咨询与建议

限定检索结果

文献类型

  • 5,480 篇 会议
  • 3,798 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 9,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,533 篇 工学
    • 3,369 篇 计算机科学与技术...
    • 2,629 篇 软件工程
    • 1,388 篇 信息与通信工程
    • 1,027 篇 电子科学与技术(可...
    • 994 篇 电气工程
    • 849 篇 控制科学与工程
    • 647 篇 光学工程
    • 570 篇 生物工程
    • 408 篇 生物医学工程(可授...
    • 360 篇 材料科学与工程(可...
    • 356 篇 机械工程
    • 293 篇 动力工程及工程热...
    • 286 篇 仪器科学与技术
    • 273 篇 化学工程与技术
    • 179 篇 安全科学与工程
    • 174 篇 交通运输工程
  • 3,315 篇 理学
    • 1,452 篇 数学
    • 1,417 篇 物理学
    • 624 篇 生物学
    • 534 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 336 篇 化学
  • 1,166 篇 管理学
    • 799 篇 管理科学与工程(可...
    • 412 篇 图书情报与档案管...
    • 398 篇 工商管理
  • 401 篇 医学
    • 339 篇 临床医学
    • 296 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
    • 154 篇 公共卫生与预防医...
  • 196 篇 法学
    • 160 篇 社会学
  • 123 篇 经济学
  • 88 篇 教育学
  • 73 篇 农学
  • 19 篇 文学
  • 16 篇 军事学
  • 11 篇 艺术学

主题

  • 222 篇 computational mo...
  • 177 篇 laboratories
  • 161 篇 computer archite...
  • 155 篇 deep learning
  • 140 篇 machine learning
  • 138 篇 application soft...
  • 132 篇 feature extracti...
  • 130 篇 computer science
  • 128 篇 quality of servi...
  • 127 篇 bandwidth
  • 126 篇 internet of thin...
  • 118 篇 optimization
  • 109 篇 hardware
  • 107 篇 throughput
  • 104 篇 accuracy
  • 103 篇 routing
  • 103 篇 resource managem...
  • 101 篇 neural networks
  • 97 篇 real-time system...
  • 96 篇 protocols

机构

  • 190 篇 department of el...
  • 93 篇 real-time comput...
  • 80 篇 college of compu...
  • 53 篇 school of comput...
  • 51 篇 department of co...
  • 41 篇 department of co...
  • 39 篇 department of el...
  • 36 篇 nanyang technolo...
  • 36 篇 school of comput...
  • 35 篇 institute for qu...
  • 34 篇 department of co...
  • 33 篇 department of ph...
  • 33 篇 faculty of scien...
  • 33 篇 departamento de ...
  • 33 篇 department for p...
  • 33 篇 department of ph...
  • 33 篇 dipartimento di ...
  • 33 篇 yerevan physics ...
  • 32 篇 college of compu...
  • 32 篇 lehrstuhl für ex...

作者

  • 124 篇 niyato dusit
  • 88 篇 k.g. shin
  • 57 篇 han zhu
  • 35 篇 mei-ling shyu
  • 34 篇 shu-ching chen
  • 33 篇 zhou mengchu
  • 30 篇 sun geng
  • 28 篇 ender ayanoglu
  • 26 篇 hossam s. hassan...
  • 25 篇 f. buehrer
  • 25 篇 m. khader
  • 25 篇 a. t. law
  • 25 篇 c. alexa
  • 25 篇 j. d. mansour
  • 25 篇 j. m. izen
  • 25 篇 s. veneziano
  • 25 篇 d. di valentino
  • 25 篇 g. bella
  • 25 篇 j. strandberg
  • 25 篇 d. calvet

语言

  • 7,811 篇 英文
  • 1,492 篇 其他
  • 78 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Electrical and Computer Engineering and the Optoelectronic Computing"
9375 条 记 录,以下是4911-4920 订阅
排序:
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS’2019 Challenge
arXiv
收藏 引用
arXiv 2018年
作者: Li, Deqiang Li, Qianmu Ye, Yanfang Xu, Shouhuai School of Computer Science and Engineering Nanjing University of Science and Technology Department of Computer Science and Electrical Engineering West Virginia University Department of Computer Science University of Texas at San Antonio School of Computing and Information Sciences Florida International University
Malware continues to be a major cyber threat, despite the tremendous effort that has been made to combat them. The number of malware in the wild steadily increases over time, meaning that we must resort to automated d... 详细信息
来源: 评论
Asynchronous local construction of bounded-degree network topologies using only neighborhood information
arXiv
收藏 引用
arXiv 2018年
作者: Koyuncu, Erdem Jafarkhani, Hamid Department of Electrical and Computer Engineering University of Illinois Chicago United States Center for Pervasive Communications and Computing University of California Irvine United States
We consider ad-hoc networks consisting of n wireless nodes that are located on the plane. Any two given nodes are called neighbors if they are located within a certain distance (communication range) from one another. ... 详细信息
来源: 评论
Excitable london: Street map analysis with oregonator model
arXiv
收藏 引用
arXiv 2018年
作者: Adamatzky, Andrew Phillips, Neil Weerasekera, Roshan Tsompanas, Michail-Antisthenis Sirakoulis, Georgios Ch. Department of Computer Science and Creative Technologies Unconventional Computing Lab Uwe Bristol United Kingdom Department of Engineering Design and Mathematics Uwe Bristol United Kingdom Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi Greece
We explore geometry of London's streets using computational mode of an excitable chemical system, Belousov-Zhabotinsky (BZ) medium. We virtually fill in the streets with a BZ medium and study propagation of excita...
来源: 评论
Community Detection Method Based on User Influence Probability and Similarity
Community Detection Method Based on User Influence Probabili...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Sheng-chen Yang Lei-lei Shi Lu Liu School of Computer Science and Telecommunication Engineering Jiangsu University Zhen Jiang China Department of Computing Electrical and Mathematics University of Derby Derby England
With the development of the social network, the rapid spread of micro-blog information and its convenience have enabled a large number of users to share their daily activities. On the basis of interest, users on Twitt... 详细信息
来源: 评论
Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks
Malware Detection in Cloud Infrastructures Using Convolution...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Mahmoud Abdelsalam Ram Krishnan Yufei Huang Ravi Sandhu Department of Computer Science Institute for Cyber Security and Center for Security and Privacy Enhanced Cloud Computing Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio Texas USA
A major challenge in Infrastructure as a Service (IaaS) clouds is its exposure to malware. Malware can spread rapidly within a datacenter and can cause major disruption to a cloud service provider and its clients. Thi... 详细信息
来源: 评论
Optimal Throughput Fairness Tradeoffs for Downlink Non-Orthogonal Multiple Access over Fading Channels
Optimal Throughput Fairness Tradeoffs for Downlink Non-Ortho...
收藏 引用
作者: Xing, Hong Liu, Yuanawei Nallanathan, Arumugam Ding, Zhiguo Poor, H. Vincent School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom Department of Electrical Engineering Princeton University PrincetonNJ08544 United States School of Computing and Communications Lancaster University LancasterLA1 4YW United Kingdom
Recently, non-orthogonal multiple access (NOMA) has attracted considerable interest as one of the 5G-enabling techniques. However, the users with better channel conditions in downlink communications intrinsically bene... 详细信息
来源: 评论
A compact structure for realizing Lorentzian, Fano and EIT resonance lineshapes in a microring resonator
arXiv
收藏 引用
arXiv 2019年
作者: Gu, Linpeng Fang, Hanlin Li, Juntao Fang, Liang Chua, Soo Jin Zhao, Jianlin Gan, Xuetao MOE Key Laboratory of Material Physics and Chemistry under Extraordinary Conditions Shaanxi Key Laboratory of Optical Information Technology School of Science Northwestern Polytechnical University Xi'an710072 China State Key Laboratory of Optoelectronic Materials and Technologies School of Physics Sun Yat-Sen University Guangzhou510275 China Department of Electrical and Computer Engineering National University of Singapore 4 Engineering Drive 3 Singapore117583 Singapore
Microring resonators, as a fundamental building block of photonic integrated circuits, have been well developed into numerous functional devices, whose performances are strongly determined by microring's resonance... 详细信息
来源: 评论
Interleaving channel estimation and limited feedback for point-to-point systems with a large number of transmit antennas
arXiv
收藏 引用
arXiv 2018年
作者: Koyuncu, Erdem Zou, Xun Jafarkhani, Hamid Department of Electrical and Computer Engineering University of Illinois Chicago United States Center for Pervasive Communications & Computing University of California Irvine United States
We introduce and investigate the opportunities of multi-antenna communication schemes whose training and feedback stages are interleaved and mutually interacting. Specifically, unlike the traditional schemes where the... 详细信息
来源: 评论
Effective Quantization Approaches for Recurrent Neural Networks
Effective Quantization Approaches for Recurrent Neural Netwo...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Md Zahangir Alom Adam T Moody Naoya Maruyama Brian C Van Essen Tarek M. Taha Department of Electrical and Computer Engineering University of Dayton OH USA Center for Applied Scientific Computing Lawrence Livermore National Laboratory CA USA
Deep learning, Recurrent Neural Networks (RNN) in particular have shown superior accuracy in a large variety of tasks including machine translation, language understanding, and movie frames generation. However, these ... 详细信息
来源: 评论
A game theoretic approach for dynamic information flow tracking to detect multi-stage advanced persistent threats
arXiv
收藏 引用
arXiv 2018年
作者: Moothedath, Shana Sahabandu, Dinuka Allen, Joey Clark, Andrew Bushnell, Linda Lee, Wenke Poovendran, Radha Department of Electrical and Computer Engineering University of Washington SeattleWA98195 United States Department of Electrical and Computer Engineering Worcester Polytechnic Institute WorcesterMA01609 United States College of Computing Georgia Institute of Technology AtlantaGA30332 United States
Advanced Persistent Threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tra... 详细信息
来源: 评论