咨询与建议

限定检索结果

文献类型

  • 86,132 篇 会议
  • 40,820 篇 期刊文献
  • 1,130 册 图书
  • 2 篇 学位论文

馆藏范围

  • 128,084 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 78,436 篇 工学
    • 57,992 篇 计算机科学与技术...
    • 46,935 篇 软件工程
    • 19,782 篇 信息与通信工程
    • 11,476 篇 控制科学与工程
    • 8,823 篇 生物工程
    • 8,109 篇 电气工程
    • 7,603 篇 电子科学与技术(可...
    • 6,047 篇 生物医学工程(可授...
    • 5,572 篇 机械工程
    • 5,090 篇 光学工程
    • 3,782 篇 仪器科学与技术
    • 3,500 篇 化学工程与技术
    • 3,331 篇 动力工程及工程热...
    • 3,076 篇 网络空间安全
    • 2,980 篇 安全科学与工程
    • 2,670 篇 交通运输工程
  • 41,065 篇 理学
    • 22,302 篇 数学
    • 11,114 篇 物理学
    • 9,823 篇 生物学
    • 7,037 篇 统计学(可授理学、...
    • 4,662 篇 系统科学
    • 3,641 篇 化学
  • 23,424 篇 管理学
    • 13,805 篇 管理科学与工程(可...
    • 10,644 篇 图书情报与档案管...
    • 6,028 篇 工商管理
  • 5,868 篇 医学
    • 4,927 篇 临床医学
    • 4,441 篇 基础医学(可授医学...
    • 2,688 篇 药学(可授医学、理...
    • 2,485 篇 公共卫生与预防医...
  • 3,769 篇 法学
    • 2,966 篇 社会学
  • 2,188 篇 经济学
  • 1,787 篇 教育学
  • 1,751 篇 农学
  • 651 篇 文学
  • 366 篇 军事学
  • 295 篇 艺术学
  • 38 篇 哲学
  • 25 篇 历史学

主题

  • 3,980 篇 computer science
  • 3,438 篇 feature extracti...
  • 2,847 篇 accuracy
  • 2,703 篇 deep learning
  • 2,632 篇 computational mo...
  • 2,457 篇 training
  • 2,311 篇 machine learning
  • 2,174 篇 data mining
  • 1,736 篇 information tech...
  • 1,662 篇 semantics
  • 1,646 篇 support vector m...
  • 1,512 篇 internet of thin...
  • 1,478 篇 educational inst...
  • 1,470 篇 predictive model...
  • 1,452 篇 optimization
  • 1,313 篇 data models
  • 1,303 篇 artificial intel...
  • 1,233 篇 security
  • 1,213 篇 neural networks
  • 1,197 篇 wireless sensor ...

机构

  • 941 篇 department of co...
  • 659 篇 school of comput...
  • 476 篇 maharishi school...
  • 473 篇 school of comput...
  • 357 篇 college of compu...
  • 350 篇 department of co...
  • 326 篇 school of comput...
  • 273 篇 department of ph...
  • 257 篇 faculté des scie...
  • 248 篇 school of comput...
  • 247 篇 department of co...
  • 236 篇 school of comput...
  • 220 篇 department of ph...
  • 218 篇 department of ph...
  • 216 篇 physics division...
  • 204 篇 school of comput...
  • 204 篇 school of comput...
  • 196 篇 department of co...
  • 194 篇 department of ph...
  • 186 篇 college of compu...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 262 篇 g. spigo
  • 260 篇 f. siegert
  • 259 篇 h. a. gordon
  • 258 篇 a. c. könig
  • 240 篇 y. tayalati
  • 235 篇 niyato dusit
  • 232 篇 m. klein
  • 220 篇 r. ströhmer
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 198 篇 h. sakamoto
  • 175 篇 m. rijssenbeek
  • 162 篇 s. veneziano
  • 159 篇 s. jin

语言

  • 122,371 篇 英文
  • 3,822 篇 其他
  • 1,892 篇 中文
  • 102 篇 日文
  • 18 篇 斯洛文尼亚文
  • 12 篇 德文
  • 10 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Computer Science And Information Technology"
128084 条 记 录,以下是1-10 订阅
排序:
Augmented reality for interactive promotion media at Faculty of computer science and information technology Mulawarman University  3
Augmented reality for interactive promotion media at Faculty...
收藏 引用
3rd International Conference on science, ICOS 2019
作者: Firdaus, M.B. Widians, J.A. Padant, J.Y. Informatics Engineering Department Faculty of Computer Science and Information Technology Mulawarman University Samarinda Indonesia
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o... 详细信息
来源: 评论
Augmented reality for interactive promotion media at Faculty of computer science and information technology Mulawarman University
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1341卷
作者: M B Firdaus J A Widians J Y Padant Informatics Engineering Department Faculty of Computer Science and Information Technology Mulawarman University Samarinda Indonesia
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o...
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Robust video question answering via contrastive cross-modality representation learning
收藏 引用
science China(information sciences) 2024年 第10期67卷 211-226页
作者: Xun YANG Jianming ZENG Dan GUO Shanshan WANG Jianfeng DONG Meng WANG School of Information Science and Technology University of Science and Technology of China Institute of Artificial Intelligence Hefei Comprehensive National Science Center School of Computer Science and Information Engineering Hefei University of Technology Institutes of Physical Science and Information Technology Anhui University School of Computer Science and Technology Zhejiang Gongshang University
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts... 详细信息
来源: 评论
QoS-Aware Computation Offloading in LEO Satellite Edge Computing for IoT:A Game-Theoretical Approach
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 875-885页
作者: Ying CHEN Jintao HU Jie ZHAO Geyong MIN School of Computer Science Beijing Information Science and Technology University University of Exeter
Low earth orbit(LEO) satellite edge computing can overcome communication difficulties in harsh environments, which lack the support of terrestrial communication infrastructure. It is an indispensable option for achiev... 详细信息
来源: 评论
Advances in neural architecture search
收藏 引用
National science Review 2024年 第8期11卷 24-38页
作者: Xin Wang Wenwu Zhu Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University
Automated machine learning(AutoML) has achieved remarkable success in automating the non-trivial process of designing machine learning *** the focal areas of AutoML,neural architecture search(NAS) stands out,aiming to... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Secure transmission design for RIS-aided symbiotic radio networks:A DRL approach
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1566-1575页
作者: Bin Li Wenshuai Liu Wancheng Xie School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China
In this paper,we investigate a Reconfigurable Intelligent Surface(RIS)-assisted secure Symbiosis Radio(SR)network to address the information leakage of the primary transmitter(PTx)to potential ***,the RIS serves as a ... 详细信息
来源: 评论
A Distributed Adaptive Second-Order Latent Factor Analysis Model
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2343-2345页
作者: Jialiang Wang Weiling Li Xin Luo the School of Computer Science and Technology Dongguan University of Technology the College of Computer and Information Science Southwest University
Dear Editor,This letter presents a distributed adaptive second-order latent factor(DAS) model for addressing the issue of high-dimensional and incomplete data representation. Compared with first-order optimizers, a se... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论