咨询与建议

限定检索结果

文献类型

  • 40,726 篇 会议
  • 2,944 册 图书

馆藏范围

  • 43,669 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 39,908 篇 工学
    • 38,450 篇 计算机科学与技术...
    • 7,386 篇 软件工程
    • 4,031 篇 信息与通信工程
    • 3,157 篇 电气工程
    • 2,324 篇 控制科学与工程
    • 792 篇 生物医学工程(可授...
    • 499 篇 生物工程
    • 333 篇 机械工程
    • 285 篇 交通运输工程
    • 179 篇 电子科学与技术(可...
    • 165 篇 土木工程
    • 164 篇 光学工程
    • 163 篇 化学工程与技术
  • 3,496 篇 管理学
    • 1,942 篇 管理科学与工程(可...
    • 1,236 篇 图书情报与档案管...
    • 925 篇 工商管理
  • 3,217 篇 理学
    • 1,946 篇 数学
    • 886 篇 生物学
    • 519 篇 统计学(可授理学、...
    • 368 篇 物理学
    • 220 篇 系统科学
    • 158 篇 化学
  • 1,498 篇 医学
    • 967 篇 临床医学
    • 693 篇 基础医学(可授医学...
    • 235 篇 特种医学
  • 1,484 篇 教育学
    • 1,402 篇 教育学
  • 531 篇 文学
    • 352 篇 外国语言文学
    • 178 篇 新闻传播学
  • 437 篇 经济学
    • 317 篇 理论经济学
  • 402 篇 法学
    • 366 篇 社会学
  • 177 篇 艺术学
  • 95 篇 历史学
  • 79 篇 农学
  • 11 篇 军事学

主题

  • 1,854 篇 artificial intel...
  • 1,169 篇 machine learning
  • 872 篇 deep learning
  • 777 篇 computer communi...
  • 668 篇 information syst...
  • 558 篇 computer applica...
  • 328 篇 computer systems...
  • 309 篇 cloud computing
  • 297 篇 clustering
  • 295 篇 security
  • 289 篇 internet of thin...
  • 270 篇 software enginee...
  • 269 篇 classification
  • 235 篇 information syst...
  • 229 篇 computer imaging...
  • 224 篇 data mining
  • 218 篇 software enginee...
  • 207 篇 data mining and ...
  • 207 篇 ontology
  • 180 篇 computers and ed...

机构

  • 80 篇 univ chinese aca...
  • 76 篇 univ dist franci...
  • 69 篇 chinese acad sci...
  • 67 篇 shanghai univ sc...
  • 48 篇 tsinghua univers...
  • 43 篇 natl res univ hi...
  • 39 篇 huazhong univers...
  • 35 篇 harbin inst tech...
  • 33 篇 tsinghua univ de...
  • 30 篇 shanghai jiao to...
  • 29 篇 pontificia univ ...
  • 29 篇 harbin universit...
  • 27 篇 polytechnic inst...
  • 27 篇 chinese acad sci...
  • 26 篇 lomonosov moscow...
  • 25 篇 chongqing univ s...
  • 25 篇 beijing univ pos...
  • 24 篇 university of cr...
  • 24 篇 hunan univ coll ...
  • 23 篇 univ nacl colomb...

作者

  • 58 篇 kim tai-hoon
  • 53 篇 lima jose
  • 43 篇 o'connor rory v.
  • 37 篇 wang lei
  • 34 篇 liu yang
  • 33 篇 zhang lin
  • 31 篇 kim seoksoo
  • 30 篇 wang jing
  • 28 篇 sabu m. thampi
  • 28 篇 crawford broderi...
  • 26 篇 zhang lei
  • 25 篇 li yang
  • 25 篇 li li
  • 24 篇 wang jian
  • 21 篇 zhang min
  • 20 篇 hassanien aboul ...
  • 19 篇 li peng
  • 19 篇 serra roberto
  • 18 篇 li xin
  • 18 篇 wang hui

语言

  • 43,504 篇 英文
  • 965 篇 中文
  • 1 篇 丹麦文
检索条件"丛书名=Communications in Computer and Information Science"
43670 条 记 录,以下是1091-1100 订阅
排序:
Deep Learning-Based Leukemia Diagnosis from Bone Marrow Images  12th
Deep Learning-Based Leukemia Diagnosis from Bone Marrow Imag...
收藏 引用
12th Ecuadorian Conference on information and Communication Technologies
作者: Zhinin-Vera, Luis Moya, Alejandro Pretel, Elena Astudillo, Jaime Jimenez-Ruescas, Javier Univ Castilla La Mancha LoUISE Res Grp Albacete 02071 Spain Yachay Tech Univ Sch Math & Computat Sci Urcuqui 100650 Ecuador Model Intelligent Networks Dev MIND Res Group Urcuqui Ecuador
Identifying and classifying features in Bone Marrow Aspirate Smear (BMAS) images is essential for diagnosing various leukemias, such as Acute Myeloid Leukemia. The complexity of microscopy image analysis necessitates ... 详细信息
来源: 评论
Entropy Based Embedded Unsupervised Feature Selection  4th
Entropy Based Embedded Unsupervised Feature Selection
收藏 引用
4th International Conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Rastogi, Reshma Aich, Era South Asian Univ Machine Learning & Stat Inference MLSI Lab Delhi India
Machine-learning techniques often encounter significant challenges when dealing with high-dimensional data due to the substantial memory requirements and extended processing times involved. In this paper, we introduce... 详细信息
来源: 评论
Identifying the Root Cause of a Cyber Attack Through Log Data Analysis: An Overview of the Challenges Faced by Novice Learners  17th
Identifying the Root Cause of a Cyber Attack Through Log Dat...
收藏 引用
17th India Compute Conference-COMPUTE-Annual
作者: Nagvekar, Priya V. Das, Syaamantak Iyer, Sridhar Indian Inst Technol Ctr Educ Technol Mumbai Maharashtra India
Cyber security has become a critical concern in todays digital age, and log data analysis plays a pivotal role in investigating the root causes of cyber attacks. However, the teaching and learning of the log data anal... 详细信息
来源: 评论
Application of Industry 4.0 for Enhancing Climate Compliant Irrigation System in Agriculture  2nd
Application of Industry 4.0 for Enhancing Climate Compliant ...
收藏 引用
2nd International Conference on Agriculture-Centric Computation
作者: Nayak, Ramesh Chandra Roul, Manmatha K. Mishra, Bishnu P. Khedikar, Amey R. Kulkarni, Mahesh Vasantrao Vijaybhai, Suryavanshi Bhagyeshkumar IHub Anubhuti IIITD Fdn New Delhi India Synergy Inst Technol Bhubaneswar Odisha India GITA Autonomous Coll Dept Mech Engn Bhubaneswar Odisha India Tulsiramji Gaikwad Patil Coll Engn & Technol Dept Civil Engn Nagpur Maharashtra India Dr Vishwanath Karad World Peace Univ Dept Mech Engn Pune Maharashtra India Larsen & Toubro L&T Heavy Engn Surat Gujarat India
Irrigation is the most important part of agriculture. Technology-based irrigation systems will help farmers with their active involvement and enhancement of productivity. In this work, two separate technology-based ir... 详细信息
来源: 评论
Securing RC Based P2P Networks: A Blockchain-Based Access Control Framework Utilizing Ethereum Smart Contracts for IoT and Web 3.0  37th
Securing RC Based P2P Networks: A Blockchain-Based Access Co...
收藏 引用
37th International Conference on computer Applications in Industry and Engineering
作者: Ghosh, Saurav Mitra, Reshmi Roy, Indranil Gupta, Bidyut Southeast Missouri State Univ Cape Girardeau MO 63701 USA Southern Illinois Univ Carbondale IL USA
Ensuring security for highly dynamic peer-to-peer (P2P) networks has always been a challenge, especially for services like online transactions and smart devices. These networks experience high churn rates, making it d... 详细信息
来源: 评论
Hybrid Wiener Filter and Sharpening Filter for Image De-blurring  4th
Hybrid Wiener Filter and Sharpening Filter for Image De-blur...
收藏 引用
4th International Conference on Intelligent Systems and Pattern Recognition-ISPR
作者: Habeeb, Nada Jasim Middle Tech Univ Baghdad Iraq
The Wiener filter is used efficiently in removing noise from images, as it is used to remove Gaussian noise. However, its use causes the loss of edge details and blurring of images. The proposed image de-blurring usin... 详细信息
来源: 评论
Towards a Taxonomy of Infrastructure as Code Misconfigurations: An Ansible Study  18th
Towards a Taxonomy of Infrastructure as Code Misconfiguratio...
收藏 引用
18th Symposium and Summer School on Service Oriented Computing
作者: Nasiri, Roya Kumara, Indika Tamburri, Damian Andrew van den Heuvel, Willem-Jan Tilburg Univ Jheronimus Acad Data Sci Shertogenbosch Netherlands Eindhoven Univ Technol Jheronimus Acad Data Sci Eindhoven Netherlands
Infrastructure as Code (IaC) enables the management and provisioning of infrastructure using code instead of manual processes. While the IaC approach can simplify and automate infrastructure management, the configurat... 详细信息
来源: 评论
Third Molar Angle Detection in Dental X-Ray Panoramic Radiographs Using YOLO and GoogleNet Convolutional Neural Networks  4th
Third Molar Angle Detection in Dental X-Ray Panoramic Radiog...
收藏 引用
4th International Conference on Advanced Research in Technologies information Innovation and Sustainability-ARTIIS-Annual
作者: Vilcapoma, Piero Parra Melendez, Diana Nicole Vasconez, Ingrid Gatica, Gustavo Pablo Vasconez, Juan Univ Andres Bello Fac Engn Santiago 7500735 Chile Univ Amer Fac Dent Quito 170513 Ecuador Univ Tecn Federico Santa Maria Ctr Biotecnol Dr Daniel Alkalay Lowitt Valparaiso 2390136 Chile Univ Andres Bello Energy Transformat Ctr Fac Engn Santiago 7500971 Chile
Artificial intelligence (AI) has proven very useful in dental applications in recent years. The automatic extraction of information from X-ray panoramic dental radiographs represents an opportunity to streamline denta... 详细信息
来源: 评论
Self-attention Siamese Network for Unsupervised Few-Shot Learning Tasks  4th
Self-attention Siamese Network for Unsupervised Few-Shot Lea...
收藏 引用
4th International Conference on Intelligent Systems and Pattern Recognition-ISPR
作者: Bhattarai, Binit Luitel, Pratik Kartheek, Mukku Nisanth Vellore Inst Technol Sch Comp Sci & Engn Vellore 632014 Tamil Nadu India
In the real world, it is hard to extract large data with the characteristics that are labeled. This becomes a problem when trying to implement artificial intelligence to real-life problems. In this work, we propose a ... 详细信息
来源: 评论
Privacy Preserving Enablers for Data Space Ecosystems  1st
Privacy Preserving Enablers for Data Space Ecosystems
收藏 引用
1st Global Internet of Things and Edge Computing Summit
作者: Borgonos Garcia, Natalia Hernandez Padilla, Maria Skarmeta Gomez, Antonio Fernando Univ Murcia Murcia Spain
Data Spaces are ecosystems designed to allow multiple organizations or companies to share data in a secure manner. Despite the potential of these technologies, they encounter a number of challenges and privacy issues ... 详细信息
来源: 评论