咨询与建议

限定检索结果

文献类型

  • 3,606 篇 会议
  • 2,731 篇 期刊文献
  • 109 册 图书

馆藏范围

  • 6,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,972 篇 工学
    • 2,699 篇 计算机科学与技术...
    • 2,184 篇 软件工程
    • 745 篇 信息与通信工程
    • 712 篇 控制科学与工程
    • 489 篇 生物工程
    • 436 篇 电气工程
    • 396 篇 生物医学工程(可授...
    • 349 篇 电子科学与技术(可...
    • 295 篇 机械工程
    • 285 篇 光学工程
    • 207 篇 动力工程及工程热...
    • 175 篇 交通运输工程
    • 170 篇 仪器科学与技术
    • 166 篇 化学工程与技术
    • 147 篇 材料科学与工程(可...
  • 2,219 篇 理学
    • 1,263 篇 数学
    • 568 篇 物理学
    • 546 篇 生物学
    • 426 篇 统计学(可授理学、...
    • 335 篇 系统科学
    • 196 篇 化学
  • 1,086 篇 管理学
    • 716 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 396 篇 工商管理
  • 409 篇 医学
    • 352 篇 临床医学
    • 314 篇 基础医学(可授医学...
    • 183 篇 药学(可授医学、理...
    • 170 篇 公共卫生与预防医...
  • 220 篇 法学
    • 185 篇 社会学
  • 153 篇 经济学
    • 152 篇 应用经济学
  • 111 篇 教育学
  • 68 篇 农学
  • 15 篇 军事学
  • 13 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 158 篇 computational mo...
  • 136 篇 feature extracti...
  • 127 篇 machine learning
  • 124 篇 deep learning
  • 116 篇 training
  • 110 篇 artificial intel...
  • 108 篇 accuracy
  • 92 篇 predictive model...
  • 91 篇 semantics
  • 90 篇 data models
  • 80 篇 cloud computing
  • 79 篇 optimization
  • 73 篇 computer archite...
  • 71 篇 educational inst...
  • 70 篇 neural networks
  • 68 篇 data mining
  • 68 篇 monitoring
  • 63 篇 internet of thin...
  • 63 篇 visualization
  • 63 篇 security

机构

  • 129 篇 school of comput...
  • 104 篇 school of comput...
  • 97 篇 school of comput...
  • 85 篇 school of mathem...
  • 54 篇 school of comput...
  • 49 篇 lsec institute o...
  • 44 篇 school of comput...
  • 43 篇 school of comput...
  • 41 篇 school of artifi...
  • 37 篇 yunnan key labor...
  • 37 篇 school of comput...
  • 33 篇 school of system...
  • 32 篇 school of comput...
  • 31 篇 school of inform...
  • 31 篇 school of comput...
  • 29 篇 center for compl...
  • 27 篇 school of comput...
  • 26 篇 school of engine...
  • 25 篇 academy of mathe...
  • 24 篇 college of compu...

作者

  • 44 篇 buyya rajkumar
  • 43 篇 niyato dusit
  • 38 篇 rajkumar buyya
  • 27 篇 wang yalin
  • 26 篇 lee joohyung
  • 25 篇 xiong gang
  • 24 篇 sonya coleman
  • 24 篇 zhen shen
  • 22 篇 rajeswari d.
  • 21 篇 kinshuk
  • 19 篇 mo huadong
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 19 篇 gang xiong
  • 18 篇 dermot kerr
  • 18 篇 yinong chen
  • 18 篇 radicchi filippo
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita

语言

  • 5,603 篇 英文
  • 787 篇 其他
  • 51 篇 中文
  • 5 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=School of Systems and Computing Engineering"
6446 条 记 录,以下是41-50 订阅
排序:
Reinforcement Learning for Joint Resource and Power Allocation in D2D Communications  63
Reinforcement Learning for Joint Resource and Power Allocati...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Saeed, Ifrah Cullen, Andrew C. Zaidi, Zainab R. Erfani, Sarah Alpcan, Tansu The University of Melbourne Department of Electrical and Electronic Engineering Australia The University of Melbourne School of Computing and Information Systems Australia
Device-to-Device (D2D) communication is critical in many public safety scenarios where access to network infrastructure is not guaranteed. In such out-of-coverage situations, random resource allocation is a straightfo... 详细信息
来源: 评论
Decision making framework for heterogeneous QoS information: an application to cloud service selection
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第3期14卷 2915-2934页
作者: Tiwari, Rohit Kumar Kumar, Rakesh Baranwal, Gaurav Buyya, Rajkumar Department of Computer Science and Engineering Madan Mohan Malaviya University of Technology Gorakhpur273010 India Department of Computer Science BHU Varanasi India Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems University of Melbourne Melbourne Australia
In recent times, appropriate decision-making in challenging and critical situations has been very well supported by multicriteria decision-making (MCDM) methods. The technique for order of preference by similarity to ... 详细信息
来源: 评论
A Literature Review of Maturity Models for Cyber-Physical Production systems  18
A Literature Review of Maturity Models for Cyber-Physical Pr...
收藏 引用
18th IFAC Symposium on Information Control Problems in Manufacturing, INCOM 2024
作者: Abadía, Sofía Avila, Oscar Goepp, Virginie Department of Systems and Computing Engineering School of Engineering Universidad de Los Andes Bogota Colombia ICube INSA Strasbourg Strasbourg France
The transition towards Industry 4.0 is taking place nowadays, with fundamental technologies such as CPSs (Cyber-Physical System) and Digital Twins enabling it. For this, a variety of maturity models have been presente... 详细信息
来源: 评论
Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning
Cooperative Jamming for Physical Layer Security Enhancement ...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Hoseini, Sayed Amir Bouhafs, Faycal Aboutorab, Neda Sadeghi, Parastoo Hartog, Frank Den School of Systems and Computing Australia School of Engineering and Technology University of New South Wales Canberra Australia
Wireless data communications are always facing the risk of eavesdropping and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT ne... 详细信息
来源: 评论
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论
Secure location-aware geocast routing in Internet of Vehicles
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19669-19692页
作者: Kumar, Sunil Dohare, Upasana Kumar, Sushil Department of Computer Science and Information Technology Central University of Haryana Mahendragarh India School of Computing Science & Engineering Galgotias University Greater Noida India School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India
Efficient message dissemination in Vehicular Ad Hoc Networks (VANETs) relies on robust connectivity between neighboring vehicular nodes, yet it is often compromised by malicious intruders. While recent literature prop... 详细信息
来源: 评论
Cybersecurity framework for SMEs in Peru based on ISO/IEC 27001 and CSF NIST controls  18
Cybersecurity framework for SMEs in Peru based on ISO/IEC 27...
收藏 引用
18th Iberian Conference on Information systems and Technologies, CISTI 2023
作者: Angelo Edu, Munoz Luyo Alexis, Garibay Palomino Lenis, Wong Portillo Universidad Peruana de Ciencias Aplicadas School of Systems Engineering and Computing Lima Peru
Due to the global pandemic that was experienced in 2020, the Small and Medium Enterprises (SMEs) sector in Peru chose to store all their information in cloud services. However, a 2021 Kaspersky study indicates that SM... 详细信息
来源: 评论
Generation of Routes Using Genetic Algorithms to Optimize the Domestic Solid Waste Collection  8th
Generation of Routes Using Genetic Algorithms to Optimize th...
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Vega-Huerta, Hugo Marcos, Jordy Mayhuay Acosta, Marx Campos Monrroy, Xavier Villanueva Maquen-Niño, Gisella Luisa Elena Puelles-Bulnes, María Gil-Calvo, Rubén School of Systems Engineering Universidad Nacional Mayor de San Marcos Lima Peru School of Computing and Informatics Engineering Universidad Nacional Pedro Ruiz Gallo Lambayeque Peru
The district of San Juan de Lurigancho (SJL) in Lima—Peru, is one of the districts crowed in the capital and has one of the highest amounts solid domestic wastes. To fix this problem, a model was developed to map the... 详细信息
来源: 评论
A Survey on Modern Deep Neural Network for Traffic Prediction: Trends, Methods and Challenges (Extended Abstract)  39
A Survey on Modern Deep Neural Network for Traffic Predictio...
收藏 引用
39th IEEE International Conference on Data engineering, ICDE 2023
作者: Tedjopurnomo, David Alexander Bao, Zhifeng Zheng, Baihua Choudhury, Farhana Murtaza Qin, A.K. Rmit University School of Computing Technologies Australia Singapore Management University School of Computing and Information Systems Singapore The University of Melbourne School of Computing and Information Systems Australia Swinburne University of Technology Department of Computer Science and Software Engineering Australia
In this modern era, traffic congestion has become a major source of negative economic and environmental impact for urban areas worldwide. One of the most efficient ways to mitigate this issue is through traffic predic... 详细信息
来源: 评论
Dual Distillation: A Lightweight and Effective Intrusion Detection Model for IoT Security  15
Dual Distillation: A Lightweight and Effective Intrusion Det...
收藏 引用
15th Global Information Infrastructure and Networking Symposium, GIIS 2025
作者: Pei, Chonghao Mhamdi, Lotfi University of Leeds School of Electronic and Electrical Engineering United Kingdom Abdullah Al Salem University College of Computing & Systems Kuwait
With the exponential growth of IoT devices, ensuring efficient and accurate network anomaly detection in resource-constrained environments has become a pressing challenge. A lightweight dual distillation approach is p... 详细信息
来源: 评论