咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 80 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 164 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 69 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 19 篇 电气工程
    • 17 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 3 篇 生物工程
    • 2 篇 光学工程
    • 2 篇 电子科学与技术(可...
  • 49 篇 理学
    • 26 篇 数学
    • 11 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 8 篇 生物学
    • 4 篇 化学
    • 3 篇 海洋科学
    • 2 篇 物理学
  • 30 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 农学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 2 篇 教育学

主题

  • 11 篇 laboratories
  • 9 篇 machine learning
  • 9 篇 cloud computing
  • 8 篇 distributed comp...
  • 6 篇 quality of servi...
  • 6 篇 multimedia syste...
  • 5 篇 computer science
  • 5 篇 information syst...
  • 5 篇 application soft...
  • 5 篇 grid computing
  • 5 篇 energy efficienc...
  • 4 篇 intrusion detect...
  • 4 篇 scalability
  • 4 篇 real time system...
  • 4 篇 resource managem...
  • 4 篇 clustering algor...
  • 4 篇 edge computing
  • 4 篇 computer network...
  • 3 篇 deep learning
  • 3 篇 computer archite...

机构

  • 7 篇 department of el...
  • 6 篇 intelligent dist...
  • 5 篇 university of co...
  • 5 篇 university colle...
  • 5 篇 school of electr...
  • 5 篇 distributed syst...
  • 4 篇 leeds institute ...
  • 4 篇 center for psych...
  • 4 篇 department of in...
  • 4 篇 institute for pa...
  • 4 篇 department of st...
  • 4 篇 university of pi...
  • 4 篇 arnie charbonnea...
  • 4 篇 ilsbio llc bioba...
  • 4 篇 department of mo...
  • 4 篇 department of bi...
  • 4 篇 faculty of biosc...
  • 4 篇 osaka internatio...
  • 4 篇 tri-institutiona...
  • 4 篇 research departm...

作者

  • 15 篇 rajkumar buyya
  • 10 篇 ismail leila
  • 10 篇 materwala huned
  • 8 篇 buyya rajkumar
  • 7 篇 dustdar schahram
  • 6 篇 shu-ching chen
  • 6 篇 leila ismail
  • 5 篇 chen shu-ching
  • 5 篇 rana omer
  • 5 篇 mei-ling shyu
  • 5 篇 gill sukhpal sin...
  • 5 篇 sakellariou rizo...
  • 4 篇 lutfiyya hanan
  • 4 篇 shyu mei-ling
  • 4 篇 bahsoon rami
  • 3 篇 xiang zhang
  • 3 篇 parlikad ajith k...
  • 3 篇 arora priyansh
  • 3 篇 xu minxian
  • 3 篇 moumoutzis nekta...

语言

  • 146 篇 英文
  • 15 篇 其他
  • 2 篇 中文
  • 1 篇 法文
检索条件"机构=Evolutionary Engineering & Distributed Information Systems Laboratory"
164 条 记 录,以下是41-50 订阅
排序:
Implicit Multi-Scale Swin Transformer Network for Image Denoising
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Qi Ding, Yuwei Zhang, Weiqi Zhu, Yian Zhang, Bob Lin, Jerry Chun-Wei Harbin Institute of Technology at Weihai School of Economics and Management Weihai China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Northwestern Polytechnical University School of Computer Science Xi’an China Northwestern Polytechnical University Yangtze River Delta Research Institute Taicang China University of Macau PAMI Research Group Department of Computer and Information Science Taipa China Department of Distributed Systems and IT Devices Electrical Engineering and Mathematical Sciences Silesian university of technology Poland
Image denoising has been used in various edge computing scenarios such as consumer electronics to improve the image quality and user experience. Existing image denoising methods based on Convolutional Neural Networks ... 详细信息
来源: 评论
Transforming Research with Quantum Computing
Journal of Economy and Technology
收藏 引用
Journal of Economy and Technology 2024年
作者: Sukhpal Singh Gill Rajkumar Buyya School of Electronic Engineering and Computer Science Queen Mary University of London London UK Cloud Computing and Distributed Systems (CLOUDS) Laboratory School of Computing and Information Systems The University of Melbourne Australia
Quantum computing is a novel method of computation that uses the principles of quantum mechanics to handle highly challenging situations in a very short amount of time. Quantum technology has the ability to significan... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
Machine Learning-based Energy-Aware Offloading in Edge-Cloud Vehicular Networks  18
Machine Learning-based Energy-Aware Offloading in Edge-Cloud...
收藏 引用
18th International Conference on Mobile systems and Pervasive Computing, MobiSPC 2021, The 16th International Conference on Future Networks and Communications, FNC 2021 and the 11th International Conference on Sustainable Energy information Technology, SEIT 2021
作者: Ismail, Leila Materwala, Huned Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates National Water and Energy Center United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates
A vehicular network underpinned by the 3-tier vehicle-edge-cloud infrastructure enables an efficient and safer travel experience. The compute-intensive vehicular applications are often offloaded to the edge and/or clo... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Models for Diabetes Mellitus Type 2 Prediction
Comparative Analysis of Machine Learning Models for Diabetes...
收藏 引用
2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
作者: Ismail, Leila Materwala, Huned United Arab Emirates University College of Information Technology Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering Abu-Dhabi Al-Ain15551 United Arab Emirates
Diabetes is one of the top 10 causes of death worldwide. Health professionals are aiming for machine learning models to support the prognosis of diabetes for better healthcare and to put in place an effective preventi... 详细信息
来源: 评论
AI-Driven molecule generation and bioactivity prediction: A multi-model approach combining VAE, graph and language-based neural networks
收藏 引用
Computational biology and chemistry 2025年 119卷
作者: Latefa Oulladji Mouna Saadallah Zakaria Guellil Houda Abbad Houda Bekhti Evolutionary Engineering and Distributed Information Systems Laboratory Djillali Liabes University Department of Computer Science Sidi Bel Abbes 22000 Algeria. Electronic address: latifa.oulladji@univ-sba.dz. Evolutionary Engineering and Distributed Information Systems Laboratory Djillali Liabes University Department of Computer Science Sidi Bel Abbes 22000 Algeria. Electronic address: mouna.saadallah@univ-sba.dz. Djillali Liabes University Department of Computer Science Sidi Bel Abbes 22000 Algeria. Electronic address: abdelkader.guellil.0702@univ-sba.dz. Evolutionary Engineering and Distributed Information Systems Laboratory Djillali Liabes University Department of Computer Science Sidi Bel Abbes 22000 Algeria. Electronic address: houda.abbad@univ-sba.dz. Djillali Liabes University Department of Computer Science Sidi Bel Abbes 22000 Algeria. Electronic address: bekhtinourelhoudayasmine@***.
Cancer is one of the top leading causes of death in the world according to the World Health Organization (WHO). Despite the continuous efforts, drug discovery often takes 10-15 years if done traditionally, and it cost... 详细信息
来源: 评论
Double Deep Q Networks for Sensor Management in Space Situational Awareness
arXiv
收藏 引用
arXiv 2022年
作者: Oakes, Benedict Richards, Dominic Barr, Jordi Ralph, Jason CDT in Distributed Algorithms University of Liverpool Liverpool United Kingdom Artificial Intelligence Group STFC Hartree Centre Daresbury United Kingdom Cyber and Information Systems Division Defence Science and Technology Laboratory United Kingdom Electrical Engineering and Electronics University of Liverpool Liverpool United Kingdom
We present a novel Double Deep Q Network (DDQN) application to a sensor management problem in space situational awareness (SSA). Frequent launches of satellites into Earth orbit pose a significant sensor management ch... 详细信息
来源: 评论
Comprehensive information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 683-704页
作者: Jinxin Zuo Yueming Lu Hui Gao Ruohan Cao Ziyv Guo Jim Feng School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China School of Information and Communication Engineering Beijing University of Posts and Telecommunica-tionsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing100876China Amphenol Global Interconnect Systems San JoseCA 95131USA
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network *** this paper,we sum... 详细信息
来源: 评论
Work-in-Progress: Using the PerFECt Framework to Design and Implement Blended Learning Activities to Introduce the Binary System in Primary School Students
Work-in-Progress: Using the PerFECt Framework to Design and ...
收藏 引用
9th International Conference on Interactive Collaborative and Blended Learning, ICBL 2020
作者: Moumoutzis, Nektarios Rigas, Nikolaos Apostolos Xanthaki, Chara Maragkoudakis, Yiannis Christodoulakis, Christina Paneva-Marinova, Desislava Pavlova, Lilia Laboratory of Distributed Multimedia Information Systems and Applications School of Electrical and Computer Engineering Technical University of Crete Chania Crete73100 Greece Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia1113 Bulgaria Directorate of Secondary Education Chania Crete Greece Department of Computer Science University of Toronto Toronto Canada Laboratory of Telematics Bulgarian Academy of Sciences Sofia1113 Bulgaria
This paper presents how the PerFECt framework is employed to enable innovative teaching and learning mathematics in schools using drama-based approaches. The topic addressed lies in the cross-section between mathemati... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论