咨询与建议

限定检索结果

文献类型

  • 50,590 篇 会议
  • 32,151 篇 期刊文献
  • 926 册 图书
  • 10 篇 学位论文

馆藏范围

  • 83,677 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 52,489 篇 工学
    • 35,309 篇 计算机科学与技术...
    • 28,668 篇 软件工程
    • 13,094 篇 信息与通信工程
    • 8,508 篇 控制科学与工程
    • 6,523 篇 电气工程
    • 6,163 篇 电子科学与技术(可...
    • 5,713 篇 生物工程
    • 4,171 篇 机械工程
    • 3,893 篇 光学工程
    • 3,885 篇 生物医学工程(可授...
    • 2,974 篇 仪器科学与技术
    • 2,505 篇 化学工程与技术
    • 2,440 篇 动力工程及工程热...
    • 1,979 篇 交通运输工程
    • 1,873 篇 安全科学与工程
    • 1,733 篇 网络空间安全
    • 1,658 篇 材料科学与工程(可...
  • 28,398 篇 理学
    • 15,121 篇 数学
    • 7,913 篇 物理学
    • 6,432 篇 生物学
    • 4,883 篇 统计学(可授理学、...
    • 3,444 篇 系统科学
    • 2,672 篇 化学
  • 14,407 篇 管理学
    • 9,012 篇 管理科学与工程(可...
    • 5,963 篇 图书情报与档案管...
    • 3,941 篇 工商管理
  • 3,825 篇 医学
    • 3,158 篇 临床医学
    • 2,755 篇 基础医学(可授医学...
    • 1,655 篇 药学(可授医学、理...
  • 2,311 篇 法学
    • 1,901 篇 社会学
  • 1,513 篇 经济学
  • 985 篇 教育学
  • 938 篇 农学
  • 320 篇 文学
  • 231 篇 军事学
  • 182 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,939 篇 computer science
  • 1,833 篇 feature extracti...
  • 1,497 篇 deep learning
  • 1,460 篇 computational mo...
  • 1,404 篇 training
  • 1,392 篇 accuracy
  • 1,282 篇 machine learning
  • 1,106 篇 data mining
  • 1,068 篇 optimization
  • 994 篇 semantics
  • 923 篇 artificial intel...
  • 909 篇 educational inst...
  • 856 篇 predictive model...
  • 782 篇 neural networks
  • 755 篇 internet of thin...
  • 694 篇 support vector m...
  • 669 篇 wireless sensor ...
  • 642 篇 data models
  • 609 篇 security
  • 586 篇 image segmentati...

机构

  • 648 篇 school of comput...
  • 539 篇 school of comput...
  • 479 篇 school of inform...
  • 476 篇 maharishi school...
  • 400 篇 school of comput...
  • 276 篇 department of ph...
  • 259 篇 faculté des scie...
  • 255 篇 school of comput...
  • 250 篇 department of ph...
  • 239 篇 school of comput...
  • 224 篇 faculty of scien...
  • 219 篇 department of ph...
  • 215 篇 physics division...
  • 215 篇 school of comput...
  • 203 篇 school of comput...
  • 196 篇 department of ph...
  • 192 篇 departamento de ...
  • 184 篇 department of ph...
  • 169 篇 school of comput...
  • 166 篇 department of ph...

作者

  • 278 篇 niyato dusit
  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 260 篇 g. spigo
  • 258 篇 h. a. gordon
  • 255 篇 f. siegert
  • 252 篇 a. c. könig
  • 249 篇 m. klein
  • 246 篇 r. ströhmer
  • 240 篇 y. tayalati
  • 231 篇 h. sakamoto
  • 217 篇 m. rijssenbeek
  • 200 篇 f. pastore
  • 200 篇 n. orlando
  • 194 篇 s. jin
  • 193 篇 d. guest

语言

  • 79,308 篇 英文
  • 2,947 篇 其他
  • 1,303 篇 中文
  • 171 篇 日文
  • 22 篇 德文
  • 21 篇 法文
  • 7 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science Engineering and Information Systems"
83677 条 记 录,以下是4991-5000 订阅
排序:
Simulation-based security of function-hiding inner product encryption
收藏 引用
science China(information sciences) 2018年 第4期61卷 215-225页
作者: Qingsong ZHAO Qingkai ZENG Ximeng LIU Huanliang XU State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing University College of Information Science and Technology Nanjing Agricultural University School of Information Systems Singapore Management University
Functional encryption(FE)[1,2]is a modern type of encryption scheme that extends several previous notions and allows tremendous flexibility in controlling and computing on encrypted *** enables an authority to derive ... 详细信息
来源: 评论
An Intelligent Intrusion Detection using Rule-based CNN with PSO Optimizer  3
An Intelligent Intrusion Detection using Rule-based CNN with...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Karpurasundharapondian, P. Selvi, M. Thangaramya, K. Santhosh Kumar, S.V.N. Kannan, A. Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Security and secure routing are important design issues in the design of Wireless Sensor Networks (WSNs). Intrusion Detection systems (IDSs) are useful for securing the communication in WSNs. An IDS can be developed b... 详细信息
来源: 评论
The study of services management based on the network environment
收藏 引用
International Journal of Smart Home 2015年 第5期9卷 83-92页
作者: Zhang, Xuemin Xiong, Zenggang Wang, Guangwei Ye, Conghuan Xu, Fang School of Computer and Information Science Hubei Engineering University Xiaogan city Hubei Province China
Service-Oriented Architecture (SOA) constructs applications by publishing services in an open network environment. In network environment individual service changes highly dynamically, it is required the system based ... 详细信息
来源: 评论
Analysis of the behavior of MGG and JGG as a selection model for real-coded genetic algorithms
收藏 引用
Transactions of the Japanese Society for Artificial Intelligence 2010年 第2期25卷 281-289页
作者: Akimoto, Youhei Nagata, Yuichi Sakuma, Jun Ono, Isao Kobayashi, Shigenobu Interdisciplinary Graduate School of Science and Engineering Tokyo Institute of Technology Japan Graduate School of Systems and Information Engineering University of Tsukuba Japan
In this paper, we focus on analyzing the behavior of the selection models for real-coded genetic algorithms. Recent studies show that Just Generation Gap (JGG) selection model outperforms Minimal Generation Gap (MGG) ... 详细信息
来源: 评论
A low complexity online controller using fuzzy logic in energy harvesting WSNs
收藏 引用
science China(information sciences) 2019年 第4期62卷 167-176页
作者: Talha AZFAR Waqas AHMED Abdul HASEEB Rizwan AHMAD Sufi Tabassum GUL Fu-Chun ZHENG Department of Electrical Engineering Pakistan Institute of Engineering and Applied Sciences (PIEAS) School of Electrical Engineering and Computer Science National University of Sciences and Technology (NUST) School of Electronic and Information Engineering Harbin Institute of Technology
In this paper, we present a fuzzy logic based scheme for a two hop energy harvesting(EH)wireless sensor network(WSN). Incorporating data and energy causality constraints, discrete transmission rates, finite energy and... 详细信息
来源: 评论
Experimental study of the three key issues of multi-auctioneer model in computer grid
Experimental study of the three key issues of multi-auctione...
收藏 引用
18th IASTED International Conference on Parallel and Distributed Computing and systems
作者: Han, Xiao Fang, Zhiyi Wang, Wanyu Xu, Fengyuan Huang, Mengzhou School of Economics and Information Systems School of Computer Science and Technology Key Laboratory Symbolic Computation and Knowledge Engineering Education Ministry
By means of introducing multi-auctioneer model, resources in the computational economic grid can be managed and allocated like in the auction. We research and put forward the corresponding solve schemes of three key i... 详细信息
来源: 评论
Organizational Data Breach:Building Conscious Care Behavior in Incident Response
收藏 引用
computer systems science & engineering 2022年 第2期40卷 505-515页
作者: Adlyn Adam Teoh Norjihan Binti Abdul Ghani Muneer Ahmad Nz Jhanjhi Mohammed A.Alzain Mehedi Masud Department of Information Systems Faculty of Computer Science&Information TechnologyUniversiti Malaya50603Kuala LumpurMalaysia School of Computer Science and Engineering SCE Taylor’s UniversitySubang Jaya47500Malaysia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of informati... 详细信息
来源: 评论
Utterance as A Bridge: Few-shot Joint Learning of Empathy Detection and Empathy Intent Classification
Utterance as A Bridge: Few-shot Joint Learning of Empathy De...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Liting Jiang Di Wu Zhe Li Shuangyong Song Yanbing Li Hao Huang School of Computer Science and Technology Xinjiang University Urumqi China Xinjiang Key Laboratory of Multi-Lingual Information Technology Urumqi China Institute of Artificial Intelligence (TeleAI) China Telecom Corp Ltd Beijing China Department of Electrical and Electronic Engineering Hong Kong Polytechnic University Hong Kong China Department of Electrical Engineering Stanford University USA Joint International Research Laboratory of Silk Road Multilingual Cognitive Computing Urumqi China
Empathy detection (ED) and empathy intent classification (EIC) aim to identify the empathy direction expressed in user utterances and the underlying empathy intent behind them. Previous studies show that facilitating ... 详细信息
来源: 评论
Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1797-1815页
作者: Sur Singh Rawat Youseef Alotaibi Nitima Malsa Vimal Gupta Department of Computer Science and Engineering JSS Academy of Technical EducationNoida201301India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as publi... 详细信息
来源: 评论
Event-Triggered Differentially Private Average Consensus for Multi-agent Network
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2019年 第1期6卷 75-83页
作者: Aijuan Wang Xiaofeng Liao Haibo He the College of Computer Science Chongqing University the School of Electronics and Information Engineering Southwest University the Department of Electrical Computer and Biomedical EngineeringUniversity of Rhode Island Kingston IEEE Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu... 详细信息
来源: 评论