咨询与建议

限定检索结果

文献类型

  • 170,964 篇 会议
  • 79,090 篇 期刊文献
  • 2,292 册 图书

馆藏范围

  • 252,345 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 147,848 篇 工学
    • 102,388 篇 计算机科学与技术...
    • 82,139 篇 软件工程
    • 35,468 篇 信息与通信工程
    • 22,944 篇 控制科学与工程
    • 18,559 篇 电气工程
    • 17,615 篇 电子科学与技术(可...
    • 16,449 篇 生物工程
    • 12,699 篇 生物医学工程(可授...
    • 10,976 篇 光学工程
    • 9,959 篇 机械工程
    • 8,112 篇 化学工程与技术
    • 7,559 篇 仪器科学与技术
    • 7,419 篇 动力工程及工程热...
    • 6,182 篇 材料科学与工程(可...
    • 5,769 篇 网络空间安全
    • 5,468 篇 安全科学与工程
  • 84,392 篇 理学
    • 43,402 篇 数学
    • 26,535 篇 物理学
    • 18,681 篇 生物学
    • 13,542 篇 统计学(可授理学、...
    • 9,280 篇 系统科学
    • 8,730 篇 化学
  • 39,729 篇 管理学
    • 23,942 篇 管理科学与工程(可...
    • 17,392 篇 图书情报与档案管...
    • 11,114 篇 工商管理
  • 12,399 篇 医学
    • 10,404 篇 临床医学
    • 9,281 篇 基础医学(可授医学...
    • 5,735 篇 药学(可授医学、理...
    • 5,163 篇 公共卫生与预防医...
  • 7,132 篇 法学
    • 5,844 篇 社会学
  • 4,295 篇 经济学
  • 3,380 篇 农学
  • 2,817 篇 教育学
  • 1,322 篇 文学
  • 530 篇 军事学
  • 412 篇 艺术学
  • 78 篇 哲学
  • 45 篇 历史学

主题

  • 11,858 篇 computer science
  • 6,241 篇 accuracy
  • 5,543 篇 feature extracti...
  • 5,374 篇 computational mo...
  • 5,238 篇 deep learning
  • 4,866 篇 machine learning
  • 4,345 篇 training
  • 3,571 篇 data mining
  • 3,402 篇 support vector m...
  • 3,101 篇 predictive model...
  • 3,077 篇 artificial intel...
  • 2,956 篇 optimization
  • 2,871 篇 internet of thin...
  • 2,794 篇 convolutional ne...
  • 2,766 篇 computer archite...
  • 2,719 篇 real-time system...
  • 2,705 篇 algorithm design...
  • 2,703 篇 wireless sensor ...
  • 2,562 篇 neural networks
  • 2,525 篇 protocols

机构

  • 5,010 篇 department of co...
  • 1,084 篇 cavendish labora...
  • 979 篇 department of ph...
  • 931 篇 university of ch...
  • 911 篇 oliver lodge lab...
  • 909 篇 physikalisches i...
  • 832 篇 department of el...
  • 662 篇 department of co...
  • 659 篇 department of el...
  • 568 篇 infn sezione di ...
  • 554 篇 department of co...
  • 552 篇 infn laboratori ...
  • 551 篇 infn sezione di ...
  • 537 篇 chitkara univers...
  • 526 篇 horia hulubei na...
  • 514 篇 infn sezione di ...
  • 512 篇 department of ph...
  • 509 篇 school of physic...
  • 501 篇 h.h. wills physi...
  • 500 篇 fakultät physik ...

作者

  • 250 篇 barter w.
  • 242 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 227 篇 blake t.
  • 226 篇 c. alexa
  • 222 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 215 篇 borsato m.
  • 212 篇 beiter a.
  • 211 篇 brundu d.
  • 209 篇 g. bella
  • 207 篇 c. amelung
  • 206 篇 j. strandberg
  • 206 篇 bencivenni g.
  • 205 篇 d. calvet

语言

  • 235,977 篇 英文
  • 13,286 篇 其他
  • 3,120 篇 中文
  • 181 篇 日文
  • 37 篇 德文
  • 25 篇 斯洛文尼亚文
  • 23 篇 法文
  • 20 篇 朝鲜文
  • 12 篇 俄文
  • 5 篇 西班牙文
  • 3 篇 意大利文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=.Department of Computer Science and Technology"
252346 条 记 录,以下是1-10 订阅
排序:
Laboratory or department?Exploration and Creation in computer science and technology
收藏 引用
计算机教育 2024年 第3期 13-16页
作者: Ann Copestake Department of Computer Science and Technology University of CambridgeWilliam Gates Building15 JJ Thomson AvenueCambridge CB30FDUK
In the very beginning,the computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the *** computer science developed as a discipline in its own righ... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Advances in neural architecture search
收藏 引用
National science Review 2024年 第8期11卷 24-38页
作者: Xin Wang Wenwu Zhu Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University
Automated machine learning(AutoML) has achieved remarkable success in automating the non-trivial process of designing machine learning *** the focal areas of AutoML,neural architecture search(NAS) stands out,aiming to... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 400-414页
作者: Nasir Ahmad Jalali Hongsong Chen Department of Computer Science University of Science and Technology Beijing(USTB)Beijing 100083China
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r... 详细信息
来源: 评论
Revisiting the LQR Problem of Singular Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2236-2252页
作者: Komeil Nosrati Juri Belikov Aleksei Tepljakov Eduard Petlenkov IEEE the Department of Computer Systems Tallinn University of Technology the Department of Software Science Tallinn University of Technology
In the development of linear quadratic regulator(LQR) algorithms, the Riccati equation approach offers two important characteristics——it is recursive and readily meets the existence condition. However, these attribu... 详细信息
来源: 评论
A Trusted Medical Image Zero-watermarking Scheme Based On DCNN and Hyperchaotic System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4241-4253页
作者: Xiang, Ruotong Liu, Gang Dang, Min Wangn, Quan Pan, Rong Xidian University School of Computer Science & Technology China Xidian University Department of Computer Science & Technology China
The zero-watermarking methods provide a means of lossless, which was adopted to protect medical image copyright requiring high integrity. However, most existing studies have only focused on robustness and there has be... 详细信息
来源: 评论
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
收藏 引用
computer Modeling in Engineering & sciences 2024年 第2期138卷 1731-1748页
作者: Mohanad A.Mohammed Hala B.Abdul Wahab Computer Science Department The University of TechnologyBaghdadIraq
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system ***,the Internet of Things(IoT)has revolutionized the Fourth... 详细信息
来源: 评论