咨询与建议

限定检索结果

文献类型

  • 2,546 篇 会议
  • 1,713 篇 期刊文献
  • 48 册 图书
  • 7 篇 学位论文

馆藏范围

  • 4,314 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,448 篇 工学
    • 1,896 篇 计算机科学与技术...
    • 1,574 篇 软件工程
    • 523 篇 信息与通信工程
    • 373 篇 生物工程
    • 341 篇 控制科学与工程
    • 303 篇 生物医学工程(可授...
    • 231 篇 电气工程
    • 196 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 135 篇 机械工程
    • 110 篇 安全科学与工程
    • 95 篇 仪器科学与技术
    • 91 篇 化学工程与技术
    • 85 篇 交通运输工程
  • 1,398 篇 理学
    • 626 篇 数学
    • 433 篇 生物学
    • 421 篇 物理学
    • 248 篇 统计学(可授理学、...
    • 126 篇 系统科学
    • 102 篇 化学
  • 766 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 381 篇 图书情报与档案管...
    • 233 篇 工商管理
  • 385 篇 医学
    • 326 篇 临床医学
    • 299 篇 基础医学(可授医学...
    • 193 篇 公共卫生与预防医...
    • 156 篇 药学(可授医学、理...
  • 146 篇 法学
    • 121 篇 社会学
  • 123 篇 教育学
    • 113 篇 教育学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 72 篇 农学
  • 18 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 129 篇 machine learning
  • 104 篇 deep learning
  • 94 篇 accuracy
  • 81 篇 training
  • 75 篇 feature extracti...
  • 71 篇 predictive model...
  • 67 篇 internet of thin...
  • 65 篇 covid-19
  • 63 篇 computational mo...
  • 62 篇 convolutional ne...
  • 59 篇 security
  • 55 篇 artificial intel...
  • 54 篇 data models
  • 53 篇 visualization
  • 53 篇 students
  • 52 篇 semantics
  • 48 篇 real-time system...
  • 47 篇 support vector m...
  • 47 篇 optimization
  • 45 篇 medical services

机构

  • 80 篇 department of co...
  • 73 篇 college of compu...
  • 63 篇 college of compu...
  • 60 篇 college of compu...
  • 45 篇 college of compu...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 4,116 篇 英文
  • 188 篇 其他
  • 15 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=at College of Computing and Informatics"
4314 条 记 录,以下是41-50 订阅
排序:
Enhancing Multi-Attribute Fairness in Healthcare Predictive Modeling
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoyang Yang, Christopher C. College of Computing and Informatics Drexel University Philadelphia United States
Artificial intelligence (AI) systems in healthcare have demonstrated remarkable potential to improve patient outcomes. However, if not designed with fairness in mind, they also carry the risks of perpetuating or exace... 详细信息
来源: 评论
IAPS: Decreasing Software-Based Packet Steering Overhead Through Interrupt Reduction
IAPS: Decreasing Software-Based Packet Steering Overhead Thr...
收藏 引用
International Conference on Information Networking
作者: Maike Helbig Younghoon Kim College of Computing and Informatics Sungkyunkwan University Suwon South Korea
Packet Steering is often performed in hardware, rendering the software-based packet steering mechanisms of the Linux kernel obsolete. However, the ability to redistribute packets later during network processing could ... 详细信息
来源: 评论
Decision-Aid Framework for Face Authentication Detection Using ResNext50 and BiLSTM to Enhance Media Integrity
收藏 引用
IEEE Access 2025年 13卷 89858-89873页
作者: Alrawahneh, Ayat Abd-Muti Abdullah, Siti Norul Huda Sheikh Abuain, Tarik Abdullah, Sharifah Nurul Asyikin Syed Taylor, Sarah Khadijah Suhaimi, Nur Hanis Sabrina Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi 43600 Malaysia Saudi Electronic University College of Computing and Informatics Riyadh 11673 Saudi Arabia CyberSecurity Malaysia Cyberjaya 63000 Malaysia
This paper presents a decision-aid framework for face authentication detection that integrates ResNext50 with Bidirectional Long Short-Term Memory (BiLSTM) networks to enhance media integrity and improve deepfake dete... 详细信息
来源: 评论
Edge AI-powered marine pollution classification with customized CNN model
收藏 引用
Neural computing and Applications 2025年 第9期37卷 6449-6463页
作者: Palanisamy, Sanjai Bonny, Talal Nasir, Nida Al Shabi, Mohammad Al Shammaa, Ahmed University of Sharjah Sharjah United Arab Emirates Khorfakkan University Sharjah United Arab Emirates College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Mechanical Department College of Engineering University of Sharjah Sharjah United Arab Emirates Department of Electronics and Communication Engineering Karunya Institute of Technology and Sciences Coimbatore India
The increasing production of disposable plastic products contributes greatly to marine pollution and its impact on the marine ecosystem and organisms consuming ocean-derived food. To address this issue, this paper pro... 详细信息
来源: 评论
Detecting data manipulation errors in android applications using scene-guided exploration
收藏 引用
Empirical Software Engineering 2025年 第4期30卷 1-38页
作者: Liu, Shuqi Zhou, Yu Yang, Wenhua Chen, Taolue Gall, Harald College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Computing and Mathematical Sciences Birkbeck University of London London United Kingdom Department of Informatics University of Zurich Zurich Switzerland
Data manipulation functionalities (DMFs) refer to operations such as create, read, update and delete which are crucial for maintaining the integrity of Android application (app) data. Existing testing techniques often... 详细信息
来源: 评论
Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission  19
Optimizing VPN Security in Financial Services: Implementing ...
收藏 引用
19th International Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Ilias, Irma Syarlina Che Sameon, Sera Syarmila Zulkifli, Muhammad Zaqwan Ezzad Salleh, Mohammad Zahir Mat Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia College of Computing and Informatics Universiti Tenaga Nasional Selangor Malaysia CyberSecurity RawSec Kuala Lumpur Malaysia
This study examines the essential importance of security in contemporary network settings, emphasizing the increasing dependence on Virtual Private Networks (VPNs) for safe data transfer. The emphasis is on assessing ... 详细信息
来源: 评论
DR3DH: A DoS resistant extended triple Diffie–Hellman for mobile edge networks
收藏 引用
Computer Networks 2025年 265卷
作者: Altaweel, Ala Bouridane, Ahmed Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH... 详细信息
来源: 评论
Leveraging Game Theory and XAI for Data Quality-Driven Sample and Client Selection in Trustworthy Split Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tariq, Asadullah Sallabi, Farag Serhani, Mohamed Adel Qayyum, Tariq Barka, Ezedin S. United Arab Emirates University College of IT United Arab Emirates College of Computing and Informatics UoS United Arab Emirates
In Federated Learning (FL) systems, clients share updates derived from their local data with the server while maintaining privacy. The server aggregates these updates to refine the global model. However, not all clien... 详细信息
来源: 评论
RT-PPS: Real-time privacy-preserving scheme for cloud-hosted IoT data
收藏 引用
Journal of High Speed Networks 2025年 第1期31卷 71-89页
作者: Elhoseny, Mohamed Riad, Khaled College of Computing and Informatics University of Sharjah Sharjah27272 United Arab Emirates Faculty of Computers and Information Mansoura University Mansoura35516 Egypt Computer Science Department College of Computer Sciences & Information Technology King Faisal University Al-Ahsa 31982 Saudi Arabia Mathematics Department Faculty of Science Zagazig University Zagazig44519 Egypt
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论