咨询与建议

限定检索结果

文献类型

  • 253,843 篇 会议
  • 107,898 篇 期刊文献
  • 2,757 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 364,520 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 207,380 篇 工学
    • 129,739 篇 计算机科学与技术...
    • 104,234 篇 软件工程
    • 51,272 篇 信息与通信工程
    • 33,410 篇 控制科学与工程
    • 33,024 篇 电气工程
    • 32,778 篇 电子科学与技术(可...
    • 22,539 篇 生物工程
    • 18,164 篇 生物医学工程(可授...
    • 18,023 篇 光学工程
    • 15,029 篇 机械工程
    • 13,027 篇 化学工程与技术
    • 12,440 篇 仪器科学与技术
    • 12,015 篇 动力工程及工程热...
    • 10,945 篇 材料科学与工程(可...
    • 7,469 篇 安全科学与工程
    • 7,206 篇 网络空间安全
    • 6,819 篇 交通运输工程
  • 121,380 篇 理学
    • 58,247 篇 数学
    • 43,588 篇 物理学
    • 25,743 篇 生物学
    • 18,743 篇 统计学(可授理学、...
    • 13,994 篇 化学
    • 13,709 篇 系统科学
  • 49,880 篇 管理学
    • 31,131 篇 管理科学与工程(可...
    • 20,718 篇 图书情报与档案管...
    • 14,668 篇 工商管理
  • 17,515 篇 医学
    • 14,506 篇 临床医学
    • 12,921 篇 基础医学(可授医学...
    • 8,128 篇 药学(可授医学、理...
  • 9,008 篇 法学
    • 7,407 篇 社会学
  • 5,940 篇 经济学
  • 4,691 篇 农学
  • 3,506 篇 教育学
  • 1,669 篇 文学
  • 847 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 39 篇 历史学

主题

  • 9,977 篇 computer science
  • 8,710 篇 accuracy
  • 7,808 篇 computational mo...
  • 7,671 篇 feature extracti...
  • 6,967 篇 deep learning
  • 6,435 篇 machine learning
  • 6,195 篇 training
  • 4,547 篇 predictive model...
  • 4,542 篇 support vector m...
  • 4,392 篇 optimization
  • 4,208 篇 data mining
  • 4,111 篇 neural networks
  • 4,074 篇 convolutional ne...
  • 4,059 篇 wireless sensor ...
  • 4,047 篇 computer archite...
  • 3,924 篇 bandwidth
  • 3,922 篇 real-time system...
  • 3,754 篇 artificial intel...
  • 3,718 篇 testing
  • 3,689 篇 costs

机构

  • 3,271 篇 school of electr...
  • 2,237 篇 chitkara univers...
  • 2,018 篇 department of el...
  • 1,721 篇 department of co...
  • 1,260 篇 university of ch...
  • 1,056 篇 cavendish labora...
  • 981 篇 department of ph...
  • 863 篇 oliver lodge lab...
  • 860 篇 physikalisches i...
  • 809 篇 department of el...
  • 717 篇 department of co...
  • 634 篇 department of co...
  • 614 篇 school of comput...
  • 610 篇 school of comput...
  • 568 篇 school of electr...
  • 533 篇 infn sezione di ...
  • 523 篇 infn laboratori ...
  • 511 篇 infn sezione di ...
  • 498 篇 horia hulubei na...
  • 490 篇 infn sezione di ...

作者

  • 250 篇 barter w.
  • 241 篇 j. wang
  • 240 篇 s. chen
  • 231 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 c. alexa
  • 213 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 194 篇 c. amelung
  • 193 篇 g. bella
  • 193 篇 j. strandberg
  • 192 篇 d. calvet

语言

  • 348,326 篇 英文
  • 11,679 篇 其他
  • 4,396 篇 中文
  • 278 篇 日文
  • 41 篇 朝鲜文
  • 36 篇 德文
  • 29 篇 法文
  • 21 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 7 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 3 篇 葡萄牙文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
364522 条 记 录,以下是381-390 订阅
排序:
A combinatorial algorithm for finding straight skeleton of a digital object
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Maity, Anukul Dutt, Mousumi Biswas, Arindam Department of Computer Science and Engineering Narula Institute of Technology 81 Nilgunj Road Agarpara West Bengal Kolkata700109 India Department of Computer Science and Engineering St. Thomas’ College of Engineering and Technology 4 Diamond Harbour Road Kidderpore West Bengal Kolkata700023 India Department of Information Technology Indian Institute of Engineering Science and Technology Botanical Garden Road Shibpur West Bengal Howrah711103 India
The paper presents a combinatorial algorithm to find the straight skeleton of the inner isothetic cover of a digital object imposed on a uniform background grid. The isothetic polygon (orthogonal polygon) tightly insc... 详细信息
来源: 评论
A fast verifiable fully homomorphic encryption technique for secret computation on cloud data
收藏 引用
International Journal of Information technology (Singapore) 2025年 第4期17卷 2193-2207页
作者: Mahato, Ganesh Kumar Chakraborty, Swarnendu Kumar Department of Computer Science and Engineering National Institute of Technology Arunachal Pradesh Jote 791113 India
In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of utmost importance. This paper introduces a pioneering verifiable homom... 详细信息
来源: 评论
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
Science China(Information Sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论
Video captioning – a survey
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 947-978页
作者: Vaishnavi, J. Narmatha, V. Department of Computer Applications SRM Institute of Science and Technology Trichy India Department of Computer and Information Science Annamalai University Annamalai Nagar Tamilnadu 608002 India
The explosion of the novel phenomenon of the combination of computer vision and Natural language processing is playing a vital role in converting the ordinary world into a more technological pool. Natural language pro... 详细信息
来源: 评论
Method to avert vehicle collision based on driver’s attention lapse predicted using BCI
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Mishra, Unnati Chauhan, Hitesh Maru, Madhuri Parikh, Saurin Computer Science and Engineering Department Institute of Technology Nirma University Sarkhej Gandhinagar Highway Near Gota Gujarat Ahmedabad382481 India
In this paper, a BCI-based machine learning method is proposed to predict the attention lapse of the driver. An EEG headset is used to capture brain activity from different regions of the human brain. The data is furt... 详细信息
来源: 评论
A Novel 3D Paradigm for Target Expansion of Augmented Reality SSVEP
收藏 引用
IEEE Transactions on Neural Systems and Rehabilitation engineering 2025年 33卷 1562-1573页
作者: Cao, Beining Li-Ting Tsai, Charlie Zhou, Nan Do, Thomas Lin, Chin-Teng University of Technology Sydney Computational Intelligence and Brain-Computer Interfaces Laboratory Australian AI Institute Faculty of Engineering and Information Technology School of Computer Science UltimoNSW2007 Australia
Steady-State Visual Evoked Potentials (SSVEP) have proven to be practical in Brain-computer Interfaces (BCI), particularly when integrated with augmented reality (AR) for real-world application. However, unlike conven... 详细信息
来源: 评论
Adaptive Task Scheduling in Fog Computing Using Federated DQN and K-Means Clustering
收藏 引用
IEEE Access 2025年 13卷 75462-75488页
作者: Choppara, Prashanth Mangalampalli, S. Sudheer VIT-AP University School of Computer Science and Engineering Andhra Pradesh Amaravati522237 India Manipal Academy of Higher Education Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Karnataka Manipal576104 India
Task scheduling in distributed cloud and fog computing applications must be efficient to optimize resource utilization, minimize latency, and comply with strict service level agreements. The dynamic and heterogeneous ... 详细信息
来源: 评论
A Stratified Seed Selection Algorithm for K-Means Clustering on Big Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1334-1344页
作者: Bajpai, Namita Paik, Jiaul H. Sarkar, Sudeshna Indian Institute of Technology Department of Artificial Intelligence Kharagpur721302 India Indian Institute of Technology Department of Computer Science Kharagpur721302 India
In k-means clustering, the selection of initial seeds significantly influences the quality of the resulting clusters. Moreover, clustering large-sized data introduces an additional challenge for seed selection. We pro... 详细信息
来源: 评论
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 169-187页
作者: Tahir, Mahjabeen Abdullah, Azizol Izura Udzir, Nur Azhar Kasmiran, Khairul Serdang Malaysia Serdang Malaysia Department of Computer Engineering Sir Syed University of Engineering & Technology Karachi Pakistan
The growing use of the internet has increased the threat of cyberattacks. Anomaly detection systems are vital for protecting networks by spotting irregular activities. Various studies investigated anomaly detection te... 详细信息
来源: 评论
RBCA-ETS: enhancing extractive text summarization with contextual embedding and word-level attention
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 1127-1135页
作者: Gangundi, Ravindra Sridhar, Rajeswari Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli 620015 India
The existing limitations in extractive text summarization encompass challenges related to preserving contextual features, limited feature extraction capabilities, and handling hierarchical and compositional aspects. T... 详细信息
来源: 评论