咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,235 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,617 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 93 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 67 篇 software
  • 66 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,880 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3255 条 记 录,以下是751-760 订阅
排序:
An Intelligent Resource Scheduling Method with Edge Channel Deployment for BPM  19
An Intelligent Resource Scheduling Method with Edge Channel ...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Liu, Bowen Dou, Wanchun Zhou, Xiaokang Zhang, Xuyun Qi, Lianyong Dai, Fei Chen, Chaochao Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Shiga University Faculty of Data Science Hikone Japan Macquarie University Department of Computing Sydney Australia College of Computer and Software Qingdao China Southwest Forestry University College of Big Data and Intelligent Engineering Kunming China Zhejiang University College of Computer Science and Technology Hangzhou China
Edge computing is a novel computing paradigm that offers kinds of resources at the network edge. In edge computing, terminal users are connected to edge servers via the wireless network and there are various channels ... 详细信息
来源: 评论
Faster Edge Coloring by Partition Sieving
arXiv
收藏 引用
arXiv 2025年
作者: Akmal, Shyan Koana, Tomohiro INSAIT Sofia University "St. Kliment Ohridski" Bulgaria Technische Universität Berlin Faculty IV Institute of Software Engineering and Theoretical Computer Science Algorithmics and Computational Complexity Germany
In the Edge Coloring problem, we are given an undirected graph G with n vertices and m edges, and are tasked with finding the smallest positive integer k so that the edges of G can be assigned k colors in such a way t... 详细信息
来源: 评论
Novel Approach for Enhancing Mental Well-Being Through Machine Learning Techniques
Novel Approach for Enhancing Mental Well-Being Through Machi...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: O.V.D.E Roshani H.M.K.J.J Ayuwardhana P.H.M.S Rodrigo R.U Hewageegana Harinda Fernando Dilshan I. de Silva Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Frequently, individuals undergo specific episodes of mental health challenges throughout their lifetime. But the COVID pandemic has triggered a surge in mental health disorders arising from isolation, monotonous routi...
来源: 评论
Properties of Nonlinear Power System Models that are Symmetrically Configured in the Narrow Sense
Properties of Nonlinear Power System Models that are Symmetr...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Elior Segev Ron Ofir Yoash Levron Juri Belikov Faculty of Electrical & Computer Engineering Technion—Israel Institute of Technology Haifa Israel Department of Software Science Tallinn University of Technology Tallinn Estonia
Symmetry is a fundamental property of three-phase circuits and is widely used in the analysis of large-scale power systems. However, when the system is nonlinear or time-varying, classical symmetry generally does not ...
来源: 评论
Absolute Pose from One or Two Scaled and Oriented Features
Absolute Pose from One or Two Scaled and Oriented Features
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Jonathan Ventura Zuzana Kukelova Torsten Sattler Dániel Baráth Department of Computer Science & Software Engineering Cal Poly San Luis Obispo Faculty of Electrical Engineering Visual Recognition Group Czech Technical University in Prague Czech Institute of Informatics Robotics and Cybernetics Czech Technical University in Prague Department of Computer Science Computer Vision and Geometry Group ETH Zürich
Keypoints used for image matching often include an estimate of the feature scale and orientation. While recent work has demonstrated the advantages of using feature scales and orientations for relative pose estimation... 详细信息
来源: 评论
Federated transfer learning for distributed drought stage prediction
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-13页
作者: Raza, Muhammad Owais Umar, Aqsa Rasheed, Jawad Asuroglu, Tunc Alsubai, Shtwai Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul34303 Turkey Department of Computer Science Sindh Madressatul Islam University Karachi74000 Pakistan Department of Software Engineering Istanbul Nisantasi University Istanbul34398 Turkey Applied Science Research Center Applied Science Private University Amman Jordan Faculty of Medicine and Health Technology Tampere University Tampere33720 Finland VTT Technical Research Centre of Finland Tampere33720 Finland Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj11942 Saudi Arabia
Due to the uncertain nature of drought, it is one of the most menacing natural disasters. Drought modeling (Prediction, Detection, Forecasting, and Stage Prediction) is very essential for efficient policy making. But ... 详细信息
来源: 评论
MODEL CHECKING FOR MULTI-AGENT SYSTEMS MODELED BY EPISTEMIC PROCESS CALCULUS
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Qixian Cao, Zining Hui, Zong Zhou, Yuan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing211106 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing210023 China Faculty of Computer and Software Engineering Huaiyin Institute Of Technology Huaian223001 China
This paper presents a comprehensive framework for modeling and verifying multi-agent systems. The paper introduce an Epistemic Process Calculus for multi-agent systems, which formalizes the syntax and semantics to cap... 详细信息
来源: 评论
Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum Computation
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Xu, Yinsong Liu, Wen Wang, Haibin Lei, Zhibin Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and Cybersecurity Communication University of China Beijing100024 China Science Park East Avenue 999077 Hong Kong
Searchable encryption (SE) is a positive way to protect users sensitive data in cloud computing setting, while preserving search ability on the server side. SE allows the server to search encrypted data without leakin... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Medical Expert System to Diagnose the Most Common Psychiatric Diseases  21
Medical Expert System to Diagnose the Most Common Psychiatri...
收藏 引用
7th International Conference on engineering and MIS, ICEMIS 2021
作者: Alsagheer, Eman A. Rajab, Hamzah A. Elnajar, Khadiga M.Y. Department of Computer Science Faculty of Information Technology University of Benghazi Benghazi Libya Department of Software Engineering Faculty of Information Technology University of Benghazi Benghazi Libya
Expert Systems are programs that employ artificial intelligence and mimic the performance of human experts in a certain field by gathering and capturing expert information. In this paper, we present a rule-based exper... 详细信息
来源: 评论