咨询与建议

限定检索结果

文献类型

  • 5,416 篇 会议
  • 4,341 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 9,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,835 篇 工学
    • 4,403 篇 计算机科学与技术...
    • 3,619 篇 软件工程
    • 1,463 篇 信息与通信工程
    • 867 篇 控制科学与工程
    • 858 篇 生物工程
    • 726 篇 电气工程
    • 650 篇 生物医学工程(可授...
    • 522 篇 光学工程
    • 448 篇 电子科学与技术(可...
    • 334 篇 机械工程
    • 325 篇 网络空间安全
    • 278 篇 化学工程与技术
    • 257 篇 仪器科学与技术
    • 252 篇 安全科学与工程
    • 237 篇 动力工程及工程热...
    • 228 篇 交通运输工程
  • 3,488 篇 理学
    • 1,629 篇 数学
    • 1,013 篇 生物学
    • 996 篇 物理学
    • 576 篇 统计学(可授理学、...
    • 389 篇 化学
    • 270 篇 系统科学
  • 1,755 篇 管理学
    • 1,004 篇 管理科学与工程(可...
    • 830 篇 图书情报与档案管...
    • 474 篇 工商管理
  • 722 篇 医学
    • 599 篇 临床医学
    • 535 篇 基础医学(可授医学...
    • 328 篇 公共卫生与预防医...
    • 294 篇 药学(可授医学、理...
  • 337 篇 法学
    • 271 篇 社会学
  • 177 篇 农学
  • 172 篇 经济学
  • 78 篇 教育学
  • 30 篇 文学
  • 17 篇 艺术学
  • 16 篇 军事学
  • 1 篇 历史学

主题

  • 450 篇 accuracy
  • 423 篇 deep learning
  • 320 篇 feature extracti...
  • 277 篇 machine learning
  • 242 篇 computational mo...
  • 241 篇 training
  • 236 篇 real-time system...
  • 228 篇 predictive model...
  • 190 篇 convolutional ne...
  • 172 篇 internet of thin...
  • 167 篇 data models
  • 164 篇 optimization
  • 164 篇 semantics
  • 129 篇 artificial intel...
  • 128 篇 neural networks
  • 128 篇 security
  • 121 篇 support vector m...
  • 113 篇 federated learni...
  • 105 篇 cloud computing
  • 103 篇 reinforcement le...

机构

  • 427 篇 department of ph...
  • 402 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 386 篇 h.h. wills physi...
  • 376 篇 van swinderen in...
  • 353 篇 college of compu...
  • 348 篇 yandex school of...
  • 320 篇 school of physic...
  • 316 篇 cavendish labora...
  • 305 篇 university of ch...
  • 292 篇 imperial college...
  • 292 篇 nikhef national ...
  • 291 篇 department of ph...
  • 289 篇 center for high ...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 283 篇 physikalisches i...

作者

  • 250 篇 barter w.
  • 246 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 215 篇 blake t.
  • 214 篇 borsato m.
  • 211 篇 betancourt c.
  • 209 篇 brundu d.
  • 197 篇 bediaga i.
  • 193 篇 amato s.
  • 188 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 166 篇 braun s.
  • 163 篇 borisyak m.
  • 159 篇 baker s.
  • 156 篇 bizzeti a.
  • 151 篇 bjørn m.
  • 146 篇 bencivenni g.
  • 144 篇 niyato dusit

语言

  • 8,587 篇 英文
  • 1,136 篇 其他
  • 77 篇 中文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Data Science"
9778 条 记 录,以下是281-290 订阅
排序:
A Machine Learning and Deep Learning based Approach to Generate a Speech Emotion Recognition System  18
A Machine Learning and Deep Learning based Approach to Gener...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Sumera Vaidehi, K. Nisha, Qamar Stanley College of Engineering and Technology for Women Department of Artificial Intelligence & Data Science and Computer Engineering Hyderabad India Stanley College of Engineering and Technology for Women Department. of Computer Science Engineering Hyderabad India
The most common and general medium via which we humans convey or communicate our thoughts, emotions, feelings or ideas artlessly is by speech or articulation. Blending of this artless way of speech with the technologi... 详细信息
来源: 评论
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2557-2578页
作者: Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng Department of Computer Science&Engineering Ramaiah Institute of TechnologyBangalore560054India Department of Artificial Intelligence&Data Science Ramaiah Institute of TechnologyBangalore560054India School of Information Engineering Changchun Sci-Tech UniversityChangchun130600China Department of Computer Science and Information Engineering Chaoyang University of TechnologyTaichung41349Taiwan Department of Information Science and Engineering Malnad College of EngineeringHassan573202India
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti... 详细信息
来源: 评论
Wireless Sensor Network-Driven IoT Solution for Advanced Borewell Rescue Robotics  4
Wireless Sensor Network-Driven IoT Solution for Advanced Bor...
收藏 引用
4th IEEE International Conference on Emerging Techniques in Computational Intelligence, ICETCI 2024
作者: Meera, V. Mercia, Sharon Nesa PadmaPriya, J. Murugavalli, S. Panimalar Engineering College Artificial Intelligence And Data Science Chennai City Campus Chennai India Panimalar Engineering College Computer Science Engineering Chennai City Campus Chennai India Panimalar Engineering College Department of Computer Science Engineering Chennai India Panimalar Engineering College Department of Computer Science Engineering Chennai City Campus Chennai India
The fact that deaths from bore wells persist in India is highly alarming, particularly when young people are involved. Since 2009, there have been more than 40 documented child deaths, and the National Disaster Respon... 详细信息
来源: 评论
Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy
Range Proof-Based Noise Filtering Mechanism for loT Differen...
收藏 引用
2024 IEEE Cyber science and Technology Congress, CyberSciTech 2024
作者: Wei, Jianqi Chen, Yuling Luo, Yun Li, Zaidong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
With the rapid development of Internet of Things (loT) technology, the vast amount of data generated by its devices has raised widespread concern for user privacy pro-tection. Differential Privacy, as a stringent priv... 详细信息
来源: 评论
Testing Most Distant Neighbor (MDN) Variants for Semi-Factual Explanations in XAI  32
Testing Most Distant Neighbor (MDN) Variants for Semi-Factua...
收藏 引用
Workshops at the 32nd International Conference on Case-Based Reasoning, ICCBR-WS 2024
作者: Aryal, Saugat Keane, Mark T. School of Computer Science University College Dublin Dublin Ireland Insight Centre for Data Analytics Dublin Ireland
Recently, Semi-factual explanations have gained popularity in the eXplainable AI (XAI) community. They provide "even if" justifications to indicate what key input features could change without changing the o... 详细信息
来源: 评论
Improved Meet-in-the-Middle Cryptanalysis on Kupyna  13
Improved Meet-in-the-Middle Cryptanalysis on Kupyna
收藏 引用
13th International Conference on Communication and Network Security, ICCNS 2023
作者: Xu, Jinxing Zou, Jian Lan, Qiufu Li, Jiayin College of Computer and Data Science Fuzhou University China College of Computer and Cyber Security Fujian Normal University China
Kupyna is an AES-like hash function that has been confirmed as the Ukrainian hash standard DSTU 7564:2014 in 2015. In this paper, we present some preimage attacks and collision attacks on Kupyna. We combine guess-and-... 详细信息
来源: 评论
DTRadar: Accelerating Search Process of Decision Trees in Packet Classification  28
DTRadar: Accelerating Search Process of Decision Trees in Pa...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Yu, Jiashuo Huang, Long Zhu, Longlong Zhang, Dong Wu, Chunming College of Computer and Data Science Fuzhou University Fuzhou China Zhicheng College Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Packet classification is an essential part of computer networks. Existing algorithms propose a partition process to address the memory explosion problem of the decision tree algorithm caused by the huge number of rule... 详细信息
来源: 评论
An Analysis of Human Factors in Malware Attacks
An Analysis of Human Factors in Malware Attacks
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Alotaibi, Jawza Al Ja'am, Jihad M. Hoda, Mohammed Oryx Universal College in Partnership with Liverpool John Moores University Dept. of Computing and Data Science Doha Qatar Kuwait College of Science and Technology Dept. of computer Science and Engineering Doha Kuwait
This research study investigates human responses to malware attacks, focusing on attacker motivations, individual reactions, and key factors influencing user vulnerability and resilience. Using a structured survey que... 详细信息
来源: 评论
P4CTM: Compressed Traffic Pattern Matching Based on Programmable data Plane  28
P4CTM: Compressed Traffic Pattern Matching Based on Programm...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Lin, Hang Lin, Weiwei Lin, Jing Zhu, Longlong Zhang, Dong Wu, Chunming College of Computer and Data Science Fuzhou University Fuzhou China Zhicheng College Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed t... 详细信息
来源: 评论
A Network Function Virtualization Resource Allocation Model Based on Heterogeneous Computing  28
A Network Function Virtualization Resource Allocation Model ...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Chen, Hanze Xiao, Feng Cheng, Lingfei Zhu, Longlong Zhang, Dong College of Computer and Data Science Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Zhicheng College Fuzhou University Fuzhou China
With the continuous increase in the speed and quantity of network traffic, higher performance requirements are put forward for the NFV system. Traditional virtualization technology is limited by slowing down of increa... 详细信息
来源: 评论