咨询与建议

限定检索结果

文献类型

  • 8,278 篇 会议
  • 6,276 篇 期刊文献
  • 254 册 图书

馆藏范围

  • 14,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,037 篇 工学
    • 5,667 篇 计算机科学与技术...
    • 4,568 篇 软件工程
    • 2,023 篇 信息与通信工程
    • 1,665 篇 控制科学与工程
    • 1,221 篇 电气工程
    • 1,092 篇 电子科学与技术(可...
    • 1,000 篇 生物工程
    • 779 篇 机械工程
    • 733 篇 光学工程
    • 715 篇 生物医学工程(可授...
    • 480 篇 仪器科学与技术
    • 448 篇 动力工程及工程热...
    • 394 篇 化学工程与技术
    • 333 篇 交通运输工程
    • 332 篇 材料科学与工程(可...
    • 318 篇 安全科学与工程
  • 5,103 篇 理学
    • 2,656 篇 数学
    • 1,349 篇 物理学
    • 1,174 篇 生物学
    • 892 篇 统计学(可授理学、...
    • 787 篇 系统科学
    • 464 篇 化学
  • 2,345 篇 管理学
    • 1,548 篇 管理科学与工程(可...
    • 852 篇 图书情报与档案管...
    • 773 篇 工商管理
  • 757 篇 医学
    • 621 篇 临床医学
    • 548 篇 基础医学(可授医学...
    • 314 篇 公共卫生与预防医...
    • 310 篇 药学(可授医学、理...
  • 387 篇 法学
    • 331 篇 社会学
  • 271 篇 经济学
  • 149 篇 农学
  • 148 篇 教育学
  • 31 篇 文学
  • 29 篇 军事学
  • 25 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 414 篇 computer science
  • 282 篇 deep learning
  • 239 篇 computational mo...
  • 192 篇 optimization
  • 170 篇 machine learning
  • 158 篇 feature extracti...
  • 149 篇 educational inst...
  • 142 篇 systems engineer...
  • 142 篇 neural networks
  • 141 篇 internet of thin...
  • 138 篇 artificial intel...
  • 129 篇 data mining
  • 124 篇 computer archite...
  • 119 篇 accuracy
  • 118 篇 control systems
  • 115 篇 predictive model...
  • 112 篇 reinforcement le...
  • 112 篇 support vector m...
  • 109 篇 simulation
  • 108 篇 software enginee...

机构

  • 98 篇 school of comput...
  • 87 篇 school of comput...
  • 86 篇 state key labora...
  • 83 篇 school of comput...
  • 81 篇 school of comput...
  • 81 篇 graduate school ...
  • 74 篇 school of comput...
  • 49 篇 school of comput...
  • 45 篇 ieee
  • 43 篇 school of comput...
  • 42 篇 information syst...
  • 41 篇 department of el...
  • 40 篇 pillar of inform...
  • 39 篇 academy of mathe...
  • 38 篇 the school of co...
  • 37 篇 school of comput...
  • 37 篇 department of co...
  • 36 篇 department of la...
  • 35 篇 school of comput...
  • 34 篇 graduate school ...

作者

  • 125 篇 niyato dusit
  • 68 篇 johansson karl h...
  • 49 篇 guo hong
  • 46 篇 hisao ishibuchi
  • 35 篇 pedrycz witold
  • 31 篇 xiong zehui
  • 29 篇 tao dacheng
  • 28 篇 e. rogers
  • 28 篇 rajkumar buyya
  • 26 篇 tsiftsis theodor...
  • 24 篇 shen xuemin
  • 24 篇 karl h. johansso...
  • 23 篇 kang jiawen
  • 22 篇 yang yang
  • 22 篇 niu jianwei
  • 21 篇 chen xiaowu
  • 21 篇 xu minrui
  • 20 篇 mengchu zhou
  • 20 篇 xiaoqing wen
  • 20 篇 arjan durresi

语言

  • 14,020 篇 英文
  • 582 篇 其他
  • 175 篇 中文
  • 32 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Systems Engineering"
14808 条 记 录,以下是41-50 订阅
排序:
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems
收藏 引用
Digital Communications and Networks 2023年 第3期9卷 655-666页
作者: Peixu Liu Gang Jing Hongwu Liu Liang Yang Theodoros A.Tsiftsis School of Information Science and Electrical Engineering Shandong Jiaotong UniversityJinan250357China School of Transportation and Logistics Engineering Shandong Jiaotong UniversityJinan250357China College of Computer Science and Electronic Engineering Hunan UniversityChangsha410082China School of Intelligent Systems Science and Engineering Jinan UniversityZhuhai519070China
Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation *** this paper,we utilize IRS to assist transmission of a secondary user(SU)in a cognitive rad... 详细信息
来源: 评论
A Study on DDoS Attacks Detection on IoT Devices Using Machine Learning for Microcontrollers
A Study on DDoS Attacks Detection on IoT Devices Using Machi...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Mwaura, Jedidah Araki, Shunsuke Kakizaki, Ken'Ichi Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering FuKuoka Japan Kyushu Institute of Technology Faculty of Computer Science and Systems Engineering Fukuoka Japan
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Recommendation System using Emotion Detection  3
Recommendation System using Emotion Detection
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Susindra, S. Sweta, B. Keerthikha Shri, R. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The need for a personalized user experience brought recommendation systems to the forefront of digital innovation. However, traditional approaches tend to often forget human emotions, which represent a critical driver... 详细信息
来源: 评论
Deep Learning-Based Enhanced Object Detection for Humanoid Robots  1
Deep Learning-Based Enhanced Object Detection for Humanoid R...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Negi, Akshit Patel, Harshita Vellore Institute of Technology School of Computer Science Engineering & Information Systems Vellore India
In the contemporary world, humanoid robots are likely to play a key role in various fields, including health care, domestic service, hospitality, business, and military and security activities. The robots are employed... 详细信息
来源: 评论
Cache Allocation in Multi-tenant Edge Computing: an Online Model-based Reinforcement Learning Approach
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第02期13卷 459-472页
作者: Ben-Ameur, Ayoub Araldo, Andrea Chahed, Tijani Dan, Gyorgy SAMOVAR Telecom SudParis Institut Polytechnique de Paris France KTH Royal Institute of Technology Division of Network and Systems Engineering School of Electrical Engineering and Computer Science Sweden
We consider a Network Operator (NO) that owns Edge Computing (EC) resources, virtualizes them and lets third party Service Providers (SPs) run their services, using the allocated slice of resources. We focus on one sp... 详细信息
来源: 评论
Risk Prediction of Heart Disease using Deep SHAP Techniques  2
Risk Prediction of Heart Disease using Deep SHAP Techniques
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Saranya, A. Narayan, Subhashini VIT University Vellore School of Computer Science Engineering and Information systems India
The automatic identification o f h eart d iseases is a challenging problem in the medical field, a nd i t constitutes the primary cause of death. Heart failure prediction, one of the symptoms of cardiovascular disease... 详细信息
来源: 评论
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1398-1411页
作者: Mimonah Al Qathrady Safi Ullah Mohammed S.Alshehri Jawad Ahmad Sultan Almakdi Samar M.Alqhtani Muazzam A.Khan Baraq Ghaleb Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Computer Science Quaid-i-Azam UniversityIslamabadPakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK ICESCO Chair Big Data Analytics and Edge Computing Quaid-i-Azam UniversityIslamabadPakistan
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr... 详细信息
来源: 评论
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
收藏 引用
Tsinghua science and Technology 2024年 第5期29卷 1615-1632页
作者: Abdul Basit Dogar Sami Ullah Yiran Zhang Hisham Alasmary Muhammad Waqas Sheng Chen Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China and also with Department of Informatics and SystemsUniversity of Management and TechnologyLahore 54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper Dir 18050Pakistan School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha 61421Saudi Arabia Department of Computer Engineering Faculty of Information TechnologyUniversity of BahrainSakheer 32038Bahrainand also with School of EngineeringEdith Cowan UniversityPerth WA 6027Australia School of Electronics and Computer Science University of SouthamptonSouthamptonSO171BJUK
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论