咨询与建议

限定检索结果

文献类型

  • 422,339 篇 会议
  • 159,477 篇 期刊文献
  • 3,573 册 图书
  • 103 篇 学位论文

馆藏范围

  • 585,490 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,343 篇 工学
    • 229,511 篇 计算机科学与技术...
    • 187,126 篇 软件工程
    • 82,634 篇 信息与通信工程
    • 53,426 篇 控制科学与工程
    • 45,381 篇 电气工程
    • 44,070 篇 电子科学与技术(可...
    • 38,835 篇 生物工程
    • 28,652 篇 生物医学工程(可授...
    • 25,906 篇 光学工程
    • 24,540 篇 机械工程
    • 19,094 篇 化学工程与技术
    • 18,530 篇 仪器科学与技术
    • 17,613 篇 动力工程及工程热...
    • 14,553 篇 材料科学与工程(可...
    • 12,212 篇 安全科学与工程
    • 11,401 篇 交通运输工程
    • 11,270 篇 网络空间安全
  • 186,829 篇 理学
    • 94,902 篇 数学
    • 58,266 篇 物理学
    • 43,445 篇 生物学
    • 30,572 篇 统计学(可授理学、...
    • 21,717 篇 系统科学
    • 20,098 篇 化学
  • 86,424 篇 管理学
    • 51,880 篇 管理科学与工程(可...
    • 38,144 篇 图书情报与档案管...
    • 24,589 篇 工商管理
  • 26,246 篇 医学
    • 22,036 篇 临床医学
    • 19,953 篇 基础医学(可授医学...
    • 12,691 篇 药学(可授医学、理...
  • 15,424 篇 法学
    • 12,599 篇 社会学
  • 9,484 篇 经济学
  • 7,474 篇 农学
  • 6,319 篇 教育学
  • 2,648 篇 文学
  • 1,323 篇 军事学
  • 845 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,541 篇 computer science
  • 13,630 篇 computational mo...
  • 13,551 篇 accuracy
  • 13,362 篇 feature extracti...
  • 11,440 篇 deep learning
  • 11,245 篇 training
  • 10,463 篇 machine learning
  • 7,932 篇 data mining
  • 7,808 篇 predictive model...
  • 7,487 篇 support vector m...
  • 7,342 篇 computer archite...
  • 7,199 篇 optimization
  • 6,784 篇 neural networks
  • 6,738 篇 wireless sensor ...
  • 6,539 篇 data models
  • 6,445 篇 real-time system...
  • 6,367 篇 costs
  • 6,321 篇 algorithm design...
  • 6,281 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,441 篇 school of comput...
  • 2,184 篇 school of comput...
  • 2,135 篇 chitkara univers...
  • 2,033 篇 school of comput...
  • 1,755 篇 school of comput...
  • 1,668 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,405 篇 school of comput...
  • 1,318 篇 department of co...
  • 1,300 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,285 篇 school of comput...
  • 1,141 篇 school of comput...
  • 1,103 篇 department of el...
  • 1,096 篇 college of compu...
  • 989 篇 university of ch...
  • 976 篇 school of comput...
  • 969 篇 department of ph...
  • 953 篇 college of compu...
  • 943 篇 cavendish labora...

作者

  • 423 篇 niyato dusit
  • 336 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 237 篇 wang wei
  • 234 篇 s. chen
  • 232 篇 j. wang
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 560,582 篇 英文
  • 17,984 篇 其他
  • 6,848 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 40 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Engineering and Computer Science"
585492 条 记 录,以下是4871-4880 订阅
排序:
Deep hierarchical network for full-reference omnidirectional image quality assessment
收藏 引用
Multimedia Systems 2025年 第3期31卷 1-15页
作者: Zhang, Youzhi Wan, Lifei Chen, Yiren Zhou, Xiaofei Zhang, Xiaolin Liu, Deyang School of Computer and Informatio Anqing Normal Universit Anqing246000 China College of Electrical Engineering and Automation Shandong University of Science and Technology Qingdao266590 China School of Automation Hangzhou Dianzi University Hangzhou310061 China
Virtual Reality(VR) can provide users immersive experience, which is considered as an innovative teaching tool for education. The rapid advancement of VR technology has brought a substantial increase in the availabili... 详细信息
来源: 评论
From Misinformation to Truth: Fake News Detection with Transformer-Based Models
From Misinformation to Truth: Fake News Detection with Trans...
收藏 引用
International Conference on Communication Systems and Network Technologies (CSNT)
作者: Arvind Mewada Mohd. Aquib Ansari Sushil Kumar Maurya Computer Science & Engineering Bennett University Greater Noida India Computer Science & Engineering Siksha ‘O’ Anusandhan Bhubaneswar India
Nowadays, technological advancements have significantly transformed information dissemination and consumption strategies. People acquire news through online portals such as social media and news websites. However, thi... 详细信息
来源: 评论
Deep Networks as Denoising Algorithms: Sample-Efficient Learning of Diffusion Models in High-Dimensional Graphical Models
收藏 引用
IEEE Transactions on Information Theory 2025年 第4期71卷 2930-2954页
作者: Mei, Song Wu, Yuchen University of California at Berkeley Department of Statistics Department of Electrical Engineering and Computer Sciences BerkeleyCA94720 United States University of Pennsylvania Wharton School Department of Statistics and Data Science PhiladelphiaPA19104 United States
We investigate the efficiency of deep neural networks for approximating scoring functions in diffusion-based generative modeling. While existing approximation theories leverage the smoothness of score functions, they ... 详细信息
来源: 评论
Exploration of soliton structures and modulation instability analysis for the highly dispersive perturbed NLSE with sextic-power law refractive index
收藏 引用
Optical and Quantum Electronics 2025年 第1期57卷 1-18页
作者: Abdullah, Eman H. M. Ahmed, Hamdy M. Zaghrout, Afaf A. S. Bahnasy, Amal Ibrahim Ahmed Rabie, Wafaa B. Hashemi, M.S. Bayram, M. Department of Physics and Engineering Mathematics Higher Institute of Engineering El Shorouk Academy Cairo Egypt Department of Mathematics Faculty of Science Al Azhar University Cairo Egypt Department of Physics and Engineering Mathematics Higher Institute of Engineering and Technology Tanta Egypt Department of Mathematics Basic Science Faculty University of Bonab Bonab Iran Computer Engineering Biruni University Istanbul Turkey
This study introduces some novel soliton solutions and other analytic wave solutions for the highly dispersive perturbed nonlinear Schrödinger equation with generalized nonlocal laws and sextic-power law refracti... 详细信息
来源: 评论
Intelligent network intrusion detection system using optimized deep CNN-LSTM with UNSW-NB15
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-17页
作者: Thaljaoui, Adel Department of Computer Science and Information College of Science at Zulfi Majmaah University Al-Majmaah 11952 Saudi Arabia Preparatory Institute for Engineering Studies of Gafsa Street Al Khayzourane-Zarroug Gafsa 2112 Tunisia
In the era of interconnected technologies, the ongoing threat of intrusion attacks poses significant risks, exposing individuals and organizations to potentially severe repercussions. Network Intrusion Detection Syste... 详细信息
来源: 评论
Online Influence Maximization With Semi-Bandit Feedback Under Corruptions
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第3期12卷 2308-2321页
作者: Cheng, Xiaotong Nourani-Koliji, Behzad Maghsudi, Setareh Ruhr-University Bochum Department of Electrical Engineering and Information Technology Bochum44801 Germany University of Tübingen Department of Computer Science Tübingen72074 Germany Fraunhofer Heinrich Hertz Institute Berlin10587 Germany
In this article, we investigate the online influence maximization in social networks. Most prior research studies on online influence maximization assume that the nodes are fully cooperative and act according to their... 详细信息
来源: 评论
InterACT: Enhancing Human-AI Interaction  2
InterACT: Enhancing Human-AI Interaction
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Katta, Jithendra Kodumuru, Nikhil Reddy Katta, Swathi School of Engineering and Applied Sciences The George Washington University WashingtonDC United States Vignana Bharathi Institute of Technology Computer Science & Engineering dept. Hyderabad India
The rapid advancement of large language models and computer vision systems has opened new frontiers in artificial intelligence. This paper introduces InterACT, a novel cross-modal system that integrates leading langua... 详细信息
来源: 评论
A Multimodal Monitoring System with XGBoost Classifier for Optimizing Student Engagement in Online Learning
A Multimodal Monitoring System with XGBoost Classifier for O...
收藏 引用
International Conference on Electrical, computer and Communication engineering (ECCE)
作者: Muhammad Kamal Hossen Mohammad Shorif Uddin Department of Computer Science and Engineering Chittagong University of Engineering and Technology Chattogram Bangladesh Department of Computer Science and Engineering Jahangirnagar University Dhaka Bangladesh
Online learning has gained significant momentum due to globalization and the COVID-19 pandemic, but maintaining student engagement in this environment remains challenging. Traditional methods like self-reports and man... 详细信息
来源: 评论
Integrating Machine Learning & Deep Learning for Image Captioning and Text Recognition in Mobile Apps Development
Integrating Machine Learning & Deep Learning for Image Capti...
收藏 引用
International Conference on Electrical, computer and Communication engineering (ECCE)
作者: J. Rahman S. R. Bhowmik Akib Jayed Islam Sultanus Salehin Muhammad Jawad Chowdhury Computer Science & Engineering Port City International University Chattogram Bangladesh Department of Computer Science Norwegian University of Science & Technology Gjøvik Norway Electrical & Computer Engineering The University of Alabama Tuscaloosa USA Computer Science & Engineering Islamic University of Technology Gazipur Bangladesh
Deep learning methods are increasingly being applied to mobile applications for word recognition and image captioning, offering innovative solutions to complex tasks. In this study, models such as VGG19, ResNet101, an... 详细信息
来源: 评论
CAST: Contrastive Analysis of Spatial and Temporal Features for QIM-Based VoIP Steganalysis
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 1935-1939页
作者: Zhang, Cheng Yan, Yue Jiang, Shujuan Chen, Zhong China University of Mining and Technology School of Computer Science and Technology Engineering Research Center of Mine Digitalization Ministry of Education Xuzhou221116 China Swinburne College of Shandong University of Science and Technology Shandong 250031 China China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China
QIM(quantization index modulation)-based VoIP steganography is an information-hiding technology that malicious users could misuse to engage in illegal activities. Its countermeasure, commonly known as the QIM-based Vo... 详细信息
来源: 评论