咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,691 篇 期刊文献
  • 6,050 册 图书
  • 4 篇 学位论文

馆藏范围

  • 797,116 篇 电子文献
  • 15 种 纸本馆藏

日期分布

学科分类号

  • 461,585 篇 工学
    • 334,278 篇 计算机科学与技术...
    • 263,989 篇 软件工程
    • 97,546 篇 信息与通信工程
    • 66,693 篇 控制科学与工程
    • 50,724 篇 电气工程
    • 46,641 篇 生物工程
    • 44,481 篇 电子科学与技术(可...
    • 35,232 篇 生物医学工程(可授...
    • 28,396 篇 光学工程
    • 26,790 篇 机械工程
    • 21,480 篇 化学工程与技术
    • 19,248 篇 仪器科学与技术
    • 17,919 篇 动力工程及工程热...
    • 16,817 篇 材料科学与工程(可...
    • 13,713 篇 安全科学与工程
    • 12,313 篇 建筑学
  • 260,745 篇 理学
    • 151,399 篇 数学
    • 69,544 篇 物理学
    • 53,686 篇 生物学
    • 44,534 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,285 篇 化学
  • 117,318 篇 管理学
    • 65,452 篇 管理科学与工程(可...
    • 56,577 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,910 篇 医学
    • 27,734 篇 临床医学
    • 24,701 篇 基础医学(可授医学...
    • 15,163 篇 药学(可授医学、理...
    • 12,411 篇 公共卫生与预防医...
  • 20,964 篇 法学
    • 17,585 篇 社会学
  • 12,356 篇 经济学
  • 11,592 篇 教育学
  • 9,587 篇 农学
  • 3,891 篇 文学
  • 1,476 篇 军事学
  • 1,242 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,506 篇 computational mo...
  • 13,636 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,568 篇 machine learning
  • 12,468 篇 application soft...
  • 12,210 篇 data mining
  • 11,169 篇 training
  • 11,155 篇 computer archite...
  • 11,016 篇 deep learning
  • 10,160 篇 algorithm design...
  • 10,083 篇 costs
  • 9,933 篇 testing
  • 9,797 篇 protocols
  • 9,439 篇 artificial intel...
  • 8,856 篇 semantics
  • 8,717 篇 bandwidth
  • 8,657 篇 delay
  • 8,652 篇 hardware
  • 8,430 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,072 篇 department of co...
  • 1,695 篇 department of co...
  • 1,536 篇 department of co...
  • 1,332 篇 department of co...
  • 1,321 篇 department of el...
  • 1,112 篇 department of co...
  • 1,093 篇 department of el...
  • 978 篇 department of ph...
  • 977 篇 department of co...
  • 953 篇 cavendish labora...
  • 946 篇 university of ch...
  • 878 篇 department of co...
  • 841 篇 department of co...
  • 836 篇 oliver lodge lab...
  • 818 篇 physikalisches i...
  • 772 篇 department of co...
  • 766 篇 department of el...
  • 729 篇 department of co...
  • 546 篇 department of co...

作者

  • 254 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 j. wang
  • 227 篇 blake t.
  • 220 篇 betancourt c.
  • 218 篇 bowcock t.j.v.
  • 218 篇 borsato m.
  • 217 篇 bellee v.
  • 214 篇 liu yang
  • 212 篇 amato s.
  • 208 篇 brundu d.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 202 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,801 篇 英文
  • 71,059 篇 其他
  • 6,503 篇 中文
  • 330 篇 日文
  • 230 篇 德文
  • 106 篇 法文
  • 83 篇 斯洛文尼亚文
  • 72 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 26 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
797120 条 记 录,以下是171-180 订阅
排序:
Classification of Health Insurance Fraud Risk with Machine Learning
Classification of Health Insurance Fraud Risk with Machine L...
收藏 引用
2024 International Conference on Information Technology Research and Innovation, ICITRI 2024
作者: Al-Ghazi, Muhammad Kent Bertrand, Ryan Destra, Muhammad Dzul Qarrnayn Gunawan, Alexander Agung Santoso Setiawan, Karli Eka Bina Nusantara University School of Computer Science Data Science Program Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Computer Science Department School of Computer Science Jakarta11480 Indonesia
Health insurance is a useful service that can help its users gain lifesaving medical aid when they are in need. However, health insurance is also exploitable to insurance fraud through the falsification of information... 详细信息
来源: 评论
DIR:Dynamic Request Interleaving for Improving the Read Performance of Aged Solid-State Drives
收藏 引用
Journal of computer science & Technology 2024年 第1期39卷 82-98页
作者: 聂世强 张驰 伍卫国 Department of Computer Science and Technology Xi'an Jiaotong UniversityShaanci 710049China
Triple-level cell(TLC)NAND flash is increasingly adopted to build solid-state drives(SSDs)for modern computer *** TLC NAND flash effectively improves storage density,it faces severe reliability issues;in partic-ular,t... 详细信息
来源: 评论
Automated Adversarial-Attack Removal with SafetyNet Using ADGIT  10
Automated Adversarial-Attack Removal with SafetyNet Using AD...
收藏 引用
10th International Conference on Smart Computing and Communication, ICSCC 2024
作者: Halim, Steven Anandi, Arvio Devin, Vyos Agung Santoso Gunawan, Alexander Eka Setiawan, Karli School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia
In the realm of artificial intelligence (AI), a notable challenge has surfaced: adversarial attacks, these attacks involve altering input data to mislead AI models. Developing defensive measures against adversarial at... 详细信息
来源: 评论
MBASE: Meta-heuristic Based optimized location allocation algorithm for baSE station in IoT assist wireless sensor networks
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 53383-53415页
作者: Chaurasia, Soni Kumar, Kamal Department of Computer Science and Engineering National Institute of Technology Uttarakhand India Department of Computer Science and Engineering SGT University Gurgaon India
In an Internet of Things (IoT) assisted Wireless Sensor Network (WSN), the location of the Base Station (BS) remains important. BS serves as the central hub for data collection, aggregation and communication within th... 详细信息
来源: 评论
Women Performance in a computer science program  42
Women Performance in a Computer Science Program
收藏 引用
42nd IEEE International Conference of the Chilean computer science Society, SCCC 2023
作者: Rojas, Catalina Bastarrica, Maria Cecilia University of Chile Computer Science Department Beauchef 851 Santiago Chile
Historically, women have been underrepresented in STEM fields, both in academia and industry. Gender prejudices sometimes assume that women are less competent in computer science. Chile has implemented various affirma... 详细信息
来源: 评论
Investigation of user perception of software features for software architecture recovery in object-oriented software
收藏 引用
International Journal of Information Systems and Change Management 2024年 第3期14卷 308-330页
作者: Kumar, Neeraj Singh, Randeep Rathee, Amit Department of Computer Science and Engineering IEC University Solan174103 India Department of Computer Science GC Barota Haryana 131301 India
A well-documented architecture can greatly improve comprehension and maintainability. However, shorter release cycles and quick delivery patterns results in negligence of architecture. In such situations, the architec... 详细信息
来源: 评论
Cosmetics Recommendation System Based on Ingredients Using Cosine Similarity  7
Cosmetics Recommendation System Based on Ingredients Using C...
收藏 引用
7th International Conference on Data science and Its Applications, ICoDSA 2024
作者: Alisha Firdaus, Sekar Dwi Nurmuthia, Laksmi Imtiyaz, Raina Agung Santoso Gunawan, Alexander Eka Setiawan, Karli School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia
In the rapidly evolving beauty industry, consumers are often bombarded with an overwhelming array of skincare brands and products, making the quest for the perfect skincare regimen a daunting task. This saturation of ... 详细信息
来源: 评论
Motion Signal-based Recognition of Human Activity from Video Stream Dataset Using Deep Learning Approach
收藏 引用
Recent Advances in computer science and Communications 2024年 第3期17卷 77-91页
作者: Yadav, Ram Kumar Arockiam, Daniel Semwal, Vijay Bhaskar Department of Computer Science and Engineering Amity University Madhya Pradesh Gwalior India Department of Computer Science and Engineering MANIT Bhopal India
Background: Human physical activity recognition is challenging in various research eras, such as healthcare, surveillance, senior monitoring, athletics, and rehabilitation. The use of various sensors has attracted out... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua science and Technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
DRL-Based Joint Optimization of Wireless Charging and Computation Offloading for Multi-Access Edge Computing
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1352-1367页
作者: Zhu, Xinyuan Hao, Fei Ma, Lianbo Luo, Changqing Min, Geyong Yang, Laurence T. Shaanxi Normal University School of Computer Science Xi'an710119 China Northeastern University School of Software Shenyang100819 China Virginia Commonwealth University Department of Computer Science RichmondVA23084 United States University of Exeter Department of Computer Science United Kingdom Hainan University School of Computer Science and Technology China St. Francis Xavier University Department of Computer Science Canada
Wireless-powered multi-access edge computing (WP-MEC), as a promising computing paradigm with the great potential for breaking through the power limitations of wireless devices, is facing the challenges of reliable ta... 详细信息
来源: 评论