咨询与建议

限定检索结果

文献类型

  • 918 篇 期刊文献
  • 538 篇 会议
  • 13 册 图书

馆藏范围

  • 1,469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 688 篇 计算机科学与技术...
    • 547 篇 软件工程
    • 244 篇 信息与通信工程
    • 166 篇 电气工程
    • 123 篇 控制科学与工程
    • 116 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 74 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 37 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 化学工程与技术
  • 602 篇 理学
    • 259 篇 数学
    • 246 篇 物理学
    • 126 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 44 篇 化学
  • 248 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 86 篇 医学
    • 76 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 35 篇 法学
    • 24 篇 社会学
  • 19 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 35 篇 deep learning
  • 34 篇 computer science
  • 30 篇 grid computing
  • 29 篇 computational mo...
  • 26 篇 semantics
  • 26 篇 feature extracti...
  • 24 篇 training
  • 20 篇 cloud computing
  • 19 篇 computer archite...
  • 19 篇 internet
  • 18 篇 data mining
  • 18 篇 artificial intel...
  • 17 篇 protocols
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 bandwidth
  • 15 篇 servers

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 33 篇 chao-tung yang
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 1,305 篇 英文
  • 141 篇 其他
  • 22 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1469 条 记 录,以下是501-510 订阅
排序:
JUMPING FLUID MODELS AND DELAY STABILITY OF MAX-WEIGHT DYNAMICS UNDER HEAVY-TAILED TRAFFIC
arXiv
收藏 引用
arXiv 2021年
作者: Sharifnassab, Arsalan Tsitsiklis, John N. Department of Computing Science University of Alberta Edmonton Canada Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Department MIT CambridgeMA02139 United States
We say that a random variable is light-tailed if moments of order 2 + ∈ are finite for some ∈ > 0;otherwise, we say that it is heavy-tailed. We study queueing networks that operate under the Max-Weight scheduling... 详细信息
来源: 评论
MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Jingcai Xu, Yuanyuan Xu, Wenchao Zhan, Yufeng Sun, Yuxia Guo, Song Department of Computing The Hong Kong Polytechnic University Hong Kong The Hong Kong Polytechnic University Shenzhen Research Institute Shenzhen518057 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Automation Beijing Institute of Technology Beijing100081 China Department of Computer Science Jinan University Guangzhou510632 China Guangdong Provincial Key Laboratory of High-Performance Computing Guangzhou510275 China
Malware open-set recognition (MOSR) aims at jointly classifying malware samples from known families and detect the ones from novel unknown families, respectively. Existing works mostly rely on a well-trained classifie... 详细信息
来源: 评论
Quantum advantage for differential equation analysis
收藏 引用
Physical Review A 2022年 第2期105卷 022415-022415页
作者: Bobak Toussi Kiani Giacomo De Palma Dirk Englund William Kaminsky Milad Marvian Seth Lloyd Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge Massachusetts 02139 USA Research Laboratory of Electronics Massachusetts Institute of Technology Cambridge Massachusetts 02139 USA Giacomo De Palma Scuola Normale Superiore 56126 Pisa Italy QuEra Computing Boston Massachusetts 02143 USA Department of Mechanical Engineering Massachusetts Institute of Technology Cambridge Massachusetts 02139 USA Department of Electrical and Computer Engineering Center for Quantum Information and Control University of New Mexico Albuquerque New Mexico 87131 USA
Quantum algorithms for differential equation solving, data processing, and machine learning potentially offer an exponential speedup over all known classical algorithms. However, there also exist obstacles to obtainin... 详细信息
来源: 评论
Authentication of Vehicles and Road Side Units in Intelligent Transportation System
收藏 引用
computers, Materials & Continua 2020年 第7期64卷 359-371页
作者: Muhammad Waqas Shanshan Tu Sadaqat Ur Rehman Zahid Halim Sajid Anwar Ghulam Abbas Ziaul Haq Abbas Obaid Ur Rehman Beijing Key Laboratory of Trusted Computing Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science&Engineering Ghulam Ishaq Khan Institute of Engineering Sciences&TechnologyTopi23460Pakistan Beijing Electro-Meahnical Engineering Institute Beijing100074China Faculty of Electrical Engineering Ghulam Ishaq Khan Institute of Engineering Sciences&TechnologyTopi23460Pakistan Department of Electrical Engineering Sarhad University of Science and Information TechnologyPeshawar25000Pakistan
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ... 详细信息
来源: 评论
Theoretical Analysis of Impact of Delayed Updates on Decentralized Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zeng, Yong Liu, Siyuan Xu, Zhiwei Tian, Jie Sichuan Tengden Technology Co. Ltd China College of Information Engineering Inner Mongolia University of Technology Hohhot100080 China Institute of Computing Technology Chinese Academy of Sciences Beijing53035 China Haihe Laboratory of Information Technology Application Innovation Tianjin300350 China Department of Computer Science New Jersey Institute of Technology NewarkNJ07102 United States
Decentralized Federated learning is a distributed edge intelligence framework by exchanging parameter updates instead of training data among participators, in order to retrain or fine-tune deep learning models for mob... 详细信息
来源: 评论
STOPPAGE: Spatio-temporal data driven cloud-fog-edge computing framework for pandemic monitoring and management
arXiv
收藏 引用
arXiv 2021年
作者: Ghosh, Shreya Mukherjee, Anwesha Ghosh, Soumya K. Buyya, Rajkumar Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India Department of Computer Science Mahishadal Raj College West Bengal India Laboratory School of Computing and Information Systems University of Melbourne Australia
Several researches and evidence show the increasing likelihood of pandemics (large-scale outbreaks of infectious disease) which has far reaching sequels in all aspects of human lives ranging from rapid mortality rates... 详细信息
来源: 评论
A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks
Research Square
收藏 引用
Research Square 2021年
作者: Zhang, Jianshan Li, Ming Zheng, Xianghan Hsu, Ching-Hsien College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory Network Computing and Intelligent Information Processing Fuzhou China Department of Computer Science and Information Engineering Asia University Taichung Taiwan
With the rapid development of mobile technology, mobile applications have increasing requirements for computational resources, and mobile devices can no longer meet these requirements. Mobile edge computing (MEC) has ... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
BIG-FUSION: Brain-Inspired Global-Local Context Fusion Framework for Multimodal Emotion Recognition in Conversations  39
BIG-FUSION: Brain-Inspired Global-Local Context Fusion Frame...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yusong Fang, Xuanye Yin, Huifeng Li, Dongyuan Li, Guoqi Xu, Qi Xu, Yi Zhong, Shuai Xu, Mingkun Guangdong Institute of Intelligence Science and Technology Hengqin Zhuhai China Department of Information and Communications Engineering Tokyo Institute of Technology Tokyo Japan School of Computer Science and Technology Dalian University of Technology Dalian China Center for Brain Inspired Computing Research (CBICR) Department of Precision Instrument Tsinghua University Beijing China Institute of Automation Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing China
Considering the importance of capturing both global conversational topics and local speaker dependencies for multimodal emotion recognition in conversations, current approaches first utilize sequence models like Trans... 详细信息
来源: 评论
Wireless Hallucination in Generative AI-enabled Communications: Concepts, Issues, and Solutions
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xudong Wang, Jiacheng Feng, Lei Niyato, Dusit Zhang, Ruichen Kang, Jiawen Xiong, Zehui Du, Hongyang Mao, Shiwen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China College of Computing and Data Science Nanyang Technological University Singapore School of Automation Guangdong University of Technology Guangzhou510006 China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore Department of Electrical and Electronic Engineering University of Hong Kong Pok Fu Lam Hong Kong Department of Electrical and Computer Engineering Auburn University Auburn United States
Generative AI (GenAI) is driving the intelligence of wireless communications. Due to data limitations, random generation, and dynamic environments, GenAI may generate channel information or optimization strategies tha... 详细信息
来源: 评论