咨询与建议

限定检索结果

文献类型

  • 255,459 篇 会议
  • 107,550 篇 期刊文献
  • 2,791 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 365,822 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 207,885 篇 工学
    • 130,087 篇 计算机科学与技术...
    • 104,424 篇 软件工程
    • 51,156 篇 信息与通信工程
    • 33,657 篇 控制科学与工程
    • 32,719 篇 电子科学与技术(可...
    • 32,667 篇 电气工程
    • 22,569 篇 生物工程
    • 18,220 篇 生物医学工程(可授...
    • 18,025 篇 光学工程
    • 14,920 篇 机械工程
    • 12,971 篇 化学工程与技术
    • 12,438 篇 仪器科学与技术
    • 11,999 篇 动力工程及工程热...
    • 10,888 篇 材料科学与工程(可...
    • 7,457 篇 安全科学与工程
    • 7,109 篇 网络空间安全
    • 6,817 篇 交通运输工程
  • 121,271 篇 理学
    • 58,182 篇 数学
    • 43,533 篇 物理学
    • 25,664 篇 生物学
    • 18,722 篇 统计学(可授理学、...
    • 13,970 篇 化学
    • 13,702 篇 系统科学
  • 49,909 篇 管理学
    • 31,173 篇 管理科学与工程(可...
    • 20,686 篇 图书情报与档案管...
    • 14,716 篇 工商管理
  • 17,514 篇 医学
    • 14,566 篇 临床医学
    • 12,921 篇 基础医学(可授医学...
    • 8,113 篇 药学(可授医学、理...
  • 9,022 篇 法学
    • 7,425 篇 社会学
  • 5,941 篇 经济学
  • 4,714 篇 农学
  • 3,516 篇 教育学
  • 1,666 篇 文学
  • 847 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,984 篇 computer science
  • 8,945 篇 accuracy
  • 7,907 篇 computational mo...
  • 7,758 篇 feature extracti...
  • 7,085 篇 deep learning
  • 6,443 篇 machine learning
  • 6,272 篇 training
  • 4,630 篇 predictive model...
  • 4,590 篇 support vector m...
  • 4,431 篇 optimization
  • 4,226 篇 data mining
  • 4,182 篇 convolutional ne...
  • 4,115 篇 neural networks
  • 4,078 篇 computer archite...
  • 4,069 篇 wireless sensor ...
  • 4,034 篇 real-time system...
  • 3,925 篇 bandwidth
  • 3,794 篇 artificial intel...
  • 3,747 篇 testing
  • 3,709 篇 robustness

机构

  • 3,273 篇 school of electr...
  • 2,250 篇 chitkara univers...
  • 2,022 篇 department of el...
  • 1,739 篇 department of co...
  • 1,270 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 980 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 818 篇 department of el...
  • 714 篇 department of co...
  • 642 篇 department of co...
  • 631 篇 school of comput...
  • 616 篇 school of comput...
  • 569 篇 school of electr...
  • 528 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 503 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 479 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 amato s.
  • 215 篇 borsato m.
  • 213 篇 boettcher t.
  • 212 篇 c. alexa
  • 211 篇 brundu d.
  • 207 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 342,802 篇 英文
  • 18,467 篇 其他
  • 4,465 篇 中文
  • 278 篇 日文
  • 44 篇 德文
  • 42 篇 朝鲜文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 13 篇 俄文
  • 7 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365824 条 记 录,以下是1291-1300 订阅
排序:
Exploring Transformer-Based Approaches for Hyperspectral Image Classification: A Comparative Analysis  3rd
Exploring Transformer-Based Approaches for Hyperspectral Ima...
收藏 引用
3rd International Conference on Machine Vision and Augmented Intelligence, MAI 2023
作者: Arya, Rajat Kumar Srivastava, Rajeev Department of Computer Science and Engineering Indian Institute of Technology-BHU Varanasi India
Hyperspectral imaging (HSI) is a technique that captures and analyzes multiple spectral bands for each pixel in an image. Convolutional neural networks (CNNs) effectively extract local features for HSI classification ... 详细信息
来源: 评论
Validating δ-Currency Using Model Checking
Validating δ-Currency Using Model Checking
收藏 引用
International Conference on Data Science and Network engineering, ICDSNE 2023
作者: Prabhu, Shreekanth M. Department of Computer Science and Engineering CMR Institute of Technology Bengaluru India
In recent years, there is a surfeit of digital currencies, virtual currencies, and cryptocurrencies. These currencies serve as alternatives to fiat currencies in the form of physical currencies or deposits in banks. S... 详细信息
来源: 评论
Parallel Complexity of Geometric Bipartite Matching  44
Parallel Complexity of Geometric Bipartite Matching
收藏 引用
44th IARCS Annual Conference on Foundations of Software technology and Theoretical computer Science, FSTTCS 2024
作者: Bhore, Sujoy Equbal, Sarfaraz Gurjar, Rohit Department of Computer Science & Engineering Indian Institute of Technology Bombay India
In this work, we study the parallel complexity of the geometric minimum-weight bipartite perfect matching (GWBPM) problem in 2. Here our graph is the complete bipartite graph G on two sets of points A and B in 2 (|A| ... 详细信息
来源: 评论
Point-To-Set Principle and Constructive Dimension Faithfulness  49
Point-To-Set Principle and Constructive Dimension Faithfulne...
收藏 引用
49th International Symposium on Mathematical Foundations of computer Science, MFCS 2024
作者: Nandakumar, Satyadev Pulari, Subin Akhil, S. Department of Computer Science and Engineering Indian Institute of Technology Kanpur India
Hausdorff Φ-dimension is a notion of Hausdorff dimension developed using a restricted class of coverings of a set. We introduce a constructive analogue of Φ-dimension using the notion of constructive Φ-s-supergales... 详细信息
来源: 评论
A Contemporary Review of Interpolation-based Reversible Data Hiding  2
A Contemporary Review of Interpolation-based Reversible Data...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Pandey, Supriya Pandey, Shrawan Kumar Tripathi, Abhinandan Buddha Institute of Technology Department of Computer Science & Engineering Gorakhpur India
Reversible data hiding (RDH) has become a critical topic in modern information security, as it allows for secure communication by embedding secret data into a cover medium. Importantly, RDH also ensures that the hidde... 详细信息
来源: 评论
Workplace Wingman: Enhancing Indoor Autonomy for Efficient Workplace Operations  2
Workplace Wingman: Enhancing Indoor Autonomy for Efficient W...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Potdar, Komal Mahajan, Yash Thakare, Ajinkya Amrutkar, Ruturaj Joglekar, Pushkar Vishwakarma Institute of Technology Department of Computer Engineering Maharashtra Pune India
This paper presents the 'Workplace Wingman,' an innovative autonomous system designed for workplace environments. Our solution integrates advanced features to optimize indoor operations. The system navigates c... 详细信息
来源: 评论
Enhancing Security in Logic-Locked Systems Through UART-Based Key Authentication
Enhancing Security in Logic-Locked Systems Through UART-Base...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information technology, ICCCIT 2025
作者: Jaisachin, B. SRM Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
Tolerant Testing and Distance Estimation for Distributions Under Memory Constraints  50th
Tolerant Testing and Distance Estimation for Distributions...
收藏 引用
50th International Conference on Current Trends in Theory and Practice of computer Science, SOFSEM 2025
作者: Roy, Sampriti Vasudev, Yadu Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var... 详细信息
来源: 评论
SecureHD: Designing Low-Cost Reliable and Security Aware Hardware Accelerators During High-Level Synthesis for Computationally Intensive Application Frameworks  10
SecureHD: Designing Low-Cost Reliable and Security Aware Har...
收藏 引用
10th IEEE International Symposium on Smart Electronic Systems, iSES 2024
作者: Chaurasia, Rahul Sengupta, Anirban Indian Institute of Technology Department of Computer Science and Engineering Indore India
Reliable and low-cost hardware accelerator design and its security countermeasures are crucial to safeguard not only the end consumer but also the intellectual property (IP) vendor and system-on-chip (SoC) integrator.... 详细信息
来源: 评论