咨询与建议

限定检索结果

文献类型

  • 22,321 篇 会议
  • 12,286 篇 期刊文献
  • 454 册 图书

馆藏范围

  • 35,061 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 21,896 篇 工学
    • 17,277 篇 计算机科学与技术...
    • 14,323 篇 软件工程
    • 5,096 篇 信息与通信工程
    • 3,156 篇 控制科学与工程
    • 2,875 篇 生物工程
    • 2,249 篇 电气工程
    • 1,971 篇 生物医学工程(可授...
    • 1,667 篇 光学工程
    • 1,595 篇 电子科学与技术(可...
    • 1,241 篇 机械工程
    • 1,076 篇 网络空间安全
    • 900 篇 安全科学与工程
    • 870 篇 动力工程及工程热...
    • 856 篇 化学工程与技术
    • 818 篇 仪器科学与技术
    • 793 篇 交通运输工程
  • 11,307 篇 理学
    • 6,188 篇 数学
    • 3,167 篇 生物学
    • 2,709 篇 物理学
    • 1,946 篇 统计学(可授理学、...
    • 1,202 篇 系统科学
    • 997 篇 化学
  • 6,539 篇 管理学
    • 3,778 篇 管理科学与工程(可...
    • 3,046 篇 图书情报与档案管...
    • 1,713 篇 工商管理
  • 2,060 篇 医学
    • 1,643 篇 临床医学
    • 1,477 篇 基础医学(可授医学...
    • 1,009 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,318 篇 法学
    • 1,101 篇 社会学
  • 601 篇 经济学
  • 490 篇 农学
  • 447 篇 教育学
  • 230 篇 文学
  • 65 篇 艺术学
  • 58 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,094 篇 deep learning
  • 1,060 篇 accuracy
  • 885 篇 computer science
  • 792 篇 computational mo...
  • 747 篇 feature extracti...
  • 721 篇 machine learning
  • 718 篇 training
  • 539 篇 semantics
  • 515 篇 predictive model...
  • 461 篇 internet of thin...
  • 450 篇 data models
  • 423 篇 support vector m...
  • 394 篇 real-time system...
  • 394 篇 convolutional ne...
  • 352 篇 artificial intel...
  • 297 篇 optimization
  • 296 篇 scalability
  • 296 篇 computer archite...
  • 275 篇 data mining
  • 268 篇 reliability

机构

  • 579 篇 school of comput...
  • 216 篇 institute of com...
  • 190 篇 department of co...
  • 171 篇 school of comput...
  • 161 篇 department of co...
  • 152 篇 department of co...
  • 142 篇 department of co...
  • 132 篇 school of comput...
  • 132 篇 school of comput...
  • 129 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 108 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 national enginee...
  • 102 篇 college of intel...
  • 99 篇 college of compu...
  • 99 篇 department of co...

作者

  • 136 篇 hai jin
  • 129 篇 jin hai
  • 122 篇 niyato dusit
  • 107 篇 zheng wei-shi
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 83 篇 díaz a.f.
  • 81 篇 anjali t.
  • 74 篇 boumaaza j.
  • 73 篇 kalekin o.
  • 65 篇 coleiro a.
  • 61 篇 huang f.
  • 57 篇 gozzini s.r.
  • 56 篇 kulikovskiy v.
  • 55 篇 zhang lei
  • 54 篇 eddymaoui a.

语言

  • 33,106 篇 英文
  • 1,736 篇 其他
  • 262 篇 中文
  • 11 篇 法文
  • 10 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Computing Science"
35061 条 记 录,以下是141-150 订阅
排序:
Searching for Structure: Investigating Emergent Communication with Large Language Models  31
Searching for Structure: Investigating Emergent Communicatio...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Kouwenhoven, Tom Peeperkorn, Max Verhoef, Tessa Leiden Institute of Advanced Computer Science Leiden University Netherlands School of Computing University of Kent United Kingdom
Human languages have evolved to be structured through repeated language learning and use. These processes introduce biases that operate during language acquisition and shape linguistic systems toward communicative eff... 详细信息
来源: 评论
Algorithms for online fault tolerance server consolidation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 514-523页
作者: Li, Boyu Wu, Bin Shen, Meng Peng, Hao Li, Weisheng Zhang, Hong Gan, Jie Tian, Zhihong Xu, Guangquan College of Intelligence and Computing Tianjin University Tianjin300350 China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China School of Computer Science and Technology Zhejiang Normal University Jinhua321004 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400054 China School of Astronautics Beihang University Beijing100191 China School of Computer Science University of Sydney SydneyNSW20528 Australia Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou511370 China
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server failures. In this mechanism, each item represents a computing task and is replicated into ξ+1 servers for some ... 详细信息
来源: 评论
Containerized Data-Flow Processing for Scalable Real-Time Analytics on Edge Devices  25th
Containerized Data-Flow Processing for Scalable Real-Time A...
收藏 引用
25th International Conference on Parallel and Distributed computing, Applications and Technologies, PDCAT 2024
作者: HoseinyFarahabady, MohammadReza Y. Zomaya, Albert School of Computer Science Center for Distributed and High Performance Computing The University of Sydney SydneyNSW2006 Australia
The increasing demand for real-time data analysis in Internet of Things (IoT) ecosystems has created several challenges, particularly in environments where resources are limited, and minimizing data processing latency... 详细信息
来源: 评论
Latency- and Privacy-Aware Convolutional Neural Network Distributed Inference for Reliable Artificial Intelligence Systems
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 365-377页
作者: Hu, Yuhao Xu, Xiaolong Qi, Lianyong Zhou, Xiaokang Xia, Xiaoyu Nanjing University of Information Science and Technology School of Software Nanjing210044 China College of computer science and technology Qingdao266850 China Shiga University Faculty of Data Science Hikone522-8522 Japan RMIT University School of Computing Technologies MelbourneVIC3000 Australia
Reliable artificial intelligence (AI) systems not only propose a challenge on providing intelligent services with high quality for customers but also require customers' privacy to be protected as much as possible ... 详细信息
来源: 评论
Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1973-1986页
作者: Khulud Salem Alshudukhi Mamoona Humayun Ghadah Naif Alwakid Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computing School of Arts Humanities and Social SciencesUniversity of RoehamptonLondonSW155PHUK
The Internet ofThings(IoT)and edge computing have substantially contributed to the development and growth of smart *** handled time-constrained services and mobile devices to capture the observing environment for surv... 详细信息
来源: 评论
A Secured Internet of Drone Model with Distributed Protocols  4
A Secured Internet of Drone Model with Distributed Protocols
收藏 引用
4th International Conference on Evolutionary computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Janani, V.S. Mukhopadhyay, Adwitiya Department of Computer Science Amrita School of Computing Mysuru Campus Amrita Vishwa Vidyapeetham Mysuru570026 India
With the increasing demand in drone technology, Internet-of-drones (IoD) has attracted researchers to contribute multiple benefits for various military and civilian applications. Providing security in a distributed Io... 详细信息
来源: 评论
MetaHG: Enhancing HGNN Systems Leveraging Advanced Metapath Graph Abstraction  25
MetaHG: Enhancing HGNN Systems Leveraging Advanced Metapath ...
收藏 引用
20th European Conference on computer Systems, EuroSys 2025, co-located 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2025
作者: He, Haiheng Liu, Haifeng Zheng, Long Huang, Yu Shen, Xinyang Huang, Wenkan Cao, Chuaihu Liao, Xiaofei Jin, Hai Xue, Jingling National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering University of New South Wales Australia
Heterogeneous Graph Neural Networks (HGNNs) are pivotal for extracting semantic and structural information from heterogeneous graphs. Traditional HGNN implementations often grapple with the challenges of excessive met... 详细信息
来源: 评论
Causal Analysis and Risk Assessment for Batch Crowdsourcing
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5312-5323页
作者: Chao, Ke Wang, Shengling Shi, Hongwei Huang, Jianhui Cheng, Xiuzhen Beijing Normal University School of Artificial Intelligence Beijing100875 China Chinese Academy of Sciences Institute of Computing Technology Beijing100190 China Shandong University School of Computer Science and Technology Shandong250100 China
The way of task posting serves as the main pillar in achieving an efficient crowdsourcing market. Pioneer solutions on task posting can be categorized as retail task posting and batch task posting. Unlike retail task ... 详细信息
来源: 评论
DAEA: Enhancing Entity Alignment in Real-World Knowledge Graphs Through Multi-Source Domain Adaptation  31
DAEA: Enhancing Entity Alignment in Real-World Knowledge Gra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Yang, Linyan Zhou, Shiqiao Cheng, Jingwei Zhang, Fu Wan, Jizheng Wang, Shou Lee, Mark School of Computer Science and Engineering Northeastern University China School of Computer Science University of Birmingham United Kingdom Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University China
Entity Alignment (EA) is a critical task in Knowledge Graph (KG) integration, aimed at identifying and matching equivalent entities that represent the same real-world objects. While EA methods based on knowledge repre... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering China City University of Hong Kong Department of Computer Science Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu China Zhengzhou University School of Cyber Science and Engineering Zhengzhou China Zhengzhou University International College Zhengzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China Nanyang Technological University College of Computing and Data Science Singapore Wuhan University School of Cyber Science and Engineering Wuhan China City University of Macau Faculty of Data Science China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论