咨询与建议

限定检索结果

文献类型

  • 254,012 篇 会议
  • 106,399 篇 期刊文献
  • 2,790 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 363,223 篇 电子文献
  • 10 种 纸本馆藏

日期分布

学科分类号

  • 205,816 篇 工学
    • 128,820 篇 计算机科学与技术...
    • 103,720 篇 软件工程
    • 50,699 篇 信息与通信工程
    • 33,024 篇 控制科学与工程
    • 32,451 篇 电子科学与技术(可...
    • 32,294 篇 电气工程
    • 22,473 篇 生物工程
    • 18,064 篇 生物医学工程(可授...
    • 17,865 篇 光学工程
    • 14,796 篇 机械工程
    • 12,882 篇 化学工程与技术
    • 12,350 篇 仪器科学与技术
    • 11,917 篇 动力工程及工程热...
    • 10,701 篇 材料科学与工程(可...
    • 7,385 篇 安全科学与工程
    • 6,987 篇 网络空间安全
    • 6,740 篇 交通运输工程
  • 120,401 篇 理学
    • 57,857 篇 数学
    • 43,185 篇 物理学
    • 25,546 篇 生物学
    • 18,585 篇 统计学(可授理学、...
    • 13,793 篇 化学
    • 13,680 篇 系统科学
  • 49,587 篇 管理学
    • 30,979 篇 管理科学与工程(可...
    • 20,562 篇 图书情报与档案管...
    • 14,607 篇 工商管理
  • 17,270 篇 医学
    • 14,365 篇 临床医学
    • 12,774 篇 基础医学(可授医学...
    • 8,107 篇 药学(可授医学、理...
  • 8,968 篇 法学
    • 7,386 篇 社会学
  • 5,914 篇 经济学
  • 4,666 篇 农学
  • 3,464 篇 教育学
  • 1,665 篇 文学
  • 844 篇 军事学
  • 454 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,980 篇 computer science
  • 8,757 篇 accuracy
  • 7,823 篇 computational mo...
  • 7,686 篇 feature extracti...
  • 6,899 篇 deep learning
  • 6,382 篇 machine learning
  • 6,225 篇 training
  • 4,561 篇 predictive model...
  • 4,550 篇 support vector m...
  • 4,395 篇 optimization
  • 4,211 篇 data mining
  • 4,103 篇 neural networks
  • 4,063 篇 wireless sensor ...
  • 4,058 篇 convolutional ne...
  • 4,044 篇 computer archite...
  • 3,961 篇 real-time system...
  • 3,916 篇 bandwidth
  • 3,749 篇 artificial intel...
  • 3,732 篇 testing
  • 3,701 篇 costs

机构

  • 3,271 篇 school of electr...
  • 2,235 篇 chitkara univers...
  • 2,013 篇 department of el...
  • 1,723 篇 department of co...
  • 1,252 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 978 篇 department of ph...
  • 860 篇 oliver lodge lab...
  • 853 篇 physikalisches i...
  • 813 篇 department of el...
  • 717 篇 department of co...
  • 638 篇 department of co...
  • 623 篇 school of comput...
  • 604 篇 school of comput...
  • 566 篇 school of electr...
  • 528 篇 infn sezione di ...
  • 513 篇 infn laboratori ...
  • 505 篇 infn sezione di ...
  • 500 篇 horia hulubei na...
  • 483 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 c. alexa
  • 213 篇 boettcher t.
  • 211 篇 brundu d.
  • 208 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg
  • 191 篇 bay a.

语言

  • 347,367 篇 英文
  • 11,359 篇 其他
  • 4,382 篇 中文
  • 278 篇 日文
  • 41 篇 朝鲜文
  • 38 篇 德文
  • 28 篇 法文
  • 21 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 7 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 3 篇 葡萄牙文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
363225 条 记 录,以下是791-800 订阅
排序:
Evaluating CUDA-Aware Approximate Computing Techniques  3
Evaluating CUDA-Aware Approximate Computing Techniques
收藏 引用
3rd International Workshop on Resource AWareness of Systems and Society, RAW 2024
作者: Öz, Işıl Computer Engineering Department Izmir Institute of Technology Izmir Turkey
Approximate computing techniques offer performance improvements by performing inexact computations. Moreover, CUDA programs written to be executed on GPU devices employ specific features to utilize the parallel comput... 详细信息
来源: 评论
Ethereum-Based Decentralized Crowdfunding Platform  6th
Ethereum-Based Decentralized Crowdfunding Platform
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Jadhav, Swati Patil, Rohit Patil, Saee Patil, Shweta Patil, Varun Department of Computer Engineering Vishwakarma Institute of Technology Pune India
Crowdfunding refers to investments of people in some projects and businesses. Sometimes, it also refers to donations from people for societal goodness. Many online platforms are available that support crowdfunding for... 详细信息
来源: 评论
CamoVeil: Digital Camouflage Pattern Generation System  1
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2023
作者: Ganganwar, Vaishali Rajput, Parshant Bhavana, N. Sinha, Swapnil Vaid, Aashna Department of Computer Engineering Army Institute of Technology Pune India
Camouflage is the art of concealing. It is widely used to conceal your own self and your equipment from the enemy. It had been in nature since before humans, animals have used it to adapt to their surroundings. Camouf... 详细信息
来源: 评论
Workout Pose Correction System using KNIFT  6
Workout Pose Correction System using KNIFT
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Uke, Shailaja Ghote, Varad Mundhe, Ved Thorat, Shreyas Patil, Ujjwal Vishwakarma Institute of Technology Department of Computer Engineering Pune India
This paper proposes a system to assist users in performing exercise workouts by implementing MediaPipe Keypoint Neural Invariant Feature Transform (KNIFT). Exercise requires proper directions to follow as improper mov... 详细信息
来源: 评论
Self-supervised few-shot medical image segmentation with spatial transformations
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18675-18691页
作者: Titoriya, Ankit Kumar Singh, Maheshwari Prasad Singh, Amit Kumar Department of Computer Science & amp Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Deep learning-based segmentation models often struggle to achieve optimal performance when encountering new, unseen semantic classes. Their effectiveness hinges on vast amounts of annotated data and high computational... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
Science China(Information Sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
EssayDetect at GenAI Detection Task 2: Guardians of Academic Integrity: Multilingual Detection of AI-Generated Essays  1
EssayDetect at GenAI Detection Task 2: Guardians of Academic...
收藏 引用
1st Workshop on GenAI Content Detection, GenAIDetect 2025
作者: Agrahari, Shifali Jayant, Subhashi Kumar, Saurabh Singh, Sanasam Ranbir Department of Computer Science and Engineering Indian Institute of Technology Guwahati India
Detecting AI-generated text in the field of academia is becoming very prominent. This paper presents a solution for Task 2: AI vs. Human - Academic Essay Authenticity Challenge in the COLING 2025 DAIGenC Workshop1. Th... 详细信息
来源: 评论
AMCB: enhancing the authentication process with blockchain integrated with PUF and machine learning
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4809-4835页
作者: Al-Ghuraybi, Hind A. AlZain, Mohammed A. Soh, Ben Department of Information Technology College of Computers and Information Technology Taif University Taif21944 Saudi Arabia Department of Computer Science and Computer Engineering La Trobe University Bundoora Australia
The rapid advancement of technology has given rise to medical cyber-physical systems (MCPS), a subset of cyber-physical systems (CPS) specifically tailored for patient care and healthcare providers. MCPS generate subs... 详细信息
来源: 评论
Blockchain-Driven Academic Learning Record Management in Higher Education: A Comprehensive Review of Methodologies, Applications, Benefits, and Challenges
收藏 引用
SN computer Science 2025年 第5期6卷 1-33页
作者: Chaudhari, Sheetal Shirole, Mahesh Computer Science and Engineering Department Sardar Patel Institute of Technology Andheri Maharashtra Mumbai 400058 India Computer Engineering and Information Technology Department Veermata Jijabai Technological Institute Matunga Maharashtra Mumbai 400031 India
Blockchain technology has the potential to revolutionize the education sector by improving the legitimacy and security of academic procedures. The academic learning record management records the learner’s academic qu... 详细信息
来源: 评论
Automated Building Damage Detection Post Hurricane: Enhancing Accuracy using Hybrid Ensemble Model  5
Automated Building Damage Detection Post Hurricane: Enhancin...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Kulkarni, Radhika V. Mude, Vedant Nagrale, Rutuj Nirgude, Aarya Nirmal, Tejashri Vishwakarma Institute of Technology Department of Computer Engineering Pune India
One of the most destructive natural disasters, hurricanes destroy a great deal of property, harm people, and disrupt the ecosystem and world economy. Earlier, through ground surveys, the impact of the hurricane was me... 详细信息
来源: 评论