咨询与建议

限定检索结果

文献类型

  • 3,554 篇 会议
  • 2,746 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 6,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,942 篇 工学
    • 2,697 篇 计算机科学与技术...
    • 2,177 篇 软件工程
    • 745 篇 信息与通信工程
    • 713 篇 控制科学与工程
    • 492 篇 生物工程
    • 451 篇 电气工程
    • 397 篇 生物医学工程(可授...
    • 338 篇 电子科学与技术(可...
    • 294 篇 机械工程
    • 291 篇 光学工程
    • 207 篇 动力工程及工程热...
    • 174 篇 交通运输工程
    • 169 篇 仪器科学与技术
    • 167 篇 化学工程与技术
    • 151 篇 安全科学与工程
  • 2,222 篇 理学
    • 1,249 篇 数学
    • 566 篇 物理学
    • 545 篇 生物学
    • 408 篇 统计学(可授理学、...
    • 339 篇 系统科学
    • 195 篇 化学
  • 1,087 篇 管理学
    • 717 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 412 篇 医学
    • 355 篇 临床医学
    • 314 篇 基础医学(可授医学...
    • 184 篇 药学(可授医学、理...
    • 167 篇 公共卫生与预防医...
  • 214 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 108 篇 教育学
  • 68 篇 农学
  • 15 篇 军事学
  • 13 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 152 篇 computational mo...
  • 136 篇 feature extracti...
  • 127 篇 machine learning
  • 119 篇 training
  • 118 篇 deep learning
  • 111 篇 artificial intel...
  • 105 篇 accuracy
  • 93 篇 semantics
  • 90 篇 data models
  • 89 篇 predictive model...
  • 77 篇 cloud computing
  • 74 篇 optimization
  • 72 篇 computer archite...
  • 71 篇 educational inst...
  • 69 篇 neural networks
  • 68 篇 monitoring
  • 67 篇 data mining
  • 64 篇 visualization
  • 58 篇 internet of thin...
  • 57 篇 security

机构

  • 123 篇 school of comput...
  • 104 篇 school of comput...
  • 97 篇 school of comput...
  • 85 篇 school of mathem...
  • 53 篇 school of comput...
  • 46 篇 lsec institute o...
  • 42 篇 school of artifi...
  • 42 篇 school of comput...
  • 40 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 yunnan key labor...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 center for compl...
  • 27 篇 school of system...
  • 25 篇 academy of mathe...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of engine...

作者

  • 41 篇 buyya rajkumar
  • 39 篇 niyato dusit
  • 36 篇 rajkumar buyya
  • 28 篇 wang yalin
  • 25 篇 xiong gang
  • 24 篇 lee joohyung
  • 23 篇 zhen shen
  • 22 篇 sonya coleman
  • 21 篇 rajeswari d.
  • 20 篇 kinshuk
  • 20 篇 liu ya-feng
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 liu yang
  • 18 篇 yinong chen

语言

  • 6,123 篇 英文
  • 234 篇 其他
  • 51 篇 中文
  • 6 篇 西班牙文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 爱沙尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=School of Computing and Engineering Systems"
6412 条 记 录,以下是71-80 订阅
排序:
Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5280-5297页
作者: Zhao, Mingxiong Wang, Zirui Guo, Kun Zhang, Rongqian Quek, Tony Q. S. Ministry of Education Engineering Research Center of Integration and Application of Digital Learning Technology Beijing100039 China Ministry of Education Engineering Research Center of Cyberspace Kunming650504 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China Yunnan University Yunnan Key Laboratory of Software Engineering Kunming650091 China East China Normal University Shanghai Key Laboratory of Multidimensional Information Processing School of Communications and Electronics Engineering Shanghai200241 China Yunnan University School of Information Science and Engineering Kunming650500 China Singapore University of Technology and Design Information Systems Technology and Design 487372 Singapore National Pilot School of Software Yunnan University Kunming China
In Unmanned Aerial Vehicle (UAV)-assisted Mobile Edge computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of line-of-sight links and potential eavesdropping o... 详细信息
来源: 评论
Using Fitts' Law to Benchmark Assisted Human-Robot Performance  25
Using Fitts' Law to Benchmark Assisted Human-Robot Performan...
收藏 引用
ACM/IEEE International Conference on Human-Robot Interaction (HRI)
作者: Jiahe Pan Jonathan Eden Denny Oetomo Wafa Johal Department of Mechanical Engineering The University of Melbourne Melbourne Australia School of Computing and Information Systems The University of Melbourne Melbourne Australia
Shared control systems aim to combine human and robot abilities to improve task performance. However, achieving optimal performance requires that the robot's level of assistance adjusts the operator's cognitiv... 详细信息
来源: 评论
Dual Distillation: A Lightweight and Effective Intrusion Detection Model for IoT Security
Dual Distillation: A Lightweight and Effective Intrusion Det...
收藏 引用
International Global Information Infrastructure Symposium (GIIS)
作者: Chonghao Pei Lotfi Mhamdi School of Electronic and Electrical Engineering University of Leeds UK College of Computing & Systems Abdullah Al Salem University Kuwait
With the exponential growth of IoT devices, ensuring efficient and accurate network anomaly detection in resource-constrained environments has become a pressing challenge. A lightweight dual distillation approach is p... 详细信息
来源: 评论
Effect of polarization on the point spread function in optical coherence tomography
Effect of polarization on the point spread function in optic...
收藏 引用
Optical Coherence Tomography and Coherence Domain Optical Methods in Biomedicine XXIX 2025
作者: Tankam, Patrice Liu, Xiao School of Optometry Indiana University BloomingtonIN United States Intelligent Systems Engineering Luddy School of Informatics Computing and Engineering Indiana University BloomingtonIN47405 United States
The use of the polarization property of light to evaluate the birefringence property of tissues as well as changes due to pathological conditions has been gaining interest over the past years with the introduction of ... 详细信息
来源: 评论
Can you pass that tool?: Implications of Indirect Speech in Physical Human-Robot Collaboration
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Yan Ratnayake, Tharaka Sachintha Sew, Cherie Knibbe, Jarrod Goncalves, Jorge Johal, Wafa School of Computing and Information Systems University of Melbourne MelbourneVIC Australia University of Melbourne MelbourneVIC Australia School of Electrical Engineering and Computer Science The University of Queensland BrisbaneQLD Australia School of Computing and Informatio Systems University of Melbourne MelbourneVIC Australia
Indirect speech acts (ISAs) are a natural pragmatic feature of human communication, allowing requests to be conveyed implicitly while maintaining subtlety and flexibility. Although advancements in speech recognition h... 详细信息
来源: 评论
Person Tracking and Modelling for a Human Interaction Robot  25
Person Tracking and Modelling for a Human Interaction Robot
收藏 引用
ACM/IEEE International Conference on Human-Robot Interaction (HRI)
作者: Adam Golding Wafa Johal Claude Sammut Computer Science and Engineering UNSW Sydney Sydney Australia School of Computing & Information Systems The University of Melbourne Melbourne Australia
For a robot to perform personalised human support in a home, it is essential to uniquely identify the people it is working for. Each individual has their own attributes, knowledge of the environment, and experiences w... 详细信息
来源: 评论
Cardiac MRI Segmentation of Ventricular Structures and Myocardium Using U-Net Variants
Cardiac MRI Segmentation of Ventricular Structures and Myoca...
收藏 引用
Advanced Research in computing (ICARC), International Conference on
作者: Chinthalanka B. Wijesinghe Dulani Meedeniya Pratheepan Yogarajah Department of Computer Science and Engineering University of Moratuwa Sri Lanka School of Computing Engineering and Intelligent Systems Ulster University Londonderry United Kingdom
Accurate segmentation of the ventricular structures and myocardium from Cardiac Magnetic Resonance (CMR) images is essential to diagnose and manage cardiovascular diseases. This study systematically evaluates the perf... 详细信息
来源: 评论
Colorful Vertex Recoloring of Bipartite Graphs
arXiv
收藏 引用
arXiv 2025年
作者: Patt-Shamir, Boaz Rosén, Adi Umboh, Seeun William School of Electrical Engineering Tel Aviv University CNRS Université Paris Cité France School of Computing and Information Systems The University of Melbourne Australia
We consider the problem of vertex recoloring: we are given n vertices with their initial coloring, and edges arrive in an online fashion. The algorithm is required to maintain a valid coloring by means of vertex recol... 详细信息
来源: 评论
How Do HCI Researchers Study Cognitive Biases? A Scoping Review  25
How Do HCI Researchers Study Cognitive Biases? A Scoping Rev...
收藏 引用
Proceedings of the 2025 CHI Conference on Human Factors in computing systems
作者: Nattapat Boonprakong Benjamin Tag Jorge Goncalves Tilman Dingler School of Computing and Information Systems University of Melbourne Parkville Victoria Australia School of Computer Science and Engineering University of New South Wales Sydney New South Wales Australia School of Computing and Information Systems University of Melbourne Melbourne Australia Industrial Design Engineering Delft University of Technology Delft Netherlands
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng University of Oxford Department of Computer Science United Kingdom Peking University Department of Information and Computing Science School of Mathematical Science China Monash University Department of Software Systems and Cybersecurity Australia Singapore Management University School of Computing and Information Systems Singapore Nanyang Technological University School of Computer Science and Engineering Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论