咨询与建议

限定检索结果

文献类型

  • 228 篇 期刊文献
  • 199 篇 会议
  • 7 册 图书

馆藏范围

  • 434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 288 篇 工学
    • 194 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 49 篇 电气工程
    • 49 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 35 篇 控制科学与工程
    • 30 篇 生物工程
    • 26 篇 化学工程与技术
    • 20 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 18 篇 材料科学与工程(可...
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 10 篇 冶金工程
  • 164 篇 理学
    • 91 篇 数学
    • 59 篇 物理学
    • 33 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 83 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 34 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 9 篇 经济学
  • 8 篇 法学
  • 6 篇 教育学
  • 4 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 16 篇 deep learning
  • 12 篇 security
  • 11 篇 feature extracti...
  • 11 篇 machine learning
  • 10 篇 accuracy
  • 9 篇 computational mo...
  • 9 篇 artificial intel...
  • 7 篇 data models
  • 6 篇 covid-19
  • 6 篇 big data
  • 6 篇 convolution
  • 6 篇 algorithm design...
  • 6 篇 training
  • 5 篇 internet of thin...
  • 5 篇 computer science
  • 5 篇 intrusion detect...
  • 5 篇 data mining
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 5 篇 sentiment analys...

机构

  • 14 篇 school of inform...
  • 8 篇 school of comput...
  • 7 篇 institute of app...
  • 7 篇 school of softwa...
  • 7 篇 school of softwa...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of comput...
  • 5 篇 state key labora...
  • 4 篇 department of so...
  • 4 篇 school of softwa...
  • 4 篇 institute of app...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 institute of com...
  • 4 篇 department of ma...
  • 4 篇 college of appli...
  • 4 篇 department of co...

作者

  • 12 篇 liu risheng
  • 9 篇 zeng shangzhi
  • 9 篇 zhang jin
  • 8 篇 astrova irina
  • 7 篇 koschel arne
  • 6 篇 zhen liu
  • 5 篇 cai shaowei
  • 5 篇 sun le
  • 5 篇 jinfeng yang
  • 5 篇 vincent omollo n...
  • 5 篇 wang yiyuan
  • 4 篇 amlan chakrabart...
  • 4 篇 he jinyuan
  • 4 篇 kai shi
  • 4 篇 yang jinfeng
  • 4 篇 praschl christop...
  • 4 篇 leyi wei
  • 4 篇 valentina emilia...
  • 4 篇 fuqiang qiao
  • 4 篇 na lei

语言

  • 418 篇 英文
  • 14 篇 其他
  • 2 篇 中文
检索条件"机构=School of Software and Applied Science and Technology"
434 条 记 录,以下是81-90 订阅
排序:
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
A Crossover Algebra for Solving Minimum Spanning Tree in Network Design with Diameter Constraints
A Crossover Algebra for Solving Minimum Spanning Tree in Net...
收藏 引用
2021 International Conference on Cloud Computer, IoT and Intelligence System, CCIIS 2021
作者: Wang, Ziyi Shi, Kai Qiao, Fuqiang Li, Huanran School of Computer Science and Engineering Tianjin University of Technology China College of Software and Communications Tianjin Sino-German University of Applied Sciences Tianjin China
The minimum spanning tree problem with diameter constraint is an important problem for many applications such as network design and reliability. The diameter constraint makes it be different from the common minimum sp... 详细信息
来源: 评论
Vacancy-Type Defects in Thin HfO2 Layers Probed by Monoenergetic Positron Beams  30
Vacancy-Type Defects in Thin HfO2 Layers Probed by Monoenerg...
收藏 引用
30th International Symposium on Semiconductor Manufacturing, ISSM 2024
作者: Uedono, Akira Kawakami, Kazuya Kuribara, Tatsunori Hasunuma, Ryu Harashima, Yosuke Shigeta, Yasuteru Ni, Zeyuan Yan, Ruolin Nakamura, Hideo Notake, Akira Moriya, Tsuyoshi Michishio, Koji Ishibashi, Shoji University of Tsukuba Faculty of Pure and Applied Science Ibaraki Tsukuba305-8573 Japan Nara Institute of Science and Technology Graduate School of Science and Technology Nara Ikoma630-0192 Japan Tokyo Electron Technology Solutions Ltd. S-Technology Development Center Yamanashi Nirasaki407-0192 Japan Tokyo Electron Technology Solutions Ltd. Development Department 1 Yamanashi Nirasaki407-0192 Japan Tokyo Electron Ltd. Digital Design Center Hokkaido Sapporo060-0003 Japan Tokyo Electron Technology Solutions Ltd. Software and Data Engineering Division Yamanashi Nirasaki407-0192 Japan National Institute of Advanced Industrial Science and Technology Research Institute for Measurement and Analytical Instrumentation Ibaraki Tsukuba305-8568 Japan National Institute of Advanced Industrial Science and Technology Research Center for Computational Design of Advanced Functional Materials Ibaraki Tsukuba305-8568 Japan
Behaviors of vacancies during the amorphous-to-crystalline transition of thin HfO2 layers were studied by monoenergetic positron beams. The HfO2 layers with 430 nm thickness were fabricated on TiN/Si templates by atom... 详细信息
来源: 评论
Moreau Envelope for Nonconvex Bi-Level Optimization: A Single-loop and Hessian-free Solution Strategy
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Risheng Liu, Zhu Yao, Wei Zeng, Shangzhi Zhang, Jin School of Software Technology Dalian University of Technology Dalian China Pazhou Lab Guangzhou China National Center for Applied Mathematics Shenzhen Southern University of Science and Technology Shenzhen China Department of Mathematics Southern University of Science and Technology Shenzhen China Department of Mathematics and Statistics University of Victoria VictoriaBC Canada
This work focuses on addressing two major challenges in the context of large-scale nonconvex Bi-Level Optimization (BLO) problems, which are increasingly applied in machine learning due to their ability to model neste... 详细信息
来源: 评论
Modelling infectious disease transmission dynamics in conference environments: An individual-based approach
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Xue Deng, Yue Huang, Jingying Zhang, Yuhong Lei, Jinzhi School of Mathematical Sciences Tiangong University Tianjin300387 China School of Software Tiangong University Tianjin300387 China School of Computer Science and Technology Tiangong University Tianjin300387 China Center for Applied Mathematics Tiangong University Tianjin300387 China
The global public health landscape is perpetually challenged by the looming threat of infectious diseases. Central to addressing this concern is the imperative to prevent and manage disease transmission during pandemi... 详细信息
来源: 评论
Chebyshev Polynomial Broad Learning System
Chebyshev Polynomial Broad Learning System
收藏 引用
2021 International Conference on Information, Cybernetics, and Computational Social Systems, ICCSS 2021
作者: Feng, Shuang Wang, Bingshu Philip Chen, C.L. Beijing Normal University School of Applied Mathematics Zhuhai China Northwestern Polytechnical University School of Software Suzhou China South China University of Technology School of Computer Science and Engineering Guangzhou China
The broad learning system (BLS) has been attracting more and more attention due to its excellent property in the field of machine learning. A great deal of variants and hybrid structures of BLS have also been designed... 详细信息
来源: 评论
Spectral Extrema of Bipartite Graphs: Forbidden an Even Cycle of Specified Length
SSRN
收藏 引用
SSRN 2024年
作者: Feng, Zhimin Luo, Xiaobing Wei, Wei School of Mathematics and Statistics Xinyang Normal University Xinyang China School of Computer Technology and Software Engineering Wuhan Polytechnic Wuhan China Center of Intelligent Computing and Applied Statistics School of Mathematics Physics and Statistics Shanghai University of Engineering Science Shanghai201620 China
A graph is called $H$-free if the graph has no subgraph being isomorphic to $H$. The classical Tur\'an problem aims to determine the maximum size of an $H$-free graph with given order. In 2010, Nikiforov introduce... 详细信息
来源: 评论
Development Anonymous Authentication Maria et al.’s Scheme of VANETs Using Blockchain and Fog Computing with QR Code Technique
Development Anonymous Authentication Maria et al.’s Scheme ...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Zahraa Sh. Alzaidi Ali A. Yassin Zaid Ameen Abduljabbar Vincent Omollo Nyangaresi Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah Iraq Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and Technology Bando Kenya Department of Applied Electronics Saveetha School of Engineering SIMATS Chennai Tamilnadu India
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advance... 详细信息
来源: 评论
IoHT System Authentication Through the Blockchain technology: A Review
IoHT System Authentication Through the Blockchain Technology...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Muwafaq Jawad Ali A. Yassin Hamid Ali Abed Al-Asadi Zaid Ameen Abduljabbar Vincent Omollo Nyangaresi Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah Iraq Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and Technology Bando Kenya Department of Applied Electronics Saveetha School of Engineering SIMATS Chennai Tamilnadu India
The growing adoption of the Internet of Things (IoT) terminology in recent years in several domains, including healthcare, has yielded multiple benefits. One of the roles is to support professionals in delivering outs... 详细信息
来源: 评论
CASKA-CRT: Chinese Remainder Theorem Empowered Certificateless Aggregate Signcryption Scheme with Key Agreement in IoVs
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-16页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu Sun, Zhili Mumtaz, Shahid Tian, Daxin School of Cyber Science and Engineering Wuhan University Wuhan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Institute of Communication Systems University of Surrey Guildford U.K Department of Applied Informatics Silesian University of Technology Akademicka Gliwice Poland State Key Laboratory of Vehicle-Infrastructure Integrated ITS the State Key Laboratory of Intelligent Transportation System and the School of Transportation Science and Engineering Beihang University Beijing China
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ... 详细信息
来源: 评论