咨询与建议

限定检索结果

文献类型

  • 500 篇 期刊文献
  • 409 篇 会议
  • 28 册 图书

馆藏范围

  • 937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 599 篇 工学
    • 420 篇 计算机科学与技术...
    • 334 篇 软件工程
    • 132 篇 信息与通信工程
    • 82 篇 电气工程
    • 80 篇 控制科学与工程
    • 79 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 50 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 43 篇 机械工程
    • 24 篇 动力工程及工程热...
    • 24 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 仪器科学与技术
  • 293 篇 理学
    • 145 篇 数学
    • 85 篇 生物学
    • 69 篇 物理学
    • 50 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 23 篇 化学
  • 157 篇 管理学
    • 104 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 63 篇 医学
    • 56 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 21 篇 公共卫生与预防医...
  • 28 篇 法学
    • 17 篇 社会学
  • 15 篇 经济学
  • 15 篇 农学
  • 11 篇 教育学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 38 篇 grid computing
  • 32 篇 cloud computing
  • 31 篇 computer science
  • 30 篇 deep learning
  • 28 篇 laboratories
  • 25 篇 computational mo...
  • 25 篇 distributed comp...
  • 23 篇 machine learning
  • 23 篇 training
  • 22 篇 feature extracti...
  • 21 篇 resource managem...
  • 20 篇 quality of servi...
  • 19 篇 application soft...
  • 19 篇 software enginee...
  • 19 篇 processor schedu...
  • 18 篇 artificial intel...
  • 15 篇 computer archite...
  • 12 篇 scalability
  • 12 篇 educational inst...
  • 12 篇 computer network...

机构

  • 39 篇 school of comput...
  • 34 篇 school of cyber ...
  • 27 篇 national enginee...
  • 25 篇 grid computing a...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 school of comput...
  • 12 篇 key laboratory o...
  • 11 篇 beijing advanced...
  • 10 篇 national frontie...
  • 10 篇 state key labora...
  • 9 篇 cloud computing ...
  • 9 篇 school of electr...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 9 篇 jinyinhu laborat...

作者

  • 67 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 30 篇 jin hai
  • 21 篇 hai jin
  • 18 篇 ismail leila
  • 17 篇 hu shengshan
  • 13 篇 materwala huned
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 wei li
  • 10 篇 dustdar schahram
  • 10 篇 wan wei
  • 9 篇 niyato dusit
  • 9 篇 liu ya-feng
  • 8 篇 bakas spyridon
  • 8 篇 deqing zou
  • 8 篇 yang jinzhu
  • 7 篇 kofler florian
  • 7 篇 xu wu

语言

  • 835 篇 英文
  • 87 篇 其他
  • 15 篇 中文
检索条件"机构=Distributed Computing Systems Laboratory School of Computer Science and Engineering"
937 条 记 录,以下是81-90 订阅
Online demand peak shaving with machine-learned advice in digital twins
Digital Twins and Applications
收藏 引用
Digital Twins and Applications 2024年 第1期1卷 38-50页
作者: Minxi Feng Wei Li Boyu Qin Albert Y.Zomaya Centre for Distributed and High Performance Computing School of Computer ScienceThe University of SydneySydneyNew South WalesAustralia State Key Laboratory of Electrical Insulation and Power Equipment Department of Electrical EngineeringXi'an Jiaotong UniversityXi'anChina
As the use of physical instruments grows,control algorithms are being increasingly deployed to enhance efficiency and reliability through digital twin *** load management is central to energy systems within digital tw... 详细信息
来源: 评论
EarSonar: An Acoustic Signal-Based Middle-Ear Effusion Detection Using Earphones
EarSonar: An Acoustic Signal-Based Middle-Ear Effusion Detec...
收藏 引用
International Conference on distributed computing systems
作者: Jingyang Hu Hongbo Jiang Daibo Liu Zhu Xiao Hangcheng Cao Yue Qi Schahram Dustdar Jiangchuan Liu College of Computer Science and Electronic Engineering Hunan University OPPO Research Institute Computer Science heading the Research Division of Distributed Systems Vienna University of Technology School of Computing Science Simon Fraser University
Middle ear effusion is a common symptom of otitis media, the reactive physical manifestation of otitis media (OM) in children's middle ear. However, diagnosing MEE for little children at home is troublesome due to...
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第8期PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
CEGraph: Cache-Efficient Management for Streaming Graph Processing
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Mao, Fubing Xie, Zihan Nie, Longyu Zhang, Yu Liu, Haikun Liao, Xiaofei Jin, Hai Zhang, Wei Guo, Yapu Liu, Jingkang Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Hong Kong University of Science and Technology Reconfiguration Computing Systems Laboratory Department of ECE Hong Kong
Efficient processing of streaming graphs is crucial to improve system performance. Due to the highly irregular and frequent access to data in streaming graph processing, existing cache management methods are difficult... 详细信息
来源: 评论
A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images
收藏 引用
computer systems science & engineering 2023年 第8期46卷 1789-1809页
作者: Hicham Moujahid Bouchaib Cherradi Oussama El Gannour Wamda Nagmeldin Abdelzahir Abdelmaboud Mohammed Al-Sarem Lhoussain Bahatti Faisal Saeed Mohammed Hadwan EEIS Laboratory ENSET of MohammediaHassan II University of CasablancaMohammedia28820Morocco STIE Team CRMEF Casablanca-SettatThe Provincial Section of El JadidaEl Jadida24000Morocco Department of Information Systems College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Information Systems King Khalid UniversityMuhayel Aseer61913Saudi Arabia College of Computer Science and Engineering Taibah UniversityMedina42353Saudi Arabia Department of Computer Science University of Sheba RegionMarib14400Yemen DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK Department of Information Technology College of ComputerQassim UniversityBuraydah 51452Saudi Arabia Department of Computer Science College of Applied SciencesTaiz UniversityTaiz6803Yemen
Due to the rapid propagation characteristic of the Coronavirus(COVID-19)disease,manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of ***,new automated diagnostic me... 详细信息
来源: 评论
Conservative Q-Learning for Mechanical Ventilation Treatment Using Diagnose Transformer-Encoder
Conservative Q-Learning for Mechanical Ventilation Treatment...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yuyu Yuan Jinsheng Shi Jincui Yang Chenlong Li Yuang Cai Baoyu Tang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China
The application of artificial intelligence to mechanical ventilation has garnered significant attention, especially with the advancement of deep reinforcement learning. Mechanical ventilation is a medical procedure us...
来源: 评论
Data-Driven Analysis of Skin Cancer Classification with Convolutional Neural Networks for E-Health Applications
Data-Driven Analysis of Skin Cancer Classification with Conv...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Ahmed, Imran Ahmad, Misbah Chehri, Abdellah Jeon, Gwanggil Anglia Ruskin University School of Computing and Information Science Cambridge United Kingdom Hartpury University Animal and Agriculture Department Gloucester United Kingdom University of the West of England Centre for Machine Vision Bristol Robotics Laboratory Bristol United Kingdom Department of Mathematics and Computer Science Canada Incheon National University Department of Embedded Systems Engineering Incheon Korea Republic of
This study explores the effectiveness of Convolutional Neural Networks (CNNs) in automatically classifying skin cancer for e-health applications. The trained model showcases impressive performance by leveraging the HA... 详细信息
来源: 评论
Adaptive NN-Based Secure Control for Disturbed Euler-Lagrange systems with DoS Attacks  1st
Adaptive NN-Based Secure Control for Disturbed Euler-Lagran...
收藏 引用
1st International Conference on Advanced Robotics, Control, and Artificial Intelligence, ICARCAI 2024
作者: Lü, Shaoyu Yan, Bingheng Anhui Province Engineering Laboratory of Intelligent Demolition Equipment and School of Electrical and Information Engineering Anhui University of Technology Ma’anshan 243032 China Key Laboratory of Multidisciplinary Management and Control of Complex Systems of Anhui Higher Education Institutes Ma’anshan 243002 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
This paper deals with the problem of output feedback tracking control for a class of Euler-Lagrange (EL) systems under denial-of-service (DoS) attack and external disturbance. A new adaptive observation scheme is devi... 详细信息
来源: 评论