咨询与建议

限定检索结果

文献类型

  • 188,718 篇 会议
  • 1,476 册 图书
  • 1,254 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 191,446 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 102,853 篇 工学
    • 77,854 篇 计算机科学与技术...
    • 61,785 篇 软件工程
    • 22,033 篇 信息与通信工程
    • 18,247 篇 控制科学与工程
    • 13,658 篇 电气工程
    • 9,028 篇 电子科学与技术(可...
    • 8,980 篇 生物工程
    • 8,725 篇 机械工程
    • 7,616 篇 生物医学工程(可授...
    • 5,228 篇 光学工程
    • 5,025 篇 动力工程及工程热...
    • 4,834 篇 仪器科学与技术
    • 4,405 篇 安全科学与工程
    • 3,863 篇 交通运输工程
    • 3,481 篇 化学工程与技术
    • 3,090 篇 建筑学
  • 41,942 篇 理学
    • 23,089 篇 数学
    • 9,732 篇 生物学
    • 9,650 篇 物理学
    • 7,081 篇 统计学(可授理学、...
    • 6,880 篇 系统科学
    • 3,513 篇 化学
  • 27,942 篇 管理学
    • 17,972 篇 管理科学与工程(可...
    • 11,977 篇 图书情报与档案管...
    • 9,307 篇 工商管理
  • 6,314 篇 医学
    • 5,376 篇 临床医学
    • 5,037 篇 基础医学(可授医学...
    • 3,007 篇 药学(可授医学、理...
  • 4,045 篇 法学
    • 3,252 篇 社会学
  • 3,202 篇 经济学
    • 3,179 篇 应用经济学
  • 2,637 篇 教育学
  • 1,816 篇 农学
  • 673 篇 文学
  • 426 篇 军事学
  • 200 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 6,541 篇 computer archite...
  • 6,075 篇 computational mo...
  • 6,073 篇 computer science
  • 6,014 篇 real-time system...
  • 5,290 篇 feature extracti...
  • 5,207 篇 accuracy
  • 4,775 篇 control systems
  • 4,084 篇 training
  • 3,523 篇 application soft...
  • 3,235 篇 hardware
  • 3,023 篇 neural networks
  • 2,940 篇 deep learning
  • 2,900 篇 monitoring
  • 2,776 篇 data mining
  • 2,754 篇 costs
  • 2,658 篇 software enginee...
  • 2,580 篇 predictive model...
  • 2,534 篇 testing
  • 2,491 篇 protocols
  • 2,430 篇 machine learning

机构

  • 344 篇 school of comput...
  • 248 篇 school of comput...
  • 216 篇 chitkara univers...
  • 201 篇 department of el...
  • 122 篇 school of comput...
  • 122 篇 school of comput...
  • 120 篇 department of co...
  • 115 篇 school of comput...
  • 111 篇 college of compu...
  • 102 篇 school of automa...
  • 102 篇 school of comput...
  • 101 篇 institute of inf...
  • 91 篇 department of co...
  • 76 篇 department of el...
  • 74 篇 department of co...
  • 68 篇 school of electr...
  • 67 篇 department of co...
  • 66 篇 department of co...
  • 63 篇 department of co...
  • 60 篇 institute of inf...

作者

  • 64 篇 lei wang
  • 54 篇 wang lei
  • 49 篇 zhang tao
  • 42 篇 rui wang
  • 38 篇 ning xi
  • 37 篇 weiming shen
  • 37 篇 jian wang
  • 31 篇 xi chen
  • 31 篇 hisao ishibuchi
  • 30 篇 mohamed abid
  • 28 篇 liu yang
  • 27 篇 feng liu
  • 24 篇 chunyan miao
  • 24 篇 mei-hui wang
  • 24 篇 bin wang
  • 24 篇 yang liu
  • 23 篇 yang yang
  • 23 篇 wei zhang
  • 23 篇 wei wang
  • 22 篇 dhabaleswar k. p...

语言

  • 186,758 篇 英文
  • 3,692 篇 其他
  • 1,210 篇 中文
  • 38 篇 俄文
  • 16 篇 土耳其文
  • 10 篇 德文
  • 10 篇 葡萄牙文
  • 7 篇 西班牙文
  • 7 篇 法文
  • 4 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=International Conference and Workshop on Engineering of Computer-Based Systems"
191449 条 记 录,以下是41-50 订阅
排序:
A Phishing Website Detection System based on Hybrid Feature engineering with SHAP Explainable Artificial Intelligence Technique
A Phishing Website Detection System Based on Hybrid Feature ...
收藏 引用
PhD Symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st international workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th international conference on Web Information systems engineering, WISE 2024
作者: Alsuqayh, Norah Mirza, Abdulrahman Alhogail, Areej College of Computer and Information Sciences King Saud University Riyadh11451 Saudi Arabia
Today, phishing website attacks have emerged as a prevalent threat affecting Internet users, governments, and businesses. The key challenge is that phishers continuously deploy new techniques to create zero-day phishi... 详细信息
来源: 评论
Systematic User Evaluation of a Second Device based Cast-as-Intended Verifiability Approach  9th
Systematic User Evaluation of a Second Device Based Cast-as-...
收藏 引用
28th international conference on Financial Cryptography and Data Security
作者: Hilt, Tobias Berens, Benjamin Truderung, Tomasz Udovychenko, Margarita Neumann, Stephan Volkamer, Melanie Karlsruhe Inst Technol Karlsruhe Germany POLYAS GmbH Kassel Germany
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast vote... 详细信息
来源: 评论
Intelligent Production and Quality Control Technology based on computer Technology and Internet of Things Technology  1
Intelligent Production and Quality Control Technology based ...
收藏 引用
1st international conference on Intelligent systems and Computational Networks, ICISCN 2025
作者: Li, Yaping Business School Ludong University Shandong Yantai China
The traditional manufacturing process seriously limits the improvement of production efficiency and product quality due to incomplete data collection and lagging information feedback. This paper uses genetic algorithm... 详细信息
来源: 评论
Analytical review of interactive technologies for teaching cybersecurity skills  3
Analytical review of interactive technologies for teaching c...
收藏 引用
3rd international conference on Cyber Hygiene and Conflict Management in Global Information Networks, CH and CMiGIN 2024
作者: Klymenko, Svitlana Konko, Vitaliy Klymenko, Oleksii Hnatushenko, Volodymyr Bychkova, Marina Oles Honchar Dnipro National University Gagarin Ave. 72 Dnipro49000 Ukraine Dnipro University of Technology Dmytra Yavornytskoho Ave. 19 Dnipro49005 Ukraine
The article discusses issues related to the development of educational platforms, the main feature of which is the use of an interactive sandbox, on the basis of which the features of information technology, computer ... 详细信息
来源: 评论
High Resolution Millimeter Wave Imaging based on FMCW Radar systems at W-Band  15
High Resolution Millimeter Wave Imaging Based on FMCW Radar ...
收藏 引用
15th IEEE Annual Computing and Communication workshop and conference, CCWC 2025
作者: Hamidi, Shahrokh Nezhad-Ahmadi, M.R. University of Waterloo Department of Electrical and Computer Engineering Canada Mmsense Technologies Inc. Waterloo Canada
In this paper, we present a unique 2D high resolution, compact, low-cost, lightweight, and highly accurate millimeter-wave imagery system capable of operating in all weather conditions. We explain different aspects of... 详细信息
来源: 评论
Research on Digital Transformation and Upgrading of University engineering Technology Majors based on Neural Network  24
Research on Digital Transformation and Upgrading of Universi...
收藏 引用
5th international conference on computer Science and Management Technology, ICCSMT 2024
作者: Ning, Lingling Wang, Jianqiang Liu, Ranran Shandong University of Engineering and Vocational Technology Shandong Jinan China
This paper studies the digital transformation and upgrading algorithms of universities based on artificial intelligence. Through the precise docking of the digital transformation and development of the manufacturing i... 详细信息
来源: 评论
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
Towards a Communication Specification Language for Heterogeneous Service Orchestration based on Process Calculus and Holonic Multi-agent systems  25th
Towards a Communication Specification Language for Heterogen...
收藏 引用
25th international conference on Intelligent Data engineering and Automated Learning
作者: Schattene, Markus Peharda, Tomislav Duric, Bogdan Okresa Univ Zagreb Fac Org & Informat Artificial Intelligence Lab Zagreb Croatia
In this paper an initial formalization for a novel communication specification language in multi-agent systems (MASs) based on Pi-calculus and holonic MASs is introduced and analyzed. The novel language called Awkward... 详细信息
来源: 评论
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
Proposed AES-based Obfuscation and Encryption Model for Cloud Data Security  1
Proposed AES-based Obfuscation and Encryption Model for Clou...
收藏 引用
1st international conference on Intelligent systems and Computational Networks, ICISCN 2025
作者: Singh, Prabhdeep Singh, Pawan Agarwal, Abhay Kumar Kumar, Anil Amity School of Engineering and Technology Department of Computer Science and Engineering Lucknow India Kamla Nehru Institute of Technology Department of Computer Science and Engineering Sultanpur India Amity University Amity School of Engineering and Technology Lucknow India
Cloud Computing (CC) offers a diverse range of services along with huge data storage across a network. CC has collaborated with varied emerging technologies like IoT because of its numerous advantages. Despite CC'... 详细信息
来源: 评论