咨询与建议

限定检索结果

文献类型

  • 3,571 篇 会议
  • 2,774 篇 期刊文献
  • 109 册 图书

馆藏范围

  • 6,454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,971 篇 工学
    • 2,715 篇 计算机科学与技术...
    • 2,188 篇 软件工程
    • 758 篇 信息与通信工程
    • 723 篇 控制科学与工程
    • 491 篇 生物工程
    • 463 篇 电气工程
    • 396 篇 生物医学工程(可授...
    • 348 篇 电子科学与技术(可...
    • 300 篇 机械工程
    • 291 篇 光学工程
    • 209 篇 动力工程及工程热...
    • 178 篇 交通运输工程
    • 170 篇 仪器科学与技术
    • 166 篇 化学工程与技术
    • 151 篇 安全科学与工程
  • 2,242 篇 理学
    • 1,262 篇 数学
    • 571 篇 物理学
    • 550 篇 生物学
    • 416 篇 统计学(可授理学、...
    • 337 篇 系统科学
    • 195 篇 化学
  • 1,096 篇 管理学
    • 722 篇 管理科学与工程(可...
    • 420 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 411 篇 医学
    • 353 篇 临床医学
    • 313 篇 基础医学(可授医学...
    • 184 篇 药学(可授医学、理...
    • 168 篇 公共卫生与预防医...
  • 216 篇 法学
    • 184 篇 社会学
  • 158 篇 经济学
    • 155 篇 应用经济学
  • 107 篇 教育学
  • 69 篇 农学
  • 15 篇 军事学
  • 14 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 156 篇 computational mo...
  • 135 篇 feature extracti...
  • 129 篇 machine learning
  • 120 篇 deep learning
  • 114 篇 training
  • 111 篇 artificial intel...
  • 106 篇 accuracy
  • 92 篇 semantics
  • 92 篇 data models
  • 88 篇 predictive model...
  • 77 篇 optimization
  • 76 篇 cloud computing
  • 73 篇 computer archite...
  • 71 篇 educational inst...
  • 69 篇 neural networks
  • 68 篇 monitoring
  • 67 篇 data mining
  • 64 篇 visualization
  • 60 篇 internet of thin...
  • 56 篇 real-time system...

机构

  • 125 篇 school of comput...
  • 104 篇 school of comput...
  • 98 篇 school of comput...
  • 86 篇 school of mathem...
  • 53 篇 school of comput...
  • 47 篇 lsec institute o...
  • 44 篇 school of comput...
  • 42 篇 school of artifi...
  • 38 篇 school of comput...
  • 36 篇 yunnan key labor...
  • 35 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of system...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 center for compl...
  • 26 篇 school of engine...
  • 25 篇 academy of mathe...
  • 25 篇 school of comput...
  • 24 篇 school of comput...

作者

  • 42 篇 buyya rajkumar
  • 41 篇 niyato dusit
  • 36 篇 rajkumar buyya
  • 27 篇 wang yalin
  • 25 篇 xiong gang
  • 24 篇 lee joohyung
  • 23 篇 zhen shen
  • 22 篇 sonya coleman
  • 21 篇 rajeswari d.
  • 20 篇 kinshuk
  • 19 篇 mo huadong
  • 19 篇 liu yang
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 19 篇 liu ya-feng
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim

语言

  • 6,141 篇 英文
  • 257 篇 其他
  • 50 篇 中文
  • 6 篇 西班牙文
  • 1 篇 爱沙尼亚文
  • 1 篇 日文
检索条件"机构=School of Computing and Engineering Systems"
6454 条 记 录,以下是121-130 订阅
排序:
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng School of Computer Science University of Bristol United Kingdom Department of Information and Computing Science School of Mathematical Science Peking University China Department of Software Systems and Cybersecurity Monash University Australia School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Engineering Nanyang Technological University Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论
IvyCross: a Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Li, Ming Weng, Jian Weng, Jiasi Li, Yi Wu, Yongdong Li, Dingcheng Xu, Guowen Deng, Robert Singapore Management University School of Computing and Information Systems 178902 Singapore Jinan University College of Cyber Security Guangzhou510632 China Nanyang Technological University School of Computer Science and Engineering Singapore
Interoperability is a fundamental challenge for longenvisioned blockchain applications. A mainstream approach is using Trusted Execution Environment (TEE) to support interoperable off-chain execution. However, this in... 详细信息
来源: 评论
A Provably Secure Post-Quantum Based EDHOC Protocol  22
A Provably Secure Post-Quantum Based EDHOC Protocol
收藏 引用
22nd IEEE Consumer Communications and Networking Conference, CCNC 2025
作者: Yadav, Awaneesh Kumar Shojafar, Mohammad Braeken, An School of Computing and Electrical Engineering Indian Institute of Technology Mandi India Institute for Communication Systems University of Surrey 5G/6GIC Guildford United Kingdom Vrije Universiteit Brussel Department of Engineering technology (INDI) Brussel Belgium
Transport Layer Security (TLS) is considered to be the most used standard security protocol for the Internet of Things (IoT). However, as TLS was originally designed for computer networks, it is not optimal with respe... 详细信息
来源: 评论
Classification of benign and malignant breast lesions in mammograms using dense-unified multiscale attention network and data-efficient image transformers
收藏 引用
The European Physical Journal Special Topics 2025年 1-19页
作者: Paavankumar, S. Karthik, R. Idayachandiran, Gangatharan Sri, Pulaparthi Penchala Deepthi Illakiya, T. School of Computer Science Engineering Vellore Institute of Technology Chennai India Centre for Cyber Physical Systems Vellore Institute of Technology Chennai India Department of Computational Intelligence Faculty of Engineering and Technology School of Computing SRM Institute of Science and Technology Chennai India
Breast cancer is a common and a serious health problem and it is the major cause of morbidity and mortality for women. Early detection of the disease is particularly challenging because abnormalities such as masses an...
来源: 评论
DPS: Design Pattern Summarisation Using Code Features
arXiv
收藏 引用
arXiv 2025年
作者: Nazar, Najam Sikka, Sameer Treude, Christoph School of Computer and Mathematical Sciences The University of Adelaide Australia School of IT and Engineering Ada University Azerbaijan Faculty of Engineering and Information Technology The University of Melbourne Australia School of Computing and Information Systems Singapore Management University Singapore
Automatic summarisation has been used efficiently in recent years to condense texts, conversations, audio, code, and various other artefacts. A range of methods, from simple template-based summaries to complex machine... 详细信息
来源: 评论
Instructors' Perspectives on Capstone Courses in computing Fields: A Mixed-Methods Study  2024
Instructors' Perspectives on Capstone Courses in Computing F...
收藏 引用
29th Working Group Reports on Innovation and Technology in Computer Science Education, ITiCSE WGR 2024
作者: Hooshangi, Sara Shakil, Asma Dasgupta, Subhasish Davis, Karen C.C. Farghally, Mohammed Fitzpatrick, KellyAnn Gutica, Mirela Hardt, Ryan Riddle, Steve Seyam, Mohammed Department of Computer Science Virginia Tech BlacksburgVA United States School of Computer Science University of Auckland Auckland New Zealand Info Systems and Tech Mgmt Dept George Washington University WashingtonDC United States Computer Science and Software Engineering Dept. Miami University OxfordOH United States School of Computing Instruction Georgia Institute of Technology AtlantaGA United States School of Computing & Academic Studies British Columbia Institute of Technology BurnabyBC Canada Computer & Information Science University of St. Thomas Saint PaulVA United States School of Computing Newcastle University Newcastle upon Tyne United Kingdom
Team-based capstone courses are integral to many undergraduate and postgraduate degree programs in the computing field. They are designed to help students gain hands-on experience and practice professional skills such... 详细信息
来源: 评论
Recognition of American sign language using modified deep residual CNN with modified canny edge segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Hariharan, U. Devarajan, Devikanniga Kumar, P. Santhosh Rajkumar, K. Meena, M. Akilan, T. Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab Mohali140413 India Department of Computer Science and Engineering GITAM University Karnataka Bengaluru561203 India Department of Information Technology Faculty of Engineering and technology SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Tambaram602109 India Research Coordinator Dept. of IQAC Amity University Kolkata West Bengal 700135 India
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori... 详细信息
来源: 评论
RS‐YOLOX: A High Precision Detector for Object Detection in Satellite Remote Sensing Images
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lei Yuan, Guowu Zhou, Hao Liu, Hongyu Chen, Jian Wu, Hao School of Information Science and Engineering Yunnan University Kunming650504 China Yunnan Key Laboratory of Intelligent Systems and Computing Kunming650504 China
Automatic object detection by satellite remote sensing images is of great significance for resource exploration and natural disaster assessment. To solve existing problems in remote sensing image detection, this artic... 详细信息
来源: 评论
Multi-Agent Performative Prediction Beyond the Insensitivity Assumption: A Case Study for Mortgage Competition
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Guanghui Acharya, Krishna Lakshmikanthan, Lokranjan Muthukumar, Vidya Ziani, Juba College of Computing Georgia Institute of Technology United States School of Industrial and Systems Engineering Georgia Institute of Technology United States School of Electrical and Computer Engineering Georgia Institute of Technology United States
Performative prediction models account for feedback loops in decision-making processes where predictions influence future data distributions. While existing work largely assumes insensitivity of data distributions to ... 详细信息
来源: 评论
Empowering the adoption of blockchain-based cryptocurrency as a payment method: A user-friendly educational approach
IET Blockchain
收藏 引用
IET Blockchain 2025年 第1期5卷
作者: Alrehaili, Ahmed White, Martin Beloff, Natalia University of Sussex School of Engineering and Informatics Informatics Brighton United Kingdom Islamic University of Madinah College of Computing and Information Systems Computer Science Department Medina Saudi Arabia
Organizations are adopting technological innovations to transform payment systems due to challenges with traditional methods, such as slow speed and high fees. These challenges have prompted a shift towards blockchain... 详细信息
来源: 评论