咨询与建议

限定检索结果

文献类型

  • 4,837 篇 会议
  • 3,540 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,407 篇 工学
    • 3,821 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,237 篇 信息与通信工程
    • 774 篇 控制科学与工程
    • 644 篇 电气工程
    • 506 篇 生物工程
    • 503 篇 电子科学与技术(可...
    • 396 篇 机械工程
    • 338 篇 光学工程
    • 314 篇 生物医学工程(可授...
    • 222 篇 动力工程及工程热...
    • 194 篇 仪器科学与技术
    • 191 篇 化学工程与技术
    • 145 篇 网络空间安全
    • 141 篇 建筑学
    • 141 篇 交通运输工程
    • 138 篇 安全科学与工程
  • 2,680 篇 理学
    • 1,457 篇 数学
    • 663 篇 物理学
    • 577 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 209 篇 化学
  • 1,495 篇 管理学
    • 942 篇 管理科学与工程(可...
    • 629 篇 图书情报与档案管...
    • 445 篇 工商管理
  • 303 篇 医学
    • 269 篇 临床医学
    • 220 篇 基础医学(可授医学...
  • 243 篇 法学
    • 192 篇 社会学
  • 135 篇 经济学
    • 135 篇 应用经济学
  • 120 篇 教育学
  • 85 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 193 篇 computer science
  • 174 篇 software enginee...
  • 154 篇 computational mo...
  • 144 篇 feature extracti...
  • 135 篇 semantics
  • 134 篇 information syst...
  • 133 篇 data mining
  • 125 篇 deep learning
  • 122 篇 quality of servi...
  • 110 篇 machine learning
  • 98 篇 application soft...
  • 96 篇 wireless sensor ...
  • 91 篇 software
  • 90 篇 training
  • 89 篇 computer archite...
  • 88 篇 resource managem...
  • 87 篇 cloud computing
  • 83 篇 protocols
  • 81 篇 optimization

机构

  • 149 篇 state key labora...
  • 119 篇 college of compu...
  • 80 篇 school of inform...
  • 51 篇 shandong provinc...
  • 47 篇 school of comput...
  • 47 篇 state key labora...
  • 45 篇 university of ch...
  • 43 篇 state key labora...
  • 41 篇 state key labora...
  • 40 篇 shandong provinc...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 34 篇 guangdong key la...
  • 32 篇 department of el...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 82 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 45 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 24 篇 zhang zhao
  • 21 篇 wang lei
  • 21 篇 ismail leila
  • 21 篇 xiong zehui
  • 20 篇 lu dianjie
  • 19 篇 wang wei
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 choo kim-kwang r...
  • 18 篇 xu xiaolong
  • 18 篇 buyya rajkumar

语言

  • 7,898 篇 英文
  • 445 篇 其他
  • 121 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8467 条 记 录,以下是541-550 订阅
排序:
Image Classification Analysis to Identify the Tourism Potential Sukabumi on Instagram Using A Deep Learning Approach
Image Classification Analysis to Identify the Tourism Potent...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Falentino Sembiring Rieska Rahayu Ayuningsih Muhamad Muslih Muhammad Andy Maulana Gina Wahdayani Futri Mohd Zainuri Saringat Rachma Siva Ainunnisa Anggun Fergina Information Systems Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan... 详细信息
来源: 评论
Visualizing Student Attention in Smart Classrooms: A Preliminary Study  15
Visualizing Student Attention in Smart Classrooms: A Prelimi...
收藏 引用
15th International Conference on Innovations in information Technology, IIT 2023
作者: Parambil, Medha Mohan Ambali Alhammadi, Amna Mohammed Abdulla Alnajjar, Fady Trabelsi, Zouheir Ali, Luqman Swavaf, Muhammed United Arab Emirate University Department of Information Systems and Security College of IT Al Ain United Arab Emirates United Arab Emirate University Department of Computer Science and Software Engineering College of IT Al Ain United Arab Emirates
In recent years, there has been a swift progression in employing novel methods in classrooms to enhance students' academic achievements, especially in line with the growing digitization of education. Such methods ... 详细信息
来源: 评论
Multi-Level Deep Generative Adversarial Networks for Brain Tumor Classification on Magnetic Resonance Images
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 127-143页
作者: Abdullah A.Asiri Ahmad Shaf Tariq Ali Muhammad Aamir Ali Usman Muhammad Irfan Hassan A.Alshamrani Khlood M.Mehdar Osama M.Alshehri Samar M.Alqhtani Radiological Sciences Department College of Applied Medical SciencesNajran UniversityNajran61441Saudi Arabia Department of Computer Science COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajranSaudi Arabia Department of Clinical Laboratory Sciences Collage of Applied Medical ScienceNajran UniversityNajranSaudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The brain tumor is an abnormal and hysterical growth of brain tissues,and the leading cause of death affected patients *** in this technol-ogy-based arena,brain tumor images with proper labeling and acquisition still ... 详细信息
来源: 评论
Simulated annealing for resource and power allocation in 5G and B5G D2D communications  6
Simulated annealing for resource and power allocation in 5G ...
收藏 引用
6th International Conference on Pattern Analysis and Intelligent systems, PAIS 2024
作者: Benbraika, Mohamed Kamel Bourekkache, Samir Kraa, Okba Himeur, Yassine Telli, Khaled Ouamane, Abdelmalik University of El-Oued Computer Science Department El-Oued Algeria Mohamed Khider University Smart Computer Science Laboratory Biskra Algeria Mohamed Khider University Energy Systems Modeling Laboratory Biskra Algeria University of Dubai College of Engineering And Information Technology United Arab Emirates Mohamed Khider University Laboratory of LI3C Biskra Algeria
Device-to-device connection is a captivating new approach that holds great potential for the next generation of mobile networks, among others 5G and beyond. One of the reasons for this is that it has the capacity to b... 详细信息
来源: 评论
Towards Combating Frequency Simplicity-biased Learning for Domain Generalization  38
Towards Combating Frequency Simplicity-biased Learning for D...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: He, Xilin Hu, Jingyu Lin, Qinliang Luo, Cheng Xie, Weicheng Song, Siyang Khan, Muhammad Haris Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China Guangdong Provincial Key Laboratory of Intelligent Information Processing China University of Exeter United Kingdom Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates
Domain generalization methods aim to learn transferable knowledge from source domains that can generalize well to unseen target domains. Recent studies show that neural networks frequently suffer from a simplicity-bia...
来源: 评论
Intelligent Daycare: Enhancing Child Safety with IoT and Machine Learning Innovations
Intelligent Daycare: Enhancing Child Safety with IoT and Mac...
收藏 引用
International Conference on Communication and Electronics systems (ICCES)
作者: Amisha Prathyanga Pasindu Shyaminda Pasan Chamikara Sachin Lakshan Samantha Thelijjagoda Dharshana Kasthurirathna Department of Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Child safety and well-being in daycare settings are important, thus it is vital that the persons in charge be attentive to them. This research tries to solve the problem by introducing a smart and detailed monitoring ... 详细信息
来源: 评论
Towards robust neural networks via a global and monotonically decreasing robustness training strategy
收藏 引用
Frontiers of information Technology & Electronic engineering 2023年 第10期24卷 1375-1389页
作者: Zhen LIANG Taoran WU Wanwei LIU Bai XUE Wenjing YANG Ji WANG Zhengbin PANG Institute for Quantum Information&State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410073China State Key Laboratory of Computer Science Institute of Software Chinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100190China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China Key Laboratory of Software Engineering for Complex Systems National University of Defense TechnologyChangsha 410073China
Robustness of deep neural networks(DNNs)has caused great concerns in the academic and industrial communities,especially in safety-critical *** of verifying whether the robustness property holds or not in certain neura... 详细信息
来源: 评论
LUMOS-DM: Landscape-Based Multimodal Scene Retrieval Enhanced by Diffusion Model  30th
LUMOS-DM: Landscape-Based Multimodal Scene Retrieval Enhance...
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Huynh, Viet-Tham Nguyen, Trong-Thuan Nguyen, Quang-Thuc Tran, Mai-Khiem Nguyen, Tam V. Tran, Minh-Triet Software Engineering Laboratory and Faculty of Information Technology University of Science VNU-HCM Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Viet Nam Department of Computer Science University of Dayton Dayton United States
information retrieval is vital in our daily lives, with applications ranging from job searches to academic research. In today’s data-driven world, efficient and accurate retrieval systems are crucial. Our research fo... 详细信息
来源: 评论
A Privacy Preserving Method for IoT Forensics
A Privacy Preserving Method for IoT Forensics
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Wenzheng Chen, Boxi Fu, Xiao Gu, Qing Shi, Jin Du, Xiaojiang Zhou, Xiaoyang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University School of Information Management Nanjing China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ United States Innovation Research Institute Nanjing China
The diversity of the Internet of Things (IoT) poses challenges to privacy protection, especially in the field of digital forensics. How to ensure that only the private information of the suspect is provided, and not t... 详细信息
来源: 评论
Interference-Limits Aware Power and Receiver Optimization for 5G NR-U and Wi-Fi in the 6 GHz Shared-Spectrum
Interference-Limits Aware Power and Receiver Optimization fo...
收藏 引用
IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
作者: Rasika Nilaweera Kalahe-Wattege Fernando Beltran Jairo Gutierrez Information Systems The University of Auckland Auckland New Zealand Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand
Adjacent Channel Interference (ACI) presents a significant concern for densely deployed Wi-Fi networks in the $\mathbf{6 G H z}$ spectrum. Coexisting Wi-Fi and 5G may be exposed to ACI due to the limitations in the de... 详细信息
来源: 评论