咨询与建议

限定检索结果

文献类型

  • 425,274 篇 会议
  • 158,517 篇 期刊文献
  • 3,628 册 图书
  • 103 篇 学位论文

馆藏范围

  • 587,520 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,870 篇 工学
    • 229,854 篇 计算机科学与技术...
    • 187,677 篇 软件工程
    • 82,294 篇 信息与通信工程
    • 53,450 篇 控制科学与工程
    • 44,630 篇 电气工程
    • 43,853 篇 电子科学与技术(可...
    • 38,858 篇 生物工程
    • 28,708 篇 生物医学工程(可授...
    • 26,003 篇 光学工程
    • 24,375 篇 机械工程
    • 19,029 篇 化学工程与技术
    • 18,514 篇 仪器科学与技术
    • 17,580 篇 动力工程及工程热...
    • 14,363 篇 材料科学与工程(可...
    • 12,213 篇 安全科学与工程
    • 11,363 篇 交通运输工程
    • 11,054 篇 网络空间安全
  • 186,622 篇 理学
    • 94,847 篇 数学
    • 58,127 篇 物理学
    • 43,347 篇 生物学
    • 30,607 篇 统计学(可授理学、...
    • 21,706 篇 系统科学
    • 19,963 篇 化学
  • 86,491 篇 管理学
    • 51,971 篇 管理科学与工程(可...
    • 38,104 篇 图书情报与档案管...
    • 24,693 篇 工商管理
  • 26,189 篇 医学
    • 22,106 篇 临床医学
    • 20,002 篇 基础医学(可授医学...
    • 12,677 篇 药学(可授医学、理...
  • 15,500 篇 法学
    • 12,658 篇 社会学
  • 9,488 篇 经济学
  • 7,501 篇 农学
  • 6,366 篇 教育学
  • 2,638 篇 文学
  • 1,327 篇 军事学
  • 839 篇 艺术学
  • 104 篇 哲学
  • 57 篇 历史学

主题

  • 26,551 篇 computer science
  • 13,933 篇 accuracy
  • 13,813 篇 computational mo...
  • 13,484 篇 feature extracti...
  • 11,621 篇 deep learning
  • 11,350 篇 training
  • 10,456 篇 machine learning
  • 7,947 篇 data mining
  • 7,927 篇 predictive model...
  • 7,558 篇 support vector m...
  • 7,387 篇 computer archite...
  • 7,253 篇 optimization
  • 6,795 篇 neural networks
  • 6,742 篇 wireless sensor ...
  • 6,662 篇 real-time system...
  • 6,620 篇 data models
  • 6,473 篇 convolutional ne...
  • 6,383 篇 costs
  • 6,321 篇 algorithm design...
  • 6,215 篇 protocols

机构

  • 2,475 篇 school of comput...
  • 2,182 篇 school of comput...
  • 2,144 篇 chitkara univers...
  • 2,067 篇 school of comput...
  • 1,770 篇 school of comput...
  • 1,676 篇 department of co...
  • 1,472 篇 school of comput...
  • 1,438 篇 school of comput...
  • 1,316 篇 department of co...
  • 1,314 篇 school of comput...
  • 1,310 篇 school of electr...
  • 1,291 篇 department of el...
  • 1,178 篇 school of comput...
  • 1,155 篇 college of compu...
  • 1,118 篇 department of el...
  • 997 篇 university of ch...
  • 995 篇 school of comput...
  • 968 篇 department of ph...
  • 957 篇 college of compu...
  • 945 篇 cavendish labora...

作者

  • 427 篇 niyato dusit
  • 326 篇 liu yang
  • 282 篇 yang yang
  • 244 篇 barter w.
  • 243 篇 wang wei
  • 231 篇 j. wang
  • 229 篇 s. chen
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung

语言

  • 552,067 篇 英文
  • 28,447 篇 其他
  • 7,001 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 68 篇 德文
  • 40 篇 法文
  • 29 篇 斯洛文尼亚文
  • 16 篇 西班牙文
  • 9 篇 俄文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 5 篇 荷兰文
  • 4 篇 阿拉伯文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
587522 条 记 录,以下是991-1000 订阅
排序:
Hierarchical blockchain-based secure data storage in cloud using Merkle tree approach
收藏 引用
International Journal of Cloud Computing 2024年 第6期13卷 605-626页
作者: Bruno, Judy Flavia Chelliah, Balika J. Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India
An authenticated manager must reinforce huge applications and operating systems, keeping information in the cloud while resisting potentially unreliable service providers. This article explores the presence of multipl... 详细信息
来源: 评论
Multi-Scale Binocular Stereo Matching Based on Semantic Association
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1010-1022页
作者: Jin ZHENG Botao JIANG Wei PENG Qiaohui ZHANG State Key Laboratory of Virtual Reality Techonology and Systems Beihang University School of Computer Science and Engineering Beihang University
Aiming at the low accuracy of existing binocular stereo matching and depth estimation methods, this paper proposes a multi-scale binocular stereo matching network based on semantic association. A semantic association ... 详细信息
来源: 评论
Augmented reality without SLAM
收藏 引用
Multimedia Tools and Applications 2024年 1-17页
作者: Gholami, Aminreza Nasihatkon, Behrooz Soryani, Mohsen School of Computer Engineering Iran University of Science and Technology Tehran Iran School of Computer Engineering K. N. Toosi University of Technology Tehran Iran
Most augmented reality (AR) pipelines typically involve the computation of the camera’s pose in each frame, followed by the 2D projection of virtual objects. The camera pose estimation is commonly implemented as SLAM... 详细信息
来源: 评论
"affectAlchemy": An Affective Dataset Based on Plutchik's Psychological Model for Text-Based Emotion Recognition and its Analysis Using ML Techniques  8
"affectAlchemy": An Affective Dataset Based on Plutchik's Ps...
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Kapase, Ajay Uke, Nilesh Savant, Jatin Desai, Mrunali Ghatage, Shravani Rahangdale, Atul Vishwakarma Institute of Information Technology Computer Science & Engineering Pune India Trinity Academy of Engineering Computer Science & Engineering Pune India KITs College of Engineering Computer Science & Engineering Kolhapur India
A technique to identify people's attitudes, and sentiments towards specified targets such as things, services, and subjects, is called sentiment analysis. As a dedicated subset of NLP, it deals with predicting spe... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 719-738页
作者: Tajinder Kumar Purushottam Sharma Xiaochun Cheng Sachin Lalar Shubham Kumar Sandhya Bansal Computer Science&Engineering Department Jai Parkash Mukand Lal Innovative Engineering&Technology InstituteRadaur135133HaryanaIndia School of Computer Science&Engineering Galgotias UniversityGreater Noida203201Uttar PradeshIndia Computer Science Department Bay Campus Fabian WaySwansea UniversitySwanseaSA18ENUK Department of Engineering and Technology Gurugram UniversityGurugram122003India Presidency School of Computer Science Presidency UniversityBangalore560089India Maharishi Markendeshwar Engineering College Maharishi Markandeshwar(Deemed to be)UniversityMullanaAmbala133203India
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this... 详细信息
来源: 评论
Enhancing Prediction Accuracy with an Innovative Hybrid Fuzzy Time Series Framework
收藏 引用
SN computer science 2025年 第2期6卷 1-11页
作者: Gogoi, Abhijit Borah, Bhogeswar Department of Computer Science and Engineering Tezpur University Naapam Assam Tezpur 784028 India Department of Computer Science and Engineering Dibrugarh Uiversity Dibrugarh India
This study introduces a new hybrid fuzzy time series (FTS) model designed to improve forecasting abilities by independently applying forecasting techniques using both overlapping and non-overlapping partitions. By lev... 详细信息
来源: 评论
Hyperelliptic curve signcryption based privacy preserving message authentication and fuzzy TOPSIS-based trust management scheme for fog enabled VANET
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第1期17卷 247-261页
作者: Govindaraju, Kaladi Sreenath, N. Department of Computer Science and Engineering Puducherry Technological University Puducherry 605014 India Department of Computer Science and Engineering Aditya University Surampalem 533437 India
In open-access and self-organized network like Vehicular Ad Hoc Network (VANETs), privacy and trust are two dimensions of security which need to be enforced for preventing and mitigating the possible compromization of... 详细信息
来源: 评论
Reinforcement imitation learning for reliable and efficient autonomous navigation in complex environments
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 11945-11961页
作者: Kumar, Dharmendra Computer Science and Engineering United College of Engineering and Research Uttar Pradesh Naini Prayagraj211010 India
Reinforcement learning (RL) and imitation learning (IL) are quite two useful machine learning techniques that were shown to be potential in enhancing navigation performance. Basically, both of these methods try to fin... 详细信息
来源: 评论
CDS: Coupled Data Storage to Enhance Read Performance of 3D TLC NAND Flash Memory
收藏 引用
IEEE Transactions on computers 2024年 第3期73卷 694-707页
作者: Wu, Wan-Ling Hsieh, Jen-Wei Ku, Hao-Yu National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Due to the strong demand of massive storage capacity, the density of flash memory has been improved in terms of technology node scaling, multi-bit per cell technique, and 3D stacking. However, these techniques also de... 详细信息
来源: 评论