咨询与建议

限定检索结果

文献类型

  • 4,841 篇 会议
  • 3,562 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,430 篇 工学
    • 3,847 篇 计算机科学与技术...
    • 3,148 篇 软件工程
    • 1,242 篇 信息与通信工程
    • 800 篇 控制科学与工程
    • 647 篇 电气工程
    • 512 篇 电子科学与技术(可...
    • 506 篇 生物工程
    • 396 篇 机械工程
    • 335 篇 光学工程
    • 315 篇 生物医学工程(可授...
    • 222 篇 动力工程及工程热...
    • 194 篇 仪器科学与技术
    • 191 篇 化学工程与技术
    • 147 篇 网络空间安全
    • 140 篇 建筑学
    • 140 篇 交通运输工程
    • 136 篇 安全科学与工程
  • 2,680 篇 理学
    • 1,459 篇 数学
    • 661 篇 物理学
    • 577 篇 生物学
    • 461 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 210 篇 化学
  • 1,496 篇 管理学
    • 941 篇 管理科学与工程(可...
    • 631 篇 图书情报与档案管...
    • 442 篇 工商管理
  • 303 篇 医学
    • 269 篇 临床医学
    • 220 篇 基础医学(可授医学...
  • 243 篇 法学
    • 191 篇 社会学
  • 134 篇 经济学
    • 134 篇 应用经济学
  • 118 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 193 篇 computer science
  • 174 篇 software enginee...
  • 156 篇 computational mo...
  • 148 篇 feature extracti...
  • 136 篇 semantics
  • 134 篇 information syst...
  • 133 篇 data mining
  • 128 篇 deep learning
  • 122 篇 quality of servi...
  • 112 篇 machine learning
  • 98 篇 application soft...
  • 96 篇 wireless sensor ...
  • 89 篇 computer archite...
  • 89 篇 software
  • 88 篇 training
  • 87 篇 resource managem...
  • 85 篇 cloud computing
  • 83 篇 artificial intel...
  • 82 篇 optimization

机构

  • 150 篇 state key labora...
  • 119 篇 college of compu...
  • 79 篇 school of inform...
  • 51 篇 shandong provinc...
  • 47 篇 school of comput...
  • 47 篇 state key labora...
  • 45 篇 university of ch...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 33 篇 guangdong key la...
  • 32 篇 department of el...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 82 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 45 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 23 篇 zhang zhao
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 qi lianyong
  • 19 篇 wang wei
  • 19 篇 choo kim-kwang r...
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 fan guisheng
  • 18 篇 buyya rajkumar
  • 17 篇 hong liu

语言

  • 7,904 篇 英文
  • 467 篇 其他
  • 121 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8493 条 记 录,以下是351-360 订阅
排序:
Optimizing Polynomial-Time Solutions to a Network Weighted Vertex Cover Game
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 512-523页
作者: Jie Chen Kaiyi Luo Changbing Tang Zhao Zhang Xiang Li the Adaptive Networks and Control Laboratory Department of Electronic EngineeringFudan UniversityShanghai 200433China the College of Mathematics and Computer Science Zhejiang Normal UniversityJinhua 321004 Yuxi Middle School Taizhou 317399China IEEE the College of Physics and Electronics Information Engineering Zhejiang Normal UniversityJinhua 321004China the College of Mathematics and Computer Science Zhejiang Normal UniversityJinhua 321004China the Adaptive Networks and Control Laboratory Department of Electronic EngineeringFudan UniversityShanghai 200433 the Institute of Complex Networks and Intelligent Systems Shanghai Research Institute for Intelligent Autonomous SystemsTongji UniversityShanghai 201210China
Weighted vertex cover(WVC)is one of the most important combinatorial optimization *** this paper,we provide a new game optimization to achieve efficiency and time of solutions for the WVC problem of weighted *** first... 详细信息
来源: 评论
Securing Multi-Tenant Cloud Environments with Fully Homomorphically Encrypted Secure Multiparty Computation
Securing Multi-Tenant Cloud Environments with Fully Homomorp...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Jagannathan, J. R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India
The aim of this work is to examine the application of FHE-SMPC as a viable security model for protecting the tenant isolation in multi-tenant cloud model. In multi-tenant environments, where various customers use the ... 详细信息
来源: 评论
Plausible Heterogeneous Graph k-Anonymization for Social Networks
收藏 引用
Tsinghua Science and Technology 2022年 第6期27卷 912-924页
作者: Kaiyang Li Ling Tian Xu Zheng Bei Hui School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu 610000China
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Ramesh, P.S. Sudha, I. Jagannathan, J. Pandiarajan, Rajkumar Ponmalar, A. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy Of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India R.M.K. Engineering College Tamilnadu Chennai India
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature... 详细信息
来源: 评论
Model for Recognition of Sign Language and Hand Gesture by Hard Hearing People
Model for Recognition of Sign Language and Hand Gesture by H...
收藏 引用
2023 International Conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Manjula, R. Jagadeesan, S. Ramalingam, Venkadeshan Vetriselvi, T. Johnpeter, T. Srm Institute of Science and Technology College of Engineering and Technology Department of Computing Technologies Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Tamilnadu Vellore India Information Technology Department University of Technology and Applied Sciences-Shinas Branch Sultanate of Oman Oman Vellore Institute of Technology School of Computer Science and Engineering Department of Iot Tamilnadu Vellore India K.Ramakrishnan College of Engineering Department of Computer Science and Engineering Trichy India
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm... 详细信息
来源: 评论
Advanced Machine Learning Algorithms for 1Predictive Analytics in Healthcare to Enhance Patient Outcomes with Data-Driven Insights
Advanced Machine Learning Algorithms for 1Predictive Analyti...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Pandiarajan, Rajkumar Jagannathan, J. Ramesh, P.S. Ponmalar, A. Sudha School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
This research aims to explore the use of modern complex defensive machine learning algorithms in the provision of predictive analytics for health improvement. Incorporating electronic health records, medical image inf... 详细信息
来源: 评论
Enhancing Healthcare Data Security in Cloud Computing systems through Advanced Homomorphic Encryption Techniques Integrated with Cuckoo Search Optimization Algorithm
Enhancing Healthcare Data Security in Cloud Computing System...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Sudha, I. Ramesh, P.S. Ponmalar, A. Jagannathan, J. Pandiarajan, Rajkumar Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav... 详细信息
来源: 评论
Automatic speaker identification system based on MLP network and deep learning in the presence of severe interference
收藏 引用
Multimedia Tools and Applications 2025年 1-42页
作者: Shafik, Amira Sedik, Ahmed El-Shafai, Walid Khalaf, Ashraf A. M. El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Faculty of Engineering Minia University Minia61519 Egypt Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh11586 Saudi Arabia Department of the Robotics and Intelligent Machines Faculty of Artificial Intelligence Kafr Elsheikh University Kafr El‑Shaikh Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise... 详细信息
来源: 评论
Advanced Multi-Spectral Image Processing Techniques for Enhanced Remote Sensing and Comprehensive Environmental Monitoring in Diverse Ecosystems
Advanced Multi-Spectral Image Processing Techniques for Enha...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Jagannathan, J. Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India
The research is aimed at improvement of multi-spectral image analysis for remote sensing and monitoring the environment at various ecosystems. A combined spectral imagery encompasses several spectrums at a time compar... 详细信息
来源: 评论
Weighted Consistent Multi-view Discriminant Analysis in Unreliable Labeling Environment  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Li, Meihua Zhao, Yang Pei, Jihong Yang, Xuan College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
Multi-view discriminant analysis method (MvDA) is an effective supervised multi-view learning method. However, in practical multi-view learning application scenarios, there may be the problem that the sample label inf... 详细信息
来源: 评论