咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 250 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 347 篇 计算机科学与技术...
    • 290 篇 软件工程
    • 75 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 46 篇 生物工程
    • 35 篇 生物医学工程(可授...
    • 33 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 20 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 17 篇 网络空间安全
    • 16 篇 光学工程
    • 16 篇 建筑学
    • 15 篇 安全科学与工程
  • 168 篇 理学
    • 87 篇 数学
    • 47 篇 生物学
    • 36 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 17 篇 化学
  • 128 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 49 篇 医学
    • 47 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
    • 21 篇 药学(可授医学、理...
  • 23 篇 教育学
    • 22 篇 教育学
  • 22 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 grid computing
  • 31 篇 software enginee...
  • 30 篇 computer science
  • 30 篇 cloud computing
  • 28 篇 quality of servi...
  • 27 篇 resource managem...
  • 26 篇 computational mo...
  • 21 篇 processor schedu...
  • 20 篇 laboratories
  • 20 篇 machine learning
  • 19 篇 deep learning
  • 18 篇 application soft...
  • 17 篇 computer archite...
  • 17 篇 distributed comp...
  • 17 篇 accuracy
  • 16 篇 training
  • 15 篇 software
  • 14 篇 predictive model...
  • 14 篇 artificial intel...
  • 13 篇 protocols

机构

  • 26 篇 grid computing a...
  • 10 篇 college of compu...
  • 10 篇 computing and so...
  • 9 篇 cloud computing ...
  • 9 篇 department of in...
  • 8 篇 department of so...
  • 8 篇 department of in...
  • 7 篇 grid computing a...
  • 7 篇 department of la...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 department of so...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 national water a...
  • 6 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 graduate school ...
  • 6 篇 intelligent dist...

作者

  • 49 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 22 篇 buyya rajkumar
  • 13 篇 materwala huned
  • 11 篇 zander carol
  • 11 篇 leila ismail
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 9 篇 leonard barolli
  • 9 篇 sanders kate
  • 8 篇 edmundo tovar
  • 8 篇 bei zeng
  • 8 篇 moström jan erik
  • 8 篇 thomas lynda
  • 8 篇 fatos xhafa
  • 8 篇 zhengfeng ji
  • 7 篇 hennebelle alain
  • 7 篇 muhammad younas
  • 6 篇 galindo josé a.
  • 6 篇 r. buyya

语言

  • 670 篇 英文
  • 37 篇 其他
  • 2 篇 中文
检索条件"机构=Department of Languages and Computing Systems and Software Engineering"
709 条 记 录,以下是221-230 订阅
排序:
A Toolbox of Feminist Wonder: Theories and methods that can make a difference  26
A Toolbox of Feminist Wonder: Theories and methods that can ...
收藏 引用
26th ACM Conference on Computer-Supported Cooperative Work and Social computing, CSCW 2023
作者: Hansson, Karin Bardzell, Shaowen Bhandari, Aparajita Boulicault, Marion Doyle, Dylan Thomas Erete, Sheena Cerratto Pargman, Teresa Lazem, Shaimaa Muller, Michael Normark, Maria Petterson, Adrian Rosén, Anton Poikolainen Taylor, Alex S. Thomas, Jakita O. Watson, Julia Södertörn University The School of Natural Sciences Technology and Environmental Studies Sweden Georgia Institute of Technology The School of Interactive Computing United States Cornell University Department of Communication United States University of Edinburgh Department of Philosophy United States University of Colorado Boulder Department of Information Science United States University of Maryland College of Information United States Stockholm University The Department of Computer and Systems Sciences Sweden City for Scientific Research and Technological Applications The Informatics Research Institute Egypt Ibm Research Human Centered Ai United States Uppsala University Department of Informatics and Media Sweden University of Toronto Faculty of Information Canada Aalto University The School of Arts Design and Architecture Finland City University of London The Centre for Human Computer Interaction Design United Kingdom Auburn University Department of Computer Science and Software Engineering United States University of Toronto Department of Computer Science Canada
This one-day hybrid workshop builds on previous feminist CSCW workshops to explore feminist theoretical and methodological approaches that have provided us with useful tools to see things differently and make space fo... 详细信息
来源: 评论
Evaluation of algorithms to predict graduation rate in higher education institutions by applying educational data mining
收藏 引用
Australasian Journal of engineering Education 2019年 第1期24卷 4-13页
作者: Moscoso-Zea, Oswaldo Saa, Pablo Luján-Mora, Sergio Faculty of Engineering Sciences Universidad Tecnológica Equinoccial Quito Ecuador Department of Software and Computing Systems University of Alicante Alicante Spain
Nowadays, researchers analyse student data to predict the graduation rate by looking at the characteristics of students enrolled and to take corrective actions at an early stage or improve the admission process. Educa... 详细信息
来源: 评论
A systematic literature review of blockchain cyber security
收藏 引用
Digital Communications and Networks 2020年 第2期6卷 147-156页
作者: Paul J.Taylor Tooska Dargahi Ali Dehghantanha Reza M.Parizi Kim-Kwang Raymond Choo School of Computing Science&EngineeringUniversity of SalfordManchesterUK Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Software Engineering and Game Development Kennesaw State UniversityMariettaGA30060USA Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249USA
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,tru... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xia, Yuanjun Liu, Yining Chen, Jingxue Liang, Yangfan Khan, Fazlullah Alturki, Ryan Wang, Xiaopei Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software School of Computer and Information Security Guilin541004 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325027 China University of Technology School of Mathematical and Physical Sciences SydneyNSW2007 Australia Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China Umm AI-Qura University Makkah Department of Software Engineering College of Computing Saudi Arabia Riverside Department of Computer Science and Engineering University of California CA92521 United States
Federated learning (FL) has been widely used for privacy-preserving model updates in Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it remains vulnerable to attacks where adv... 详细信息
来源: 评论
Use of augmented reality for social communication skills in children and adolescents with autism spectrum disorder (ASD): A systematic review  6
Use of augmented reality for social communication skills in ...
收藏 引用
6th IEEE International Conference on engineering, Technologies and Applied Sciences, ICETAS 2019
作者: Khowaja, Kamran Al-Thani, Dena Banire, Bilikis Salim, Siti Salwah Shah, Asadullah Information Computing Technology Hamad Bin Khalifa University Doha Qatar University of Malaya Department of Software Engineering Kuala Lumpur Malaysia International Islamic University Malaysia Department of Information Systems Kuala Lumpur Malaysia
The purpose of this review is to provide a systematic analysis of studies investigating the use of augmented reality (AR) to improve the social communications skills of individuals (children and adults) diagnosed with... 详细信息
来源: 评论
Machine Learning-based Energy-Aware Offloading in Edge-Cloud Vehicular Networks  18
Machine Learning-based Energy-Aware Offloading in Edge-Cloud...
收藏 引用
18th International Conference on Mobile systems and Pervasive computing, MobiSPC 2021, The 16th International Conference on Future Networks and Communications, FNC 2021 and the 11th International Conference on Sustainable Energy Information Technology, SEIT 2021
作者: Ismail, Leila Materwala, Huned Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates National Water and Energy Center United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates
A vehicular network underpinned by the 3-tier vehicle-edge-cloud infrastructure enables an efficient and safer travel experience. The compute-intensive vehicular applications are often offloaded to the edge and/or clo... 详细信息
来源: 评论
Anytime diagnosis for reconfiguration
arXiv
收藏 引用
arXiv 2021年
作者: Felfernig, Alexander Walter, Rouven Galindo, José A. Benavides, David Erdeniz, Seda Polat Atas, Müslüm Reiterer, Stefan Applied Software Engineering Group Institute for Software Technology TU Graz Austria Symbolic Computation Group WSI Informatics Universität Tübingen Germany Computer Languages and Systems Department University of Sevilla Spain SelectionArts Austria
Many domains require scalable algorithms that help to determine diagnoses efficiently and often within predefined time limits. Anytime diagnosis is able to determine solutions in such a way and thus is especially usef... 详细信息
来源: 评论
Automated Computation of Therapies Using Failure Mode and Effects Analysis in the Medical Domain
arXiv
收藏 引用
arXiv 2024年
作者: Luttermann, Malte Baake, Edgar Bouchagiar, Juljan Gebel, Benjamin Grüning, Philipp Manikwadura, Dilini Schollemann, Franziska Teifke, Elisa Rostalski, Philipp Möller, Ralf Institute of Information Systems University of Lübeck Germany Institute of Telematics University of Lübeck Germany Institute for Software Engineering and Programming Languages University of Lübeck Germany Department of Infectious Diseases and Microbiology University Hospital Schleswig-Holstein Campus Lübeck Germany Institute for Neuro- and Bioinformatics University of Lübeck Germany Institute for Molecular Medicine University of Lübeck Germany Institute for Electrical Engineering in Medicine University of Lübeck Germany franziska.schollemann Department of Anesthesiology and Intensive Care University Hospital Schleswig-Holstein Campus Lübeck Germany
Failure mode and effects analysis (FMEA) is a systematic approach to identify and analyse potential failures and their effects in a system or process. The FMEA approach, however, requires domain experts to manually an... 详细信息
来源: 评论
A Reinforcement Learning Based Approach to Identify Resource Bottlenecks for Multiple Services Interactions in Cloud computing Environments  16th
A Reinforcement Learning Based Approach to Identify Resource...
收藏 引用
16th EAI International Conference on Collaborative computing: Networking, Applications, and Worksharing, CollaborateCom 2020
作者: Xu, Lingxiao Xu, Minxian Semmes, Richard Li, Hui Mu, Hong Gui, Shuangquan Tian, Wenhong Wu, Kui Buyya, Rajkumar School of Software and Information Engineering University of Electronic Science and Technology of China Chengdu China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China Co. Ltd. Chengdu China Department of Computer Science University of Victoria Victoria Canada CLOUDS Lab School of Computing and Information Systems University of Melbourne Melbourne Australia
Cloud service providers are provisioning resources including a variety of virtual machine instances to support customers that migrate their services to the cloud. From the customers’ perspective, selecting the approp... 详细信息
来源: 评论