咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,119 篇 期刊文献
  • 6,000 册 图书
  • 4 篇 学位论文

馆藏范围

  • 796,494 篇 电子文献
  • 13 种 纸本馆藏

日期分布

学科分类号

  • 461,692 篇 工学
    • 334,237 篇 计算机科学与技术...
    • 263,937 篇 软件工程
    • 97,524 篇 信息与通信工程
    • 66,641 篇 控制科学与工程
    • 50,836 篇 电气工程
    • 46,638 篇 生物工程
    • 44,577 篇 电子科学与技术(可...
    • 35,230 篇 生物医学工程(可授...
    • 28,318 篇 光学工程
    • 26,782 篇 机械工程
    • 21,474 篇 化学工程与技术
    • 19,242 篇 仪器科学与技术
    • 17,917 篇 动力工程及工程热...
    • 16,983 篇 材料科学与工程(可...
    • 13,711 篇 安全科学与工程
    • 12,309 篇 建筑学
  • 260,686 篇 理学
    • 151,436 篇 数学
    • 69,534 篇 物理学
    • 53,678 篇 生物学
    • 44,598 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,286 篇 化学
  • 117,291 篇 管理学
    • 65,436 篇 管理科学与工程(可...
    • 56,570 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,877 篇 医学
    • 27,708 篇 临床医学
    • 24,696 篇 基础医学(可授医学...
    • 15,161 篇 药学(可授医学、理...
    • 12,406 篇 公共卫生与预防医...
  • 20,960 篇 法学
    • 17,584 篇 社会学
  • 12,344 篇 经济学
  • 11,589 篇 教育学
  • 9,578 篇 农学
  • 3,889 篇 文学
  • 1,475 篇 军事学
  • 1,241 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,505 篇 computational mo...
  • 13,635 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,543 篇 machine learning
  • 12,468 篇 application soft...
  • 12,208 篇 data mining
  • 11,170 篇 training
  • 11,154 篇 computer archite...
  • 11,002 篇 deep learning
  • 10,161 篇 algorithm design...
  • 10,074 篇 costs
  • 9,936 篇 testing
  • 9,798 篇 protocols
  • 9,393 篇 artificial intel...
  • 8,843 篇 semantics
  • 8,741 篇 bandwidth
  • 8,670 篇 delay
  • 8,663 篇 hardware
  • 8,431 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,084 篇 department of co...
  • 1,693 篇 department of co...
  • 1,523 篇 department of co...
  • 1,351 篇 department of co...
  • 1,336 篇 department of el...
  • 1,132 篇 department of co...
  • 1,085 篇 department of el...
  • 974 篇 department of ph...
  • 958 篇 department of co...
  • 947 篇 cavendish labora...
  • 926 篇 university of ch...
  • 864 篇 department of co...
  • 830 篇 oliver lodge lab...
  • 819 篇 department of co...
  • 814 篇 physikalisches i...
  • 781 篇 department of el...
  • 765 篇 department of co...
  • 745 篇 department of co...
  • 560 篇 department of co...

作者

  • 253 篇 barter w.
  • 240 篇 j. wang
  • 233 篇 s. chen
  • 224 篇 blake t.
  • 222 篇 bowcock t.j.v.
  • 218 篇 bellee v.
  • 217 篇 betancourt c.
  • 216 篇 liu yang
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 209 篇 amato s.
  • 209 篇 a. gomes
  • 207 篇 beiter a.
  • 197 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,280 篇 英文
  • 71,028 篇 其他
  • 6,434 篇 中文
  • 330 篇 日文
  • 229 篇 德文
  • 105 篇 法文
  • 83 篇 斯洛文尼亚文
  • 71 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 25 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
796498 条 记 录,以下是61-70 订阅
排序:
Lip-Reading with Visual Form Classification using Residual Networks and Bidirectional Gated Recurrent Units
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2023年 第2期4卷 375-386页
作者: Anni Suharjito Computer Science Department BINUS Graduate Program – Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Lip-reading is a method that focuses on the observation and interpretation of lip movements to understand spoken language. Previous studies have exclusively concentrated on a single variation of residual networks (Res... 详细信息
来源: 评论
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论
Gender Classification on Twitter Based on Feeds and User Descriptions Using Xlnet-Fasttext
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第20期48卷 71-80页
作者: Alandeta, Vito Rozaan Suhartono, Derwin Computer Science Department BINUS Graduate Program Bina Nusantara University Jakarta Indonesia
This study proposes a gender classification method for Twitter data using a hybrid XLNet-fastText model. The objective is to enhance gender classification accuracy by leveraging the contextual understanding of XLNet a... 详细信息
来源: 评论
SHA: QoS-Aware Software and Hardware Auto-Tuning for Database Systems
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 369-383页
作者: 李进 陈全 唐晓新 过敏意 Department of Computer Science Shanghai Jiao Tong UniversityShanghai 200240China Department of Computer Science and Technology Shanghai University of Finance and EconomicsShanghai 200433China
While databases are widely-used in commercial user-facing services that have stringent quality-of-service(QoS)requirement,it is crucial to ensure their good performance and minimize the hardware usage at the same *** ... 详细信息
来源: 评论
Linguistically Differentiating Acts and Recalls of Racial Microaggressions on Social Media
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW1期8卷 1-36页
作者: Gunturi, Uma Sushmitha Kumar, Anisha Ding, Xiaohan Rho, Eugenia H. Department of Computer Science Virginia Tech United States Department of Computer Science Virginia Tech United States
In this work, we examine the linguistic signature of online racial microaggressions (acts) and how it differs from that of personal narratives recalling experiences of such aggressions (recalls) by Black social media ... 详细信息
来源: 评论
Analyzing the Impacts of Dynamic Game Balancing in a Survival Roguelike Chess Game
Analyzing the Impacts of Dynamic Game Balancing in a Surviva...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and Information System, ICADEIS 2025
作者: Mario Arifin, Yulyani Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta Indonesia
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud... 详细信息
来源: 评论
A Trusted Medical Image Zero-watermarking Scheme Based On DCNN and Hyperchaotic System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4241-4253页
作者: Xiang, Ruotong Liu, Gang Dang, Min Wangn, Quan Pan, Rong Xidian University School of Computer Science & Technology China Xidian University Department of Computer Science & Technology China
The zero-watermarking methods provide a means of lossless, which was adopted to protect medical image copyright requiring high integrity. However, most existing studies have only focused on robustness and there has be... 详细信息
来源: 评论
Combined Deep Learning Approaches for Intrusion Detection Systems
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第19期18卷 144-155页
作者: Alshattnawi, Sawsan Alshboul, Hadeel Rida Department of Computer Science Yarmouk University Irbid Jordan Department of Computer Science World Islamic Science and Education University Amman Jordan
Cybersecurity has become increasingly important because of the widespread use of data and its enormous global storage. Hackers and other invaders always want to breach data security by interfering with network traffic... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and Technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 评论