咨询与建议

限定检索结果

文献类型

  • 42,820 篇 会议
  • 23,499 篇 期刊文献
  • 344 册 图书

馆藏范围

  • 66,663 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 35,908 篇 工学
    • 14,044 篇 计算机科学与技术...
    • 10,882 篇 软件工程
    • 9,804 篇 电气工程
    • 9,763 篇 电子科学与技术(可...
    • 7,718 篇 信息与通信工程
    • 6,378 篇 控制科学与工程
    • 4,133 篇 光学工程
    • 3,333 篇 材料科学与工程(可...
    • 2,754 篇 机械工程
    • 2,704 篇 化学工程与技术
    • 2,653 篇 动力工程及工程热...
    • 2,639 篇 仪器科学与技术
    • 2,531 篇 生物工程
    • 2,095 篇 生物医学工程(可授...
    • 1,395 篇 力学(可授工学、理...
    • 1,022 篇 冶金工程
    • 879 篇 航空宇航科学与技...
    • 858 篇 交通运输工程
  • 23,837 篇 理学
    • 11,946 篇 物理学
    • 9,154 篇 数学
    • 3,058 篇 系统科学
    • 3,046 篇 统计学(可授理学、...
    • 3,033 篇 化学
    • 2,954 篇 生物学
  • 5,116 篇 管理学
    • 3,675 篇 管理科学与工程(可...
    • 1,825 篇 工商管理
    • 1,532 篇 图书情报与档案管...
  • 1,893 篇 医学
    • 1,547 篇 临床医学
    • 1,238 篇 基础医学(可授医学...
  • 868 篇 法学
  • 716 篇 经济学
  • 385 篇 农学
  • 287 篇 教育学
  • 180 篇 文学
  • 138 篇 军事学
  • 72 篇 艺术学
  • 7 篇 历史学
  • 6 篇 哲学

主题

  • 2,832 篇 laboratories
  • 1,464 篇 control systems
  • 1,155 篇 computational mo...
  • 1,151 篇 frequency
  • 1,131 篇 bandwidth
  • 861 篇 switches
  • 848 篇 application soft...
  • 805 篇 voltage
  • 778 篇 computer archite...
  • 714 篇 costs
  • 704 篇 computer science
  • 697 篇 systems engineer...
  • 688 篇 testing
  • 638 篇 equations
  • 629 篇 neural networks
  • 612 篇 hardware
  • 604 篇 delay
  • 588 篇 robustness
  • 552 篇 throughput
  • 542 篇 optimization

机构

  • 543 篇 department of el...
  • 320 篇 department of el...
  • 205 篇 national mobile ...
  • 183 篇 radiation labora...
  • 158 篇 electrical compu...
  • 149 篇 national and kap...
  • 147 篇 universidad iber...
  • 147 篇 centro brasileir...
  • 139 篇 ieee
  • 137 篇 yerevan physics ...
  • 135 篇 infn sezione di ...
  • 122 篇 brunel universit...
  • 121 篇 istanbul technic...
  • 105 篇 state university...
  • 99 篇 department of el...
  • 95 篇 department of ph...
  • 93 篇 the university o...
  • 92 篇 faculty of scien...
  • 89 篇 faculté des scie...
  • 89 篇 departamento de ...

作者

  • 141 篇 niyato dusit
  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 108 篇 l. valencia palo...
  • 104 篇 c. hensel
  • 103 篇 t. liu
  • 93 篇 a. babaev
  • 92 篇 w. busza
  • 92 篇 a. garcia-bellid...
  • 90 篇 a. steen
  • 89 篇 n. cartiglia
  • 89 篇 n. colino
  • 89 篇 f. moortgat
  • 89 篇 b. clerbaux
  • 89 篇 g. sultanov
  • 88 篇 v. karjavine
  • 88 篇 m. a. ciocci
  • 87 篇 k. lamichhane
  • 87 篇 s. maselli
  • 86 篇 e. migliore

语言

  • 63,954 篇 英文
  • 1,778 篇 其他
  • 899 篇 中文
  • 7 篇 德文
  • 7 篇 日文
  • 5 篇 葡萄牙文
  • 4 篇 法文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Department of Electrical and Computer Engineering and Computer Systems Laboratory"
66663 条 记 录,以下是861-870 订阅
排序:
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 2235-2247页
作者: Mostafa Nassar Anas M.Ali Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Alexandria Higher Institute of Engineering&Technology(AIET) AlexandriaEgypt Department of Computer Science Security Engineering LaboratoryPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the *** techniques have been suggested for detecting attacks using machine learning... 详细信息
来源: 评论
An Immutable Framework for Smart Healthcare Using Blockchain Technology
收藏 引用
computer systems Science & engineering 2023年 第7期46卷 165-179页
作者: Faneela Muazzam A.Khan Suliman A.Alsuhibany Walid El-Shafai Mujeeb Ur Rehman Jawad Ahmad Department of Computer Science Quaid-i-Azam UniversityIslamabad45320Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Computer Science Security Engineering LaboratoryPrince Sultan UniversityRiyadh11586Saudi Arabia James Watt School of Engineering University of GlasgowG128QQUK School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare *** Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders ... 详细信息
来源: 评论
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles
收藏 引用
engineering 2024年 第2期33卷 178-189页
作者: Xiaoming Yuan Jiahui Chen Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen Qinhuangdao Branch Campus Northeastern UniversityQinhuangdao 066004China State Key Laboratory of Integrated Services Networks&the Research Institute of Smart Transportation Xidian UniversityXi’an 710071China Department of Electrical and Computer Engineering University of WindsorWindsorON N9B 3P4Canada Department of Electrical and Software Engineering University of CalgaryCalgaryAB T2N 1N4Canada SUSTech Institute of Future Networks Southern University of Science and TechnologyShenzhen 518055China Department of Electrical and Computer Engineering University of WaterlooWaterlooON N2L 3G1Canada
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... 详细信息
来源: 评论
Privacy-Preservation for Distributed Quantized k-means Clustering  59
Privacy-Preservation for Distributed Quantized k-means Clust...
收藏 引用
59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
作者: Rikos, Apostolos I. Manitara, Nicolas E. Oliva, Gabriele Hadjicostis, Christoforos N. Boston University Division of Systems Engineering Department of Electrical and Computer Engineering BostonMA02215 United States University of Cyprus Department of Electrical and Computer Engineering Nicosia1678 Cyprus Università Campus Bio-Medico di Roma Unit of Automatic Control Department of Engineering Rome00128 Italy
In this paper, we enhance a distributed version of the well known k-means algorithm with privacy-preservation features. While ensuring that sensitive or confidential information remains undisclosed to unauthorized ent... 详细信息
来源: 评论
Differentially Private Online Federated Learning with Correlated Noise  63
Differentially Private Online Federated Learning with Correl...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Zhang, Jiaojiao Zhu, Linglingzhi Johansson, Mikael Kth Royal Institute of Technology Division of Decision and Control Systems School of Electrical Engineering and Computer Science StockholmSE-100 44 Sweden Chinese University of Hong Kong Department of Systems Engineering and Engineering Management Hong Kong
We introduce a novel differentially private algorithm for online federated learning that employs temporally correlated noise to enhance utility while ensuring privacy of continuously released models. To address challe... 详细信息
来源: 评论
Stationary, continuous, and discrete wavelet-based approach for secure medical image transmission
收藏 引用
Research on Biomedical engineering 2023年 第1期39卷 167-178页
作者: Sayah, Moad Med Redouane, Kafi Med Amine, Khaldi Electrical Engineering Laboratory Department of Electronics Faculty of Sciences and Technology University of Kasdi Merbah Ouargla30000 Algeria Computer Science Department Faculty of Sciences and Technology University of Kasdi Merbah Ouargla30000 Algeria
Purpose: Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes en... 详细信息
来源: 评论
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY-BASED CYBERATTACK CAMPAIGNS
DESIGN, MODELING AND SIMULATION OF CYBERCRIMINAL PERSONALITY...
收藏 引用
2024 Winter Simulation Conference, WSC 2024
作者: Shin, Jeongkeun Dobson, Geoffrey B. Carley, L. Richard Carley, Kathleen M. Department of Electrical and Computer Engineering Carnegie Mellon University PittsburghPA United States Software and Societal Systems Department Carnegie Mellon University PittsburghPA United States
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims’ human factors affect th...
来源: 评论
Spatio-temporal Attention Graph Convolutions for Skeleton-based Action Recognition  23rd
Spatio-temporal Attention Graph Convolutions for Skeleton-b...
收藏 引用
22nd Scandinavian Conference on Image Analysis, SCIA 2023
作者: Le, Cuong Liu, Xin Computer Vision and Pattern Recognition Laboratory School of Engineering Science Lappeenranta-Lahti University of Technology LUT Lappeenranta Finland Computer Vision Laboratory Department of Electrical Engineering Linköping University Linköping Sweden
In skeleton-based action recognition, graph convolutional networks (GCN) have been applied to extract features based on the dynamic of the human body and the method has achieved excellent results recently. However, GC... 详细信息
来源: 评论
Towards Simpler Modelling Expressions for the Mechanical Characterization of Soft Materials
收藏 引用
Micro and Nanosystems 2024年 第3期16卷 172-182页
作者: Kontomaris, Stylianos-Vasileios Malamou, Anna Stylianou, Andreas Chliveros, Georgios Faculty of Engineering and Architecture Metropolitan College Athens Greece BioNanoTec LTD Nicosia Cyprus Radar Systems and Remote Sensing Lab School of Electrical & Computer Engineering National Technical University of Athens Athens Greece Department of Mechanical Engineering Faculty of Engineering School of Sciences European University Cyprus Nicosia2404 Cyprus
Aims: The aim of this paper is to develop a new, simple equation for deep spherical indentations. Background: The Hertzian theory is the most widely applied mathematical tool when testing soft materials because it pro... 详细信息
来源: 评论
On the Design of Novel Attention Mechanism for Enhanced Efficiency of Transformers  24
On the Design of Novel Attention Mechanism for Enhanced Effi...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Jha, Sumit Kumar Jha, Susmit Ewetz, Rickard Velasquez, Alvaro Computer Science Department Florida International University MiamiFL United States Computer Science Laboratory Sri International Menlo ParkCA United States Electrical and Computer Engineering University of Central Florida OrlandoFL United States Department of Computer Science University of Colorado Boulder BoulderCO United States
We present a new xor-based attention function for efficient hardware implementation of transformers. While the standard attention mechanism relies on matrix multiplication between the key and the transpose of the quer... 详细信息
来源: 评论