咨询与建议

限定检索结果

文献类型

  • 4,844 篇 会议
  • 3,520 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 8,453 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,362 篇 工学
    • 3,782 篇 计算机科学与技术...
    • 3,114 篇 软件工程
    • 1,224 篇 信息与通信工程
    • 768 篇 控制科学与工程
    • 629 篇 电气工程
    • 505 篇 生物工程
    • 500 篇 电子科学与技术(可...
    • 393 篇 机械工程
    • 325 篇 光学工程
    • 313 篇 生物医学工程(可授...
    • 219 篇 动力工程及工程热...
    • 192 篇 仪器科学与技术
    • 190 篇 化学工程与技术
    • 143 篇 网络空间安全
    • 140 篇 交通运输工程
    • 139 篇 建筑学
    • 136 篇 安全科学与工程
  • 2,665 篇 理学
    • 1,452 篇 数学
    • 660 篇 物理学
    • 575 篇 生物学
    • 464 篇 统计学(可授理学、...
    • 361 篇 系统科学
    • 209 篇 化学
  • 1,481 篇 管理学
    • 931 篇 管理科学与工程(可...
    • 625 篇 图书情报与档案管...
    • 440 篇 工商管理
  • 301 篇 医学
    • 268 篇 临床医学
    • 219 篇 基础医学(可授医学...
  • 242 篇 法学
    • 192 篇 社会学
  • 133 篇 经济学
    • 133 篇 应用经济学
  • 120 篇 教育学
  • 84 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 282 篇 laboratories
  • 192 篇 computer science
  • 175 篇 software enginee...
  • 155 篇 computational mo...
  • 148 篇 feature extracti...
  • 135 篇 data mining
  • 134 篇 information syst...
  • 131 篇 semantics
  • 129 篇 deep learning
  • 121 篇 quality of servi...
  • 112 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 92 篇 software
  • 90 篇 cloud computing
  • 89 篇 training
  • 88 篇 resource managem...
  • 87 篇 computer archite...
  • 83 篇 optimization
  • 83 篇 accuracy

机构

  • 143 篇 state key labora...
  • 121 篇 college of compu...
  • 87 篇 school of inform...
  • 56 篇 shandong provinc...
  • 52 篇 state key labora...
  • 49 篇 school of comput...
  • 46 篇 university of ch...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 state key labora...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 35 篇 department of co...
  • 34 篇 school of comput...
  • 31 篇 department of el...
  • 31 篇 school of inform...
  • 31 篇 guangdong key la...
  • 31 篇 peng cheng labor...

作者

  • 87 篇 xi zhang
  • 58 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 39 篇 guo hong
  • 33 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 25 篇 zhang zhao
  • 22 篇 ismail leila
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 20 篇 lu dianjie
  • 20 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 19 篇 xu xiaolong
  • 18 篇 wei li
  • 17 篇 li yang
  • 17 篇 hong liu
  • 16 篇 zhou jie
  • 16 篇 zhang lei

语言

  • 7,511 篇 英文
  • 829 篇 其他
  • 120 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8453 条 记 录,以下是641-650 订阅
排序:
Exercise-induced adaptation of neurons in the vertebrate locomotor system
收藏 引用
Journal of Sport and Health Science 2024年 第2期13卷 160-171页
作者: Yue Dai Yi Cheng Renkai Ge Ke Chen Liming Yang Key Lab of Adolescent Health Assessment and Exercise Intervention of Ministry of Education College of Physical Education and Health CareEast China Normal UniversityShanghai 200241China Shanghai Key Laboratory of Multidimensional Information Processing School of Communication and Electronic EngineeringEast China Normal UniversityShanghai 200241China School of Physical Education and Health Care East China Jiaotong UniversityNanchang 330013China Key Laboratory of High Confidence Software Technologies of Ministry of Education School of Computer SciencePeking UniversityBeijing 100871China
Vertebrate neurons are highly dynamic cells that undergo several alterations in their functioning and physiologies in adaptation to various external *** particular,how these neurons respond to physical exercise has lo... 详细信息
来源: 评论
Towards Modeling Functional Requirements From Tacit Knowledge
Towards Modeling Functional Requirements From Tacit Knowledg...
收藏 引用
computer Science, computer engineering, & Applied Computing (CSCE), Congress in
作者: Rameen Jafar Maram Fahaad Almufareh Sundas Ashraf Bushra Khan Wasi Haider Butt Mamoona Humayun Department of Computer and Software Engineering National University of Sciences and Technology Pakistan Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
来源: 评论
PSO Optimization Algorithm for QoS Enhancement in IoT-Enabled WSNs
PSO Optimization Algorithm for QoS Enhancement in IoT-Enable...
收藏 引用
International Conference on Artificial Intelligence and Smart Environment, ICAISE 2022
作者: Benelhouri, Abdelkader Idrissi-Saba, Hafida Antari, Jilali Laboratory of Metrology and Information Processing Faculty of Science Ibn Zohr University B.P. 8106 Agadir Morocco Laboratory of Computer Systems Engineering Mathematics and Applications Ibn Zohr University Polydisciplinary FacultyB.P. 271 Taroudant83000 Morocco
Through the recent progress in the field of microelectronics and the emergence of wireless communication technologies, wireless sensor networks (WSNs) have seen the light of day. However, one of the major problems of ... 详细信息
来源: 评论
PpNNT: Multiparty Privacy-Preserving Neural Network Training System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influence Diagrams through Evolutionary Algorithms  21
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influenc...
收藏 引用
21st International Conference on Autonomous Agents and Multiagent systems, AAMAS 2022
作者: Ma, Biyang Pan, Yinghui Zeng, Yifeng Ming, Zhong School of Computer Science and Engineering Minnan Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University United Kingdom College of Computer Science and Software Engineering Shenzhen University China
Interactive dynamic influence diagrams (I-DIDs) are a general framework for multiagent sequential decision making under uncertainty. Due to the model complexity, a significant amount of research has been invested into... 详细信息
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng University of Oxford Department of Computer Science United Kingdom Peking University Department of Information and Computing Science School of Mathematical Science China Monash University Department of Software Systems and Cybersecurity Australia Singapore Management University School of Computing and Information Systems Singapore Nanyang Technological University School of Computer Science and Engineering Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论
SMART: towards pre-trained missing-aware model for patient health status prediction  24
SMART: towards pre-trained missing-aware model for patient h...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing systems
作者: Zhihao Yu Xu Chu Yujie Jin Yasha Wang Junfeng Zhao School of Computer Science Peking University and National Research and Engineering Center of Software Engineering Peking University School of Computer Science Peking University and Center on Frontiers of Computing Studies Peking University Beijing China and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Peking University Information Technology Institute (Tianjin Binhai) National Research and Engineering Center of Software Engineering Peking University and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Peking University Information Technology Institute (Tianjin Binhai) School of Computer Science Peking University and National Research and Engineering Center of Software Engineering Peking University and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Nanhu Laboratory Jiaxing China
Electronic health record (EHR) data has emerged as a valuable resource for analyzing patient health status. However, the prevalence of missing data in EHR poses significant challenges to existing methods, leading to s...
来源: 评论
A Privacy Leakage Detection Method for Personalized Course Recommendation Based on Pi-Calculus  24
A Privacy Leakage Detection Method for Personalized Course R...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Wu, Zixin Zhou, Xiaoyun Zhu, Yi Wang, Chenyu Hao, Guosheng School of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou China Jiangsu Engineering Technology Research Center of Ict in Education Jiangsu Xuzhou China Nanjing University of Aeronautics and Astronautics Ministry of Industry and Information Technology Key Laboratory of Safety-Critical Software Jiangsu Nanjing China
Privacy protection is one of the main approaches to improve the security and reliability of personalized course recommendation systems. However, the current privacy protection methods for personalized course recommend... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Emotional Synchronization for Audio-Driven Talking-Head Generation
Emotional Synchronization for Audio-Driven Talking-Head Gene...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Zhao Zhang Yan Luo Zhichao Zuo Richang Hong Yi Yang Meng Wang School of Computer Science and Information Engineering University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China School of Computer Science and Technology Zhejiang University Hangzhou China
Audio-driven talking-head synthesis has become a significant focus in the field of virtual human applications. However, existing methodologies face challenges in effectively synchronizing audio and video, especially i... 详细信息
来源: 评论