咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,119 篇 期刊文献
  • 6,000 册 图书
  • 4 篇 学位论文

馆藏范围

  • 796,494 篇 电子文献
  • 13 种 纸本馆藏

日期分布

学科分类号

  • 461,692 篇 工学
    • 334,237 篇 计算机科学与技术...
    • 263,937 篇 软件工程
    • 97,524 篇 信息与通信工程
    • 66,641 篇 控制科学与工程
    • 50,836 篇 电气工程
    • 46,638 篇 生物工程
    • 44,577 篇 电子科学与技术(可...
    • 35,230 篇 生物医学工程(可授...
    • 28,318 篇 光学工程
    • 26,782 篇 机械工程
    • 21,474 篇 化学工程与技术
    • 19,242 篇 仪器科学与技术
    • 17,917 篇 动力工程及工程热...
    • 16,983 篇 材料科学与工程(可...
    • 13,711 篇 安全科学与工程
    • 12,309 篇 建筑学
  • 260,686 篇 理学
    • 151,436 篇 数学
    • 69,534 篇 物理学
    • 53,678 篇 生物学
    • 44,598 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,286 篇 化学
  • 117,291 篇 管理学
    • 65,436 篇 管理科学与工程(可...
    • 56,570 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,877 篇 医学
    • 27,708 篇 临床医学
    • 24,696 篇 基础医学(可授医学...
    • 15,161 篇 药学(可授医学、理...
    • 12,406 篇 公共卫生与预防医...
  • 20,960 篇 法学
    • 17,584 篇 社会学
  • 12,344 篇 经济学
  • 11,589 篇 教育学
  • 9,578 篇 农学
  • 3,889 篇 文学
  • 1,475 篇 军事学
  • 1,241 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,505 篇 computational mo...
  • 13,635 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,543 篇 machine learning
  • 12,468 篇 application soft...
  • 12,208 篇 data mining
  • 11,170 篇 training
  • 11,154 篇 computer archite...
  • 11,002 篇 deep learning
  • 10,161 篇 algorithm design...
  • 10,074 篇 costs
  • 9,936 篇 testing
  • 9,798 篇 protocols
  • 9,393 篇 artificial intel...
  • 8,843 篇 semantics
  • 8,741 篇 bandwidth
  • 8,670 篇 delay
  • 8,663 篇 hardware
  • 8,431 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,084 篇 department of co...
  • 1,693 篇 department of co...
  • 1,523 篇 department of co...
  • 1,351 篇 department of co...
  • 1,336 篇 department of el...
  • 1,132 篇 department of co...
  • 1,085 篇 department of el...
  • 974 篇 department of ph...
  • 958 篇 department of co...
  • 947 篇 cavendish labora...
  • 926 篇 university of ch...
  • 864 篇 department of co...
  • 830 篇 oliver lodge lab...
  • 819 篇 department of co...
  • 814 篇 physikalisches i...
  • 781 篇 department of el...
  • 765 篇 department of co...
  • 745 篇 department of co...
  • 560 篇 department of co...

作者

  • 253 篇 barter w.
  • 240 篇 j. wang
  • 233 篇 s. chen
  • 224 篇 blake t.
  • 222 篇 bowcock t.j.v.
  • 218 篇 bellee v.
  • 217 篇 betancourt c.
  • 216 篇 liu yang
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 209 篇 amato s.
  • 209 篇 a. gomes
  • 207 篇 beiter a.
  • 197 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,280 篇 英文
  • 71,028 篇 其他
  • 6,434 篇 中文
  • 330 篇 日文
  • 229 篇 德文
  • 105 篇 法文
  • 83 篇 斯洛文尼亚文
  • 71 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 25 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
796498 条 记 录,以下是21-30 订阅
排序:
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
science China(Information sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论
A multi-objective social-based algorithm for community detection
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Farrokhpour Dizaj, Yousef Lotfi, Shahriar Hajipour, Javad Department of Computer Science Faculty of Mathematics Statistics and Computer Science University of Tabriz Tabriz Iran
The detection of community structures in complex networks has garnered significant attention in recent years. Given its NP-hardness, numerous evolutionary optimization-based approaches have been proposed. However, the... 详细信息
来源: 评论
An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 957-977页
作者: Peda Narayana Bathula M.Sreenivasulu Department of Computer Science Engineering Jawaharlal Nehru Technological UniversityAnanthapur 515002India Department of Computer Science Engineering Matrusri Engineering CollegeHyderabad 500059India
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ... 详细信息
来源: 评论
Improving Video Watermarking through Galois Field GF(2^(4)) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1423-1442页
作者: Yasmin Alaa Hassan Abdul Monem S.Rahma Department of Computer Science College of ScienceUniversity of BaghdadBaghdadIraq Department of Computer Science College of ScienceAl-Maarif University CollegeAl-AnbarIraq
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content *** study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their int... 详细信息
来源: 评论
Machine Learning for Threat Detection
Machine Learning for Threat Detection
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Sutanto, Dustin Fransisca, Febri Liem, Steven Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila School of Computer Science Cyber Security Program Computer Science Department Bina Nusantara Jakarta Indonesia School of Computer Science Computer Science Program Computer Science Department Bina Nusantara Jakarta Indonesia
These days almost all people in the world use the Internet as the internet is constantly evolving. Cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t... 详细信息
来源: 评论
Position-aware packet loss optimization on service function chain placement
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 1057-1067页
作者: Wenjie Liang Chengxiang Li Lin Cui Fung Po Tso Department of Computer Science Jinan UniversityGuangzhou510632China Department of Computer Science Loughborough UniversityLoughboroughLE113TUUK
The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network... 详细信息
来源: 评论
Security Challenges and Issues in Cloud Computing
Security Challenges and Issues in Cloud Computing
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Zakiyyah, Rika Permana, Daniel Valenecio, Devan Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia Computer Science Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t... 详细信息
来源: 评论
StylePart: image-based shape part manipulation
收藏 引用
Visual computer 2025年 第1期41卷 67-78页
作者: Shen, I.-Chao Su, Li-Wen Wu, Yu-Ting Chen, Bing-Yu Computer Science Department The University of Tokyo Tokyo Japan Computer Science Department National Taiwan University Taipei Taiwan Computer Science Department National Taipei University Taipei Taiwan
Direct part-level manipulation of man-made shapes in an image is desired given its simplicity. However, it is not intuitive given the existing manually created cuboid and cylinder controllers. To tackle this problem, ... 详细信息
来源: 评论
Controllable multi-domain semantic artwork synthesis
收藏 引用
Computational Visual Media 2024年 第2期10卷 355-373页
作者: Yuantian Huang Satoshi Iizuka Edgar Simo-Serra Kazuhiro Fukui Department of Computer Science University of TsukubaTsukuba 305-8577Japan Department of Computer Science and Engineering Waseda UniversityTokyo 169-8050Japan
We present a novel framework for the multidomain synthesis of artworks from semantic *** of the main limitations of this challenging task is the lack of publicly available segmentation datasets for art *** address thi... 详细信息
来源: 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(Information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of Cyber Engineering Xidian University School of Computer Science and Technology Xidian University Department of Computer and Information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 评论