咨询与建议

限定检索结果

文献类型

  • 422,339 篇 会议
  • 159,477 篇 期刊文献
  • 3,573 册 图书
  • 103 篇 学位论文

馆藏范围

  • 585,490 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,343 篇 工学
    • 229,511 篇 计算机科学与技术...
    • 187,126 篇 软件工程
    • 82,634 篇 信息与通信工程
    • 53,426 篇 控制科学与工程
    • 45,381 篇 电气工程
    • 44,070 篇 电子科学与技术(可...
    • 38,835 篇 生物工程
    • 28,652 篇 生物医学工程(可授...
    • 25,906 篇 光学工程
    • 24,540 篇 机械工程
    • 19,094 篇 化学工程与技术
    • 18,530 篇 仪器科学与技术
    • 17,613 篇 动力工程及工程热...
    • 14,553 篇 材料科学与工程(可...
    • 12,212 篇 安全科学与工程
    • 11,401 篇 交通运输工程
    • 11,270 篇 网络空间安全
  • 186,829 篇 理学
    • 94,902 篇 数学
    • 58,266 篇 物理学
    • 43,445 篇 生物学
    • 30,572 篇 统计学(可授理学、...
    • 21,717 篇 系统科学
    • 20,098 篇 化学
  • 86,424 篇 管理学
    • 51,880 篇 管理科学与工程(可...
    • 38,144 篇 图书情报与档案管...
    • 24,589 篇 工商管理
  • 26,246 篇 医学
    • 22,036 篇 临床医学
    • 19,953 篇 基础医学(可授医学...
    • 12,691 篇 药学(可授医学、理...
  • 15,424 篇 法学
    • 12,599 篇 社会学
  • 9,484 篇 经济学
  • 7,474 篇 农学
  • 6,319 篇 教育学
  • 2,648 篇 文学
  • 1,323 篇 军事学
  • 845 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,541 篇 computer science
  • 13,630 篇 computational mo...
  • 13,551 篇 accuracy
  • 13,362 篇 feature extracti...
  • 11,440 篇 deep learning
  • 11,245 篇 training
  • 10,463 篇 machine learning
  • 7,932 篇 data mining
  • 7,808 篇 predictive model...
  • 7,487 篇 support vector m...
  • 7,342 篇 computer archite...
  • 7,199 篇 optimization
  • 6,784 篇 neural networks
  • 6,738 篇 wireless sensor ...
  • 6,539 篇 data models
  • 6,445 篇 real-time system...
  • 6,367 篇 costs
  • 6,321 篇 algorithm design...
  • 6,281 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,441 篇 school of comput...
  • 2,184 篇 school of comput...
  • 2,135 篇 chitkara univers...
  • 2,033 篇 school of comput...
  • 1,755 篇 school of comput...
  • 1,668 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,405 篇 school of comput...
  • 1,318 篇 department of co...
  • 1,300 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,285 篇 school of comput...
  • 1,141 篇 school of comput...
  • 1,103 篇 department of el...
  • 1,096 篇 college of compu...
  • 989 篇 university of ch...
  • 976 篇 school of comput...
  • 969 篇 department of ph...
  • 953 篇 college of compu...
  • 943 篇 cavendish labora...

作者

  • 423 篇 niyato dusit
  • 336 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 237 篇 wang wei
  • 234 篇 s. chen
  • 232 篇 j. wang
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 560,582 篇 英文
  • 17,984 篇 其他
  • 6,848 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 40 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
585492 条 记 录,以下是141-150 订阅
排序:
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
From Centralization to Decentralization: Blockchain’s Role in Transforming Social Media Platforms
收藏 引用
IEEE Access 2025年 13卷 80478-80507页
作者: Sarkar Diba, Bidita Dutta Plabon, Jayonto Tasnim, Nishat Hossain, Mehjabin Mistry, Durjoy Sarker, Sourav Mridha, M.F. Okuyama, Yuichi Shin, Jungpil University of Asia Pacific Department of Computer Science and Engineering Dhaka1215 Bangladesh Chittagong University of Engineering and Technology Department of Civil Engineering Chittagong4349 Bangladesh American International University Department of Computer Science and Engineering Dhaka1215 Bangladesh University of Aizu Department of Computer Science and Engineering Fukushima Aizuwakamatsu956-8580 Japan
Blockchain is influencing the social media platforms by promising to solve the biggest issues of today, such as privacy concerns and content moderation, and the ability to provide a decentralized system for the manage... 详细信息
来源: 评论
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 239-258页
作者: Long Cai Ke Gu Jiaqi Lei School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer... 详细信息
来源: 评论
Steel Surface Defect Detection Algorithm Based on S-YOLOv8
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 644-652页
作者: Zhang, Xu Cui, Wenhua Tao, Ye Shi, Tianwei School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China
Steel, being a widely utilized material in industrial production, holds a pivotal role in ensuring product safety and longevity. Hence, the exploration and implementation of steel surface defect detection technology c... 详细信息
来源: 评论
computer and Information science and engineering  1
收藏 引用
丛书名: Studies in Computational Intelligence
1000年
作者: Roger Lee
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
PosParser: A Heuristic Online Log Parsing Method Based on Part-of-Speech Tagging
收藏 引用
IEEE Transactions on Big Data 2025年 第3期11卷 1334-1345页
作者: Jiang, Jinzhao Fu, Yuanyuan Xu, Jian Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Log parsing, the process of transforming raw logs into structured data, is a key step in the complex computer system's intelligent operation and maintenance and therefore has received extensive attention. Among al... 详细信息
来源: 评论
Leveraging variant of CAE with sparse convolutional embedding and two-stage application-driven data augmentation for image clustering
收藏 引用
Soft Computing 2025年 第3期29卷 1419-1435页
作者: Liu, Yanming Liu, Jinglei School of Computer Science and Engineering Yantai University Yantai264005 China
Existing deep clustering approaches often struggle with redundant feature learning, which limits their effectiveness. The primary goal of this study is to address these issues by developing a more robust deep clusteri... 详细信息
来源: 评论
Skin cancer detection using optimized mask R-CNN and two-fold-deep-learning-classifier framework
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Reddy, Akepati Sankar M.P, Gopinath School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow... 详细信息
来源: 评论
CMOS Design of Ternary Arithmetic Devices Wu Xunwei *** Electronic engineering,Hangzhou University,Hangzhou 310028F.P rosser *** computer science,Indiana University,U.S.A.
收藏 引用
Journal of computer science & Technology 1991年 第4期6卷 376-382页
作者: 吴训威 F.Prosser Dept.of Electronic Engineering Hangzhou UniversityHangzhou 310028 Dept.of Computer Science Indiana UniversityU.S.A.
This paper presents CMOS circuit designs of a ternary adder and a ternary multiplier,formulated using transmission function *** carry signals appearing in these designs allow conventional look-ahead carry techniques t... 详细信息
来源: 评论