咨询与建议

限定检索结果

文献类型

  • 255,459 篇 会议
  • 107,550 篇 期刊文献
  • 2,791 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 365,822 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 207,885 篇 工学
    • 130,087 篇 计算机科学与技术...
    • 104,424 篇 软件工程
    • 51,156 篇 信息与通信工程
    • 33,657 篇 控制科学与工程
    • 32,719 篇 电子科学与技术(可...
    • 32,667 篇 电气工程
    • 22,569 篇 生物工程
    • 18,220 篇 生物医学工程(可授...
    • 18,025 篇 光学工程
    • 14,920 篇 机械工程
    • 12,971 篇 化学工程与技术
    • 12,438 篇 仪器科学与技术
    • 11,999 篇 动力工程及工程热...
    • 10,888 篇 材料科学与工程(可...
    • 7,457 篇 安全科学与工程
    • 7,109 篇 网络空间安全
    • 6,817 篇 交通运输工程
  • 121,271 篇 理学
    • 58,182 篇 数学
    • 43,533 篇 物理学
    • 25,664 篇 生物学
    • 18,722 篇 统计学(可授理学、...
    • 13,970 篇 化学
    • 13,702 篇 系统科学
  • 49,909 篇 管理学
    • 31,173 篇 管理科学与工程(可...
    • 20,686 篇 图书情报与档案管...
    • 14,716 篇 工商管理
  • 17,514 篇 医学
    • 14,566 篇 临床医学
    • 12,921 篇 基础医学(可授医学...
    • 8,113 篇 药学(可授医学、理...
  • 9,022 篇 法学
    • 7,425 篇 社会学
  • 5,941 篇 经济学
  • 4,714 篇 农学
  • 3,516 篇 教育学
  • 1,666 篇 文学
  • 847 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,984 篇 computer science
  • 8,945 篇 accuracy
  • 7,907 篇 computational mo...
  • 7,758 篇 feature extracti...
  • 7,085 篇 deep learning
  • 6,443 篇 machine learning
  • 6,272 篇 training
  • 4,630 篇 predictive model...
  • 4,590 篇 support vector m...
  • 4,431 篇 optimization
  • 4,226 篇 data mining
  • 4,182 篇 convolutional ne...
  • 4,115 篇 neural networks
  • 4,078 篇 computer archite...
  • 4,069 篇 wireless sensor ...
  • 4,034 篇 real-time system...
  • 3,925 篇 bandwidth
  • 3,794 篇 artificial intel...
  • 3,747 篇 testing
  • 3,709 篇 robustness

机构

  • 3,273 篇 school of electr...
  • 2,250 篇 chitkara univers...
  • 2,022 篇 department of el...
  • 1,739 篇 department of co...
  • 1,270 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 980 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 818 篇 department of el...
  • 714 篇 department of co...
  • 642 篇 department of co...
  • 631 篇 school of comput...
  • 616 篇 school of comput...
  • 569 篇 school of electr...
  • 528 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 503 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 479 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 amato s.
  • 215 篇 borsato m.
  • 213 篇 boettcher t.
  • 212 篇 c. alexa
  • 211 篇 brundu d.
  • 207 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 342,802 篇 英文
  • 18,467 篇 其他
  • 4,465 篇 中文
  • 278 篇 日文
  • 44 篇 德文
  • 42 篇 朝鲜文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 13 篇 俄文
  • 7 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365824 条 记 录,以下是1221-1230 订阅
排序:
Lightning Sidebridge: Decentralized RPC Load Balancer  15
Lightning Sidebridge: Decentralized RPC Load Balancer
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kulkarni, Mayuri Shahade, Makarand Mahajan, Deep Nikam, Bhavesh Badgujar, Rushikesh Sharma, Piyush SVKM's Institute of Technology Department of Computer Engineering Dhule India
The Decentralized technology 'Blockchain' has some point Centralization in terms of Remote Procedure Call Mechanism. Relying on centralized RPC (Remote Procedure Call) is risky and running a node can be expens... 详细信息
来源: 评论
Key Management in Space Integrated Terrestrial Network: A Cybersecurity Perspective  2
Key Management in Space Integrated Terrestrial Network: A Cy...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications Systems, ICMACC 2024
作者: Ahlawat, Priyanka National Institute of Technology Computer Engineering Department Haryana Kurukshetra India
Satellite networks comprise of large number of satellite constellations. It makes the management of keys used for different security mechanism a very important issue to be studied. Key management is set of procedure t... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms in Fish Survival Prediction
Comparative Analysis of Machine Learning Algorithms in Fish ...
收藏 引用
2024 IEEE Bangalore Humanitarian technology Conference, B-HTC 2024
作者: Shirwaikar, Rudresh D. D'Souza, Lyzandra Bhangle, Anirudh Santosh Joshi, Sarang Deepak Jathar, Nupur Ajit Alvares, Jonathan Elroy Agnel Institute of Technology and Design Department of Computer Engineering Mapusa India
This research paper conducts an exploration of prevalent machine learning classification algorithms, emphasizing the refinement of Random Forest models to optimize performance. The initial phase involves a comparative... 详细信息
来源: 评论
Advancing Data Sovereignty in Distributed Environments: An In-Depth Exploration of Data Localization Challenges
Advancing Data Sovereignty in Distributed Environments: An I...
收藏 引用
2024 International Conference on computer, Electronics, Electrical engineering and their Applications, IC2E3 2024
作者: Kancharla, Jaganmohan Reddy Madhu Kumar, S.D. National Institute of Technology Department of Computer Science & Engineering Calicut India
Data localization in distributed computing has gotten a lot of attention because it has the potential to improve data sovereignty, make sure regulations are followed, and make data easier to access. However, this prac... 详细信息
来源: 评论
Analysing for Impact of Neutral Sentiments for Enhancing Quality of Services  2
Analysing for Impact of Neutral Sentiments for Enhancing Qua...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Ranjan, Roop Singh, Ranjeet Shukla, Roshan Buddha Institute of Technology Department of Computer Science and Engineering Gorakhpur India
Sentiment analysis (SA) is an intellectual process of extracting a user's views. Social media is gaining prominence in public transit agencies for communication strategies and daily management. In recent years, we... 详细信息
来源: 评论
Customer Segmentation using Clustering Techniques: Data-Driven Approach to Enhance Marketing Strategy  5
Customer Segmentation using Clustering Techniques: Data-Driv...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Sakthi Priya, G. Vignesh Saravanan, K. Hemalatha, B. Karthika, R. Kavya Srinidhi, B. Ramco Institute of Technology Department of Computer Science and Engineering Rajapalayam India
Customer segmentation is a vital strategy for businesses seeking to enhance their marketing efforts and optimize resource allocation. This research focuses on segmenting customers using the Mall Customer Segmentation ... 详细信息
来源: 评论
Remember This Event That Year? Assessing Temporal Information and Understanding in Large Language Models
Remember This Event That Year? Assessing Temporal Informatio...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Beniwal, Himanshu Patel, Dishant Kowsik Nandagopan, D. Ladia, Hritik Yadav, Ankit Singh, Mayank Department of Computer Science and Engineering Indian Institute of Technology Gandhinagar India
Large Language Models (LLMs) are increasingly ubiquitous, yet their ability to retain and reason about temporal information remains limited, hindering their application in real-world scenarios where understanding the ... 详细信息
来源: 评论
Enhancing Occluded Face Recognition Through Device-Edge Collaboration and Cross-Domain Feature Fusion with Heatmaps  3
Enhancing Occluded Face Recognition Through Device-Edge Coll...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Prasanth, Ashwin Annie Micheal, A. Department of Computer Science & Engineering Sathyabama Institute of Science & Technology Chennai India
Face recognition under occlusion presents a persistent challenge in computer vision, primarily due to difficulties in capturing and effectively integrating visible and obscured facial features. This paper introduces a... 详细信息
来源: 评论
Deep Learning Approach for Detecting Fake Images Using Texture Variation Network
收藏 引用
Inteligencia Artificial 2023年 第72期26卷 1-14页
作者: Haseena, S. Saroja, S. Shri Dharshini, D. Nivetha, A. Department of Information Technology Mepco Schlenk Engineering College India Department of Computer Applications National Institute of Technology Trichy India
Face manipulation technology is rapidly evolving, making it impossible for human eyes to recognize fake faces in photos. Convolutional Neural Network (CNN) discriminators, on the other hand, can quickly achieve high a... 详细信息
来源: 评论
Software Fault Localization using CNN-LSTM Model  15
Software Fault Localization using CNN-LSTM Model
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Singh, Vishwank Vikram Bisi, Manjubala National Institute of Technology Department of Computer Science and Engineering Warangal India
Software fault localization is a critical task which identify the faulty statements in a program. Traditional fault localization techniques are unable to capture complex relationships within program execution data. In... 详细信息
来源: 评论