咨询与建议

限定检索结果

文献类型

  • 421,959 篇 会议
  • 157,139 篇 期刊文献
  • 249 册 图书
  • 91 篇 学位论文

馆藏范围

  • 579,436 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 338,990 篇 工学
    • 228,056 篇 计算机科学与技术...
    • 186,494 篇 软件工程
    • 81,875 篇 信息与通信工程
    • 52,868 篇 控制科学与工程
    • 44,251 篇 电气工程
    • 43,501 篇 电子科学与技术(可...
    • 38,764 篇 生物工程
    • 28,555 篇 生物医学工程(可授...
    • 25,737 篇 光学工程
    • 24,229 篇 机械工程
    • 18,922 篇 化学工程与技术
    • 18,415 篇 仪器科学与技术
    • 17,496 篇 动力工程及工程热...
    • 14,270 篇 材料科学与工程(可...
    • 12,122 篇 安全科学与工程
    • 11,293 篇 交通运输工程
    • 10,936 篇 网络空间安全
  • 185,567 篇 理学
    • 94,346 篇 数学
    • 57,702 篇 物理学
    • 43,236 篇 生物学
    • 30,412 篇 统计学(可授理学、...
    • 21,671 篇 系统科学
    • 19,868 篇 化学
  • 86,050 篇 管理学
    • 51,684 篇 管理科学与工程(可...
    • 37,931 篇 图书情报与档案管...
    • 24,531 篇 工商管理
  • 25,977 篇 医学
    • 21,904 篇 临床医学
    • 19,840 篇 基础医学(可授医学...
    • 12,671 篇 药学(可授医学、理...
  • 15,408 篇 法学
    • 12,589 篇 社会学
  • 9,457 篇 经济学
  • 7,438 篇 农学
  • 6,279 篇 教育学
  • 2,643 篇 文学
  • 1,322 篇 军事学
  • 837 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,540 篇 computer science
  • 13,607 篇 computational mo...
  • 13,531 篇 accuracy
  • 13,322 篇 feature extracti...
  • 11,283 篇 deep learning
  • 11,212 篇 training
  • 10,183 篇 machine learning
  • 7,921 篇 data mining
  • 7,791 篇 predictive model...
  • 7,485 篇 support vector m...
  • 7,336 篇 computer archite...
  • 7,116 篇 optimization
  • 6,763 篇 neural networks
  • 6,732 篇 wireless sensor ...
  • 6,526 篇 data models
  • 6,440 篇 real-time system...
  • 6,372 篇 costs
  • 6,321 篇 algorithm design...
  • 6,260 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,431 篇 school of comput...
  • 2,167 篇 school of comput...
  • 2,132 篇 chitkara univers...
  • 2,011 篇 school of comput...
  • 1,745 篇 school of comput...
  • 1,635 篇 department of co...
  • 1,450 篇 school of comput...
  • 1,396 篇 school of comput...
  • 1,310 篇 department of co...
  • 1,307 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,270 篇 school of comput...
  • 1,125 篇 school of comput...
  • 1,079 篇 college of compu...
  • 1,076 篇 department of el...
  • 978 篇 university of ch...
  • 966 篇 department of ph...
  • 955 篇 school of comput...
  • 947 篇 college of compu...
  • 940 篇 cavendish labora...

作者

  • 413 篇 niyato dusit
  • 314 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 236 篇 s. chen
  • 234 篇 j. wang
  • 228 篇 wang wei
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 554,935 篇 英文
  • 17,606 篇 其他
  • 6,803 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 39 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
579438 条 记 录,以下是111-120 订阅
排序:
Weakly-supervised instance co-segmentation via tensor-based salient co-peak search
收藏 引用
Frontiers of computer science 2024年 第2期18卷 83-92页
作者: Wuxiu QUAN Yu HU Tingting DAN Junyu LI Yue ZHANG Hongmin CAI School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhou 510665China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c... 详细信息
来源: 评论
Informative task classification with concatenated embeddings using deep learning on crisisMMD
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 123-140页
作者: Jain, Tarun Gopalani, Dinesh Kumar Meena, Yogesh Department of Computer Science and Engineering Manipal University Jaipur Jaipur India Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur India
Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p... 详细信息
来源: 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and Technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 评论
Unsupervised spectral feature selection algorithms for high dimensional data
收藏 引用
Frontiers of computer science 2023年 第5期17卷 27-40页
作者: Mingzhao WANG Henry HAN Zhao HUANG Juanying XIE School of Computer Science Shaanxi Normal UniversityXi’an 710119China Department of Computer Science School of Engineering&Computer ScienceBaylor UniversityWacoTX 76798USA
It is a significant and challenging task to detect the informative features to carry out explainable analysis for high dimensional data,especially for those with very small number of *** selection especially the unsup... 详细信息
来源: 评论
Deep learning for code generation: a survey
收藏 引用
science China(Information sciences) 2024年 第9期67卷 5-40页
作者: Huangzhao ZHANG Kechi ZHANG Zhuo LI Jia LI Jia LI Yongmin LI Yunfei ZHAO Yuqi ZHU Fang LIU Ge LI Zhi JIN Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education School of Computer Science Peking University School of Computer Science and Engineering Beihang University
In the past decade, thanks to the powerfulness of deep-learning techniques, we have witnessed a whole new era of automated code generation. To sort out developments, we have conducted a comprehensive review of solutio... 详细信息
来源: 评论
Application of human activity/action recognition: a review
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: sedaghati, Nazanin ardebili, Sondos Ghaffari, Ali Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering Faculty of Engineering and Natural Science Istinye University Istanbul Turkey Department of Computer Science Khazar University Baku Azerbaijan
Human activity recognition is a crucial domain in computer science and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Proposing a digital twin-based sustainable water governance system for rural Indian villages
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1777-1783页
作者: Singh, Dineshkumar Sharma, Vishnu Department of Computer Science and Engineering Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India Department of Computer Science and Application Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ... 详细信息
来源: 评论
Genetic algorithm based data controlling method using IoT enabled WSNs
收藏 引用
Soft Computing 2025年 第5期29卷 2465-2482页
作者: Singh, Samayveer Nandan, Aridaman Singh Sikka, Geeta Malik, Aruna Singh, Pradeep Kumar Department of Computer Science and Engineering National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Delhi India Department of Computer Science and Engineering Central University of Jammu J&K Jammu India
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) is not only constitute an encouraging research domain but also represent a promising industrial trend that permits the development of various IoT-based ... 详细信息
来源: 评论
Towards kernelizing the classifier for hyperbolic data
收藏 引用
Frontiers of computer science 2024年 第1期18卷 17-31页
作者: Meimei YANG Qiao LIU Xinkai SUN Na SHI Hui XUE School of Computer Science and Engineering Southeast UniversityNanjing 210096China MOE Key Laboratory of Computer Science and Information Integration(Southeast University) Nanjing 210096China
Data hierarchy,as a hidden property of data structure,exists in a wide range of machine learning applications.A common practice to classify such hierarchical data is first to encode the data in the Euclidean space,and... 详细信息
来源: 评论