咨询与建议

限定检索结果

文献类型

  • 83,034 篇 会议
  • 44,128 篇 期刊文献
  • 765 册 图书

馆藏范围

  • 127,926 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 72,857 篇 工学
    • 35,119 篇 计算机科学与技术...
    • 27,491 篇 软件工程
    • 16,953 篇 电子科学与技术(可...
    • 16,783 篇 电气工程
    • 16,513 篇 信息与通信工程
    • 12,247 篇 控制科学与工程
    • 7,744 篇 光学工程
    • 6,578 篇 生物工程
    • 6,281 篇 材料科学与工程(可...
    • 5,427 篇 生物医学工程(可授...
    • 5,392 篇 化学工程与技术
    • 5,185 篇 机械工程
    • 4,949 篇 动力工程及工程热...
    • 4,880 篇 仪器科学与技术
    • 2,279 篇 力学(可授工学、理...
    • 1,888 篇 交通运输工程
    • 1,786 篇 冶金工程
  • 45,630 篇 理学
    • 20,462 篇 物理学
    • 19,571 篇 数学
    • 7,447 篇 生物学
    • 6,832 篇 统计学(可授理学、...
    • 5,809 篇 化学
    • 5,498 篇 系统科学
  • 12,385 篇 管理学
    • 8,351 篇 管理科学与工程(可...
    • 4,363 篇 图书情报与档案管...
    • 4,184 篇 工商管理
  • 4,604 篇 医学
    • 3,831 篇 临床医学
    • 3,299 篇 基础医学(可授医学...
    • 2,094 篇 药学(可授医学、理...
  • 2,270 篇 法学
    • 1,971 篇 社会学
  • 1,654 篇 经济学
  • 982 篇 教育学
  • 909 篇 农学
  • 471 篇 文学
  • 281 篇 军事学
  • 124 篇 艺术学
  • 22 篇 哲学
  • 14 篇 历史学

主题

  • 5,019 篇 computer science
  • 2,382 篇 computational mo...
  • 1,834 篇 bandwidth
  • 1,789 篇 control systems
  • 1,533 篇 feature extracti...
  • 1,490 篇 costs
  • 1,448 篇 accuracy
  • 1,409 篇 testing
  • 1,405 篇 delay
  • 1,390 篇 computer archite...
  • 1,368 篇 optimization
  • 1,350 篇 hardware
  • 1,316 篇 application soft...
  • 1,307 篇 wireless sensor ...
  • 1,256 篇 algorithm design...
  • 1,255 篇 robustness
  • 1,252 篇 machine learning
  • 1,246 篇 switches
  • 1,223 篇 training
  • 1,217 篇 mathematical mod...

机构

  • 1,484 篇 department of el...
  • 1,242 篇 department of el...
  • 475 篇 department of el...
  • 474 篇 department of el...
  • 327 篇 department of el...
  • 303 篇 department of el...
  • 300 篇 department of el...
  • 214 篇 department of el...
  • 172 篇 department of el...
  • 168 篇 department of el...
  • 168 篇 radiation labora...
  • 160 篇 department of el...
  • 157 篇 department of el...
  • 149 篇 universidad iber...
  • 149 篇 school of electr...
  • 146 篇 department of el...
  • 141 篇 department of el...
  • 138 篇 ieee
  • 127 篇 department of el...
  • 118 篇 school of automa...

作者

  • 302 篇 niyato dusit
  • 187 篇 han zhu
  • 108 篇 g. tonelli
  • 107 篇 d. barney
  • 99 篇 l. valencia palo...
  • 97 篇 c. hensel
  • 94 篇 t. liu
  • 89 篇 a. garcia-bellid...
  • 88 篇 a. babaev
  • 88 篇 a. steen
  • 88 篇 n. cartiglia
  • 88 篇 k.g. shin
  • 88 篇 n. colino
  • 88 篇 f. moortgat
  • 87 篇 v. karjavine
  • 87 篇 b. clerbaux
  • 84 篇 w. busza
  • 84 篇 g. sultanov
  • 80 篇 y. chen
  • 79 篇 f. buehrer

语言

  • 115,293 篇 英文
  • 11,227 篇 其他
  • 1,357 篇 中文
  • 50 篇 日文
  • 20 篇 德文
  • 16 篇 法文
  • 10 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Authors are with the Department of Electrical Engineering and Computer Science"
127927 条 记 录,以下是131-140 订阅
排序:
Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 49-63页
作者: Wang, Feng Gursoy, M. Cenk Velipasalar, Senem Syracuse University Department of Electrical Engineering and Computer Science SyracuseNY13244 United States
In this paper, we present a multi-agent deep reinforcement learning (deep RL) framework for network slicing in a dynamic environment with multiple base stations and multiple users. In particular, we propose a novel de... 详细信息
来源: 评论
Deep Learning-Based Trojan Detection in Network Traffic: A CNN-BiLSTM Approach  100
Deep Learning-Based Trojan Detection in Network Traffic: A C...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Hoque, Md Mozammal Alam, Khorshed Monir, Md Fahad Tarek Habib, Md University of Houston Department of Electrical and Computer Engineering United States Department of Computer Science & Engineering Bangladesh
Trojan detection from network traffic data is crucial for safeguarding networks against covert infiltration and potential data breaches. Deep learning (DL) techniques can play a pivotal role in detecting trojans from ... 详细信息
来源: 评论
Uncertainty quantification in large language models through convex hull analysis
收藏 引用
Discover Artificial Intelligence 2024年 第1期4卷 1-14页
作者: Catak, Ferhat Ozgur Kuzlu, Murat Department of Electrical Engineering and Computer Science University of Stavanger Rogaland Norway Department of Engineering Technology Old Dominion University NorfolkVA United States
Uncertainty quantification approaches have been more critical in large language models (LLMs), particularly high-risk applications requiring reliable outputs. However, traditional methods for uncertainty quantificatio... 详细信息
来源: 评论
Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3079-3096页
作者: Farida Asriani Azhari Azhari Wahyono Wahyono Department of Computer Science and Electronics Universitas Gadjah MadaYogyakarta55281Indonesia Electrical Engineering Department Universitas Jenderal SoedirmanPurbalingga53371Indonesia
Incredible progress has been made in human action recognition(HAR),significantly impacting computer vision applications in sports ***,identifying dynamic and complex movements in sports like badminton remains challeng... 详细信息
来源: 评论
Optimized Temporary Frequency Support for Wind Power Plants Considering Expanded Operational Region of Wind Turbines
收藏 引用
CSEE Journal of Power and Energy Systems 2025年 第1期11卷 51-64页
作者: Zhengyang Hu Bingtuan Gao Zhao Xu Sufan Jiang School of Electrical Engineering Southeast UniversityNanjing210096China Department of Electrical and Electronic Engineering The Hong Kong Polytechnic UniversityHong Kong SARChina Department of Electrical Engineering and Computer Science The University of TennesseeKnoxvilleTN 37996 USA
Wind power plants(WPPs)are increasingly mandated to provide temporary frequency support to power systems during contingencies involving significant power ***,the frequency support capabilities of WPPs under derated op... 详细信息
来源: 评论
User-Induced Heuristics for Security-Constrained Unit Commitment: Variable Influence Diving and Variable Significance Neighborhood Search
收藏 引用
IEEE Transactions on Power Systems 2025年 第4期40卷 3334-3346页
作者: Li, Peijie Liao, Changtao Qi, Junjian Bai, Xiaoqing Wei, Hua Guangxi University School of Electrical Engineering Nanning530004 China South Dakota State University McComish Department of Electrical Engineering and Computer Science BrookingsSD57007 United States
The heuristics in mixed- integer linear programming (MILP) solvers are mostly general-purpose, which can only recognize some common structures. It sometimes may be challenging for them to obtain a high-quality feasibl... 详细信息
来源: 评论
A 28.8-mW Accelerator IC for Dark Channel Prior-Based Blind Image Deblurring
收藏 引用
IEEE Journal of Solid-State Circuits 2024年 第6期59卷 1899-1911页
作者: Chen, Po-Shao Chen, Yen-Lung Lee, Yu-Chi Fu, Zih-Sing Yang, Chia-Hsiang Graduate Institute of Electronics Engineering National Taiwan University Taipei10617 Taiwan University of Michigan Department of Electrical Engineering and Computer Science Ann ArborMI48109 United States Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science CambridgeMA02139 United States National Taiwan University Department of Electrical Engineering Graduate Institute of Electronics Engineering Taipei10617 Taiwan
This work presents an accelerator that performs blind deblurring based on the dark channel prior. The alternating minimization algorithm is leveraged for latent image and blur kernel estimation. A 2-D Laplace equation... 详细信息
来源: 评论
Privacy Comparison for Bitcoin Light Client Implementations  6
Privacy Comparison for Bitcoin Light Client Implementations
收藏 引用
6th Conference on Advances in Financial Technologies, AFT 2024
作者: Kotzer, Arad Rottenstreich, Ori The Department of Computer Science Technion Haifa Israel The Department of Computer Science The Department of Electrical and Computer Engineering Technion Haifa Israel
Light clients implement a simple solution for Bitcoin’s scalability problem, as they do not store the entire blockchain but only the state of particular addresses of interest. To be able to keep track of the updated ... 详细信息
来源: 评论
A review on applications of holomorphic embedding methods
收藏 引用
iEnergy 2023年 第4期2卷 264-274页
作者: Kaiyang Huang Kai Sun Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert th... 详细信息
来源: 评论
Fast Adversarial Attacks on Language Models In One GPU Minute  41
Fast Adversarial Attacks on Language Models In One GPU Minut...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Sadasivan, Vinu Sankar Saha, Shoumik Sriramanan, Gaurang Kattakinda, Priyatham Chegini, Atoosa Feizi, Soheil Department of Computer Science United States Department of Electrical & Computer Engineering United States
In this paper, we introduce a novel class of fast, beam search-based adversarial attack (BEAST) for Language Models (LMs). BEAST employs interpretable parameters, enabling attackers to balance between attack speed, su... 详细信息
来源: 评论