咨询与建议

限定检索结果

文献类型

  • 5,412 篇 会议
  • 4,285 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 9,718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,788 篇 工学
    • 4,353 篇 计算机科学与技术...
    • 3,635 篇 软件工程
    • 1,451 篇 信息与通信工程
    • 856 篇 生物工程
    • 815 篇 控制科学与工程
    • 719 篇 电气工程
    • 648 篇 生物医学工程(可授...
    • 523 篇 光学工程
    • 440 篇 电子科学与技术(可...
    • 330 篇 机械工程
    • 322 篇 网络空间安全
    • 276 篇 化学工程与技术
    • 257 篇 仪器科学与技术
    • 251 篇 安全科学与工程
    • 231 篇 动力工程及工程热...
    • 226 篇 交通运输工程
  • 3,482 篇 理学
    • 1,630 篇 数学
    • 1,013 篇 生物学
    • 992 篇 物理学
    • 575 篇 统计学(可授理学、...
    • 386 篇 化学
    • 271 篇 系统科学
  • 1,751 篇 管理学
    • 1,001 篇 管理科学与工程(可...
    • 833 篇 图书情报与档案管...
    • 473 篇 工商管理
  • 712 篇 医学
    • 594 篇 临床医学
    • 531 篇 基础医学(可授医学...
    • 326 篇 公共卫生与预防医...
    • 294 篇 药学(可授医学、理...
  • 338 篇 法学
    • 271 篇 社会学
  • 177 篇 农学
  • 170 篇 经济学
  • 79 篇 教育学
  • 29 篇 文学
  • 16 篇 军事学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 453 篇 accuracy
  • 416 篇 deep learning
  • 318 篇 feature extracti...
  • 277 篇 machine learning
  • 242 篇 computational mo...
  • 240 篇 training
  • 235 篇 real-time system...
  • 227 篇 predictive model...
  • 189 篇 convolutional ne...
  • 171 篇 internet of thin...
  • 167 篇 data models
  • 164 篇 semantics
  • 162 篇 optimization
  • 128 篇 neural networks
  • 128 篇 security
  • 127 篇 artificial intel...
  • 120 篇 support vector m...
  • 108 篇 federated learni...
  • 107 篇 cloud computing
  • 103 篇 reinforcement le...

机构

  • 427 篇 department of ph...
  • 402 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 386 篇 h.h. wills physi...
  • 376 篇 van swinderen in...
  • 347 篇 yandex school of...
  • 347 篇 college of compu...
  • 320 篇 school of physic...
  • 318 篇 cavendish labora...
  • 305 篇 university of ch...
  • 292 篇 imperial college...
  • 292 篇 nikhef national ...
  • 291 篇 department of ph...
  • 289 篇 center for high ...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 283 篇 physikalisches i...

作者

  • 250 篇 barter w.
  • 246 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 214 篇 borsato m.
  • 212 篇 betancourt c.
  • 209 篇 brundu d.
  • 198 篇 bediaga i.
  • 193 篇 amato s.
  • 187 篇 baryshnikov f.
  • 181 篇 boettcher t.
  • 166 篇 braun s.
  • 163 篇 borisyak m.
  • 158 篇 baker s.
  • 157 篇 bizzeti a.
  • 150 篇 bjørn m.
  • 146 篇 bencivenni g.
  • 145 篇 niyato dusit

语言

  • 8,599 篇 英文
  • 1,068 篇 其他
  • 73 篇 中文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Data Science"
9718 条 记 录,以下是291-300 订阅
排序:
An Analysis of Human Factors in Malware Attacks
An Analysis of Human Factors in Malware Attacks
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Alotaibi, Jawza Al Ja'am, Jihad M. Hoda, Mohammed Oryx Universal College in Partnership with Liverpool John Moores University Dept. of Computing and Data Science Doha Qatar Kuwait College of Science and Technology Dept. of computer Science and Engineering Doha Kuwait
This research study investigates human responses to malware attacks, focusing on attacker motivations, individual reactions, and key factors influencing user vulnerability and resilience. Using a structured survey que... 详细信息
来源: 评论
DTRadar: Accelerating Search Process of Decision Trees in Packet Classification  28
DTRadar: Accelerating Search Process of Decision Trees in Pa...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Yu, Jiashuo Huang, Long Zhu, Longlong Zhang, Dong Wu, Chunming College of Computer and Data Science Fuzhou University Fuzhou China Zhicheng College Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Packet classification is an essential part of computer networks. Existing algorithms propose a partition process to address the memory explosion problem of the decision tree algorithm caused by the huge number of rule... 详细信息
来源: 评论
P4CTM: Compressed Traffic Pattern Matching Based on Programmable data Plane  28
P4CTM: Compressed Traffic Pattern Matching Based on Programm...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Lin, Hang Lin, Weiwei Lin, Jing Zhu, Longlong Zhang, Dong Wu, Chunming College of Computer and Data Science Fuzhou University Fuzhou China Zhicheng College Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed t... 详细信息
来源: 评论
A Network Function Virtualization Resource Allocation Model Based on Heterogeneous Computing  28
A Network Function Virtualization Resource Allocation Model ...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Chen, Hanze Xiao, Feng Cheng, Lingfei Zhu, Longlong Zhang, Dong College of Computer and Data Science Fuzhou University Fuzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Zhicheng College Fuzhou University Fuzhou China
With the continuous increase in the speed and quantity of network traffic, higher performance requirements are put forward for the NFV system. Traditional virtualization technology is limited by slowing down of increa... 详细信息
来源: 评论
Late Breaking Results: Mixed-Cell-Height Detailed Placement under Multi-Cell Spacing Constraints  24
Late Breaking Results: Mixed-Cell-Height Detailed Placement ...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Zhu, Benchao Zeng, Zheng Chen, Jianli School of Microelectronics Fudan University Shanghai China College of Computer and Data Science Fuzhou University Fuzhou China
As technology scales down, multi-cell spacing constraints are imposed by modern circuit designs. Previous works compromise solution quality to address the problem by transforming it into two-cell spacing constraints. ...
来源: 评论
EfficientNetB1 Deep Learning Model for Microscopic Lung Cancer Lesion Detection and Classification Using Histopathological Images
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 809-825页
作者: Rabia Javed Tanzila Saba Tahani Jaser Alahmadi Sarah Al-Otaibi Bayan AlGhofaily Amjad Rehman Department of Computer Science Lahore College for Women UniversityLahore54000Pakistan Artificial Intelligence&Data Analytics Lab. CCIS Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computer and Information SciencesKing Saud UniversityRiyadh145111Saudi Arabia
Cancer poses a significant threat due to its aggressive nature,potential for widespread metastasis,and inherent heterogeneity,which often leads to resistance to *** cancer ranks among the most prevalent forms of cance... 详细信息
来源: 评论
NOMA Attack Prediction in Large-Scale Networks using Non-Linear Chaotic Belief Mechanism  3
NOMA Attack Prediction in Large-Scale Networks using Non-Lin...
收藏 引用
3rd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Sangeetha, K. Suguna, M. Jebakumar Immanuel, D. Suje, S.A. Department of Computer Science and Engineering SNS College of Technology Tamil Nadu Coimbatore India Department of Artificial Intelligence and Data Science Karpagam Institute of Technology Tamil Nadu Coimbatore India Department of Artificial Intelligence and Data Science Nandha Engineering College Tamil Nadu Erode India
Non-Orthogonal Multiple Access (NOMA) systems are becoming relevant in the fast-expanding terrain of large-scale networks because of their efficiency in concurrently managing many users. This is true since NOMA system... 详细信息
来源: 评论
Group Signature with Time-Bound Keys for Secure E-health Record Sharing
Group Signature with Time-Bound Keys for Secure E-health Rec...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lu, Junze Hu, Chunqiang Ruan, Conghao Cai, Bin Xiang, Tao Chongqing University School of Big Data & Software Engineering China Chongqing University College of Computer Science China
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t... 详细信息
来源: 评论
ECCA:An Efficient Channel-and-Coordinate Attention Module for Image Stitching
ECCA:An Efficient Channel-and-Coordinate Attention Module fo...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Chen, Weikai Yu, Yuanlong Huang, Zhiyong Wu, Zhixin College of Computer and Data Science Science/College of Software Fuzhou University Fuzhou China Southwest Automation Research Institute Sichuan China
We propose a simple and effective attention module, called Efficient Channel-and-Coordinate Attention (ECCA), which can be applied to CNN-based image stitching models. Traditional image stitching models usually use de... 详细信息
来源: 评论
Machine Learning in Healthcare: Prognosis Heart Disease Prediction  4
Machine Learning in Healthcare: Prognosis Heart Disease Pred...
收藏 引用
4th International Conference on Advancement in Electronics and Communication Engineering, AECE 2024
作者: Ramnath, M. Revathi, B. Selva Birunda, S. Usharani, C. Ramana, R. Tyson Masillamani, J. Ramco Institute of Technology Department of Artificial Intelligence and Data Science Virudhunagar India Thamirabharani Engineernig College Department of Computer Science and Engineering Tirunelveli India
The heart, being a crucial organ, necessitates meticulous care. Accurate information is essential for identifying heart-related disorders. Precise patient data is vital for hospitals to effectively predict and treat c... 详细信息
来源: 评论