咨询与建议

限定检索结果

文献类型

  • 255,459 篇 会议
  • 107,550 篇 期刊文献
  • 2,791 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 365,822 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 207,885 篇 工学
    • 130,087 篇 计算机科学与技术...
    • 104,424 篇 软件工程
    • 51,156 篇 信息与通信工程
    • 33,657 篇 控制科学与工程
    • 32,719 篇 电子科学与技术(可...
    • 32,667 篇 电气工程
    • 22,569 篇 生物工程
    • 18,220 篇 生物医学工程(可授...
    • 18,025 篇 光学工程
    • 14,920 篇 机械工程
    • 12,971 篇 化学工程与技术
    • 12,438 篇 仪器科学与技术
    • 11,999 篇 动力工程及工程热...
    • 10,888 篇 材料科学与工程(可...
    • 7,457 篇 安全科学与工程
    • 7,109 篇 网络空间安全
    • 6,817 篇 交通运输工程
  • 121,271 篇 理学
    • 58,182 篇 数学
    • 43,533 篇 物理学
    • 25,664 篇 生物学
    • 18,722 篇 统计学(可授理学、...
    • 13,970 篇 化学
    • 13,702 篇 系统科学
  • 49,909 篇 管理学
    • 31,173 篇 管理科学与工程(可...
    • 20,686 篇 图书情报与档案管...
    • 14,716 篇 工商管理
  • 17,514 篇 医学
    • 14,566 篇 临床医学
    • 12,921 篇 基础医学(可授医学...
    • 8,113 篇 药学(可授医学、理...
  • 9,022 篇 法学
    • 7,425 篇 社会学
  • 5,941 篇 经济学
  • 4,714 篇 农学
  • 3,516 篇 教育学
  • 1,666 篇 文学
  • 847 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,984 篇 computer science
  • 8,945 篇 accuracy
  • 7,907 篇 computational mo...
  • 7,758 篇 feature extracti...
  • 7,085 篇 deep learning
  • 6,443 篇 machine learning
  • 6,272 篇 training
  • 4,630 篇 predictive model...
  • 4,590 篇 support vector m...
  • 4,431 篇 optimization
  • 4,226 篇 data mining
  • 4,182 篇 convolutional ne...
  • 4,115 篇 neural networks
  • 4,078 篇 computer archite...
  • 4,069 篇 wireless sensor ...
  • 4,034 篇 real-time system...
  • 3,925 篇 bandwidth
  • 3,794 篇 artificial intel...
  • 3,747 篇 testing
  • 3,709 篇 robustness

机构

  • 3,273 篇 school of electr...
  • 2,250 篇 chitkara univers...
  • 2,022 篇 department of el...
  • 1,739 篇 department of co...
  • 1,270 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 980 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 818 篇 department of el...
  • 714 篇 department of co...
  • 642 篇 department of co...
  • 631 篇 school of comput...
  • 616 篇 school of comput...
  • 569 篇 school of electr...
  • 528 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 503 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 479 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 amato s.
  • 215 篇 borsato m.
  • 213 篇 boettcher t.
  • 212 篇 c. alexa
  • 211 篇 brundu d.
  • 207 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 342,802 篇 英文
  • 18,467 篇 其他
  • 4,465 篇 中文
  • 278 篇 日文
  • 44 篇 德文
  • 42 篇 朝鲜文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 13 篇 俄文
  • 7 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365824 条 记 录,以下是1081-1090 订阅
排序:
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17805-17836页
作者: Henge, Santosh Kumar Rajakumar, R. Prasanna, P. Parivazhagan, A. Hu, Yu-Chen Chen, Wu-Lin Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation KL University AP Vaddeswaram India Centre for Automation School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology Chennai India Department of CSE Kalasalingam Academy of Research and Education Tamilnadu Krishnankoil India Department of Computer Science Xitun District Tunghai University No. 1727 Sec. 4 Boulevard Taichung City407224 Taiwan Department of Computer Science and Information Management Providence University Taichung City Taiwan
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to ensure da... 详细信息
来源: 评论
Emotion Recognition from Electroencephalogram (EEG) Signals Using a Multiple Column Convolutional Neural Network Model
收藏 引用
SN computer Science 2024年 第2期5卷 213页
作者: Jha, Sonu Kumar Suvvari, Somaraju Kumar, Mukesh Department of Computer Science and Engineering National Institute of Technology Patna Patna 800005 India
Emotions are vital in human cognition and are essential for human survival. Emotion is often associated with smart decisions, interpersonal behavior, and, to some extent, intellectual cognition. From the recent litera... 详细信息
来源: 评论
Thin film ferroelectric photonic-electronic memory
收藏 引用
Light(Science & Applications) 2024年 第10期13卷 2251-2262页
作者: Gong Zhang Yue Chen Zijie Zheng Rui Shao Jiuren Zhou Zuopu Zhou Leming Jiao Jishen Zhang Haibo Wang Qiwen Kong Chen Sun Kai Ni Jixuan Wu Jiezhi Chen Xiao Gong Department of Electrical and Computer Engineering National University of SingaporeSingapore 119077Singapore Department of Microelectronic Engineering Rochester Institute of TechnologyRochesterNY 14623USA School of Information Science and Engineering Shandong UniversityJinan 250100China
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are sti... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua Science and technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
Study on Implementation of Shor’s Factorization Algorithm on Quantum computer
收藏 引用
SN computer Science 2024年 第4期5卷 413页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science and Engineering National Institute of Technology Patna Patna 800005 India
The fundamental security aspect of the classical crypto-system depends on integer factorization and discrete logarithm problems. The quantum factorization problem is a crucial problem in quantum computing as it has si... 详细信息
来源: 评论
Improving Machine Translation Formality with Large Language Models
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2061-2075页
作者: Murun Yang Fuxue Li School of Computer Science and Engineering Northeastern UniversityShenyang110819China College of Electrical Engineering Yingkou Institute of TechnologyYingkou115014China
Preserving formal style in neural machine translation (NMT) is essential, yet often overlooked as an optimization objective of the training processes. This oversight can lead to translations that, though accurate, lac... 详细信息
来源: 评论
An Integrated Approach of Efficient Edge Task Offloading Using Deep RL, Attention and MDS Techniques
收藏 引用
SN computer Science 2024年 第6期5卷 681页
作者: Priyadarshni Kumar, Praveen Kadavala, Dhruvan Tripathi, Shivani Misra, Rajiv Department of Computer Science and Engineering Indian Institute of Technology Patna Bihar Patna India
In Distributed Computation Optimization (DCO) networks, where clients distribute computational jobs among heterogeneous helpers with different capacities and pricing models, efficient task offloading and cost reductio... 详细信息
来源: 评论
White shark optimizer via support vector machine for video-based gender classification system
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Oyediran, Mayowa Oyedepo Ajagbe, Sunday Adeola Ojo, Olufemi Samuel Alshahrani, Reem Awodoye, Olufemi O. Adigun, Matthew O. Department of Computer Engineering Ajayi Crowther University Oyo Nigeria Department of Computer Science University of Zululand Kwadlangezwa3886 South Africa Department of Computer Engineering Abiola Ajimobi Technical University Ibadan200255 Nigeria Department of Computer Science College of Computers and IT Taif University P.O.Box 11099 Taif21944 Saudi Arabia Department of Computer Engineering Ladoke Akintola University of Technology Ogbomoso Nigeria
Gender identification from videos is a challenging task with significant real-world applications, such as video content analysis and social behavior research. In this study, we propose a novel approach, the White Shar... 详细信息
来源: 评论
Decision Tree Ensemble Approach for Recidivism Risk Classification Among Heinous Crime Convicts
收藏 引用
SN computer Science 2024年 第1期5卷 195页
作者: Singh, Aman Mohapatra, Subrajeet Department of Computer Science Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India
Early prediction of violent recidivism is one of the most essential tasks of the judiciary system. Being able to accurately forecast violent recidivism in offenders with heinous crime conviction can facilitate judicia... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论