咨询与建议

限定检索结果

文献类型

  • 556 篇 会议
  • 263 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 827 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 513 篇 工学
    • 370 篇 计算机科学与技术...
    • 292 篇 软件工程
    • 90 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 38 篇 机械工程
    • 37 篇 电气工程
    • 32 篇 电子科学与技术(可...
    • 26 篇 生物医学工程(可授...
    • 25 篇 生物工程
    • 19 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 11 篇 建筑学
  • 243 篇 理学
    • 152 篇 数学
    • 54 篇 系统科学
    • 41 篇 统计学(可授理学、...
    • 37 篇 生物学
    • 36 篇 物理学
    • 13 篇 化学
  • 142 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 51 篇 工商管理
    • 51 篇 图书情报与档案管...
  • 30 篇 医学
    • 29 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 18 篇 法学
    • 13 篇 社会学
  • 10 篇 教育学
  • 8 篇 农学
  • 4 篇 文学
  • 4 篇 军事学

主题

  • 74 篇 computer science
  • 70 篇 laboratories
  • 40 篇 software enginee...
  • 38 篇 grid computing
  • 37 篇 application soft...
  • 34 篇 software systems
  • 30 篇 cloud computing
  • 28 篇 resource managem...
  • 28 篇 computational mo...
  • 26 篇 quality of servi...
  • 23 篇 processor schedu...
  • 22 篇 costs
  • 20 篇 distributed comp...
  • 18 篇 computer archite...
  • 16 篇 wireless sensor ...
  • 15 篇 systems engineer...
  • 15 篇 data mining
  • 15 篇 algorithm design...
  • 14 篇 computer network...
  • 14 篇 training

机构

  • 59 篇 shanghai key lab...
  • 33 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 24 篇 state key labora...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 17 篇 software enginee...
  • 16 篇 department of co...
  • 16 篇 state key labora...
  • 15 篇 shanghai key lab...
  • 14 篇 shanghai key lab...
  • 10 篇 department of co...
  • 9 篇 cloud computing ...
  • 8 篇 college of compu...
  • 8 篇 department of co...
  • 8 篇 school of electr...
  • 7 篇 grid computing a...
  • 7 篇 the seventh rese...
  • 7 篇 school of inform...

作者

  • 47 篇 rajkumar buyya
  • 36 篇 junping du
  • 34 篇 yingmin jia
  • 29 篇 chen guihai
  • 24 篇 fashan yu
  • 21 篇 wu fan
  • 20 篇 guan haibing
  • 19 篇 buyya rajkumar
  • 18 篇 ismail leila
  • 15 篇 gao xiaofeng
  • 14 篇 xiaolin li
  • 14 篇 guihai chen
  • 13 篇 materwala huned
  • 12 篇 veera boonjing
  • 12 篇 li wu-jun
  • 11 篇 p.k. mckinley
  • 10 篇 cheng betty h. c...
  • 10 篇 haibing guan
  • 10 篇 guo minyi
  • 10 篇 zhengfeng ji

语言

  • 780 篇 英文
  • 42 篇 其他
  • 5 篇 中文
  • 1 篇 日文
检索条件"机构=Scalable Software Systems Laboratory Computer Science Department"
827 条 记 录,以下是1-10 订阅
排序:
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 910-919页
作者: Liang YAO Xiaolong XU Wanchun DOU Muhammad Bilal School of Software Nanjing University of Information Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
Toward actionable testing of deep learning models
收藏 引用
science China(Information sciences) 2023年 第7期66卷 300-302页
作者: Yingfei XIONG Yongqiang TIAN Yepang LIU Shing-Chi CHEUNG Key Laboratory of High Confidence Software Technologies(Peking University) Ministry of Education School of Computer Science Peking University Department of Computer Science and Engineering The Hong Kong University of Science and Technology School of Computer Science University of Waterloo Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Department of Computer Science and Engineering Southern University of Science and Technology
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of th...
来源: 评论
WIP: An Engaging Undergraduate Intro to Model Checking in software Engineering Using TLA+  54
WIP: An Engaging Undergraduate Intro to Model Checking in So...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Läufer, Konstantin Mertin, Gunda Thiruvathukal, George K. Loyola University Software and Systems Laboratory Department of Computer Science Chicago United States Institute for Software Engineering and Programming Languages University of Lübeck Germany
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com... 详细信息
来源: 评论
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
Deep learning based water leakage detection for shield tunnel lining
收藏 引用
Frontiers of Structural and Civil Engineering 2024年 第6期18卷 887-898页
作者: Shichang LIU Xu XU Gwanggil JEON Junxin CHEN Ben-Guo HE College of Computer Science Sichuan UniversityChengdu 610065China School of Computer Science and Engineering Northeastern UniversityShenyang 110004China Department of Embedded Systems Engineering Incheon National UniversityIncheon 22012Korea School of Software Dalian University of TechnologyDalian 116621China Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern UniversityShenyang 110819China
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous *** avoid tedious and inefficient manual inspection,many proje... 详细信息
来源: 评论
MONETA: Prior-free and Truthful Auctions with Adaptive Reserve Price for High Revenue in Dynamic Spectrum Access Networks
收藏 引用
Chinese Journal of Electronics 2023年 第2期21卷 355-361页
作者: Xiaobing Wu Guihai Chen Department of Computer Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai China
Auction is efficient for spectrum allocation in future dynamic spectrum access networks. Truthful or strategy-proof auction is favorable since every bidder only needs to bid his true valuation and the auctioneer assig... 详细信息
来源: 评论
RAT: A Refactoring-Aware Tool for Tracking Code History  24
RAT: A Refactoring-Aware Tool for Tracking Code History
收藏 引用
46th International Conference on software Engineering: Companion, ICSE-Companion 2024
作者: Niu, Feifei Shao, Junqian Xu, Chaofan Mayr-Dorn, Christoph Assunção, Wesley K. G. Huang, Liguo Li, Chuanyi Ge, Jidong Luo, Bin Egyed, Alexander State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Department of Computer Science North Carolina State University North Carolina United States Department of Computer Science and Engineering Southern Methodist University DallasTX United States
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source... 详细信息
来源: 评论
Attentive Hawkes Process Application for Sequential Recommendation  28th
Attentive Hawkes Process Application for Sequential Recomme...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Yu, Shuodian Ma, Li Gao, Xiaofeng Guo, Jianxiong Chen, Guihai Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Advanced Institute of Natural Sciences Beijing Normal University Zhuhai519087 China
Sequential recommendation systems which aim to predict the users’ future clicking items are essential in both research and industry services. Based on the contextual characteristics of users, a large number of existi... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论