咨询与建议

限定检索结果

文献类型

  • 6,150 篇 会议
  • 5,208 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 11,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,436 篇 工学
    • 5,354 篇 计算机科学与技术...
    • 4,415 篇 软件工程
    • 1,755 篇 信息与通信工程
    • 1,070 篇 控制科学与工程
    • 905 篇 生物工程
    • 891 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 577 篇 光学工程
    • 541 篇 机械工程
    • 366 篇 仪器科学与技术
    • 347 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 265 篇 交通运输工程
    • 250 篇 安全科学与工程
  • 4,131 篇 理学
    • 2,041 篇 数学
    • 1,310 篇 物理学
    • 1,014 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 416 篇 系统科学
    • 379 篇 化学
  • 2,072 篇 管理学
    • 1,227 篇 管理科学与工程(可...
    • 925 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 611 篇 医学
    • 528 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 257 篇 药学(可授医学、理...
  • 398 篇 法学
    • 309 篇 社会学
  • 189 篇 经济学
  • 156 篇 教育学
  • 142 篇 农学
  • 36 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 298 篇 deep learning
  • 261 篇 machine learning
  • 260 篇 feature extracti...
  • 221 篇 computational mo...
  • 192 篇 accuracy
  • 185 篇 semantics
  • 171 篇 predictive model...
  • 168 篇 internet of thin...
  • 168 篇 training
  • 144 篇 real-time system...
  • 117 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 artificial intel...
  • 109 篇 neural networks
  • 109 篇 security
  • 108 篇 computer science
  • 108 篇 optimization
  • 95 篇 visualization
  • 88 篇 data models
  • 87 篇 cloud computing

机构

  • 172 篇 university of ch...
  • 122 篇 key laboratory o...
  • 113 篇 university of sc...
  • 97 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 91 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 86 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 college of compu...
  • 54 篇 school of comput...
  • 54 篇 college of intel...
  • 48 篇 institute for nu...
  • 47 篇 department of co...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 10,384 篇 英文
  • 959 篇 其他
  • 127 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11484 条 记 录,以下是481-490 订阅
排序:
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
Phase-bias-blind computational ghost imaging with optical phased array
收藏 引用
Optics Express 2025年 第10期33卷 21132-21141页
作者: Hirata, Sota Matsuda, Naoki Komatsu, Kento Tanemura, Takuo Horisaki, Ryoichi Department of Information Physics and Computing Graduate School of Information Science and Technology The University of Tokyo 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan Department of Electrical Engineering and Information Systems Graduate School of Engineering The University of Tokyo 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan
We propose a method for computational ghost imaging (CGI) with an optical phased array (OPA), wherein phase biases on the phase shifters are intrinsically unknown. In our method, an object is illuminated with a number... 详细信息
来源: 评论
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones
收藏 引用
International Journal of information Security 2025年 第3期24卷 1-34页
作者: Ray, Palash Giri, Debasis Obaidat, Mohammad S. Jana, Manasi Sasmal, Mahuya Alenazi, Mohammed J. F. Haldia Institute of Technology West Bengal Haldia India Maulana Abul Kalam Azad University of Technology West Bengal Nadia India King Abdullah II School of Information Technology The University of Jordan Amman Jordan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Department of Computational Intelligence School of Computing SRM University SRM Nagar TN Kattankulathur603203 India School of Engineering The Amity University UP Noida201301 India King Saud University Riyadh Saudi Arabia
The growing prevalence of smartphones and the increasing dependence on digital services have made it crucial to have authentication techniques that are both secure and user-friendly. This study examines the effectiven... 详细信息
来源: 评论
Improving Existing VANETs by Incorporating UAVS Using Ant Colony and PSO Algorithms  4
Improving Existing VANETs by Incorporating UAVS Using Ant Co...
收藏 引用
4th IEEE International Conference on Data Engineering and Communication Systems, ICDECS 2024
作者: Thangam, S. Dixit, Aniket Karn, Alok Kumar Thakur, Arnav Arunbalaji, Cg Jesy Janet Kumari, J. Saleem Raja, A. Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Bengaluru India University of Technology and Applied Sciences-Shinas College of Computing and Information Sciences It Department Oman
Vehicular Ad Hoc Networks (VANETs) are a type of wireless communication network that enable vehicles to communicate with each other and with roadside infrastructure in a peer-to-peer fashion;despite their vast applica... 详细信息
来源: 评论
Not All Pairs are Equal: Hierarchical Learning for Average-Precision-Oriented Video Retrieval  24
Not All Pairs are Equal: Hierarchical Learning for Average-P...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Yang Xu, Qianqian Wen, Peisong Dai, Siran Huang, Qingming School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences BDKM University of Chinese Academy of Sciences Beijing China
The rapid growth of online video resources has significantly promoted the development of video retrieval methods. As a standard evaluation metric for video retrieval, Average Precision (AP) assesses the overall rankin... 详细信息
来源: 评论
Adaptive Strategies for Scalable and Heterogeneous VANET Network  5
Adaptive Strategies for Scalable and Heterogeneous VANET Net...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Thangam, S. Jha, Priyanshu Hawari, Jawed Sah, Nabin Kumar Jain, Nikunj Jesy Janet Kumari, J.J. Saleem Raja, A. Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Bengaluru India College of Computing and Information Sciences University of Technology and Applied Sciences It Department Shinas Oman
Despite technological advancements, Vehicular Ad-hoc Networks (VANETs) continue to face challenges related to reliability and high-speed mobility. This study focuses on enhancing scalability, improving mobility, and a... 详细信息
来源: 评论
Adaptive Multi-Updating Strategy Based Particle Swarm Optimization
收藏 引用
Intelligent Automation & Soft computing 2023年 第9期37卷 2783-2807页
作者: Dongping Tian Bingchun Li Jing Liu Chen Liu Ling Yuan Zhongzhi Shi School of Computer Science and Technology Kashi UniversityKashi844006China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing100190China
Particle swarm optimization(PSO)is a stochastic computation tech-nique that has become an increasingly important branch of swarm intelligence ***,like other evolutionary algorithms,PSO also suffers from premature conv... 详细信息
来源: 评论
Neuro-Mimetic Developmental Architecture for Continual Learning through Self-Organizing Multimodal Perception Coordination
收藏 引用
IEEE Access 2025年 13卷 91625-91641页
作者: Dawood, Farhan Masuyama, Naoki Loo, Chu Kiong Iqra University Department of Computing & Technology Islamabad Pakistan Osaka Metropolitan University Graduate School of Informatics 1-1 Gakuen-cho Naka-ku Sakai-Shi Osaka599-8531 Japan University of Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia
Developing cognitive capabilities in autonomous agents stands as a challenging yet pivotal task. In order to construct cohesive representations and extract meaningful insights from the environment, the brain utilizes ... 详细信息
来源: 评论