咨询与建议

限定检索结果

文献类型

  • 14,456 篇 会议
  • 9,554 篇 期刊文献
  • 431 册 图书

馆藏范围

  • 24,441 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,586 篇 工学
    • 9,776 篇 计算机科学与技术...
    • 7,935 篇 软件工程
    • 2,869 篇 信息与通信工程
    • 2,643 篇 控制科学与工程
    • 1,841 篇 电气工程
    • 1,542 篇 生物工程
    • 1,513 篇 电子科学与技术(可...
    • 1,134 篇 机械工程
    • 1,116 篇 生物医学工程(可授...
    • 1,025 篇 光学工程
    • 675 篇 仪器科学与技术
    • 666 篇 化学工程与技术
    • 604 篇 动力工程及工程热...
    • 553 篇 材料科学与工程(可...
    • 531 篇 交通运输工程
    • 531 篇 安全科学与工程
  • 7,934 篇 理学
    • 4,062 篇 数学
    • 2,045 篇 物理学
    • 1,855 篇 生物学
    • 1,296 篇 统计学(可授理学、...
    • 1,215 篇 系统科学
    • 766 篇 化学
  • 3,913 篇 管理学
    • 2,626 篇 管理科学与工程(可...
    • 1,467 篇 图书情报与档案管...
    • 1,269 篇 工商管理
  • 1,175 篇 医学
    • 988 篇 临床医学
    • 861 篇 基础医学(可授医学...
    • 508 篇 药学(可授医学、理...
  • 648 篇 法学
    • 547 篇 社会学
  • 469 篇 经济学
    • 465 篇 应用经济学
  • 323 篇 教育学
  • 261 篇 农学
  • 65 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 905 篇 computer science
  • 502 篇 software enginee...
  • 466 篇 deep learning
  • 340 篇 machine learning
  • 326 篇 computational mo...
  • 279 篇 application soft...
  • 272 篇 accuracy
  • 270 篇 feature extracti...
  • 257 篇 computer archite...
  • 254 篇 artificial intel...
  • 254 篇 training
  • 239 篇 systems engineer...
  • 237 篇 internet of thin...
  • 201 篇 neural networks
  • 199 篇 support vector m...
  • 193 篇 optimization
  • 177 篇 data mining
  • 166 篇 image segmentati...
  • 162 篇 reinforcement le...
  • 156 篇 software systems

机构

  • 261 篇 college of compu...
  • 114 篇 school of comput...
  • 92 篇 state key labora...
  • 84 篇 school of comput...
  • 76 篇 graduate school ...
  • 69 篇 software enginee...
  • 66 篇 school of comput...
  • 63 篇 university of ch...
  • 44 篇 department of la...
  • 42 篇 school of softwa...
  • 39 篇 institute for sy...
  • 38 篇 department of co...
  • 37 篇 school of comput...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 36 篇 inesc tec - inst...
  • 36 篇 department of el...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 32 篇 department of co...

作者

  • 47 篇 rajkumar buyya
  • 43 篇 niyato dusit
  • 41 篇 m. zahn
  • 33 篇 liu yang
  • 30 篇 baowen xu
  • 30 篇 mengchu zhou
  • 29 篇 zhou jie
  • 29 篇 johansson karl h...
  • 27 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 bentahar jamal
  • 21 篇 bo du
  • 21 篇 zhang lei
  • 21 篇 e. rogers
  • 21 篇 liu xin
  • 20 篇 li yang

语言

  • 23,220 篇 英文
  • 901 篇 其他
  • 302 篇 中文
  • 31 篇 日文
  • 10 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24441 条 记 录,以下是221-230 订阅
排序:
Exploiting the Potential of Self-Supervised Monocular Depth Estimation via Patch-Based Self-Distillation
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18042-18055页
作者: Yu, Ting Pan, Shan Chen, Wei Tian, Zijian Wang, Zehua Yu, F. Richard Leung, Victor C. M. Postdoctoral Research Station China RongTong Academy of Sciences Group Corporation Limited Beijing100022 China China RongTong Artificial Intelligence Research Center Beijing100022 China China University of Mining and Technology School of Artificial Intelligence Beijing100083 China China University of Mining and Technology School of Computer Science and Technology Xuzhou221116 China School of Artificial Intelligence Beijing100083 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada Carleton University Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
Perceiving scene depth and 3D structure is one of the key tasks for Internet of Video Things (IoVT) devices to understand and interact with the environment. Self-supervised monocular depth estimation has demonstrated ... 详细信息
来源: 评论
HTM-CDFK: An Online Industrial Control Anomaly Detection Algorithm based on Hierarchical Time Memory
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Jingwen Zhang, Yuanyuan Wang, Zilin Ren, Yi Chen, Liangyin Chen, Yanru Sichuan University College of Computer Science College of Software Engineering Institute for Industrial Internet Research Chengdu610065 China
With the rapid advancement of industrial structures, many factories are deploying anomaly detection systems. However, most existing anomaly detection algorithms are unsuitable for high-noise industrial control system ... 详细信息
来源: 评论
An Overview of Security Threats, Attack Detection and Defense for Large-Scale Multi-Agent systems (LSMAS) in Internet of Things (IoT)
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical systems 2025年 3卷 70-81页
作者: Cai, Jijing Wen, Long Feng, Hailin Fang, Kai Chen, Junxin Wei, Wei Wang, Wei Zhejiang A and F University College of Mathematics and Computer Science Hangzhou311300 China Macau University of Science and Technology School of Innovation Engineering Macau999078 China Dalian University of Technology School of Software Dalian116621 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Shenzhen518172 China
With the global advancement of the Internet of Things (IoT), large-scale multi-agent systems (LSMAS) technology has been increasingly adopted across various industries. Despite the widespread use of IoT, vulnerabiliti... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
Private Computation of Boolean Functions Using Single Qubits  15th
Private Computation of Boolean Functions Using Single Qubit...
收藏 引用
15th International Conference on Parallel Processing and Applied Mathematics, PPAM 2024
作者: Rahmani, Zeinab Pinto, Armando N. Barbosa, Luis S. Department of Electronics Telecommunications and Informatics University of Aveiro Aveiro Portugal Instituto de Telecomunicações Aveiro Portugal International Iberian Nanotechnology Laboratory Braga Portugal Department of Computer Science University of Minho Braga Portugal Institute of Systems and Computer Engineering Technology and Science Braga Portugal
Secure Multiparty Computation (SMC) facilitates secure collaboration among multiple parties while safeguarding the privacy of their confidential data. This paper introduces a two-party quantum SMC protocol designed fo... 详细信息
来源: 评论
Toward Understanding Federated Learning over Unreliable Networks
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2025年 3卷 80-97页
作者: Feng, Chenyuan Arafa, Ahmed Chen, Zihan Zhao, Mingxiong Quek, Tony Q. S. Yang, Howard H. EURECOM Department of Communication Biot06410 France University of North Carolina at Charlotte Department of Electrical and Computer Engineering CharlotteNC28223 United States Singapore University of Technology and Design Information Systems Technology and Design Pillar Tampines487372 Singapore Yunnan University Engineering Research Center of Cyberspace National Pilot School of Software Kunming650106 China Zhejiang University ZJU-UIUC Institute Haining314400 China Zhejiang University College of Information Science and Electronic Engineering Hangzhou310007 China University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering ChampaignIL61820 United States
This paper studies the efficiency of training a statistical model among an edge server and multiple clients via Federated Learning (FL) - a machine learning method that preserves data privacy in the training process -... 详细信息
来源: 评论
Blockchain-Enabled Secure Offloading for VEC: A Multi-Agent Reinforcement Learning Approach
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2978-2995页
作者: Lu, Xiaozhen Xiao, Liang Xiao, Yilin Xiong, Zehui Liu, Zhe Zhang, Yanyong Zhuang, Weihua Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China Xiamen University Department of Information and Communication Engineering Xiamen361005 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518172 China Singapore University of Technology and Design Pillar of Information Systems Technology and Design 487372 Singapore Zhejiang Lab Hangzhou310027 China University of Science and Technology of China School of Computer Science and Technology Hefei230026 China University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada
Vehicular edge computing (VEC) helps improve the task computational performance of vehicles on roads but has difficulty in defending against eavesdropping and selfish attacks simultaneously. In this paper, we design a... 详细信息
来源: 评论
TCIP: Transformed Colour Intensity Profiles analysis for fault detection in power line insulators
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4503-4534页
作者: Tomaszewski, Michal Gasz, Rafal Kasana, Singara Singh Osuchowski, Jakub Singh, Simranjit Zator, Slawomir Department of Computer Science Faculty of Electrical Engineering Automatic Control and Informatics Opole University of Technology Prószkowska 76 Opole45-758 Poland Department of Computer Science and Information Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Information Technology Dr B. R. Ambedkar National Institute of Technology Punjab Jalandhar India Department of Safety Engineering and Technical Systems Faculty of Production Engineering and Logistics Opole University of Technology Prószkowska 76 Opole45-758 Poland
In response to the escalating demand for electricity, the aging process and inherent failures in power lines have become unavoidable challenges in their operational integrity. This research addresses the imperative ne... 详细信息
来源: 评论
Security Aspects of Container Orchestration in Kubernetes Environments  24
Security Aspects of Container Orchestration in Kubernetes En...
收藏 引用
24th International Symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Stanišić, Sava Vesković, Milan Ristić, Olga Dordević, Borislav Faculty of Technical Sciences Department of Computer and Software Engineering Čačak Serbia Mihajlo Pupin Institute Imp Computer Systems Belgrade Serbia
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernete... 详细信息
来源: 评论
Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests  24
Automatic Adjustment of HPA Parameters and Attack Prevention...
收藏 引用
9th International Conference on Cloud Computing and Internet of Things, CCIOT 2024
作者: Chan, Huah Yong Zhou, Hanlin Ni, Jingfei Wu, Mengchun Deng, Qing School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Malaysia Xiamen Institute of Software Technology Xiamen China Department of Manzhouli Customs Manzhouli China College of Information Science and Engineering Jimei University Xiamen China
In this paper, HTTP status codes are used as custom metrics within the HPA as the experimental scenario. By integrating the Random Forest classification algorithm from machine learning, attacks are assessed and predic... 详细信息
来源: 评论