咨询与建议

限定检索结果

文献类型

  • 29,863 篇 会议
  • 4,639 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 34,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,568 篇 工学
    • 15,583 篇 计算机科学与技术...
    • 13,104 篇 软件工程
    • 5,748 篇 信息与通信工程
    • 3,405 篇 控制科学与工程
    • 2,662 篇 电子科学与技术(可...
    • 2,613 篇 电气工程
    • 2,329 篇 生物工程
    • 1,870 篇 生物医学工程(可授...
    • 1,512 篇 光学工程
    • 1,337 篇 机械工程
    • 1,210 篇 动力工程及工程热...
    • 1,194 篇 仪器科学与技术
    • 1,012 篇 化学工程与技术
    • 839 篇 安全科学与工程
    • 707 篇 交通运输工程
  • 11,085 篇 理学
    • 6,009 篇 数学
    • 3,029 篇 物理学
    • 2,557 篇 生物学
    • 1,986 篇 统计学(可授理学、...
    • 1,316 篇 系统科学
    • 1,081 篇 化学
  • 5,558 篇 管理学
    • 3,248 篇 管理科学与工程(可...
    • 2,580 篇 图书情报与档案管...
    • 1,797 篇 工商管理
  • 1,576 篇 医学
    • 1,361 篇 临床医学
    • 1,272 篇 基础医学(可授医学...
    • 836 篇 药学(可授医学、理...
    • 658 篇 公共卫生与预防医...
  • 1,021 篇 法学
    • 820 篇 社会学
  • 634 篇 经济学
    • 634 篇 应用经济学
  • 478 篇 农学
  • 437 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,031 篇 accuracy
  • 826 篇 feature extracti...
  • 804 篇 computational mo...
  • 683 篇 deep learning
  • 680 篇 computer science
  • 662 篇 training
  • 501 篇 support vector m...
  • 495 篇 real-time system...
  • 493 篇 machine learning
  • 420 篇 predictive model...
  • 403 篇 internet of thin...
  • 345 篇 computer archite...
  • 331 篇 data models
  • 325 篇 convolutional ne...
  • 316 篇 reliability
  • 306 篇 optimization
  • 285 篇 data mining
  • 273 篇 routing
  • 256 篇 wireless sensor ...
  • 249 篇 image segmentati...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 66 篇 dept. of informa...
  • 63 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 48 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 72 篇 dallier r.
  • 70 篇 huang f.
  • 66 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,519 篇 英文
  • 806 篇 其他
  • 308 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Engineering Program and Dept. of Computer Science"
34737 条 记 录,以下是41-50 订阅
排序:
A Blockchain-Based Approach for Detecting Counterfeit Pharmaceuticals  15
A Blockchain-Based Approach for Detecting Counterfeit Pharma...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Afrin, Farhina Laboni, Marfi Akter Rimi, Iffat Firozy Rahman, Md Sadekur Habib, Md. Tarek Dept. of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Dept. of Computer Science and Engineering Independent University Dhaka Bangladesh
Nowadays, the contemplations for improving the item circulation supply structure have been expanded around the world. Simultaneously, it acquires different complexities in the inventory network and things get a lot de... 详细信息
来源: 评论
Breaking Barriers: Investigating the Sense of Belonging Among Women and Non-Binary Students in Software engineering  46
Breaking Barriers: Investigating the Sense of Belonging Amon...
收藏 引用
46th International Conference on Software engineering: Software engineering Education and Training, ICSE-SEET 2024
作者: Boman, Lina Andersson, Jonatan de Oliveira Neto, Francisco Gomes University of Gothenburg Dept. of Computer Science and Engineering Gothenburg Sweden Chalmers and the University of Gothenburg Dept. of Computer Science and Engineering Gothenburg Sweden
Women in computing were among the first programmers in the early 20th century and were substantial contributors to the industry. Today, men dominate the software engineering industry. Research and data show that women... 详细信息
来源: 评论
Implementation of Blockchain and IPFS to safeguard evidentiary data
Implementation of Blockchain and IPFS to safeguard evidentia...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Srivastava, Supriya Kaur, GeetKiran Himank Singla, Sanjay Chandigarh University Dept. of Computer Science & Engineering Mohali140413 India Chandigarh University Dept. of Computer Science & Engineering Gharuan India
Nowadays due to increasing cases of evidence alteration the need of a robust evidence protection system is increasing rapidly. This paper presents an innovative solution that combines the InterPlanetary File System (I... 详细信息
来源: 评论
A Comprehensive Analysis on Skin Cancer Classification Using Transfer Learning  3
A Comprehensive Analysis on Skin Cancer Classification Using...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic engineering, ICAEEE 2024
作者: Renu, Israt Zerin Haque, Md. Momenul Paul, Subrata Kumer Mou, Mahmuda Shirin Rahman, Md Nahid Gupta, Sudipta Sen Paul, Rakhi Rani Rabindra Maitree University Dept. of Computer Science and Engineering Kushtia7000 Bangladesh Qadirabad Dept. of Computer Science and Engineering Dayarampur Natore6431 Bangladesh University of Rajshahi Dept. of Computer Science and Engineering Rajshahi6205 Bangladesh
Skin cancer, a prevalent and potentially life-threatening disease, necessitates accurate and timely diagnosis for effective treatment. In addressing this critical healthcare challenge, this research proposes a novel a... 详细信息
来源: 评论
Enhancing 5G Efficiency: Regression Analysis for Resource Allocation Optimization in Wireless Networks
Enhancing 5G Efficiency: Regression Analysis for Resource Al...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Padmageetha, B.G. Kumar Naik, Pramod Patil, Mallanagouda Dayananda Sagar University Dept. of Computer Applications Bengaluru India Dayananda Sagar University Dept. of Computer Science and Engineering Bengaluru India RVITM Dept. of Computer Science and Engineering Bengaluru India
The advent of 5G networks signifies a major breakthrough in mobile communications, providing better data rates, low latency, and improved connectivity. Efficient resource allocation within 5G networks is paramount to ... 详细信息
来源: 评论
Breast Cancer Classification via the Use of ML and DL: A Comprehensive Review  3
Breast Cancer Classification via the Use of ML and DL: A Com...
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Sarang, Ruvanshi Dabhi, Vipul Shah, Arpit Dept. of Computer Science Engineering Parul University Vadodara India Dept. of Computer Engineering Parul University Vadodara India
New and improved methods of diagnosis are needed because breast cancer is still the leading cancer-related killer worldwide. Updates to the methods used to categorize breast cancer have emerged because of recent advan... 详细信息
来源: 评论
Automated Identification of Pneumonia Employing Convolution Neural Networks and the VGG-16 Model  1
Automated Identification of Pneumonia Employing Convolution ...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Srivastava, Anamika Gupta, Anuj Kaushik, Deepti Gupta, Neha Chadha, Shikha Chauhan, Rosey Noida Institute Of Engineering Technology Dept. of Computer Science & Engineering Gerater Noida India Sharda Unviersity Dept. of Computer Science & Engineering Gerater Noida India School of Engineering and Technology IIMT University Dept. of Computer Science and Engineering U.P Meerut India ABES Engineering College Dept. of Computer Science UP Ghaziabad India
Pneumonia, an inflammatory lung disease, impacts the small air sacs known as alveoli and is typically caused by the bacteria Streptococcus pneumonia. Symptoms commonly include a combination of productive or dry cough,... 详细信息
来源: 评论
Energy Efficient LEDCA Analysis for Improved Throughput in Wireless Sensor Networks  6
Energy Efficient LEDCA Analysis for Improved Throughput in W...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Padmageetha, B.G. Naik, Pramod Kumar Patil, Mallanagouda Dept.of Computer Applications Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering RVITM Bengaluru India
Wireless Sensor Networks (WSNs) face significant challenges in terms of energy conservation, scalability, and data throughput owing to their limited node energy resources. This paper presents a low-energy data-centric... 详细信息
来源: 评论
A Transformer-Based Model for Image Caption Generation with Memory Enhancement
A Transformer-Based Model for Image Caption Generation with ...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Ome, Shadika Afroze Azhar, Tanvir Asaduzzaman East Delta University Dept. of Computer Science & Engineering Chattogram Bangladesh Chittagong University of Engineering & Technology Dept. of Computer Science & Engineering Chattogram Bangladesh
This study proposes a convolution-free transformer-based method for generating accurate descriptions of images. A Vision Transformer is utilized as the primary encoder, replacing traditional CNN, and a Meshed Memory T... 详细信息
来源: 评论
An Effective Method to Detect DHCP Starvation Attack using Port Scanning
An Effective Method to Detect DHCP Starvation Attack using P...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Jony, Asaduzzaman Miah, Abu Saleh Musa Islam, Muhammad Nazrul Dept. of Computer Science and Engineering Dhaka Bangladesh The University of Aizu Dept. of Computer Science and Engineering Aizuwakamatsu Japan Dept. of Computer Science and Engineering Dhaka Bangladesh
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the DHCP server pool. Most of the existing s... 详细信息
来源: 评论