咨询与建议

限定检索结果

文献类型

  • 12,981 篇 会议
  • 6,966 篇 期刊文献
  • 346 册 图书

馆藏范围

  • 20,293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,621 篇 工学
    • 8,110 篇 计算机科学与技术...
    • 6,642 篇 软件工程
    • 2,738 篇 信息与通信工程
    • 1,667 篇 控制科学与工程
    • 1,535 篇 生物工程
    • 1,484 篇 生物医学工程(可授...
    • 1,278 篇 电气工程
    • 1,137 篇 电子科学与技术(可...
    • 982 篇 光学工程
    • 780 篇 机械工程
    • 629 篇 仪器科学与技术
    • 518 篇 化学工程与技术
    • 472 篇 动力工程及工程热...
    • 404 篇 安全科学与工程
    • 372 篇 交通运输工程
    • 352 篇 建筑学
  • 7,095 篇 理学
    • 3,411 篇 数学
    • 2,367 篇 物理学
    • 1,753 篇 生物学
    • 1,117 篇 统计学(可授理学、...
    • 794 篇 系统科学
    • 558 篇 化学
  • 3,159 篇 管理学
    • 1,801 篇 管理科学与工程(可...
    • 1,505 篇 图书情报与档案管...
    • 980 篇 工商管理
  • 1,420 篇 医学
    • 1,220 篇 临床医学
    • 1,112 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 514 篇 公共卫生与预防医...
  • 537 篇 法学
    • 447 篇 社会学
  • 324 篇 经济学
  • 286 篇 教育学
  • 263 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 29 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 272 篇 computer archite...
  • 271 篇 deep learning
  • 253 篇 computer science
  • 234 篇 machine learning
  • 218 篇 data mining
  • 203 篇 training
  • 202 篇 image segmentati...
  • 194 篇 internet of thin...
  • 194 篇 feature extracti...
  • 182 篇 artificial intel...
  • 181 篇 support vector m...
  • 181 篇 optimization
  • 173 篇 accuracy
  • 158 篇 neural networks
  • 155 篇 quality of servi...
  • 151 篇 bandwidth
  • 149 篇 monitoring
  • 135 篇 application soft...

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 399 篇 department of ph...
  • 389 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 384 篇 department of ph...
  • 347 篇 fakultät für phy...
  • 324 篇 institute of phy...
  • 307 篇 institute of phy...
  • 304 篇 department of ph...
  • 280 篇 department of ph...
  • 274 篇 instituto de fís...
  • 272 篇 department of ph...
  • 271 篇 universidade fed...
  • 265 篇 ictp trieste
  • 264 篇 graduate school ...
  • 254 篇 yerevan physics ...
  • 252 篇 nikhef national ...
  • 249 篇 department of ph...
  • 248 篇 graduate school ...

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 317 篇 g. gaudio
  • 316 篇 s. mohapatra
  • 300 篇 y. tayalati
  • 299 篇 s. guindon
  • 288 篇 a. kaczmarska
  • 283 篇 m. klein
  • 267 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 254 篇 a. d. pilkington

语言

  • 19,616 篇 英文
  • 529 篇 其他
  • 133 篇 中文
  • 18 篇 日文
  • 2 篇 法文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Engineering and Informatics"
20293 条 记 录,以下是171-180 订阅
排序:
Comprehensive Classification of Web Tracking Systems: Technological Insights and Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Tasoulas, Theofanis Gazis, Alexandros Tsohou, Aggeliki Ionian University Department of Informatics Corfu Greece Democritus University of Thrace Department of Electrical Engineering and Computer Greece
Web tracking (WT) systems are advanced technologies used to monitor and analyze online user behavior. Initially focused on HTML and static webpages, these systems have evolved with the proliferation of IoT, edge compu... 详细信息
来源: 评论
Transforming Synthesized Netlists into a Feasible & Compliant Functional Bookshelf Format  24
Transforming Synthesized Netlists into a Feasible & Complian...
收藏 引用
Proceedings of the 28th Pan-Hellenic Conference on Progress in Computing and informatics
作者: George Kranas Kosmas Kariotis Antonios Dadaliaris George Stamoulis Athanasios Kakarountas Dept. of Computer Science & Biomedical Informatics University of Thessaly Lamia Greece Dept. of Informatics & Telecommunications University of Thessaly Lamia Greece Dept. of Electrical and Computer Engineering University of Thessaly Volos Greece
来源: 评论
LATUP-Net: A lightweight 3D attention U-Net with parallel convolutions for brain tumor segmentation
收藏 引用
computers in Biology and Medicine 2025年 184卷 109353-109353页
作者: Alwadee, Ebtihal J. Sun, Xianfang Qin, Yipeng Langbein, Frank C. School of Computer Science and Informatics Cardiff University CardiffCF24 4AG United Kingdom Department of Computer Science College of Engineering and Computer Science Jazan University Jazan Saudi Arabia
Early-stage 3D brain tumor segmentation from magnetic resonance imaging (MRI) scans is crucial for prompt and effective treatment. However, this process faces the challenge of precise delineation due to the tumors’ c... 详细信息
来源: 评论
Leveraging Large Language Models for Smart Pharmacy Systems: Enhancing Drug Safety and Operational Efficiency
Leveraging Large Language Models for Smart Pharmacy Systems:...
收藏 引用
International Conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Abdelrahman Osheba Ahmed Abou-El-Ela Osama Adel Youssef Maaod Tamer Abuhmed Shaker El-Sappagh Faculty of Computer Science and Engineering Galala University Egypt College of Computing and Informatics Sungkyunkwan University South Korea
Adverse drug reactions (ADRs) remain a crucial challenge in healthcare systems, highly contributing to patient mortality. We present an innovative smart pharmacy system that utilizes advanced large language models (LL... 详细信息
来源: 评论
EPM: Evolutionary Perception Method for Anomaly Detection in Noisy Dynamic Graphs
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年
作者: Wang, Huan Chen, Junyang Wu, Yirui Leung, Victor C. M. Wang, Di King Abdullah University of Science and Technology Division of Computer Electrical and Mathematical Sciences and Engineering Saudi Arabia Huazhong Agricultural University College of Informatics China Shenzhen University College of Computer Science and Software Engineering China Hohai University College of Computer and Information China
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Hybrid deep learning approach for brain tumor classification using EfficientNetB0 and novel quantum genetic algorithm
收藏 引用
PeerJ computer Science 2025年 11卷 e2556-e2556页
作者: Gencer, Kerem Gencer, Gülcan Afyon Kocatepe University Faculty of Engineering Department of Computer Engineering Afyonkarahisar Turkey Afyonkarahisar Health Sciences University Faculty of Medicine Department of Biostatistics and Medical Informatics Afyonkarahisar Turkey
One of the most complex and life-threatening pathologies of the central nervous system is brain tumors. Correct diagnosis of these tumors plays an important role in determining the treatment plans of patients. Traditi... 详细信息
来源: 评论
Recursive Broadcasting Approach  33
Recursive Broadcasting Approach
收藏 引用
33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2025
作者: Harutyunyan, Hovhannes A. Hovhannisyan, Narek Concordia University Department of Computer Science and Software Engineering MontrealQCH3G 1M8 Canada Institute for Informatics and Automation Problems NAS RA Yerevan0014 Armenia
Broadcasting is one of the fundamental information dissemination primitives in interconnection networks, where a message is passed from one node (called originator) to all other nodes in the network. Following the inc... 详细信息
来源: 评论
ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof  24th
ZKCross: An Efficient and Reliable Cross-Chain Authenticati...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Cai, Hailang Chen, Jialuo Xiang, Qiao Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China School of Informatics Xiamen University Xiamen China College of Computer Science Nankai University Tianjin China
The consortium blockchain finds wide application in finance and logistics. However, these independent networks create information silos. Cross-chain authentication aims to bridge these gaps. It verifies qualifications... 详细信息
来源: 评论
Leveraging LLM in Genetic Programming Hyper-heuristics for Dynamic Microservice Deployment  37th
Leveraging LLM in Genetic Programming Hyper-heuristics for...
收藏 引用
37th Australasian Joint Conference on Artificial Intelligence, AJCAI 2024
作者: Fang, Zhengxin Ma, Hui Chen, Gang Hartmann, Sven Wang, Chen Centre for Data Science and Artificial Intelligence and School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Department of Informatics Clausthal University of Technology Clausthal-Zellerfeld Germany National Institute of Water and Atmospheric Research Wellington New Zealand
Microservice deployment in cloud computing is a challenging combinatorial optimization problem due to the complex dependencies among microservices and the intricate trade-offs among different QoS requirements, e.g., m... 详细信息
来源: 评论