咨询与建议

限定检索结果

文献类型

  • 6,062 篇 会议
  • 5,136 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,323 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,286 篇 工学
    • 5,245 篇 计算机科学与技术...
    • 4,334 篇 软件工程
    • 1,734 篇 信息与通信工程
    • 1,039 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 668 篇 电子科学与技术(可...
    • 590 篇 生物医学工程(可授...
    • 571 篇 光学工程
    • 538 篇 机械工程
    • 360 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 312 篇 网络空间安全
    • 266 篇 交通运输工程
    • 244 篇 安全科学与工程
  • 4,080 篇 理学
    • 2,014 篇 数学
    • 1,296 篇 物理学
    • 1,007 篇 生物学
    • 674 篇 统计学(可授理学、...
    • 413 篇 系统科学
    • 374 篇 化学
  • 2,046 篇 管理学
    • 1,208 篇 管理科学与工程(可...
    • 917 篇 图书情报与档案管...
    • 563 篇 工商管理
  • 603 篇 医学
    • 518 篇 临床医学
    • 457 篇 基础医学(可授医学...
    • 283 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 394 篇 法学
    • 307 篇 社会学
  • 187 篇 经济学
  • 149 篇 教育学
  • 139 篇 农学
  • 37 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 292 篇 deep learning
  • 268 篇 machine learning
  • 259 篇 feature extracti...
  • 216 篇 computational mo...
  • 192 篇 accuracy
  • 184 篇 semantics
  • 168 篇 internet of thin...
  • 167 篇 predictive model...
  • 163 篇 training
  • 142 篇 real-time system...
  • 116 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 neural networks
  • 110 篇 artificial intel...
  • 108 篇 optimization
  • 107 篇 computer science
  • 107 篇 security
  • 96 篇 visualization
  • 89 篇 cloud computing
  • 87 篇 data models

机构

  • 172 篇 university of ch...
  • 121 篇 key laboratory o...
  • 112 篇 university of sc...
  • 96 篇 tianfu cosmic ra...
  • 90 篇 hebei normal uni...
  • 88 篇 state key labora...
  • 88 篇 school of comput...
  • 88 篇 school of comput...
  • 86 篇 department of ph...
  • 85 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 53 篇 school of inform...
  • 53 篇 school of comput...
  • 52 篇 school of comput...
  • 52 篇 college of intel...
  • 48 篇 school of physic...
  • 47 篇 institute for nu...
  • 46 篇 department of co...

作者

  • 89 篇 niyato dusit
  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 70 篇 li cheng
  • 69 篇 li xin
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 66 篇 dai h.l.
  • 62 篇 min z.
  • 60 篇 guo y.q.
  • 57 篇 liu b.
  • 56 篇 heller m.
  • 56 篇 bao y.w.
  • 55 篇 hu h.b.

语言

  • 10,577 篇 英文
  • 617 篇 其他
  • 122 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11323 条 记 录,以下是4921-4930 订阅
排序:
TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics
TECS: A Trust Model for VANETs Using Eigenvector Centrality ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yu’Ang Zhang Yujie Song Yu Wang Yue Cao Xuefeng Ren Fei Yan Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Huali iSmartWays Technology Inc Wuhan China
Vehicular Ad Hoc Networks (VANETs) rely heavily on trustworthy message exchanges between vehicles to enhance traffic efficiency and transport safety. Although cryptography-based methods are capable of alleviating thre... 详细信息
来源: 评论
Learning-based Sustainable Multi-User Computation Offloading for Mobile Edge-Quantum computing
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Minrui Niyato, Dusit Kang, Jiawen Xiong, Zehui Chen, Mingzhe School of Computer Science and Engineering Nanyang Technological University Singapore School of Automation Guangdong University of Technology China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore487372 Singapore Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States
In this paper, a novel paradigm of mobile edge-quantum computing (MEQC) is proposed, which brings quantum computing capacities to mobile edge networks that are closer to mobile users (i.e., edge devices). First, we pr... 详细信息
来源: 评论
Bulk properties of the system in Au–Au collisions at 3 GeV and their dependence on collision centrality and particle rapidity
收藏 引用
Results in Physics 2024年 64卷
作者: Waqas, M. Hassan, Belqees Alnakhlani, Ali Ajaz, M. Altalbe, Ali Ghodhbani, Refka Ismail, A. Haj School of Mathematics Physics and Optoelectronic Engineering Hubei University of Automotive Technology Department of Physics College of Science Qassim University Department of Physics Faculty of Science Ibb university Department of Physics Abdul Wali Khan University Mardan Department of Computer Science. Prince Sattam Bin Abdulaziz University Department of Computer Sciences Faculty of Computing and Information Technology Northern Border University Department of Mathematics and Science Ajman University
We analyze the transverse momentum spectra of proton (p), deuteron (d), triton (t), and helium (3He and 4He) in different centrality intervals in various rapidity slices in gold–gold (Au–Au) collisions at sNN=3 GeV.... 详细信息
来源: 评论
VENUS: A Geometrical Representation for Quantum State Visualization
arXiv
收藏 引用
arXiv 2023年
作者: Ruan, Shaolun Yuan, Ribo Guan, Qiang Lin, Yanna Mao, Ying Jiang, Weiwen Wang, Zhepeng Xu, Wei Wang, Yong School of Computing and Information System Singapore Management University Singapore Department of Computer and Information Sciences University of Delaware United States Department of Computer Science Kent State University United States Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Computer and Information Science Department Fordham University United States Electrical and Computer Engineering George Mason University United States Computational Science Initiative Brookhaven National Laboratory United States
Visualizations have played a crucial role in helping quantum computing users explore quantum states in various quantum computing applications. Among them, Bloch Sphere is the widely-used visualization for showing quan... 详细信息
来源: 评论
Safeguarding Privacy for Cloud computing's Encrypted Data Using Association Rule Mining Algorithm and FP Growth Algorithm
Safeguarding Privacy for Cloud Computing's Encrypted Data Us...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: D. MohanaPriya P. Anu N. Kalyani S. Rekha R. Praba S. Sasikala Department of Computer Science PSG College of Arts & Science Coimbatore Tamilnadu India School of Computing SASTRA Deemed to be University Thanjavur Tamilnadu India Department of Information Technology Dr. N. G. P. Arts and Science College Coimbatore Tamilnadu India Department of Data Analytics (PG) PSGR Krishnammal College for Women Coimbatore Tamilnadu India
In an effort to support data privacy, safeguarding privacy guidelines for association mining techniques have recently been presented. Nevertheless, the algorithms are unable to conceal data frequency and have an extra... 详细信息
来源: 评论
Multi-View Mutual Learning Network for Multimodal Fake News Detection
SSRN
收藏 引用
SSRN 2023年
作者: Cui, Wei Zhang, Xuerui Shang, Mingsheng College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China School of Electronic Information and Communication Engineering Chongqing Aerospace Polytechnic Chongqing400021 China
Multimodal fake news is more deceptive than unimodal content and often has adverse social and economic impacts. However, most existing methods learn modal features from a single perspective, without considering simult... 详细信息
来源: 评论
Federated Linear Bandit Learning via Over-the-air Computation
Federated Linear Bandit Learning via Over-the-air Computatio...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jiali Wang Yuning Jiang Xin Liu Ting Wang Yuanming Shi MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China School of Information Science and Technology (SIST) ShanghaiTech University China Automatic Control Laboratory Ecole Polytechnique Fédérale de Lausanne (EPFL) Switzerland
In this paper, we investigate federated contextual linear bandit learning within a wireless system that comprises a server and multiple devices. Each device interacts with the environment, selects an action based on t...
来源: 评论
Online and semi-online scheduling on two hierarchical machines with a common due date to maximize the total early work
arXiv
收藏 引用
arXiv 2022年
作者: Xiao, Man Liu, Xiaoqiao Li, Weidong Chen, Xin Sterna, Malgorzata Blazewicz, Jacek Yunnan University School of Mathematics and Statistics Kunming China Liaoning University of Technology School of Electronics and Information Engineering Jinzhou China Poznan University of Technology Institute of Computing Science Poznan Poland European Centre for Bioinformatics and Genomics Polish Academy of Sciences Poznan Poland
In this study, we investigated several online and semi-online scheduling problems on two hierarchical machines with a common due date to maximize the total early work. For the pure online case, we designed an optimal ... 详细信息
来源: 评论
In Defense of Clip-based Video Relation Detection
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Meng Chen, Long Ji, Wei Yue, Xiaoyu Zimmermann, Roger The Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam999077 Hong Kong The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon999077 Hong Kong The School of Computing National University of Singapore 117417 Singapore The School of Electrical and Information Engineering The University of Sydney CamperdownNSW2006 Australia
Video Visual Relation Detection (VidVRD) aims to detect visual relationship triplets in videos using spatial bounding boxes and temporal boundaries. Existing VidVRD methods can be broadly categorized into bottom-up an... 详细信息
来源: 评论
Mengers Authentication for efficient security system using Blockchain technology for Industrial IoT(IIOT) systems
Mengers Authentication for efficient security system using B...
收藏 引用
Advance computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: Daxa Vekariya Ajay Rastogi R. Priyadarshini Manoj Patil M. Sunil Kumar Bhasker Pant Department of CSE Parul Institute of Engineering and Technology Parul University Vadodara Gujarat India College of Computing Science and Information Technology Teerthanker Mahaveer University Moradabad Uttar Pradesh India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Research and Development Jawaharlal Nehru Medical College Datta Meghe Institute of Medical Sciences Wardha India Department of CSE School of Computing Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College) Tirupathi AP India CSE Graphic Era Deemed to be University Dehradun Uttarakhand India
The Internet of Things (IoT), which allows computers from different settings to connect and cooperate on a same activity while ensuring better levels of privacy and safety for some of the connected equipment, must man...
来源: 评论