咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Software Engineering and Computing"
2889 条 记 录,以下是311-320 订阅
排序:
Differential-Privacy Capacity
Differential-Privacy Capacity
收藏 引用
IEEE International Symposium on Information Theory
作者: Wael Alghamdi Shahab Asoodeh Flavio P. Calmon Oliver Kosut Lalitha Sankar School of Engineering and Applied Sciences Harvard University Department of Computing and Software McMaster University ( School of Electrical Computer and Energy Engineering Arizona State University
We formulate a fundamental limit in differential privacy under growing composition. We introduce the universal composition curve: the best privacy guarantee under repeated composition of a given privacy mechanism give... 详细信息
来源: 评论
A Data-Driven Approach Towards software Regression Testing Quality Optimization  25
A Data-Driven Approach Towards Software Regression Testing Q...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Moubayed, Abdallah Alhindawi, Nouh Alsakran, Jamal Injadat, MohammadNoor Kanan, Mohammad King Fahd University of Petroleum & Minerals Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems Dhahran Saudi Arabia Arizona State University School of Computing and Augmented Intelligence GilbertAZ United States Jadara University Department of Software Engineering Irbid Jordan Fairleigh Dickinson University Canada Zarqa University Data Science & Artificial Intelligence Department Zarqa Jordan University of Business and Technology Department of Industrial Engineering Jeddah Saudi Arabia
software testing is very important in software development to ensure its quality and reliability. As software systems have become more complex, the number of test cases has increased, which presents the challenge of e... 详细信息
来源: 评论
Artificial Neural Network using Image Processing for Digital Forensics Crime Scene Object Detection  2
Artificial Neural Network using Image Processing for Digital...
收藏 引用
2nd International Conference on Edge computing and Applications, ICECAA 2023
作者: Devasenapathy, Deepa Raja, M. Dwibedi, Rajat Kumar Vinoth, N. Jayasudha, T. Ganesh, V. Dilli Computing & Software Engineering U.A. Whitaker College of Engineering Florida Gulf Coast University United States Cmr Institute of Technology Department of Computer Science and Engineeting Bengaluru India Aarupadai Veedu Institute of Technology Vmrf Chennai India Chennai Institute of Technology Department of Mechatronics Engineering Chennai India Kpr Institute of Engineering and Technology Department of English Coimbatore India Chennai India
Digital forensics science places a significant emphasis on the detection of objects as one of the most vital areas of study. Several industries and institutions may benefit from the object detection method, including ... 详细信息
来源: 评论
Process Mining representation using Communication Structured Acyclic Nets (CSA-nets)
Process Mining representation using Communication Structured...
收藏 引用
2024 International Workshop on Petri Nets and software engineering, PNSE 2024
作者: Almutairi, Nadiyah Alshammari, Tuwailaa Alahmadi, Mohammed School of Computing Newcastle University Science Square Newcastle upon TyneNE4 5TG United Kingdom Department of Science and Technology University of Hafr Albatin Hafr Al-Batin39524 Saudi Arabia Department of Software Engineering University of Jeddah Jeddah21493 Saudi Arabia
Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets SON which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). It consists of... 详细信息
来源: 评论
Security Issues and Application of Blockchain  2nd
Security Issues and Application of Blockchain
收藏 引用
2nd International Conference on Machine Learning, Advances in computing,Renewable Energy and communication, MARC 2020
作者: Saxena, Sandeep Gupta, Umesh Kumar Renu Dwivedi, Vimal Galgotias College of Engineering and Technology Greater Noida India School of Computing Science and Engineering Galgotias University Greater Noida India Department of Software Science Tallinn University of Technology Tallinn Estonia
Blockchain is the most important IT invention in current technology. Blockchain is much secured, easily shared and works with various distributed ledgers. Blockchain is changing the working environment from centralize... 详细信息
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
The Role of AI in Predictive UX Shaping the Future of Metaverse Interactions
The Role of AI in Predictive UX Shaping the Future of Metave...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Nedal Nwasra Khalil Omar Zahid Hussain Qaisar Software Engineering Department University of Petra Amman Jordan Faculty of Computing & Emerging Technologies Multan Pakistan Computer Science Department University of Petra Amman Jordan
The Metaverse is defined as a collectively shared, persistent, and contextualized virtual space that will drive next-generation digital interaction facilitated by enhanced extended reality (XR) and edge computing. One... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things  4
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Riaz, Syed Waleed Khan, Fazlullah Ullah, Insaf Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Mardan Computer Science Department KPK Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang Ningbo315104 China Institute for Analytics and Data Science University of Essex ColchesterCO4 3SQ United Kingdom College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
CRAYM: neural field optimization via camera RAY matching  24
CRAYM: neural field optimization via camera RAY matching
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Liqiang Lin Wenpeng Wu Chi-Wing Fu Hao Zhang Hui Huang College of Computer Science and Software Engineering Shenzhen University Department of Computer Science and Engineering The Chinese University of Hong Kong School of Computing Science Simon Fraser University
We introduce camera ray matching (CRAYM) into the joint optimization of camera poses and neural fields from multi-view images. The optimized field, referred to as a feature volume, can be "probed" by the cam...
来源: 评论
IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 321-330页
作者: Namakshenas, Danyal Yazdinejad, Abbas Dehghantanha, Ali Parizi, Reza M. Srivastava, Gautam University of Guelph Cyber Science Lab Canada Cyber Foundry GuelphONN1G2W1 Canada Kennesaw State University Decentralized Science Lab College of Computing and Software Engineering MariettaGA30060 United States Brandon University Department of Math and Computer Science ManitobaMBR7A6A9 Canada China Medical University Research Centre for Interneural Computing Taichung40402 Taiwan Lebanese American University Department of Computer Science and Mathematics Beirut1102 Lebanon
The expansion of Industrial Cyber-Physical Systems (ICPS) has introduced new challenges in security and privacy, highlighting a research gap in effective anomaly detection while preserving data confidentiality. In the... 详细信息
来源: 评论