咨询与建议

限定检索结果

文献类型

  • 918 篇 期刊文献
  • 538 篇 会议
  • 13 册 图书

馆藏范围

  • 1,469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 688 篇 计算机科学与技术...
    • 547 篇 软件工程
    • 244 篇 信息与通信工程
    • 166 篇 电气工程
    • 123 篇 控制科学与工程
    • 116 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 74 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 37 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 化学工程与技术
  • 602 篇 理学
    • 259 篇 数学
    • 246 篇 物理学
    • 126 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 44 篇 化学
  • 248 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 86 篇 医学
    • 76 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 35 篇 法学
    • 24 篇 社会学
  • 19 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 35 篇 deep learning
  • 34 篇 computer science
  • 30 篇 grid computing
  • 29 篇 computational mo...
  • 26 篇 semantics
  • 26 篇 feature extracti...
  • 24 篇 training
  • 20 篇 cloud computing
  • 19 篇 computer archite...
  • 19 篇 internet
  • 18 篇 data mining
  • 18 篇 artificial intel...
  • 17 篇 protocols
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 bandwidth
  • 15 篇 servers

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 33 篇 chao-tung yang
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 1,305 篇 英文
  • 141 篇 其他
  • 22 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1469 条 记 录,以下是441-450 订阅
排序:
Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yuntao Kong, Yan Yan, Yukang Cheng, Zirui Wang, Xueyang Yu, Chun Shi, Yuanchun Yi, Xin Xu, Xuhai Patel, Shwetak Key Laboratory of Pervasive Computing Ministry of Education Department of Computer Science and Technology Tsinghua University Beijing China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Qinghai University Qinghai Xining China Zhongguancun Laboratory Beijing China Information School University of Washington SeattleWA United States Paul G. Allen School of Computer Science and Engineering University of Washington SeattleWA United States
A computer vision system using low-resolution image sensors can provide intelligent services (e.g., activity recognition) but preserve unnecessary visual privacy information from the hardware level. However, preservin... 详细信息
来源: 评论
VMScan: an out-of-VM malware scanner
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第4期27卷 59-68页
作者: Lin Jie Liu Chuanyi Fang Binxing School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhen 518055China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Information and Electronic Engineering Chinese Academy of EngineeringBeijing 100088China
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends ... 详细信息
来源: 评论
EAFP-Med: An Efficient Adaptive Feature Processing Module Based on Prompts for Medical Image Detection
arXiv
收藏 引用
arXiv 2023年
作者: Li, Xiang Lan, Long Lahza, Husam Yang, Shaowu Wang, Shuihua Yang, Wenjing Liu, Hengzhu Zhang, Yudong College of Computer Science and Technology National University of Defense Technology Changsha410073 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Biological Sciences Xi'an Jiaotong-Liverpool University Jiangsu Suzhou215123 China School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom School of Computer Science and Engineering Southeast University Jiangsu Nanjing210096 China Department of Mathematical Sciences University of Liverpool LiverpoolL69 3BX United Kingdom
In the face of rapid advances in medical imaging, cross-domain adaptive medical image detection is challenging due to the differences in lesion representations across various medical imaging technologies. To address t... 详细信息
来源: 评论
Securing the Future Internet of Things with Post-Quantum Cryptography
arXiv
收藏 引用
arXiv 2022年
作者: Kumar, Adarsh Ottaviani, Carlo Gill, Sukhpal Singh Buyya, Rajkumar Department of Systemics School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Computer Science York Centre for Quantum Technologies University of York United Kingdom School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Laboratory School of Computing and Information Systems The University of Melbourne Australia
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ens... 详细信息
来源: 评论
EGRC-Net: Embedding-induced Graph Refinement Clustering Network
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Zhihao Liu, Hui Jia, Yuheng Hou, Junhui The Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong The School of Computing & Information Sciences Caritas In-stitute of Higher Education Hong Kong School of Computer Science and Engineering SoutheastUniversity Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Existing graph clustering networks heavily rely on a predefined yet fixed graph, which can lead to failures when the initial graph fails to accurately capture the data topology structure of the embedding space. In ord... 详细信息
来源: 评论
A Clustering-Based Routing Protocol Using Path Pattern Discovery Method to Minimize Delay in VANET
收藏 引用
Wireless Communications and Mobile computing 2023年 第1期2023卷
作者: Xie, Xiaoyun Navaei, Yahya Dorostkar Einy, Sajad School of Electronic Information Engineering Gannan University of Science and Technology Jiangxi Ganzhou341000 China Ganzhou Key Laboratory of Cloud Computing and Big Data Jiangxi Ganzhou341000 China Computer and Information Technology Engineering Qazvin Branch Islamic Azad University Qazvin Iran Istanbul Aydin University Department of Application and Research Center for Advanced Studies Istanbul Turkey
In vehicular ad hoc networks (VANETs), vehicle-to-vehicle (V2V) communications can link vehicles to each other, and vehicle-to-infrastructure (V2I) messaging and communications can link roadside infrastructure such as... 详细信息
来源: 评论
Training of Spiking Neural Network joint Curriculum Learning Strategy
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Lingling Chu, Jielei Gong, Zhiguo Li, Tianrui The School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China The State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China
Starting with small and simple concepts, and gradually introducing complex and difficult concepts is the natural process of human learning. Spiking Neural Networks (SNNs) aim to mimic the way humans process informatio... 详细信息
来源: 评论
Achieving Distributed and Privacy-Preserving Cross-Chain Transactions in Account-Model Blockchain Systems
Achieving Distributed and Privacy-Preserving Cross-Chain Tra...
收藏 引用
Metaverse computing, Networking and Applications (MetaCom), IEEE International Conference on
作者: Chuan Zhang Weijie Wang Weiting Zhang Jiangtian Nie Jinwen Liang Liehuang Zhu School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong China School of Computer Science & Technology Beijing Institute of Technology Beijing China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China School of Computer Science and Engineering Nanyang Technological University Singapore Department of Computing Hong Kong Polytechnic University China
Cross-Chain is an emerging technology to enable transaction circulation across different blockchain systems, breaking down transaction isolation among decentralized ecosystems. Existing cross-chain solutions are often...
来源: 评论
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
Cloud ubiquitous learning approach based on multi-agents system
Cloud ubiquitous learning approach based on multi-agents sys...
收藏 引用
information Technology (ACIT)
作者: Manel Guettala Samir Bourekkache Okba Kazar Saad Harous Belkacem Athamena Zina Houhamdi Department of Computer Science LINFI Laboratory University of Biskra Biskra Algeria Department of information Systems and Security College of Information Technology UAE University Department of Computer Science College of Computing and Informatics University of Sharjah College of Business Al Ain University Al Ain UAE College of engineering Al Ain University Al Ain UAE
information technology (IT) plays an important role in the education field, with ubiquitous computing technology the ubiquitous learning (U-learning) is now a practical possibility. Cloud computing can offer many bene... 详细信息
来源: 评论