咨询与建议

限定检索结果

文献类型

  • 7,953 篇 会议
  • 1,329 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 9,324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,162 篇 工学
    • 3,349 篇 计算机科学与技术...
    • 2,790 篇 软件工程
    • 1,323 篇 信息与通信工程
    • 995 篇 电气工程
    • 991 篇 电子科学与技术(可...
    • 945 篇 控制科学与工程
    • 353 篇 机械工程
    • 324 篇 光学工程
    • 300 篇 生物工程
    • 294 篇 生物医学工程(可授...
    • 286 篇 仪器科学与技术
    • 239 篇 动力工程及工程热...
    • 231 篇 化学工程与技术
    • 225 篇 材料科学与工程(可...
    • 167 篇 建筑学
    • 161 篇 力学(可授工学、理...
    • 151 篇 土木工程
  • 2,757 篇 理学
    • 1,768 篇 数学
    • 907 篇 物理学
    • 472 篇 统计学(可授理学、...
    • 340 篇 生物学
    • 256 篇 系统科学
    • 225 篇 化学
  • 1,098 篇 管理学
    • 698 篇 管理科学与工程(可...
    • 465 篇 图书情报与档案管...
    • 429 篇 工商管理
  • 195 篇 医学
    • 171 篇 临床医学
    • 168 篇 基础医学(可授医学...
  • 183 篇 法学
    • 151 篇 社会学
  • 170 篇 教育学
    • 169 篇 教育学
  • 136 篇 经济学
  • 50 篇 农学
  • 29 篇 军事学
  • 26 篇 文学
  • 9 篇 艺术学
  • 1 篇 历史学

主题

  • 422 篇 computer science
  • 230 篇 computational mo...
  • 189 篇 application soft...
  • 185 篇 neural networks
  • 166 篇 bandwidth
  • 166 篇 frequency
  • 165 篇 control systems
  • 160 篇 computer archite...
  • 135 篇 voltage
  • 119 篇 costs
  • 110 篇 data mining
  • 108 篇 switches
  • 103 篇 laboratories
  • 102 篇 routing
  • 95 篇 very large scale...
  • 94 篇 throughput
  • 87 篇 signal processin...
  • 87 篇 hardware
  • 85 篇 algorithm design...
  • 84 篇 wireless communi...

机构

  • 65 篇 dept. of compute...
  • 65 篇 dept. of electr....
  • 59 篇 dept. of electr....
  • 41 篇 dept. of electr....
  • 39 篇 dept. of electr....
  • 38 篇 dept. of electr....
  • 33 篇 dept. of electr....
  • 31 篇 dept. of electr....
  • 29 篇 department of el...
  • 24 篇 dept. of electr....
  • 22 篇 department of el...
  • 22 篇 dept. of electr....
  • 21 篇 dept.of computer...
  • 20 篇 university of ca...
  • 20 篇 sch. of elec. en...
  • 20 篇 department of el...
  • 20 篇 dept. of electr....
  • 19 篇 sch. of elec. en...
  • 19 篇 dept. of electr....
  • 19 篇 dept. of electr....

作者

  • 22 篇 slawomir koziel
  • 17 篇 john w. bandler
  • 16 篇 yahong rosa zhen...
  • 15 篇 mohamed younis
  • 14 篇 morandotti r.
  • 13 篇 wang yizhou
  • 12 篇 petre-marian nic...
  • 11 篇 lange martin
  • 11 篇 denidni tayeb a.
  • 10 篇 t. adali
  • 10 篇 yu kai
  • 10 篇 zhong fangwei
  • 10 篇 afjei e.
  • 10 篇 batarseh issa
  • 10 篇 v.k. bhargava
  • 9 篇 m. sawan
  • 9 篇 soltanian-zadeh ...
  • 9 篇 yuan j.s.
  • 9 篇 jiacun wang
  • 9 篇 sul seung-ki

语言

  • 9,026 篇 英文
  • 186 篇 其他
  • 94 篇 中文
  • 14 篇 日文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Computer Eng. and Computer Science Department"
9324 条 记 录,以下是11-20 订阅
排序:
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 853-862页
作者: Tao Huang Renchao Xie Yuzheng.Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng.Yinan Li Tian Liu State Key Lab.of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijingChina Department of Systems and Computer Eng. Carleton UniversityOttawaONCanada
In recent years,the Industrial Internet and Industry 4.0 came into *** the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also *... 详细信息
来源: 评论
A Space-Saving Algorithm for Enumerating Minimal Generators in Negative Rule Mining  16
A Space-Saving Algorithm for Enumerating Minimal Generators ...
收藏 引用
16th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2024
作者: Mochizuki, Shogo Iwanuma, Koji University of Yamanashi Dept. of Computer Science & Eng. Kofu-shi Japan
A positive/negative association rule describes the relationship between co-occurrence and anti-co-occurrence of events (item sets) in the data. The number of association rules extracted from the data, especially negat... 详细信息
来源: 评论
Towards Secure and Efficient Practical Consensus Protocols in Quantum Internet  15
Towards Secure and Efficient Practical Consensus Protocols i...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Lee, Woonghee Kim, Donghee Hur, Junbeom Korea University Dept. of Computer Science and Eng. Seoul Korea Republic of
While the quantum Internet leverages quantum mechanics to achieve unprecedented security against security threats such as eavesdropping, challeng.s remain, particularly in trust establishment. Traditional methods usin... 详细信息
来源: 评论
Design Thinking Approach to Develop a User-Centric Fitness Application  3
Design Thinking Approach to Develop a User-Centric Fitness A...
收藏 引用
3rd International Conference for Innovation in Technology, INOCON 2024
作者: Ammayath, Navya Sumithra, T.V. Ramrao Adik Institute of Technology Department of Computer Eng. Mumbai India
Fitness mobile apps are becoming increasingly popular as more people seek to improve their health and wellness. However, not all fitness apps are equally effective or user-friendly. Design thinking involves five phase... 详细信息
来源: 评论
Design and Development of A Family of Non-Isolated Three-Port DC-DC Converters for Hybrid Energy Systems Application
Design and Development of A Family of Non-Isolated Three-Por...
收藏 引用
2024 IEEE Energy Conversion Congress and Exposition, ECCE 2024
作者: Zolfi, Pouya Vahid, Sina El-Refaie, Ayman Marquette University Department of Electrical and Computer Eng. Milwaukee United States
A family of non-isolated compact and efficient (NICE) DC-DC three-port converters (TPCs) is introduced for low to medium power hybrid energy systems (HESs) application. With single magnetic core and potential for util... 详细信息
来源: 评论
Salmon: A Suite for Acoustic Language Model Evaluation
Salmon: A Suite for Acoustic Language Model Evaluation
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Maimon, Gallil Roth, Amit Adi, Yossi School of Computer Science Eng. Hebrew University of Jerusalem Jerusalem Israel
Speech language models have recently demonstrated great potential as universal speech processing systems. Such models have the ability to model the rich acoustic information existing in audio signals, beyond spoken co... 详细信息
来源: 评论
Learning to Teach: A Guide to Using Learning Theories in computer science Education  53
Learning to Teach: A Guide to Using Learning Theories in Com...
收藏 引用
53rd IEEE ASEE Frontiers in Education International Conference, FIE 2023
作者: Ishikawa, Edison Fernando Lopes Saldanha, Hanniel Hiroshi Silva Tutida, Hugo De Fátima Brandão, Maria Holanda, Maristela Universidade de Brasília Department of Computer Science Brasília Brazil Department of Computer Science and Eng. Texas A&m University College Station United States Department of Computer Science and Eng. Universidade de Brasília Brasília Brazil
This full paper proposes an innovative framework for teaching computer science topics to undergraduate students in computer science and Teacher Training (CSTT) for k12 majors. A computer science major is required by k... 详细信息
来源: 评论
DNS Tunnel Problem In Cybersecurity  12
DNS Tunnel Problem In Cybersecurity
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Gursoy, Gunes Varol, Asaf Nasab, Ahad College of Eng. and Natural Sciences Maltepe University Dept. of Computer Engineering İstanbul Turkey College of Eng. and Computer Science The Uni. of Tennessee at Chattanooga Dept. of Eng. Management and Technology ChattanoogaTN United States
The Domain Name System (DNS) is the most important building block of the Internet. Websites, file transfer applications, and e-mail services use the DNS service. Therefore, these services can rarely be blocked by fire... 详细信息
来源: 评论
WIPP - Smart Authentication: Contextual Strategies for Dynamic User Verification
WIPP - Smart Authentication: Contextual Strategies for Dynam...
收藏 引用
2024 Resilience Week, RWS 2024
作者: Sharp, Jonathan Williams, Alexander Womack, Baker Roy, Arunava Dasgupta, Dipankar Farkas, Csilla University of South Carolina Dept. of Computer Science and Eng. United States University of Memphis Dept. of Computer Science United States
In this paper, we propose a framework to support continuous and adaptive multi-factor authentication. Our proposed solution is based on leveraging the users' context to estimate the risk to the remote login and to... 详细信息
来源: 评论
Towards the Compilation of Digital Twin Models for Service-Oriented Systems  34
Towards the Compilation of Digital Twin Models for Service-O...
收藏 引用
34th Annual International Conference on Collaborative Advances in Software and Computing, CASCON 2024
作者: Jiang, Hao Kontogiannis, Kostas Western University Computer Science Dept. LondonON Canada York University Dept. of Electrical Eng. & Computer Science TorontoON Canada
Service-oriented architecture (SOA) serves as a foundational technology for complex IT systems, such as e-commerce platforms, banking solutions, public-sector applications, and gaming systems. As these systems become ... 详细信息
来源: 评论