咨询与建议

限定检索结果

文献类型

  • 3,554 篇 会议
  • 2,746 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 6,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,942 篇 工学
    • 2,697 篇 计算机科学与技术...
    • 2,177 篇 软件工程
    • 745 篇 信息与通信工程
    • 713 篇 控制科学与工程
    • 492 篇 生物工程
    • 451 篇 电气工程
    • 397 篇 生物医学工程(可授...
    • 338 篇 电子科学与技术(可...
    • 294 篇 机械工程
    • 291 篇 光学工程
    • 207 篇 动力工程及工程热...
    • 174 篇 交通运输工程
    • 169 篇 仪器科学与技术
    • 167 篇 化学工程与技术
    • 151 篇 安全科学与工程
  • 2,222 篇 理学
    • 1,249 篇 数学
    • 566 篇 物理学
    • 545 篇 生物学
    • 408 篇 统计学(可授理学、...
    • 339 篇 系统科学
    • 195 篇 化学
  • 1,087 篇 管理学
    • 717 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 412 篇 医学
    • 355 篇 临床医学
    • 314 篇 基础医学(可授医学...
    • 184 篇 药学(可授医学、理...
    • 167 篇 公共卫生与预防医...
  • 214 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 108 篇 教育学
  • 68 篇 农学
  • 15 篇 军事学
  • 13 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 152 篇 computational mo...
  • 136 篇 feature extracti...
  • 127 篇 machine learning
  • 119 篇 training
  • 118 篇 deep learning
  • 111 篇 artificial intel...
  • 105 篇 accuracy
  • 93 篇 semantics
  • 90 篇 data models
  • 89 篇 predictive model...
  • 77 篇 cloud computing
  • 74 篇 optimization
  • 72 篇 computer archite...
  • 71 篇 educational inst...
  • 69 篇 neural networks
  • 68 篇 monitoring
  • 67 篇 data mining
  • 64 篇 visualization
  • 58 篇 internet of thin...
  • 57 篇 security

机构

  • 123 篇 school of comput...
  • 104 篇 school of comput...
  • 97 篇 school of comput...
  • 85 篇 school of mathem...
  • 53 篇 school of comput...
  • 46 篇 lsec institute o...
  • 42 篇 school of artifi...
  • 42 篇 school of comput...
  • 40 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 yunnan key labor...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 center for compl...
  • 27 篇 school of system...
  • 25 篇 academy of mathe...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of engine...

作者

  • 41 篇 buyya rajkumar
  • 39 篇 niyato dusit
  • 36 篇 rajkumar buyya
  • 28 篇 wang yalin
  • 25 篇 xiong gang
  • 24 篇 lee joohyung
  • 23 篇 zhen shen
  • 22 篇 sonya coleman
  • 21 篇 rajeswari d.
  • 20 篇 kinshuk
  • 20 篇 liu ya-feng
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 liu yang
  • 18 篇 yinong chen

语言

  • 6,123 篇 英文
  • 234 篇 其他
  • 51 篇 中文
  • 6 篇 西班牙文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 爱沙尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=School of Computing and Engineering Systems"
6412 条 记 录,以下是51-60 订阅
排序:
Improving Image Captioning by Mimicking Human Reformulation Feedback at Inference-time
arXiv
收藏 引用
arXiv 2025年
作者: Berger, Uri Abend, Omri Frermann, Lea Stanovsky, Gabriel School of Computer Science and Engineering The Hebrew University of Jerusalem School of Computing and Information Systems University of Melbourne Australia
Incorporating automatically predicted human feedback into the process of training generative models has attracted substantial recent interest, while feedback at inference time has received less attention. The typical ... 详细信息
来源: 评论
Enhancing student performance prediction: the role of class imbalance handling in machine learning models
收藏 引用
Discover computing 2025年 第1期28卷 1-34页
作者: Althaqafi, Turki Saleem, Farrukh AL-Ghamdi, Abdullah AL-Malaise Computer Science Department School of Engineering Computing and Design Dar Al-Hekma University Jeddah Saudi Arabia School of Built Environment Engineering and Computing Leeds Beckett University Leeds UK Information Systems Department Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The Learning Management System (LMS) is an essential tool for educational institutions that facilitates content delivery, assessments, lecture delivery, and collaboration to enhance the learning experience. This study...
来源: 评论
A Two-Stage Solution to Quantum Process Tomography: Error Analysis and Optimal Design
收藏 引用
IEEE Transactions on Information Theory 2025年 第3期71卷 1803-1823页
作者: Xiao, Shuixin Wang, Yuanlong Zhang, Jun Dong, Daoyi Mooney, Gary J. Petersen, Ian R. Yonezawa, Hidehiro University of New South Wales School of Engineering and Technology CanberraACT2600 Australia University of Michigan-Shanghai Jiao Tong University Joint Institute Shanghai Jiao Tong University Shanghai200240 China The Australian National University School of Engineering CanberraACT2601 Australia Chinese Academy of Sciences Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Beijing100190 China The Australian National University CIICADA Laboratory School of Engineering CanberraACT2601 Australia The University of Melbourne School of Physics ParkvilleVIC3010 Australia RIKEN Center for Quantum Computing Saitama351-0198 Japan Centre for Quantum Computation and Communication Technology Australian Research Council CanberraACT2600 Australia
Quantum process tomography is a critical task for characterizing the dynamics of quantum systems and achieving precise quantum control. In this paper, we propose a two-stage solution for both trace-preserving and non-... 详细信息
来源: 评论
AUTOTEE: Automated Migration and Protection of Programs in Trusted Execution Environments
arXiv
收藏 引用
arXiv 2025年
作者: Han, Ruidong Yang, Zhou Ma, Chengyan Liu, Ye Niu, Yuqing Ma, Siqi Gao, Debin Lo, David School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Engineering UNSW Sydney Australia
Trusted Execution Environments (TEEs) isolate a special space within a device’s memory that is not accessible to the normal world (also known as Untrusted Environment), even when the device is compromised. Thus, deve... 详细信息
来源: 评论
Multi-View Test-Time Adaptation for Semantic Segmentation in Clinical Cataract Surgery
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第5期44卷 2307-2318页
作者: Li, Heng Ou, Mingyang Li, Haojin Qiu, Zhongxi Niu, Ke Fu, Huazhu Liu, Jiang Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems Shenzhen518055 China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China Beijing Information Science and Technology University Computer School Beijing100192 China Institute of High Performance Computing Agency for Science Technology and Research Fusionopolis Way 138632 Singapore Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering Shenzhen518055 China
Cataract surgery, a widely performed operation worldwide, is incorporating semantic segmentation to advance computer-assisted intervention. However, the tissue appearance and illumination in cataract surgery often dif... 详细信息
来源: 评论
Assessing Susceptibility Factors of Confirmation Bias in News Feed Reading  25
Assessing Susceptibility Factors of Confirmation Bias in New...
收藏 引用
Proceedings of the 2025 CHI Conference on Human Factors in computing systems
作者: Nattapat Boonprakong Saumya Pareek Benjamin Tag Jorge Goncalves Tilman Dingler School of Computing and Information Systems University of Melbourne Parkville Victoria Australia School of Computing and Information Systems University of Melbourne Melbourne Victoria Australia School of Computer Science and Engineering University of New South Wales Sydney New South Wales Australia School of Computing and Information Systems University of Melbourne Melbourne Australia Industrial Design Engineering Delft University of Technology Delft Netherlands
来源: 评论
Threshold Password-Hardening Updatable Oblivious Key Management
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4799-4814页
作者: Jiang, Changsong Xu, Chunxiang Liu, Zhen Dong, Xinfeng Zhang, Wenzheng University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Singapore Management University School of Computing and Information Systems Bras Basah 188065 Singapore Huzhou313001 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Science and Technology on Communication Security Laboratory Chengdu610041 China
We propose a threshold password-hardening updatable oblivious key management system dubbed TPH-UOKM for cloud storage. In TPH-UOKM, a group of key servers share a user-specific secret key for a user, and assist the us... 详细信息
来源: 评论
RUM-NN: A Neural Network Model Compatible with Random Utility Maximisation for Discrete Choice Setups
arXiv
收藏 引用
arXiv 2025年
作者: Bagheri, Niousha Ghasri, Milad Barlow, Michael School of Engineering and Technology UNSW Canberra ACT2600 Australia School of Systems and Computing UNSW Canberra ACT2600 Australia
This paper introduces a framework for capturing stochasticity of choice probabilities in neural networks, derived from and fully consistent with the Random Utility Maximization (RUM) theory, referred to as RUM-NN. Neu... 详细信息
来源: 评论
Hotpatching on the Fly - Mitigating Drone Incidents Arising from Incorrect Configuration
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Han, Ruidong Li, Juanru Ma, Zhuo Lo, David Shaghaghi, Arash Ma, JianFeng Ma, Siqi Xidian University School of Cyber Engineering Xi'an China Singapore Management University School of Computing and Information Systems Singapore Feiyu Security Shanghai China Unsw Sydney School of Computer Science and Engineering Australia
Manufacturers offer adjustable control parameters for flight control systems to accommodate diverse environments and missions. To ensure flight safety, they also develop established boundaries, i.e., range specificati... 详细信息
来源: 评论
H-Rum-Nn: A Hybrid Neural Network Model Compatible with the Random Utility Maximisation
SSRN
收藏 引用
SSRN 2025年
作者: Bagheri, Niousha Ghasri, Milad Barlow, Michael School of Engineering and Technology UNSW CanberraACT2600 Australia School of Systems & Computing UNSW CanberraACT2600 Australia
Accurate prediction and analysis of travel mode choices are critical for effective transportation planning and have garnered significant attention in research. Traditionally, travel mode choice prediction has been con...
来源: 评论