environment at various ecosystems. A combined spectral imagery encompasses several spectrums at a time compar... 详细信息
来源: 评论
Enhancing Healthcare Data Security in Cloud computing Systems through Advanced Homomorphic Encryption Techniques Integrated with Cuckoo Search Optimization Algorithm
Enhancing Healthcare Data Security in Cloud Computing System...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Sudha, I. Ramesh, P.S. Ponmalar, A. Jagannathan, J. Pandiarajan, Rajkumar Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav... 详细信息
来源: 评论
Proactive Hybrid Autoscaling for Container-Based Edge Applications in Kubernetes  19th
Proactive Hybrid Autoscaling for Container-Based Edge Appli...
收藏 引用
19th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2023
作者: Zhu, Kaile Shen, Shihao Lan, Shizhan Wang, Xiaofei Zhang, Cheng Qiu, Chao Leung, Victor College of Intelligence and Computing Tianjin University Tianjin China China Mobile Guangxi Institute Co. Ltd. Shanghai China Institute of Technology Tianjin University of Finance and Economics Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
As the rising of the Internet of Things (IoT), edge computing is widely adopted in numerous applications. However, current autoscaling tools are not designed for edge applications and can not utilize the heterogeneous... 详细信息
来源: 评论
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Nimra Basit Fatima Khalid Qurat Ul Ain Maria Andleeb Department of Software Engineering University of Engineering and Technology Taxila Pakistan Faculty of Computer Sciences and Engineeing GIKI Topi Pakistan Department of Computing Shifa Tameer-e-Millat University PRC Islamabad Pakistan
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photo... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论