咨询与建议

限定检索结果

文献类型

  • 422,194 篇 会议
  • 157,481 篇 期刊文献
  • 3,599 册 图书
  • 103 篇 学位论文

馆藏范围

  • 583,375 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 339,403 篇 工学
    • 228,279 篇 计算机科学与技术...
    • 186,547 篇 软件工程
    • 81,893 篇 信息与通信工程
    • 52,889 篇 控制科学与工程
    • 44,414 篇 电气工程
    • 43,684 篇 电子科学与技术(可...
    • 38,775 篇 生物工程
    • 28,574 篇 生物医学工程(可授...
    • 25,754 篇 光学工程
    • 24,253 篇 机械工程
    • 18,952 篇 化学工程与技术
    • 18,432 篇 仪器科学与技术
    • 17,520 篇 动力工程及工程热...
    • 14,291 篇 材料科学与工程(可...
    • 12,123 篇 安全科学与工程
    • 11,298 篇 交通运输工程
    • 10,936 篇 网络空间安全
  • 185,765 篇 理学
    • 94,460 篇 数学
    • 57,848 篇 物理学
    • 43,253 篇 生物学
    • 30,424 篇 统计学(可授理学、...
    • 21,690 篇 系统科学
    • 19,897 篇 化学
  • 86,063 篇 管理学
    • 51,695 篇 管理科学与工程(可...
    • 37,933 篇 图书情报与档案管...
    • 24,536 篇 工商管理
  • 25,986 篇 医学
    • 21,912 篇 临床医学
    • 19,849 篇 基础医学(可授医学...
    • 12,679 篇 药学(可授医学、理...
  • 15,409 篇 法学
    • 12,590 篇 社会学
  • 9,461 篇 经济学
  • 7,438 篇 农学
  • 6,280 篇 教育学
  • 2,643 篇 文学
  • 1,322 篇 军事学
  • 838 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,540 篇 computer science
  • 13,607 篇 computational mo...
  • 13,532 篇 accuracy
  • 13,324 篇 feature extracti...
  • 11,313 篇 deep learning
  • 11,212 篇 training
  • 10,370 篇 machine learning
  • 7,922 篇 data mining
  • 7,791 篇 predictive model...
  • 7,486 篇 support vector m...
  • 7,336 篇 computer archite...
  • 7,177 篇 optimization
  • 6,767 篇 neural networks
  • 6,734 篇 wireless sensor ...
  • 6,526 篇 data models
  • 6,440 篇 real-time system...
  • 6,363 篇 costs
  • 6,321 篇 algorithm design...
  • 6,260 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,435 篇 school of comput...
  • 2,176 篇 school of comput...
  • 2,132 篇 chitkara univers...
  • 2,024 篇 school of comput...
  • 1,752 篇 school of comput...
  • 1,662 篇 department of co...
  • 1,450 篇 school of comput...
  • 1,399 篇 school of comput...
  • 1,315 篇 department of co...
  • 1,303 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,269 篇 school of comput...
  • 1,131 篇 school of comput...
  • 1,101 篇 department of el...
  • 1,089 篇 college of compu...
  • 979 篇 university of ch...
  • 966 篇 department of ph...
  • 962 篇 school of comput...
  • 948 篇 college of compu...
  • 940 篇 cavendish labora...

作者

  • 413 篇 niyato dusit
  • 314 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 236 篇 s. chen
  • 232 篇 j. wang
  • 228 篇 wang wei
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 558,874 篇 英文
  • 17,606 篇 其他
  • 6,803 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 39 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Engineering and Computer Science"
583377 条 记 录,以下是4601-4610 订阅
排序:
CGEDN: Approximation of Graph Edit Distance with Path Generation via Learning Node Matching
CGEDN: Approximation of Graph Edit Distance with Path Genera...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yang, Liu Zheng, Qiankun Wang, Zidong School of Computer Science and Engineering Central South University Changsha China
Graph Edit Distance (GED) is a classical graph similarity metric. Since exact GED computation is NP-hard, existing GNN-based methods try to approximate GED in polynomial time. However, they still lack support for edge... 详细信息
来源: 评论
FaLa: feature-augmented location-aware transformer network for graph representation learning
收藏 引用
Neural Computing and Applications 2025年 1-28页
作者: Morshed, Md Golam Sultana, Tangina Lee, Young-Koo Computer Science and Engineering Kyung Hee University Yongin17104 Korea Republic of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka1230 Bangladesh Electronics and Communication Engineering Hajee Mohammad Danesh Science & Technology University Dinajpur5200 Bangladesh
Data augmentation is a technique that improves the ability of neural networks to make accurate predictions by increasing the size of the training dataset. However, it is still uncertain how to properly use data augmen... 详细信息
来源: 评论
Smart Home Security Enhancements with Cisco Packet Tracer  1
Smart Home Security Enhancements with Cisco Packet Tracer
收藏 引用
1st IEEE International Conference on Computing and Data science, ICCDS 2024
作者: Nanthini, N. Lakshmi Priya, S. Jeslene Sugee, A.G. Sathyabama Institute of Science and Technology Department Of Computer Science and Engineering Chennai India
Modern households are increasingly adopting smart home devices powered by the Internet of Things (IoT). From smart thermostats and security systems to voice assistants, connected IoT devices enable seamless and respon... 详细信息
来源: 评论
An IoT based Application for Real-Time Detection of Rotten Fruits  2
An IoT based Application for Real-Time Detection of Rotten F...
收藏 引用
2nd International Conference on computer, Communication and Control, IC4 2024
作者: Raj, Jeberson Retna Srinivasulu, Senduru Jabez Gowri Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
Food packaging serves several purposes, including food preservation, shelf-life extension, and upholding quality and safety requirements throughout manufacturing and storage. Intelligent food packaging, on the other h... 详细信息
来源: 评论
The dynamics of a memristor-based Rulkov neuron with fractional-order difference
收藏 引用
Chinese Physics B 2022年 第6期31卷 30-38页
作者: Yan-Mei Lu Chun-Hua Wang Quan-Li Deng Cong Xu College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China
The exploration of the memristor model in the discrete domain is a fascinating *** electromagnetic induction on neurons has also begun to be simulated by some discrete ***,most of the current investigations are based ... 详细信息
来源: 评论
MTPNet: Learning Multiple Twin-support Prototypes for Few-shot Medical Image Segmentation
MTPNet: Learning Multiple Twin-support Prototypes for Few-sh...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Song, Feifan Cheng, Ziming Li, Lunbo Zhang, Haofeng Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
Given the high annotation costs and ethical considerations associated with medical images, leveraging a limited number of annotated samples for Few-Shot Medical Image Segmentation (FSMIS) has become increasingly preva... 详细信息
来源: 评论
TCP-Cubiwood: Enhanced Cubic Congestion Control for mmWave and Future Networks  17
TCP-Cubiwood: Enhanced Cubic Congestion Control for mmWave a...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Prakash, Ujjayant Baswade, Anand M. Indian Institute of Technology Department of Computer Science and Engineering Bhilai India
The rise in mobile internet usage especially using cellular networks demands efficient performance for web traffic, primarily made up of short TCP flows. For TCP, Cubic is the most widely deployed congestion control a... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
Graph Neural Architecture Search:A Survey
收藏 引用
Tsinghua science and Technology 2022年 第4期27卷 692-708页
作者: Babatounde Moctard Oloulade Jianliang Gao Jiamin Chen Tengfei Lyu Raeed Al-Sabri School of Computer Science and Engineering Central South UniversityChangsha 410083China
In academia and industries,graph neural networks(GNNs)have emerged as a powerful approach to graph data processing ranging from node classification and link prediction tasks to graph clustering *** models are usually ... 详细信息
来源: 评论
A-DSCNet: Implementing Attention-based Deep Serial Cascaded Network for Predicting Insider Threats using Human Behaviors  3
A-DSCNet: Implementing Attention-based Deep Serial Cascaded ...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Ilampiray, P. Ramya, S. Thanga R.M.K. Engineering College Computer Science and Engineering Thiruvallur India
Insider threats are considered a major issue in the field of system engineering. For modern applications, which demand a seamless integration among humans and machines, human interactions along with the applications a... 详细信息
来源: 评论