咨询与建议

限定检索结果

文献类型

  • 3,571 篇 会议
  • 2,774 篇 期刊文献
  • 109 册 图书

馆藏范围

  • 6,454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,971 篇 工学
    • 2,715 篇 计算机科学与技术...
    • 2,188 篇 软件工程
    • 758 篇 信息与通信工程
    • 723 篇 控制科学与工程
    • 491 篇 生物工程
    • 463 篇 电气工程
    • 396 篇 生物医学工程(可授...
    • 348 篇 电子科学与技术(可...
    • 300 篇 机械工程
    • 291 篇 光学工程
    • 209 篇 动力工程及工程热...
    • 178 篇 交通运输工程
    • 170 篇 仪器科学与技术
    • 166 篇 化学工程与技术
    • 151 篇 安全科学与工程
  • 2,242 篇 理学
    • 1,262 篇 数学
    • 571 篇 物理学
    • 550 篇 生物学
    • 416 篇 统计学(可授理学、...
    • 337 篇 系统科学
    • 195 篇 化学
  • 1,096 篇 管理学
    • 722 篇 管理科学与工程(可...
    • 420 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 411 篇 医学
    • 353 篇 临床医学
    • 313 篇 基础医学(可授医学...
    • 184 篇 药学(可授医学、理...
    • 168 篇 公共卫生与预防医...
  • 216 篇 法学
    • 184 篇 社会学
  • 158 篇 经济学
    • 155 篇 应用经济学
  • 107 篇 教育学
  • 69 篇 农学
  • 15 篇 军事学
  • 14 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 156 篇 computational mo...
  • 135 篇 feature extracti...
  • 129 篇 machine learning
  • 120 篇 deep learning
  • 114 篇 training
  • 111 篇 artificial intel...
  • 106 篇 accuracy
  • 92 篇 semantics
  • 92 篇 data models
  • 88 篇 predictive model...
  • 77 篇 optimization
  • 76 篇 cloud computing
  • 73 篇 computer archite...
  • 71 篇 educational inst...
  • 69 篇 neural networks
  • 68 篇 monitoring
  • 67 篇 data mining
  • 64 篇 visualization
  • 60 篇 internet of thin...
  • 56 篇 real-time system...

机构

  • 125 篇 school of comput...
  • 104 篇 school of comput...
  • 98 篇 school of comput...
  • 86 篇 school of mathem...
  • 53 篇 school of comput...
  • 47 篇 lsec institute o...
  • 44 篇 school of comput...
  • 42 篇 school of artifi...
  • 38 篇 school of comput...
  • 36 篇 yunnan key labor...
  • 35 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of system...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 center for compl...
  • 26 篇 school of engine...
  • 25 篇 academy of mathe...
  • 25 篇 school of comput...
  • 24 篇 school of comput...

作者

  • 42 篇 buyya rajkumar
  • 41 篇 niyato dusit
  • 36 篇 rajkumar buyya
  • 27 篇 wang yalin
  • 25 篇 xiong gang
  • 24 篇 lee joohyung
  • 23 篇 zhen shen
  • 22 篇 sonya coleman
  • 21 篇 rajeswari d.
  • 20 篇 kinshuk
  • 19 篇 mo huadong
  • 19 篇 liu yang
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 19 篇 liu ya-feng
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim

语言

  • 6,141 篇 英文
  • 257 篇 其他
  • 50 篇 中文
  • 6 篇 西班牙文
  • 1 篇 爱沙尼亚文
  • 1 篇 日文
检索条件"机构=School of Computing and Engineering Systems"
6454 条 记 录,以下是41-50 订阅
排序:
Comparison of Segmentation Algorithms for Extraction of Stone from Kidney X-ray Image  4th
Comparison of Segmentation Algorithms for Extraction of Ston...
收藏 引用
4th International Conference on Smart IoT systems: Innovations and computing, SSIC 2023
作者: Nisha, N. Dhaka, Vijaypal Singh Sinwar, Deepak Department of Computer and Communication Engineering Manipal University Jaipur Jaipur India Director of School of Computing and Intelligent Systems Department of Computer and Communication Engineering Manipal University Jaipur Jaipur India Department of IoT and Intelligent Systems Manipal University Jaipur Jaipur India
Healthcare systems are gaining popularity because of the advancement of new technology aiding healthcare professional for diagnosis of disease from medical modalities. The detection and classification of disease using... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
Comparative Study of Classification Algorithms Using Big Data Analytics for Flight Delays Prediction  5th
Comparative Study of Classification Algorithms Using Big Dat...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Asiri, Mona Hassan AL-Malaise AL-Ghamdi, Abdullah S. Fayoumi, Ayman G. Ragab, Mahmoud Department of Information Systems Collage of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Information Systems Department School of Engineering Computing and Design Dar Al-Hekma University Jeddah34801 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Information Technology Department Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Flight delays are the most pressing cause of concern in the airline sector because they can weaken and harm airlines, passengers, and airports. Flight delay prediction has become an essential step in decision-making p... 详细信息
来源: 评论
TrapNet: Model Inversion Defense via Trapdoor
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4469-4483页
作者: Ma, Wanlun Wang, Derui Song, Yiliao Xue, Minhui Wen, Sheng Li, Zhengdao Xiang, Yang Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC3122 Australia Cybersecurity and Quantum Systems Group CSIRO’s Data61 EveleighNSW2015 Australia The University of Adelaide School of Computer and Mathematical Sciences AdelaideSA5005 Australia Guangzhou University School of Artificial Intelligence Guangzhou511370 China
Model inversion (MI) attacks, for which effective defense strategies are still lacking, pose significant risks to privacy by reconstructing private training data through access to well-trained classifiers. Addressing ... 详细信息
来源: 评论
IDS: Robust Network Intrusion Detection via Temporal Contrastive Graph Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 1475-1486页
作者: Wu, Cong Sun, Jianfei Chen, Jing Alazab, Mamoun Liu, Yang Xiang, Yang Wuhan University School of Cyber Science and Engineering Wuhan430072 China Singapore Management University School of Computing and Information Systems Bras Basah Singapore188065 Singapore Charles Darwin University College of Engineering IT and Environment DarwinNT0810 Australia Nanyang Technological University College of Computing and Data Science Jurong West Singapore639798 Singapore Swinburne University of Technology Department of Digital Research MelbourneVIC3122 Australia
In the era of zero trust security models and next-generation networks (NGN), the primary challenge is that network nodes may be untrusted, even if they have been verified, necessitating continuous validation and scrut... 详细信息
来源: 评论
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Large Language Models
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Larg...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hong, Xin Gong, Yuan Sethu, Vidhyasaharan Dang, Ting School of Computing and Information Systems University of Melbourne Melbourne Australia CSAIL SLS Massachusetts Institute of Technology Boston United States School of Electrical Engineering and Telecommunications University of New South Wales Sydney Australia
Recent advancements in Large Language Models (LLMs) have demonstrated great success in many Natural Language Processing (NLP) tasks. In addition to their cognitive intelligence, exploring their capabilities in emotion... 详细信息
来源: 评论
A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2741-2755页
作者: Zhu, Xiaojie Zhou, Jiancong Dai, Yueyue Shen, Peisong Kasra Kermanshahi, Shabnam Hu, Jiankun King Abdullah University of Science and Technology Thuwal23955 Saudi Arabia Chinese Academy of Sciences Institute of Information Engineering Beijing100045 China University of Chinese Academy of Sciences School of Cyber Security Beijing101408 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China University of New South Wales School of Systems & Computing CanberraNSW2600 Australia
The adoption of symmetric searchable encryption (SSE) has become increasingly common. However, many current SSE schemes assume an honest-but-curious cloud service provider (CSP) or necessitate significant overhead to ... 详细信息
来源: 评论
Enhancing Air Quality Monitoring: A Brief Review of Federated Learning Advances  2nd
Enhancing Air Quality Monitoring: A Brief Review of Federate...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Yarham, Sara Behjati, Mehran Alobaidy, Haider A. H. Majeed, Anwar P. P. Abdul Zheng, Yufan Department of Computing and Information Systems School of Engineering and Technology Sunway University Bandar Sunway47500 Malaysia Department of Information and Communications Engineering College of Information Engineering Al-Nahrain University Baghdad64046 Iraq Suzhou Taicang215400 China
Monitoring air quality and environmental conditions is crucial for public health and effective urban planning. Current environmental monitoring approaches often rely on centralized data collection and processing, whic... 详细信息
来源: 评论
Development of Fast Prediction System of User Action for a Fully Autonomous Smart Home System  4
Development of Fast Prediction System of User Action for a F...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Rajalakshmi, N.R. Sharmila, L. Prabu, S. Veeramakali, T. Arulkumaran, G. Chourasia, Pranshu Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India School of Computing Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Chennai India School of Computing Srm Institute of Science and Technology Department of Data Science and Business Systems Kattankulathur Chennai India School of Computing and Information Technology Reva University Karnataka Bangalore560064 India
The HVAC system, energy storage building, distributed power supply, and other equipment are integrated into the scheduling algorithm, which is aimed at reducing household electricity consumption. It is also assumed th... 详细信息
来源: 评论
Normalized Least Dependent Difference: A Method in Solving Incorrectly Identified Monotonic Linearity Relationship in Linear Regression
Normalized Least Dependent Difference: A Method in Solving I...
收藏 引用
2025 International Workshop on Advanced Imaging Technology, IWAIT 2025
作者: Yeap, Herrick Han Lin Lim, Le Ying Lim, Michelle Chee Ern Chow, Brandon Chen Hong Ong, Hui Yan Kimberly Eu, Kok Seng Yap, Kian Meng Research Centre for Human-Machine Collaboration Department of Computing and Information Systems School of Engineering and Technology Sunway University Bandar Sunway Petaling Jaya47500 Malaysia School of Engineering Faculty of Innovation & Technology Taylor's University Subang Jaya47500 Malaysia
In machine learning, the reliability of an analytical method is crucial in validating the assumption of linearity for any linear regression *** existing analytical method of proving the assumption linearity, such as P... 详细信息
来源: 评论