咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,691 篇 期刊文献
  • 6,050 册 图书
  • 4 篇 学位论文

馆藏范围

  • 797,116 篇 电子文献
  • 15 种 纸本馆藏

日期分布

学科分类号

  • 461,585 篇 工学
    • 334,278 篇 计算机科学与技术...
    • 263,989 篇 软件工程
    • 97,546 篇 信息与通信工程
    • 66,693 篇 控制科学与工程
    • 50,724 篇 电气工程
    • 46,641 篇 生物工程
    • 44,481 篇 电子科学与技术(可...
    • 35,232 篇 生物医学工程(可授...
    • 28,396 篇 光学工程
    • 26,790 篇 机械工程
    • 21,480 篇 化学工程与技术
    • 19,248 篇 仪器科学与技术
    • 17,919 篇 动力工程及工程热...
    • 16,817 篇 材料科学与工程(可...
    • 13,713 篇 安全科学与工程
    • 12,313 篇 建筑学
  • 260,745 篇 理学
    • 151,399 篇 数学
    • 69,544 篇 物理学
    • 53,686 篇 生物学
    • 44,534 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,285 篇 化学
  • 117,318 篇 管理学
    • 65,452 篇 管理科学与工程(可...
    • 56,577 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,910 篇 医学
    • 27,734 篇 临床医学
    • 24,701 篇 基础医学(可授医学...
    • 15,163 篇 药学(可授医学、理...
    • 12,411 篇 公共卫生与预防医...
  • 20,964 篇 法学
    • 17,585 篇 社会学
  • 12,356 篇 经济学
  • 11,592 篇 教育学
  • 9,587 篇 农学
  • 3,891 篇 文学
  • 1,476 篇 军事学
  • 1,242 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,506 篇 computational mo...
  • 13,636 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,568 篇 machine learning
  • 12,468 篇 application soft...
  • 12,210 篇 data mining
  • 11,169 篇 training
  • 11,155 篇 computer archite...
  • 11,016 篇 deep learning
  • 10,160 篇 algorithm design...
  • 10,083 篇 costs
  • 9,933 篇 testing
  • 9,797 篇 protocols
  • 9,439 篇 artificial intel...
  • 8,856 篇 semantics
  • 8,717 篇 bandwidth
  • 8,657 篇 delay
  • 8,652 篇 hardware
  • 8,430 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,072 篇 department of co...
  • 1,695 篇 department of co...
  • 1,536 篇 department of co...
  • 1,332 篇 department of co...
  • 1,321 篇 department of el...
  • 1,112 篇 department of co...
  • 1,093 篇 department of el...
  • 978 篇 department of ph...
  • 977 篇 department of co...
  • 953 篇 cavendish labora...
  • 946 篇 university of ch...
  • 878 篇 department of co...
  • 841 篇 department of co...
  • 836 篇 oliver lodge lab...
  • 818 篇 physikalisches i...
  • 772 篇 department of co...
  • 766 篇 department of el...
  • 729 篇 department of co...
  • 546 篇 department of co...

作者

  • 254 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 j. wang
  • 227 篇 blake t.
  • 220 篇 betancourt c.
  • 218 篇 bowcock t.j.v.
  • 218 篇 borsato m.
  • 217 篇 bellee v.
  • 214 篇 liu yang
  • 212 篇 amato s.
  • 208 篇 brundu d.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 202 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,801 篇 英文
  • 71,059 篇 其他
  • 6,503 篇 中文
  • 330 篇 日文
  • 230 篇 德文
  • 106 篇 法文
  • 83 篇 斯洛文尼亚文
  • 72 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 26 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
797120 条 记 录,以下是11-20 订阅
排序:
An Encoding-Decoding Framework Based on CNN for circ RNA-RBP Binding Sites Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 256-263页
作者: Yajing GUO Xiujuan LEI Yi PAN School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Department of Computer Science Georgia State University
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th... 详细信息
来源: 评论
Offensive Language Detection Using Soft Voting Ensemble Model
Mendel
收藏 引用
Mendel 2023年 第1期29卷 1-6页
作者: Fieri, Brillian Suhartono, Derwin Computer Science Department BINUS Graduate Program – Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Offensive language is one of the problems that have become increasingly severe along with the rise of the internet and social media usage. This language can be used to attack a person or specific groups. Automatic mod... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Personality Identification from Social Media Using Ensemble BERT and RoBERTa
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2023年 第4期47卷 537-544页
作者: Tsani, Eggi Farkhan Suhartono, Derwin Computer Science Department Binus Graduate Program – Master of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Social media growth was fast because many people used it to express their feelings, share information, and interact with others. With the growth of social media, many researchers are interested in using social media d...
来源: 评论
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 735-759页
作者: Wael M.S.Yafooz Abdullah Alsaeedi Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo... 详细信息
来源: 评论
Hybrid Model for Motor Imagery Biometric Identification
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第1期5卷 1-12页
作者: Aljanabi, Rasha A. Al-Qaysi, Z.T. Ahmed, M.A. Mahmood, M. Salih Tikrit University College of Computer Science and Mathematics Computer Science Department Iraq
Biometric systems are a continuously evolving and promising technological domain that can be used in automatic systems for the unique and efficient identification and authentication of individuals without necessitatin... 详细信息
来源: 评论
Taxonomy, Open Challenges, Motivations, and Recommendations in Driver Behavior Recognition: A Systematic Review
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第3期5卷 358-377页
作者: Omar, Mohammed Basim Ahmed, Mohamed A. Hussein, Harith A. Al-Qaysi, Z.T. Salih, Mahmood M. Hamddi, S.A. Hameed, Qabas A. Ismail, Reem D. Tikrit University College of Computer Science and Mathematics Computer Science Department Iraq
Driver behavior has a major role in many of the unpleasant things that happen when driving, such as crashes or accidents, heavy traffic, abrupt braking, and acceleration and deceleration. Numerous investigations have ... 详细信息
来源: 评论
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
science China(Information sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论
Improving Video Watermarking through Galois Field GF(2^(4)) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1423-1442页
作者: Yasmin Alaa Hassan Abdul Monem S.Rahma Department of Computer Science College of ScienceUniversity of BaghdadBaghdadIraq Department of Computer Science College of ScienceAl-Maarif University CollegeAl-AnbarIraq
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content *** study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their int... 详细信息
来源: 评论
A multi-objective social-based algorithm for community detection
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Farrokhpour Dizaj, Yousef Lotfi, Shahriar Hajipour, Javad Department of Computer Science Faculty of Mathematics Statistics and Computer Science University of Tabriz Tabriz Iran
The detection of community structures in complex networks has garnered significant attention in recent years. Given its NP-hardness, numerous evolutionary optimization-based approaches have been proposed. However, the... 详细信息
来源: 评论