咨询与建议

限定检索结果

文献类型

  • 67,500 篇 会议
  • 31,599 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 99,932 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,489 篇 工学
    • 43,573 篇 计算机科学与技术...
    • 35,461 篇 软件工程
    • 17,012 篇 信息与通信工程
    • 9,820 篇 控制科学与工程
    • 7,446 篇 电气工程
    • 7,282 篇 电子科学与技术(可...
    • 7,036 篇 生物工程
    • 4,942 篇 生物医学工程(可授...
    • 4,656 篇 机械工程
    • 4,375 篇 光学工程
    • 3,437 篇 仪器科学与技术
    • 3,140 篇 动力工程及工程热...
    • 2,901 篇 化学工程与技术
    • 2,570 篇 网络空间安全
    • 2,511 篇 安全科学与工程
    • 2,329 篇 交通运输工程
  • 32,195 篇 理学
    • 17,222 篇 数学
    • 8,977 篇 物理学
    • 7,805 篇 生物学
    • 5,593 篇 统计学(可授理学、...
    • 3,775 篇 系统科学
    • 3,052 篇 化学
  • 17,327 篇 管理学
    • 10,729 篇 管理科学与工程(可...
    • 7,329 篇 图书情报与档案管...
    • 4,570 篇 工商管理
  • 4,826 篇 医学
    • 4,056 篇 临床医学
    • 3,643 篇 基础医学(可授医学...
    • 2,248 篇 药学(可授医学、理...
    • 2,051 篇 公共卫生与预防医...
  • 2,799 篇 法学
    • 2,189 篇 社会学
  • 1,717 篇 经济学
  • 1,413 篇 农学
  • 1,200 篇 教育学
  • 472 篇 文学
  • 287 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 2,629 篇 feature extracti...
  • 2,275 篇 accuracy
  • 2,198 篇 deep learning
  • 2,112 篇 computer science
  • 1,955 篇 computational mo...
  • 1,896 篇 training
  • 1,871 篇 machine learning
  • 1,451 篇 data mining
  • 1,308 篇 internet of thin...
  • 1,303 篇 optimization
  • 1,290 篇 support vector m...
  • 1,191 篇 information tech...
  • 1,138 篇 predictive model...
  • 1,110 篇 educational inst...
  • 1,101 篇 wireless sensor ...
  • 957 篇 artificial intel...
  • 954 篇 neural networks
  • 925 篇 semantics
  • 924 篇 security
  • 915 篇 real-time system...

机构

  • 656 篇 school of comput...
  • 508 篇 school of comput...
  • 474 篇 maharishi school...
  • 352 篇 department of co...
  • 277 篇 department of ph...
  • 264 篇 school of comput...
  • 259 篇 faculté des scie...
  • 250 篇 department of ph...
  • 222 篇 faculty of scien...
  • 220 篇 department of ph...
  • 214 篇 physics division...
  • 204 篇 school of comput...
  • 201 篇 department of co...
  • 192 篇 department of ph...
  • 184 篇 department of ph...
  • 181 篇 departamento de ...
  • 170 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 158 篇 department for p...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 261 篇 h. a. gordon
  • 256 篇 m. klein
  • 254 篇 r. ströhmer
  • 246 篇 h. sakamoto
  • 244 篇 y. tayalati
  • 233 篇 niyato dusit
  • 228 篇 m. rijssenbeek
  • 202 篇 f. pastore
  • 202 篇 n. orlando
  • 199 篇 d. guest
  • 190 篇 s. jin

语言

  • 95,052 篇 英文
  • 3,279 篇 其他
  • 1,604 篇 中文
  • 77 篇 日文
  • 13 篇 斯洛文尼亚文
  • 11 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Information Technology"
99932 条 记 录,以下是131-140 订阅
排序:
Developing an Esports Assistant System for First Person Shooting Game Based on Multimodal Learning  14th
Developing an Esports Assistant System for First Person Shoo...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Chiu, Wei-Hsiang Hung, Jason C. Ma, Hao-Shang Huang, Chun-Hong Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan City Taiwan
We plan to develop a specialized training system to enhance the competitive skills of players in the first-person shooter game "Valorant", aiming to improve their abilities and tactical understanding within ... 详细信息
来源: 评论
A New key Establishment Method Based on Random key Pre-Distribution in Sensor Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18427-18430页
作者: Li, Sujun Zhou, Boqing Miao, Decheng Cheng, Yun Wu, Jie Shaoguan University School of Information Engineering Shaoguan512005 China Hunan University of Humanities Science and Technology Department of Information Science and Engineering Loudi Hunan417000 China Temple University Department of Computer and Information Sciences United States
Sensor networks are often deployed outdoors and are more susceptible to various attacks. In order to protect communication between nodes, scholars have proposed key management schemes. The most popular among them is t... 详细信息
来源: 评论
A voting-based trustworthy distributed IoT attack detection model
收藏 引用
Personal and Ubiquitous Computing 2025年 第1期29卷 103-118页
作者: Sharma, Priya Sharma, Sanjay Kumar Dani, Diksha University School of Information & Communication Technology Gautam Buddha University Greater Noida India Department of Computer Engineering SVKM’s NMIMS Mukesh Patel School of Technology Management & Engineering Mumbai India
Besides the enhancement of the Internet of Things (IoT) distributed environment, anomalous activities are also escalating rapidly. Therefore, improving the trustworthiness of distributed networks is required for the e... 详细信息
来源: 评论
Joint Watermarking and Encryption for Social Image Sharing
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2927-2946页
作者: Conghuan Ye Shenglong Tan Shi Li Jun Wang Qiankun Zuo Bing Xiong School of Information Engineering Hubei University of EconomicsWuhan430205China School of Computer and Communication Engineering Changsha University of Science&TechnologyChangsha410114China
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima... 详细信息
来源: 评论
Salp swarm algorithm using lens opposition-based learning and local search for constrained optimization problems
收藏 引用
Iran Journal of computer Science 2025年 1-28页
作者: Majumdar, Parijata Mitra, Sanjoy Department of Computer Science and Engineering Indian Institute of Information Technology Agartala Jirania 799046 India Department of Computer Science and Engineering Tripura Institute of Technology Agartala Narsingarh 799009 India
The Salp swarm algorithm (SSA) simulates how salps forage and travel in the ocean. SSA suffers from low initial population diversity, improper balancing of exploration and exploitation, and slow convergence speed. Thu... 详细信息
来源: 评论
DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8  17
DyPSS: Dynamic Priority Signalling System for Emergency Vehi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Kakde, Anuj Nath, Shubha Brata Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy... 详细信息
来源: 评论
Neuroadaptive Containment Control for Nonlinear Multiagent Systems With Input Saturation: An Event-Triggered Communication Approach
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3163-3173页
作者: Wang, Xin Zhang, Sen Li, Huaqing Zhang, Wei Li, Hongyi Huang, Tingwen Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o... 详细信息
来源: 评论
An Adaptive Slicing Based Task Admission Scheduling Strategy in Multi-Access Edge Computing
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16067-16078页
作者: Liao, Zhuofan Tang, Yanpu Tang, XiaoYong Huang, Jiawei Changsha University of Science and Technology School of Computer and Communication Engineering Changsha410114 China Central South University School of Information Science and Engineering Changsha410083 China
The rise of Multi-access Edge Computing (MEC) speeds up mobile user services and resolves service delays caused by long-distance transmission to cloud servers. However, in task-intensive scenarios, edge server process... 详细信息
来源: 评论
PsSR: Hybrid Path Selection Mechanism for Efficient Image Super-Resolution
PsSR: Hybrid Path Selection Mechanism for Efficient Image Su...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ding, Cheng Zhao, ZhongQiu Zhao, Yang Hefei University of Technology School of Computer Science and Information Engineering Hefei China
In practical applications, large images are processed in patches, many of which are simple and smooth, making them suitable for lighter network processing. This paper proposes a hybrid path selection mechanism that en... 详细信息
来源: 评论
DDT-Net:Deep Detail Tracking Network for Image Tampering Detection
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3451-3469页
作者: Jim Wong Zhaoxiang Zang Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering China Three Gorges UniversityYichang443002China College of Computer and Information Technology ChinaThree Gorges UniversityYichang443002China Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650504China
In the field of image forensics,image tampering detection is a critical and challenging *** methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits ... 详细信息
来源: 评论