咨询与建议

限定检索结果

文献类型

  • 456,331 篇 会议
  • 177,261 篇 期刊文献
  • 4,164 册 图书
  • 103 篇 学位论文

馆藏范围

  • 637,856 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 368,509 篇 工学
    • 249,095 篇 计算机科学与技术...
    • 203,213 篇 软件工程
    • 87,110 篇 信息与通信工程
    • 56,784 篇 控制科学与工程
    • 46,943 篇 电气工程
    • 45,822 篇 电子科学与技术(可...
    • 41,529 篇 生物工程
    • 31,021 篇 生物医学工程(可授...
    • 27,428 篇 光学工程
    • 25,808 篇 机械工程
    • 20,564 篇 化学工程与技术
    • 19,613 篇 仪器科学与技术
    • 18,505 篇 动力工程及工程热...
    • 15,313 篇 材料科学与工程(可...
    • 12,991 篇 安全科学与工程
    • 11,925 篇 交通运输工程
    • 11,682 篇 网络空间安全
  • 206,023 篇 理学
    • 105,851 篇 数学
    • 63,977 篇 物理学
    • 46,569 篇 生物学
    • 33,559 篇 统计学(可授理学、...
    • 23,668 篇 系统科学
    • 21,635 篇 化学
  • 94,744 篇 管理学
    • 56,264 篇 管理科学与工程(可...
    • 42,491 篇 图书情报与档案管...
    • 27,122 篇 工商管理
  • 28,440 篇 医学
    • 24,030 篇 临床医学
    • 21,649 篇 基础医学(可授医学...
    • 13,696 篇 药学(可授医学、理...
  • 16,896 篇 法学
    • 13,832 篇 社会学
  • 10,307 篇 经济学
  • 8,108 篇 农学
  • 7,265 篇 教育学
  • 2,897 篇 文学
  • 1,402 篇 军事学
  • 891 篇 艺术学
  • 169 篇 哲学
  • 85 篇 历史学

主题

  • 28,388 篇 computer science
  • 14,738 篇 accuracy
  • 14,697 篇 computational mo...
  • 14,383 篇 feature extracti...
  • 12,271 篇 deep learning
  • 12,186 篇 training
  • 11,230 篇 machine learning
  • 8,696 篇 data mining
  • 8,340 篇 predictive model...
  • 8,217 篇 support vector m...
  • 7,882 篇 computer archite...
  • 7,692 篇 optimization
  • 7,323 篇 neural networks
  • 7,131 篇 data models
  • 6,997 篇 wireless sensor ...
  • 6,905 篇 real-time system...
  • 6,817 篇 convolutional ne...
  • 6,715 篇 testing
  • 6,699 篇 algorithm design...
  • 6,617 篇 costs

机构

  • 2,475 篇 school of comput...
  • 2,182 篇 school of comput...
  • 2,142 篇 chitkara univers...
  • 2,063 篇 school of comput...
  • 1,770 篇 school of comput...
  • 1,673 篇 department of co...
  • 1,469 篇 school of comput...
  • 1,436 篇 school of comput...
  • 1,316 篇 department of co...
  • 1,311 篇 school of comput...
  • 1,310 篇 school of electr...
  • 1,291 篇 department of el...
  • 1,169 篇 school of comput...
  • 1,153 篇 college of compu...
  • 1,105 篇 department of el...
  • 1,016 篇 university of ch...
  • 991 篇 school of comput...
  • 972 篇 department of ph...
  • 957 篇 college of compu...
  • 951 篇 cavendish labora...

作者

  • 429 篇 niyato dusit
  • 338 篇 liu yang
  • 280 篇 yang yang
  • 246 篇 wang wei
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 221 篇 s. chen
  • 220 篇 j. wang
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 214 篇 bowcock t.j.v.
  • 209 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 203 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung

语言

  • 600,086 篇 英文
  • 30,527 篇 其他
  • 7,214 篇 中文
  • 382 篇 日文
  • 110 篇 朝鲜文
  • 85 篇 德文
  • 53 篇 法文
  • 41 篇 斯洛文尼亚文
  • 28 篇 俄文
  • 24 篇 西班牙文
  • 8 篇 土耳其文
  • 7 篇 意大利文
  • 7 篇 葡萄牙文
  • 5 篇 捷克文
  • 5 篇 荷兰文
  • 4 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science Faculty of Computer Science and Engineering"
637859 条 记 录,以下是141-150 订阅
排序:
Neutrosophic-Supported Machine Learning Models for Oral Disease Classification
收藏 引用
Neutrosophic Sets and Systems 2025年 79卷 657-668页
作者: Elezmazy, Ibrahim M. El-Shahat, Doaa Zagazig University Faculty of Computers and Informatics Computer Science Egypt
This study is presented to investigate the influence of the neutrosophic (NS) domain on the performance of the most common machine learning (ML) models. Specifically, it evaluates the effectiveness of Random Forest (R... 详细信息
来源: 评论
A biological-like synthesis framework for software engineering environments
收藏 引用
International Journal of computers and Applications 2024年 第4期46卷 208-217页
作者: Sophatsathit, Peraphon Department of Mathematics and Computer Science Faculty of Science Chulalongkorn University Bangkok Thailand
This research proposes a Biological-like Architecture for Software Systems (BASS) that make up of software components. The design principle is to mimic the simplicity of uni-cellular life form as fixed-sized blocks li... 详细信息
来源: 评论
Anomaly Detection Control Through One-class Learning in Defect Inspection Systems
收藏 引用
Journal of Institute of Control, Robotics and Systems 2025年 第4期31卷 328-333页
作者: Jeon, Janggun Kim, Namgi Dept of AI Computer Engineering and Dept of computer science Kyonggi University Korea Republic of
This paper presents a novel image-level anomaly detection control method for defect inspection, which comprises featureextraction from high-dimensional data and feature-learning to analyze the observed patterns. we fo... 详细信息
来源: 评论
A Novel Certificateless Signature-based Access Control Scheme for Named In-network Computing Service
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 38-45页
作者: Li, Wanji Liu, Qiangbin Zhu, Yi School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p... 详细信息
来源: 评论
Secure kNN For Distributed Cloud Environment Using Fully Homomorphic Encryption
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 721-736页
作者: Fukuchi, Yuuya Hashimoto, Sota Sakai, Kazuya Fukumoto, Satoshi Sun, Min-Te Ku, Wei-Shinn Tokyo Metropolitan University Department of Electrical Engineering and Computer Science Tokyo Japan Tokyo Metropolitan University Department of Computer Science Tokyo Japan National Central University Department of Computer Science and Information Engineering Taoyuan Taiwan Auburn University Department of Computer Science and Software Engineering AuburnAL United States
Privacy-preserving k-nearest neighbor (PPkNN) classification for multiple clouds enables categorizing queried data into a class in keeping with data privacy, where the database and key servers jointly perform cryptogr... 详细信息
来源: 评论
Understanding Government Enterprise Architecture: A Review and Case Study
收藏 引用
IEEE Access 2025年 13卷 90088-90108页
作者: Trimanadi, Raden Indra Sensuse, Dana University of Indonesia Faculty of Computer Science Depok16424 Indonesia
The implementation of enterprise architecture (EA) is no longer exclusive to large corporations;its principles have been adapted for various organizations, including small and medium-sized enterprises (SMEs) and indus... 详细信息
来源: 评论
Self-supervised Hypergraph Transformer with Alignment and Uniformity for Recommendation
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第3期51卷 292-300页
作者: Yang, XianFeng Liu, Yang School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China School of computer Science and Software Engineering University of Science and Technology Liaoning Anshan China
Graph neural networks have proven their effectiveness for user-item interaction graph collaborative filtering. However, most of the existing recommendation models highly depended on abundant and high-quality datasets ... 详细信息
来源: 评论
Empirical Evaluation of Algorithm Performance: Addressing Execution Time Measurement Challenges
收藏 引用
Informatica (Slovenia) 2024年 第4期48卷 543-548页
作者: Dobravec, Tomaž Faculty of Computer and Information Science University of Ljubljana Slovenia
In this paper, we investigate the influence of various factors, such as programming language, testing environment, and input data, on the accuracy of algorithm execution measurements. To conduct this study, we used th... 详细信息
来源: 评论
Deepfake Audio Detection for Urdu Language Using Deep Neural Networks
收藏 引用
IEEE Access 2025年 13卷 97765-97778页
作者: Ahmad, Omair Khan, Muhammad Sohail Jan, Salman Khan, Inayat University of Engineering and Technology Department of Computer Software Engineering Mardan Pakistan Arab Open University Faculty of Computer Studies A’Ali732 Bahrain University of Engineering and Technology Department of Computer Science Mardan Pakistan
Audio Deepfakes, which are highly realistic fake audio recordings driven by AI tools that clone human voices, With Advancements in Text-Based Speech Generation (TTS) and Vocal Conversion (VC) technologies have enabled... 详细信息
来源: 评论
NeurDB: an AI-powered autonomous data system
收藏 引用
science China(Information sciences) 2024年 第10期67卷 129-150页
作者: Beng Chin OOI Shaofeng CAI Gang CHEN Yanyan SHEN Kian-Lee TAN Yuncheng WU Xiaokui XIAO Naili XING Cong YUE Lingze ZENG Meihui ZHANG Zhanhao ZHAO School of Computing National University of Singapore College of Computer Science and Technology Zhejiang University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Information Renmin University of China School of Computer Science and Technology Beijing Institute of Technology
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,... 详细信息
来源: 评论