咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,691 篇 期刊文献
  • 6,050 册 图书
  • 4 篇 学位论文

馆藏范围

  • 797,116 篇 电子文献
  • 15 种 纸本馆藏

日期分布

学科分类号

  • 461,585 篇 工学
    • 334,278 篇 计算机科学与技术...
    • 263,989 篇 软件工程
    • 97,546 篇 信息与通信工程
    • 66,693 篇 控制科学与工程
    • 50,724 篇 电气工程
    • 46,641 篇 生物工程
    • 44,481 篇 电子科学与技术(可...
    • 35,232 篇 生物医学工程(可授...
    • 28,396 篇 光学工程
    • 26,790 篇 机械工程
    • 21,480 篇 化学工程与技术
    • 19,248 篇 仪器科学与技术
    • 17,919 篇 动力工程及工程热...
    • 16,817 篇 材料科学与工程(可...
    • 13,713 篇 安全科学与工程
    • 12,313 篇 建筑学
  • 260,745 篇 理学
    • 151,399 篇 数学
    • 69,544 篇 物理学
    • 53,686 篇 生物学
    • 44,534 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,285 篇 化学
  • 117,318 篇 管理学
    • 65,452 篇 管理科学与工程(可...
    • 56,577 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,910 篇 医学
    • 27,734 篇 临床医学
    • 24,701 篇 基础医学(可授医学...
    • 15,163 篇 药学(可授医学、理...
    • 12,411 篇 公共卫生与预防医...
  • 20,964 篇 法学
    • 17,585 篇 社会学
  • 12,356 篇 经济学
  • 11,592 篇 教育学
  • 9,587 篇 农学
  • 3,891 篇 文学
  • 1,476 篇 军事学
  • 1,242 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,506 篇 computational mo...
  • 13,636 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,568 篇 machine learning
  • 12,468 篇 application soft...
  • 12,210 篇 data mining
  • 11,169 篇 training
  • 11,155 篇 computer archite...
  • 11,016 篇 deep learning
  • 10,160 篇 algorithm design...
  • 10,083 篇 costs
  • 9,933 篇 testing
  • 9,797 篇 protocols
  • 9,439 篇 artificial intel...
  • 8,856 篇 semantics
  • 8,717 篇 bandwidth
  • 8,657 篇 delay
  • 8,652 篇 hardware
  • 8,430 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,072 篇 department of co...
  • 1,695 篇 department of co...
  • 1,536 篇 department of co...
  • 1,332 篇 department of co...
  • 1,321 篇 department of el...
  • 1,112 篇 department of co...
  • 1,093 篇 department of el...
  • 978 篇 department of ph...
  • 977 篇 department of co...
  • 953 篇 cavendish labora...
  • 946 篇 university of ch...
  • 878 篇 department of co...
  • 841 篇 department of co...
  • 836 篇 oliver lodge lab...
  • 818 篇 physikalisches i...
  • 772 篇 department of co...
  • 766 篇 department of el...
  • 729 篇 department of co...
  • 546 篇 department of co...

作者

  • 254 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 j. wang
  • 227 篇 blake t.
  • 220 篇 betancourt c.
  • 218 篇 bowcock t.j.v.
  • 218 篇 borsato m.
  • 217 篇 bellee v.
  • 214 篇 liu yang
  • 212 篇 amato s.
  • 208 篇 brundu d.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 202 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,801 篇 英文
  • 71,059 篇 其他
  • 6,503 篇 中文
  • 330 篇 日文
  • 230 篇 德文
  • 106 篇 法文
  • 83 篇 斯洛文尼亚文
  • 72 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 26 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
797120 条 记 录,以下是221-230 订阅
排序:
Strategies to Selecting Most Profitable Products by Price Settings
收藏 引用
International Journal of Information Technology and Decision Making 2024年 第2期23卷 885-915页
作者: Tai, Liang Kuang Chen, Arbee L.P. Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering Asia University Taichung Taiwan
For a company, it is important to know which products to launch to the market that may get the maximal profit. To achieve this goal, companies not only need to consider these products' features, but also need to a... 详细信息
来源: 评论
Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS
收藏 引用
Journal of Cyber Security and Mobility 2024年 第2期13卷 265-282页
作者: Dawson, John Kwao Twum, Frimpong Acquah, James Benjamin Hayfron Missah, Yaw Marfo Computer Science Department Sunyani Technical University Sunyani Ghana Computer Science Department Kwame Nkrumah University of Science and Technology Kumasi Ghana Ghana Department of Kwame Nkrumah University of Science and Technology Ghana
Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concer... 详细信息
来源: 评论
OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW1期8卷 1-38页
作者: Mukhopadhyay, Anirban Venkatagiri, Sukrit Luther, Kurt Department of Computer Science Virginia Tech BlacksburgVA United States Department of Computer Science Swarthmore College SwarthmorePA United States
Open Source Intelligence (OSINT) investigations, which rely entirely on publicly available data such as social media, play an increasingly important role in solving crimes and holding governments accountable. The grow... 详细信息
来源: 评论
On the Generalisation Performance of Geometric Semantic Genetic programming for Boolean Functions: Learning Block Mutations
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-33页
作者: Corus, Dogan Oliveto, Pietro S. Department of Computer Engineering Kadir Has University Istanbul Turkey Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic programming (GSGP) system. More specifically, we consider a hill-climber using the ... 详细信息
来源: 评论
Face Templates Encryption Technique Based on Random Projection and Deep Learning
收藏 引用
computer Systems science & Engineering 2023年 第3期44卷 2049-2063页
作者: Mayada Tarek Department of Computer Science Mansoura UniversityMansoura35516Egypt Department of Computer Science Jouf UniversityJouf2014KSA
Cancellable biometrics is the solution for the trade-off between two concepts:Biometrics for Security and Security for *** cancelable template is stored in the authentication system’s database rather than the origina... 详细信息
来源: 评论
Blind image authentication using singular value decomposition with enhanced robustness by augmenting hamming code
收藏 引用
International Journal of computers and Applications 2024年 第11期46卷 1020-1044页
作者: Ghosh, Bibek Ranjan Mandal, Jyotsna Kumar Das, Swarnadeep Laha, Ayantanu Saha, Rajarshi Banerjee, Siddhartha Narendrapur India Department of Computer Science & Engineering Kalyani University Kalyani India Department of Computer Science & Engineering University of Calcutta Kolkata India Department of Computer Science Ramakrishna Mission Vivekananda Educational and Research Institute Howrah India
Singular value decomposition (SVD) based image authentication has widespread applications for digital media protection including forensic and medical domains due to the high stability and robustness of singular values... 详细信息
来源: 评论
Enhancing Stroke Detection in Brain CT Images with Residual Attention Networks
Enhancing Stroke Detection in Brain CT Images with Residual ...
收藏 引用
International Conference on Green Energy, Computing and Intelligent Technology 2024, GEn-CITy 2024
作者: Larasati, Sza Sza Amulya Shalsadilla, Shafatyra Reditha Utaminingrum, Fitri Graduate Program of Computer Science Faculty of Computer Science Universitas Brawijaya Indonesia
Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete... 详细信息
来源: 评论
Proposing a digital twin-based sustainable water governance system for rural Indian villages
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1777-1783页
作者: Singh, Dineshkumar Sharma, Vishnu Department of Computer Science and Engineering Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India Department of Computer Science and Application Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ... 详细信息
来源: 评论
A systematic literature review of video forgery detection techniques
收藏 引用
Multimedia Tools and Applications 2025年 1-51页
作者: Aulakh, Manpreet Kaur Kanwal, Navdeep Bansal, Manish Department of Computer Science and Engineering Punjabi University Patiala Punjab Patiala India Department of Computer Science Baba Farid Group of Institutions Punjab Bathinda India
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of... 详细信息
来源: 评论
Towards optimal path planning for sustainable data collection in real-time wireless sensor networks
收藏 引用
International Journal of computers and Applications 2024年 第5期46卷 301-309页
作者: Ranjan, Rajeev Kumar, Prabhat Department of Computer Science and Engineering National Institute of Technology Patna India Department of Computer Science and Engineering Bakhtiyarpur College of Engineering Bakhtiyarpur India
Data collection using mobile sink(s) has proven to reduce energy consumption and enhance the network lifetime of wireless sensor networks. Generally speaking, a mobile sink (MS) traverses the network region, sojournin... 详细信息
来源: 评论