咨询与建议

限定检索结果

文献类型

  • 4,799 篇 会议
  • 3,516 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,337 篇 工学
    • 3,773 篇 计算机科学与技术...
    • 3,117 篇 软件工程
    • 1,223 篇 信息与通信工程
    • 757 篇 控制科学与工程
    • 637 篇 电气工程
    • 500 篇 生物工程
    • 499 篇 电子科学与技术(可...
    • 386 篇 机械工程
    • 328 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 193 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 142 篇 网络空间安全
    • 137 篇 交通运输工程
    • 134 篇 建筑学
    • 134 篇 安全科学与工程
  • 2,658 篇 理学
    • 1,453 篇 数学
    • 653 篇 物理学
    • 571 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 208 篇 化学
  • 1,480 篇 管理学
    • 932 篇 管理科学与工程(可...
    • 622 篇 图书情报与档案管...
    • 438 篇 工商管理
  • 298 篇 医学
    • 265 篇 临床医学
    • 218 篇 基础医学(可授医学...
  • 243 篇 法学
    • 190 篇 社会学
  • 134 篇 经济学
    • 134 篇 应用经济学
  • 119 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 156 篇 computational mo...
  • 147 篇 feature extracti...
  • 135 篇 semantics
  • 134 篇 information syst...
  • 133 篇 data mining
  • 124 篇 deep learning
  • 122 篇 quality of servi...
  • 113 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 89 篇 computer archite...
  • 89 篇 software
  • 89 篇 training
  • 87 篇 resource managem...
  • 87 篇 cloud computing
  • 86 篇 artificial intel...
  • 83 篇 protocols

机构

  • 150 篇 state key labora...
  • 113 篇 college of compu...
  • 84 篇 school of inform...
  • 52 篇 shandong provinc...
  • 49 篇 state key labora...
  • 48 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 state key labora...
  • 42 篇 state key labora...
  • 40 篇 shandong provinc...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 34 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 guangdong key la...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 84 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 18 篇 choo kim-kwang r...
  • 18 篇 buyya rajkumar
  • 17 篇 zhang lei

语言

  • 7,967 篇 英文
  • 317 篇 其他
  • 121 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8405 条 记 录,以下是251-260 订阅
排序:
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
Using Gamification to Increase Healthcare Professionals’ Cybersecurity Awareness
Using Gamification to Increase Healthcare Professionals’ Cy...
收藏 引用
International Conference on Smart Applications and Sustainability in the Artificial Intelligence of Things, SAS-AIoT 2024
作者: Salama, Ramiz Alturjman, Sinem Altrjman, Chadi Al-Turjman, Fadi Department of Computer Engineering AI and Robotics Institute Research Center for AI and IoT Near East University Nicosia Cyprus Artificial Intelligence Software Information Systems Engineering Departments AI and Robotics Institute Near East University Nicosia Cyprus
Cybersecurity knowledge is essential in today’s increasingly digital healthcare environment to protect sensitive patient data and guarantee the integrity of healthcare systems. But conventional cybersecurity training... 详细信息
来源: 评论
Towards Eco-Sustainability and Green Analytics Model to Measure the Performance of Big Data systems  9
Towards Eco-Sustainability and Green Analytics Model to Meas...
收藏 引用
9th International Conference on information Management, ICIM 2023
作者: Jusoh, Yusmadi Yah Abdullah, Rusli Nor, Rozi Nor Haizan Yahaya, Jamaiah Hj. Muhammad, Shireen Arunachalam, Aishwharya Raani Universiti Putra Malaysia Faculty of Computer Science and Information Technology Dept. of Software Engineering and Information Systems Serdang Malaysia Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Faculty of Communication Selangor Malaysia
Many BDS is doomed to failure because of the missing knowledge on measuring the performance of BDS. The failure to identify the performance measurement and correct will make the problems worsen. This will complicate t... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
Optimal Illumination Distance Metrics for Person Re-identification  21st
Optimal Illumination Distance Metrics for Person Re-identif...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Wang, Chao Wang, Zhongyuan Hu, Ruimin Wang, Xiaochen Zhou, Wen National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China College of Information Engineering Nanjing University of Finance Economics Nanjing China
Person re-identification (Re-ID) has been widely used in public security and surveillance. Due to the influence of different shooting times and locations, can lead to lighting variations in the images captured by the ... 详细信息
来源: 评论
Joint Optimizations for Double-IRS' Cooperative Positioning and Beamforming Over Massive-MIMOAP Based 6G Secure Mobile Wireless Networks
Joint Optimizations for Double-IRS' Cooperative Positioning ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Wang, Jiaojie Wang, Fei Zhang, Xi Yang, Yuanyuan Southwest University College of Electronic and Information Engineering Chongqing400715 China Texas A&m University Networking and Information Systems Laboratory Department of Electrical and Computer Engineering College StationTX77843 United States Stony Brook University Department of Electrical and Computer Engineering Stony BrookNY11794 United States
Intelligent reflecting surface (IRS) has been widely recognized as one of the key techniques to improve secure communications performances. However, most existing works mainly focus on the passive beamforming, i.e., p... 详细信息
来源: 评论
Polarization-induced photocurrent switching effect in heterojunction photodiodes
收藏 引用
Nano Research 2023年 第4期16卷 5503-5510页
作者: Dingbo Chen Yu-Chang Chen Guang Zeng Yu-Chun Li Xiao-Xi Li Dong Li Chao Shen Nan Chi Boon S.Ooi David Wei Zhang Hong-Liang Lu State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics&SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433China Key Laboratory for Information Science of Electromagnetic Waves Department of Communication Science and EngineeringFudan UniversityShanghai 200433China Photonics Laboratory Division of ComputerElectricaland Mathematical Sciences and EngineeringKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia
The unipolar photocurrent in conventional photodiodes(PDs)based on photovoltaic effect limits the output modes and potential versatility of these devices in *** photodiodes with photocurrent switching are emerging as ... 详细信息
来源: 评论
A New RISC-V CPU for Safety-Critical systems  12
A New RISC-V CPU for Safety-Critical Systems
收藏 引用
12th Mediterranean Conference on Embedded Computing, MECO 2023
作者: Mach, Jan Kohutka, Lukas Cicak, Pavel Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava842 16 Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava842 16 Slovakia
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun... 详细信息
来源: 评论
Highly Sensitive Real-Time Detection of Surface Texture Changes  17
Highly Sensitive Real-Time Detection of Surface Texture Chan...
收藏 引用
17th IEEE International Conference on Advanced Trends in Radioelectronics, Telecommunications and computer engineering, TCSET 2024
作者: Yarmilko, Andrii Rozlomii, Inna Mysiura, Yuliia Bohdan Khmelnytsky National University of Cherkasy Department of Automated Systems Software Cherkasy Ukraine Cherkasy State Technological University Department of Information Security and Computer Engineering Cherkasy Ukraine Bohdan Khmelnytsky National University of Cherkasy Department of Information Technologies Cherkasy Ukraine
Real-time surface analysis is becoming increasingly important in various fields, including industry, medicine, and transportation. This article examines the problem of remote monitoring of surface texture in real time... 详细信息
来源: 评论
A New Method of Image Restoration Technology Based on WGAN
收藏 引用
computer systems Science & engineering 2022年 第5期41卷 689-698页
作者: Wei Fang Enming Gu Weinan Yi Weiqing Wang Victor S.Sheng School of Computer&Software Engineering Research Center of Digital ForensicsMininstry of EducationNanjing University of Information Science&TechnologyNanjing210044China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou215325China Texas Tech University USA
With the development of image restoration technology based on deep learning,more complex problems are being solved,especially in image semantic inpainting based on ***,image semantic inpainting techniques are becoming... 详细信息
来源: 评论