咨询与建议

限定检索结果

文献类型

  • 2,428 篇 会议
  • 999 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 3,499 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,015 篇 工学
    • 1,566 篇 计算机科学与技术...
    • 1,288 篇 软件工程
    • 400 篇 信息与通信工程
    • 340 篇 控制科学与工程
    • 185 篇 生物工程
    • 181 篇 电气工程
    • 141 篇 电子科学与技术(可...
    • 130 篇 生物医学工程(可授...
    • 129 篇 机械工程
    • 91 篇 安全科学与工程
    • 87 篇 动力工程及工程热...
    • 86 篇 光学工程
    • 73 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 建筑学
    • 69 篇 土木工程
  • 884 篇 理学
    • 483 篇 数学
    • 210 篇 生物学
    • 165 篇 系统科学
    • 162 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 73 篇 化学
  • 590 篇 管理学
    • 408 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 135 篇 医学
    • 124 篇 临床医学
    • 105 篇 基础医学(可授医学...
  • 93 篇 法学
    • 70 篇 社会学
  • 70 篇 经济学
    • 70 篇 应用经济学
  • 67 篇 教育学
    • 67 篇 教育学
  • 27 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 193 篇 software enginee...
  • 165 篇 computer science
  • 97 篇 application soft...
  • 92 篇 computational mo...
  • 87 篇 laboratories
  • 77 篇 machine learning
  • 76 篇 computer archite...
  • 76 篇 software
  • 74 篇 software systems
  • 73 篇 deep learning
  • 73 篇 accuracy
  • 69 篇 distributed comp...
  • 68 篇 artificial intel...
  • 66 篇 wireless sensor ...
  • 63 篇 quality of servi...
  • 61 篇 resource managem...
  • 61 篇 training
  • 57 篇 grid computing
  • 57 篇 cloud computing
  • 54 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of co...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...

作者

  • 66 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 36 篇 junping du
  • 29 篇 yingmin jia
  • 24 篇 ismail leila
  • 20 篇 fashan yu
  • 18 篇 xenofon koutsouk...
  • 16 篇 m. parashar
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 choo kim-kwang r...
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 dustdar schahram
  • 11 篇 ahmed bestoun s.

语言

  • 3,173 篇 英文
  • 299 篇 其他
  • 24 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering for Distributed Computer Systems"
3499 条 记 录,以下是971-980 订阅
排序:
Reinforcement Learning Based Oscillation Dampening Scaling up Single-Agent RL algorithms to a 100 AV highway field operational test
arXiv
收藏 引用
arXiv 2024年
作者: Jang, Kathy Lichtlé, Nathan Vinitsky, Eugene Shah, Adit Bunting, Matthew Nice, Matthew Piccoli, Benedetto Seibold, Benjamin Work, Daniel B. Delle Monache, Maria Laura Sprinkle, Jonathan Lee, Jonathan W. Bayen, Alexandre M. University of California Berkeley Department of Electrical Engineering and Computer Sciences United States University of California Berkeley Department of Mechanical Engineering United States University of California Berkeley Department of Civil and Environmental Engineering United States University of California Berkeley Institute for Transportation Studies United States École des Ponts Paristech Marne la Vallée France Vanderbilt University Institute for Software Integrated Systems United States Temple University Department of Mathematics United States Rutgers University-Camden Department of Mathematical Sciences United States
In this article, we explore the technical details of the reinforcement learning (RL) algorithms that were deployed in the largest field test of automated vehicles designed to smooth traffic flow in history as of 2023,... 详细信息
来源: 评论
Artificial Intelligence-based Service Chains Scheduling for Medical Emergency in Healthcare
Artificial Intelligence-based Service Chains Scheduling for ...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Mukesh Soni Maher Ali Rusho Haewon Byeon Azzah AlGhamdi Shaikh Abdul Hannan Parth Rameshchandra Dave Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Tathawade Pune Marashtra Department of Lockheed Martin Engineering Management University of Colorado Boulder Colorado Department of AI and Software & Medical Big Data Research Centre Inje University Gimhae Republic of Korea Computer Information Systems Department College of Computer Science and Information Technology Imam Abdalrhman Bin Faisal University Khobar Saudi Arabia Faculty of Computing and Information AlBaha University AlBaha Kingdom of Saudi Arabia Department of Computer Engineering L. D. College of Engineering Ahmedabad Gujarat India
This study analyses the weekly scheduling challenge of health and medical information network service function chains to meet medical emergency categorization and grading needs. Emergency services are divided into fou... 详细信息
来源: 评论
Qemtrace: A multi-platform memory tracer based on system emulation
Qemtrace: A multi-platform memory tracer based on system emu...
收藏 引用
2020 Summer computer Simulation Conference, SCSC 2020, Held at the 2020 Summer Simulation Multi-Conference, SummerSim 2020
作者: Aurora Dugo, Alexy Torres Lefoul, Jean-Baptiste de Magalhães, Felipe Göhring Nicolescu, Gabriela Assal, Dahman Department of computer engineering Polytechnique Montréal MontréalQC Canada MANNARINO Systems and Software MontréalQC Canada
Memory simulation is now widely used in system design processes. This process allows debugging, profiling and sometimes validating all memory-related tasks. The step before memory profiling is memory tracing, which co... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
Uvl: Feature Modelling with the Universal Variability Language
SSRN
收藏 引用
SSRN 2024年
作者: Benavides, David Sundermann, Chico Feichtinger, Kevin Galindo, José A. Rabiser, Rick Thüm, Thomas Department of Computer Languages and Systems Universidad de Sevilla Av. Reina Mercedes Seville41012 Spain Institute of Software Engineering and Programming Languages University of Ulm Albert-Einstein-Allee 11 Ulm89069 Germany CRC 1608 KASTEL – Dependability of Software-intensive Systems Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe76131 Germany Christian Doppler Laboratory VaSiCS LIT CPS Lab Johannes Kepler University Linz Altenberger Straße 69 Linz4040 Austria
Feature modelling is a cornerstone of software product line engineering, providing a means to represent software variability through features and their relationships. Since its inception in 1990, feature modelling has... 详细信息
来源: 评论
DeepSmartFuzzer: Reward guided test generation for deep learning
DeepSmartFuzzer: Reward guided test generation for deep lear...
收藏 引用
2020 Workshop on Artificial Intelligence Safety, AISafety 2020
作者: Demir, Samet Eniser, Hasan Ferit Sen, Alper Department of Computer Engineering Bogaziçi University Turkey Max Planck Institute for Software Systems Germany Bogaziçi Uni Turkey
Testing Deep Neural Network (DNN) models has become more important than ever with the increasing usage of DNN models in safety-critical domains such as autonomous cars. Traditionally, DNN testing relies on the perform... 详细信息
来源: 评论
Interplay between Physical Layer Security and Blockchain Technology for 5G and Beyond: A Comprehensive Survey
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Ghourab, Esraa M. Jaafar, Wael Bariah, Lina Naser, Shimaa Muhaidat, Sami Yanikomeroglu, Halim The KU Center for Cyber-Physical Systems Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates The Department of Software and Information Technology Engineering Ecole de Technologie Supérieure MontrealQCH3C 1K3 Canada Abu Dhabi9639 United Arab Emirates The Department of Systems and Computer Engineering Carleton University OttawaONK1S 5B6 Canada The Department of Systems and Computer Engineering Carleton University OttawaON Canada
Fifth-generation and beyond (5G and xG) wireless networks are envisioned to meet the requirements of vertical applications like high traffic throughput, ultra-massive connectivity, extremely low latency, and high qual... 详细信息
来源: 评论
Assessing Team-Based Capstone Projects: Challenges and Recommendations  2025
Assessing Team-Based Capstone Projects: Challenges and Recom...
收藏 引用
Proceedings of the 30th ACM Conference on Innovation and Technology in computer Science Education V. 2
作者: Sara Hooshangi Asma Shakil Steve Riddle Ilknur Aydin Nayla Nasir Tejasvi Parupudi Attiqa Rehman Michael James Scott Jan Vahrenhold Amali Weerasinghe Xi Wu Department of Computer Science Virginia Tech Blacksburg VA USA School of Computer Science University of Auckland Auckland New Zealand School of Computing Newcastle University Newcastle upon Tyne United Kingdom Computer Systems Farmingdale State College Farmingdale NY USA Software Engineering Research Lab Blekinge Institute of Technology Karlskrona Blekinge Sweden School of Computing and Augmented Intelligence Arizona State University Tempe AZ USA Department of Computer Science Norwegian University of Science and Technology Trondheim Norway Faculty of Screen Technology and Performance Falmouth University Penryn Cornwall United Kingdom Department of Computer Science University of Munster Munster Germany School of Computer and Mathematical Sciences University of Adelaide Adelaide Australia School of Computer Science University of Sydney Sydney NSW Australia
Team-based capstone projects are vital in preparing computer science students for real-world challenges by fostering teamwork, communication, and industry-relevant technical skills. However, their assessment presents ... 详细信息
来源: 评论
Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor  10
Achieving Enhanced Security in Biometric Authentication: A R...
收藏 引用
10th International Scientific Conference "Information Technology and Implementation", IT and I 2023
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kuznetsova, Yelyzaveta Smirnov, Oleksii Chevardin, Vladyslav Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security School of Computer Sciences V. N. Karazin Kharkiv National University 4 Svobody Sq. Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Department of cyber security and software Central Ukrainian National Technical University 8 University Ave Kropyvnytskyi25006 Ukraine Military Institute of Telecommunications and Information Technologies Moskovska str. 45/1 Kiev01015 Ukraine
In the contemporary digital era, the intersectionality between biometric authentication and cryptographic security has emerged as a pivotal research domain, particularly in the context of facial recognition. This stud... 详细信息
来源: 评论
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection
arXiv
收藏 引用
arXiv 2021年
作者: Gunter, George Li, Huichen Hojjati, Avesta Nice, Matthew Bunting, Matthew Gunter, Carl A. Li, Bo Sprinkle, Jonathan Work, Daniel The Department of Civil and Environmental Engineering The Institute for Software Integrated Systems Vanderbilt University TN United States The Department of Electrical and Computer Engineering The Institute for Software Integrated Systems Vanderbilt University TN United States The Department of Computer Science University of Illinois at Urbana-Champaign IL United States The Department of Computer and Electrical Engineering University of Arizona AZ United States
We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy free... 详细信息
来源: 评论