咨询与建议

限定检索结果

文献类型

  • 15,782 篇 会议
  • 10,093 篇 期刊文献
  • 445 册 图书

馆藏范围

  • 26,320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,375 篇 工学
    • 9,733 篇 计算机科学与技术...
    • 7,776 篇 软件工程
    • 3,299 篇 信息与通信工程
    • 3,115 篇 控制科学与工程
    • 2,127 篇 电气工程
    • 1,842 篇 电子科学与技术(可...
    • 1,662 篇 生物工程
    • 1,339 篇 机械工程
    • 1,308 篇 生物医学工程(可授...
    • 1,000 篇 光学工程
    • 823 篇 动力工程及工程热...
    • 802 篇 仪器科学与技术
    • 715 篇 化学工程与技术
    • 628 篇 材料科学与工程(可...
    • 568 篇 安全科学与工程
    • 557 篇 交通运输工程
  • 8,812 篇 理学
    • 4,540 篇 数学
    • 2,337 篇 物理学
    • 1,991 篇 生物学
    • 1,556 篇 统计学(可授理学、...
    • 1,468 篇 系统科学
    • 829 篇 化学
  • 3,864 篇 管理学
    • 2,558 篇 管理科学与工程(可...
    • 1,449 篇 图书情报与档案管...
    • 1,308 篇 工商管理
  • 1,397 篇 医学
    • 1,165 篇 临床医学
    • 981 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 523 篇 公共卫生与预防医...
  • 716 篇 法学
    • 593 篇 社会学
  • 461 篇 经济学
  • 317 篇 教育学
  • 278 篇 农学
  • 72 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,111 篇 computer science
  • 507 篇 deep learning
  • 352 篇 systems engineer...
  • 347 篇 computational mo...
  • 347 篇 machine learning
  • 331 篇 artificial intel...
  • 317 篇 application soft...
  • 289 篇 computer archite...
  • 272 篇 internet of thin...
  • 264 篇 control systems
  • 243 篇 accuracy
  • 240 篇 feature extracti...
  • 238 篇 support vector m...
  • 223 篇 optimization
  • 211 篇 neural networks
  • 203 篇 software enginee...
  • 199 篇 training
  • 198 篇 information syst...
  • 192 篇 laboratories
  • 186 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 47 篇 department of la...
  • 47 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 35 篇 school of comput...
  • 33 篇 department of co...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 95 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 35 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 27 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars
  • 18 篇 li li

语言

  • 22,585 篇 英文
  • 3,489 篇 其他
  • 237 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 6 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 芬兰文
  • 1 篇 荷兰文
检索条件"机构=†Department of Computer Science and Systems Engineering"
26320 条 记 录,以下是821-830 订阅
排序:
Incentive Designs for Learning Agents to Stabilize Coupled Exogenous systems  63
Incentive Designs for Learning Agents to Stabilize Coupled E...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Certorio, Jair Martins, Nuno C. La, Richard J. Arcak, Murat Institute for Systems Research University of Maryland College Park Department of Electrical and Computer Engineering College ParkMD20740 United States University of California Department of Electrical Engineering and Computer Science BerkeleyCA94720 United States
We consider a large population of learning agents noncooperatively selecting strategies from a common set, influencing the dynamics of an exogenous system (ES) we seek to stabilize at a desired equilibrium. Our approa... 详细信息
来源: 评论
A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems
收藏 引用
International Journal of Network Security 2023年 第6期25卷 1070-1076页
作者: Hwang, Min-Shiang Hsu, Shih-Ting Yang, Cheng-Ying Department of Computer Science and Information Engineering Asia University Taiwan Fintech and Blockchain Research Center Asia University Taichung 354 Wufeng Taiwan Department of Management Information Systems National Chung Hsing University Taiwan Department of Computer Science University of Taipei Taipei Taiwan
Public key encryption with keyword search (PEKS) scheme enables one to send the trapdoor, which involves the encrypted keyword in querying data without revealing the keyword. The trapdoor should transfer into the secr... 详细信息
来源: 评论
CloudyPages: A Secure and Scalable Serverless Web-Based Blogging Application  1
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent systems, ADCIS 2023
作者: Prakash, Vijay Jaiswal, Shrestha Purohit, Saumya Singh, Pardeep Garg, Lalit School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Department of Computer Information Systems Faculty of Information and Communication Technology University of Malta MsidaMSD 2080 Malta
The CloudyPages app is a precise and trustworthy platform for bloggers to create and effectively manage blogs. The CloudyPages application provides bloggers a platform for creating and managing their blogs. The applic... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
Performance Analysis of Machine Learning Algorithms for Classifying Hand Motion-Based EEG Brain Signals
收藏 引用
computer systems science & engineering 2022年 第9期42卷 1095-1107页
作者: Ayman Altameem Jaideep Singh Sachdev Vijander Singh Ramesh Chandra Poonia Sandeep Kumar Abdul Khader Jilani Saudagar Department of Computer Science College of Applied StudiesKing Saud UniversityRiyadh11495Saudi Arabia Department of Computer Science and Engineering Manipal University JaipurJaipur303007India Department of Computer Science CHRIST(Deemed to be University)Bangalore560029India Department of Computer Science and Engineering CHRIST(Deemed to be University)Bangalore560074India Information Systems Department Imam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Brain-computer interfaces (BCIs) records brain activity using electroencephalogram (EEG) headsets in the form of EEG signals;these signals can berecorded, processed and classified into different hand movements, which... 详细信息
来源: 评论
Histogram-Based Decision Support System for Extraction and Classification of Leukemia in Blood Smear Images
收藏 引用
computer systems science & engineering 2023年 第8期46卷 1879-1900页
作者: Neenavath Veeraiah Youseef Alotaibi Ahmad FSubahi Department of Electronics and Communications DVR&DHS MIC Engineering CollegeKanchikacharlaA.P.521180India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Science University College of Al JamoumUmm Al-Qura UniversityMakkah21421Saudi Arabia
An abnormality that develops in white blood cells is called *** diagnosis of leukemia is made possible by microscopic investigation of the smear in the *** training is necessary to complete the morphological examinati... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Out-of-distribution Object Detection through Bayesian Uncertainty Estimation  26
Out-of-distribution Object Detection through Bayesian Uncert...
收藏 引用
26th International Conference on Information Fusion, FUSION 2023
作者: Zhang, Tianhao Wang, Shenglin Bouaynaya, Nidhal Calinescu, Radu Mihaylova, Lyudmila The University of Sheffield Automatic Control and Systems Engineering United Kingdom Rowan University Department of Electrical and Computer Engineering United States University of York Department of Computer Science United Kingdom
The superior performance of object detectors is often established under the condition that the test samples are in the same distribution as the training data. However, in many practical applications, out-of-distributi... 详细信息
来源: 评论
Optimizing Facial Recognition: An Analytical Comparison of Traditional and Deep Learning Approaches  7
Optimizing Facial Recognition: An Analytical Comparison of T...
收藏 引用
7th International Conference on Data science and Its Applications, ICoDSA 2024
作者: Sakib, Shadman Siddiky, Md Nurul Absar Arifuzzaman, Md. Chowdhury, Md. Jalal Uddin University of Maryland Baltimore County Department of Information Systems Maryland21250 United States University of North Carolina at Charlotte Department of Electrical and Computer Engineering Charlotte United States Leading University Sylhet Department of Computer Science and Engineering Sylhet Bangladesh
In the rapidly evolving domains of AI and Internet tech, face recognition, a key machine learning application, is increasingly used in security, identity verification, and public monitoring. As this technology progres... 详细信息
来源: 评论
Directed Machine Learning Approaches for Determining Alzheimer Disease  3
Directed Machine Learning Approaches for Determining Alzheim...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Vashist, Ansh Jain, Tarun Sharma, Vijay Shankar Manipal University Jaipur Department of Computer Science and Engineering India Manipal University Jaipur Department of Iot & Intelligent Systems India
Alzheimer's is a neurogenic disease which progress into neurological disorder that primarily affects cognitive function and memory. It's a Neurodegenerative (ND) disease, characterized by the gradual deteriora... 详细信息
来源: 评论