咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,691 篇 期刊文献
  • 6,050 册 图书
  • 4 篇 学位论文

馆藏范围

  • 797,116 篇 电子文献
  • 15 种 纸本馆藏

日期分布

学科分类号

  • 461,585 篇 工学
    • 334,278 篇 计算机科学与技术...
    • 263,989 篇 软件工程
    • 97,546 篇 信息与通信工程
    • 66,693 篇 控制科学与工程
    • 50,724 篇 电气工程
    • 46,641 篇 生物工程
    • 44,481 篇 电子科学与技术(可...
    • 35,232 篇 生物医学工程(可授...
    • 28,396 篇 光学工程
    • 26,790 篇 机械工程
    • 21,480 篇 化学工程与技术
    • 19,248 篇 仪器科学与技术
    • 17,919 篇 动力工程及工程热...
    • 16,817 篇 材料科学与工程(可...
    • 13,713 篇 安全科学与工程
    • 12,313 篇 建筑学
  • 260,745 篇 理学
    • 151,399 篇 数学
    • 69,544 篇 物理学
    • 53,686 篇 生物学
    • 44,534 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,285 篇 化学
  • 117,318 篇 管理学
    • 65,452 篇 管理科学与工程(可...
    • 56,577 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,910 篇 医学
    • 27,734 篇 临床医学
    • 24,701 篇 基础医学(可授医学...
    • 15,163 篇 药学(可授医学、理...
    • 12,411 篇 公共卫生与预防医...
  • 20,964 篇 法学
    • 17,585 篇 社会学
  • 12,356 篇 经济学
  • 11,592 篇 教育学
  • 9,587 篇 农学
  • 3,891 篇 文学
  • 1,476 篇 军事学
  • 1,242 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,506 篇 computational mo...
  • 13,636 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,568 篇 machine learning
  • 12,468 篇 application soft...
  • 12,210 篇 data mining
  • 11,169 篇 training
  • 11,155 篇 computer archite...
  • 11,016 篇 deep learning
  • 10,160 篇 algorithm design...
  • 10,083 篇 costs
  • 9,933 篇 testing
  • 9,797 篇 protocols
  • 9,439 篇 artificial intel...
  • 8,856 篇 semantics
  • 8,717 篇 bandwidth
  • 8,657 篇 delay
  • 8,652 篇 hardware
  • 8,430 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,072 篇 department of co...
  • 1,695 篇 department of co...
  • 1,536 篇 department of co...
  • 1,332 篇 department of co...
  • 1,321 篇 department of el...
  • 1,112 篇 department of co...
  • 1,093 篇 department of el...
  • 978 篇 department of ph...
  • 977 篇 department of co...
  • 953 篇 cavendish labora...
  • 946 篇 university of ch...
  • 878 篇 department of co...
  • 841 篇 department of co...
  • 836 篇 oliver lodge lab...
  • 818 篇 physikalisches i...
  • 772 篇 department of co...
  • 766 篇 department of el...
  • 729 篇 department of co...
  • 546 篇 department of co...

作者

  • 254 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 j. wang
  • 227 篇 blake t.
  • 220 篇 betancourt c.
  • 218 篇 bowcock t.j.v.
  • 218 篇 borsato m.
  • 217 篇 bellee v.
  • 214 篇 liu yang
  • 212 篇 amato s.
  • 208 篇 brundu d.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 202 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,801 篇 英文
  • 71,059 篇 其他
  • 6,503 篇 中文
  • 330 篇 日文
  • 230 篇 德文
  • 106 篇 法文
  • 83 篇 斯洛文尼亚文
  • 72 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 26 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
797120 条 记 录,以下是51-60 订阅
排序:
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
Cloud Computing Security: Assured Deletion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第3期48卷 485-496页
作者: Ahmed, Sarmad Mahmood Mahmood, Baban Ahmed Department of Computer Science College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How... 详细信息
来源: 评论
Credit card fraud detection using hybridization of isolation forest with grey wolf optimizer algorithm
收藏 引用
Soft Computing 2024年 第17-18期28卷 10215-10233页
作者: Tabrizchi, Hamed Razmara, Jafar Department of Computer Science Faculty of Mathematics Statistics and Computer Science University of Tabriz Tabriz Iran
During recent decades, using credit cards represents a pivotal part of the financial lifeline. Credit cards and online payment gateways are vital elements in the world of world-wide-web. Given the fact that credit car... 详细信息
来源: 评论
Facial Sentiment Analysis Using Convolutional Neural Network and Fuzzy Systems
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第12期48卷 15-32页
作者: Kadhim, Ahmed R. Khudeyer, Raidah S. Alabbas, Maytham Department of Computer Information System College of Computer Science and Information Technology University of Basrah Basrah Iraq Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah Iraq
This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da... 详细信息
来源: 评论
Group Decision Support Model for Tech-Based Startup Funding Using Multistage Fuzzy Logic
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2023年 第6期47卷 131-144页
作者: Devanda, Muhammad Donny Utama, Ditdit Nugeraha Computer Science Department BINUS Graduate Program – Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
The startup business model has grown rapidly in the last few years. However, giving investment or funding to a startup, especially in its early stages, is difficult because the risk is higher than a conventional compa... 详细信息
来源: 评论
Lip-Reading with Visual Form Classification using Residual Networks and Bidirectional Gated Recurrent Units
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2023年 第2期4卷 375-386页
作者: Anni Suharjito Computer Science Department BINUS Graduate Program – Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Lip-reading is a method that focuses on the observation and interpretation of lip movements to understand spoken language. Previous studies have exclusively concentrated on a single variation of residual networks (Res... 详细信息
来源: 评论
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论
Gender Classification on Twitter Based on Feeds and User Descriptions Using Xlnet-Fasttext
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第20期48卷 71-80页
作者: Alandeta, Vito Rozaan Suhartono, Derwin Computer Science Department BINUS Graduate Program Bina Nusantara University Jakarta Indonesia
This study proposes a gender classification method for Twitter data using a hybrid XLNet-fastText model. The objective is to enhance gender classification accuracy by leveraging the contextual understanding of XLNet a... 详细信息
来源: 评论
SHA: QoS-Aware Software and Hardware Auto-Tuning for Database Systems
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 369-383页
作者: 李进 陈全 唐晓新 过敏意 Department of Computer Science Shanghai Jiao Tong UniversityShanghai 200240China Department of Computer Science and Technology Shanghai University of Finance and EconomicsShanghai 200433China
While databases are widely-used in commercial user-facing services that have stringent quality-of-service(QoS)requirement,it is crucial to ensure their good performance and minimize the hardware usage at the same *** ... 详细信息
来源: 评论
Analyzing the Impacts of Dynamic Game Balancing in a Survival Roguelike Chess Game
Analyzing the Impacts of Dynamic Game Balancing in a Surviva...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and Information System, ICADEIS 2025
作者: Mario Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta Indonesia
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud... 详细信息
来源: 评论