咨询与建议

限定检索结果

文献类型

  • 425,951 篇 会议
  • 158,610 篇 期刊文献
  • 3,628 册 图书
  • 16 篇 学位论文

馆藏范围

  • 588,203 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,950 篇 工学
    • 229,359 篇 计算机科学与技术...
    • 187,035 篇 软件工程
    • 82,090 篇 信息与通信工程
    • 53,342 篇 控制科学与工程
    • 44,988 篇 电气工程
    • 44,130 篇 电子科学与技术(可...
    • 38,817 篇 生物工程
    • 28,669 篇 生物医学工程(可授...
    • 25,667 篇 光学工程
    • 24,351 篇 机械工程
    • 19,046 篇 化学工程与技术
    • 18,455 篇 仪器科学与技术
    • 17,588 篇 动力工程及工程热...
    • 15,023 篇 材料科学与工程(可...
    • 12,172 篇 安全科学与工程
    • 11,329 篇 交通运输工程
    • 11,045 篇 网络空间安全
  • 186,181 篇 理学
    • 94,732 篇 数学
    • 58,037 篇 物理学
    • 43,303 篇 生物学
    • 30,721 篇 统计学(可授理学、...
    • 21,682 篇 系统科学
    • 19,978 篇 化学
  • 86,268 篇 管理学
    • 51,819 篇 管理科学与工程(可...
    • 38,034 篇 图书情报与档案管...
    • 24,609 篇 工商管理
  • 26,108 篇 医学
    • 22,036 篇 临床医学
    • 19,940 篇 基础医学(可授医学...
    • 12,687 篇 药学(可授医学、理...
  • 15,472 篇 法学
    • 12,643 篇 社会学
  • 9,469 篇 经济学
  • 7,464 篇 农学
  • 6,352 篇 教育学
  • 2,634 篇 文学
  • 1,325 篇 军事学
  • 843 篇 艺术学
  • 103 篇 哲学
  • 57 篇 历史学

主题

  • 26,566 篇 computer science
  • 14,207 篇 accuracy
  • 13,955 篇 computational mo...
  • 13,610 篇 feature extracti...
  • 11,745 篇 deep learning
  • 11,448 篇 training
  • 10,505 篇 machine learning
  • 8,020 篇 predictive model...
  • 7,973 篇 data mining
  • 7,602 篇 support vector m...
  • 7,425 篇 computer archite...
  • 7,320 篇 optimization
  • 6,853 篇 real-time system...
  • 6,835 篇 neural networks
  • 6,744 篇 wireless sensor ...
  • 6,686 篇 data models
  • 6,503 篇 convolutional ne...
  • 6,417 篇 costs
  • 6,332 篇 algorithm design...
  • 6,225 篇 protocols

机构

  • 2,471 篇 school of comput...
  • 2,190 篇 school of comput...
  • 2,145 篇 chitkara univers...
  • 2,070 篇 school of comput...
  • 1,784 篇 school of comput...
  • 1,692 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,428 篇 school of comput...
  • 1,332 篇 department of co...
  • 1,318 篇 department of el...
  • 1,316 篇 school of comput...
  • 1,295 篇 school of electr...
  • 1,191 篇 school of comput...
  • 1,154 篇 college of compu...
  • 1,125 篇 department of el...
  • 1,001 篇 school of comput...
  • 1,000 篇 university of ch...
  • 971 篇 department of ph...
  • 951 篇 college of compu...
  • 948 篇 cavendish labora...

作者

  • 421 篇 niyato dusit
  • 325 篇 liu yang
  • 280 篇 yang yang
  • 252 篇 barter w.
  • 234 篇 wang wei
  • 229 篇 blake t.
  • 228 篇 s. chen
  • 227 篇 j. wang
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 215 篇 amato s.
  • 210 篇 brundu d.
  • 209 篇 boettcher t.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 j. m. izen
  • 191 篇 c. amelung

语言

  • 520,739 篇 英文
  • 60,711 篇 其他
  • 7,076 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 84 篇 德文
  • 55 篇 法文
  • 50 篇 斯洛文尼亚文
  • 15 篇 西班牙文
  • 12 篇 阿拉伯文
  • 11 篇 俄文
  • 7 篇 土耳其文
  • 6 篇 葡萄牙文
  • 5 篇 捷克文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
588205 条 记 录,以下是1611-1620 订阅
排序:
Cloud-Enabled Wireless Gesture Control System for Humanoid Bionic Arm Using IOT  2
Cloud-Enabled Wireless Gesture Control System for Humanoid B...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Geetha, S. Vichitra, S. Nithiya Shree, M. Sandhiya, V. Yuvarani, V. VSB Engineering College Computer Science and Engineering India
The Internet of Things (IOT) connects Tangible assets via data fusion facilitating information interchange. Ranging from basic temperature sensors to sophisticated industrial robots, IOT covers a wide range of applica... 详细信息
来源: 评论
Training Speech Recognition Model with Speech Synthesis and Text Discriminator
收藏 引用
Journal of Information science and engineering 2024年 第2期40卷 359-373页
作者: Lin, Hou-An Chen, Chia-Ping Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung804 Taiwan
In this paper, we build neural-network model-based automatic speech recognition (ASR) systems incrementally for performance improvement. First, we add an adversarial text discriminator module to train the speech recog... 详细信息
来源: 评论
Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers
收藏 引用
IEEE Access 2024年 12卷 82443-82468页
作者: Sana, Laraib Nazir, Muhammad Mohsin Yang, Jing Hussain, Lal Chen, Yen-Lin Ku, Chin Soon Alatiyyah, Mohammed Alateyah, Sulaiman Abdullah Por, Lip Yee Lahore College for Women University Department of Computer Science Punjab Lahore54000 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia The University of Azad Jammu and Kashmir Department of Computer Science and IT Neelum Campus Azad Kashmir13230 Pakistan King Abdullah Campus The University of Azad Jammu and Kashmir Department of Computer Science and IT Azad Kashmir Muzaffarabad13100 Pakistan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia Prince Sattam Bin Abdulaziz University College of Sciences and Humanities-Aflaj Department of Computer Science Al-Kharj16278 Saudi Arabia Qassim University College of Computer Department of Computer Engineering Buraydah52571 Saudi Arabia
The ever-expanding Internet of Things (IoT) landscape presents a double-edged sword. While it fosters interconnectedness, the vast amount of data generated by IoT devices creates a larger attack surface for cybercrimi... 详细信息
来源: 评论
Efficient Approximation Algorithms for Scheduling Coflows with Total Weighted Completion Time in Identical Parallel Networks
收藏 引用
IEEE Transactions on Cloud Computing 2024年 第1期12卷 116-129页
作者: Chen, Chi-Yeh National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
This article addresses the scheduling problem of coflows in identical parallel networks, a well-known NPNP-hard problem. We consider both flow-level scheduling and coflow-level scheduling problems. In the flow-level s... 详细信息
来源: 评论
An End-to-End Two-Branch Network Towards Robust Video Fingerprinting
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2371-2384页
作者: Xu, Yingying Zhou, Yuanding Li, Xinran Zhao, Gejian Qin, Chuan University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
With the increasing number of edited videos, many robust video fingerprinting schemes have been proposed to solve the problem of video content authentication. However, most of them either deal with the temporal and sp... 详细信息
来源: 评论
Multi-view GCN for loan default risk prediction
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12149-12162页
作者: Li, Zihao Chen, Yakun Wang, Xianzhi Yao, Lina Xu, Guandong School of Computer Science University of Technology Sydney Broadway SydneyNSW2007 Australia School of Computer Science and Engineering University of New South Wales Garden SydneyNSW2052 Australia
As a significant application of machine learning in financial scenarios, loan default risk prediction aims to evaluate the client’s default probability. However, most existing deep learning solutions treat each appli... 详细信息
来源: 评论
Pre-Routing Timing Prediction Across Different Technology Nodes
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2024年 第7期44卷 2697-2710页
作者: Zhang, Xinyun Zhu, Binwu Liu, Fangzhou Jiang, Jiaxi Wang, Ziyi Xu, Peng Xu, Hong Yu, Bei The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong Hong Kong
In the domain of Very-Large-Scale Integration (VLSI) design, the accuracy of pre-routing timing prediction is of paramount importance for ensuring the performance and reliability of integrated circuits. Traditional me... 详细信息
来源: 评论
Robust federated contrastive recommender system against targeted model poisoning attack
收藏 引用
science China(Information sciences) 2025年 第4期68卷 50-65页
作者: Wei YUAN Chaoqun YANG Liang QU Guanhua YE Quoc Viet Hung NGUYEN Hongzhi YIN School of Electrical Engineering and Computer Science The University of Queensland School of Information and Communication Technology Griffith University Deep Neural Computing Company Limited
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t... 详细信息
来源: 评论
Res-SRNN: Residual Spiking Recurrent Neural Network for Efficient Video Recognition
Res-SRNN: Residual Spiking Recurrent Neural Network for Effi...
收藏 引用
2024 International Annual Conference on Complex Systems and Intelligent science, CSIS-IAC 2024
作者: Zhang, Ya Luo, Xiaoling Sun, Qian Qu, Hong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering Sichuan University of Science and Engineering Yibin China
Action recognition in videos is a critical task in computer vision, with a wide range of applications including security surveillance, behavior analysis, and cooperative control. Despite significant advancements in ac... 详细信息
来源: 评论
Multilevel Thresholding-based Medical Image Segmentation using Hybrid Particle Cuckoo Swarm Optimization
收藏 引用
Recent Advances in computer science and Communications 2024年 第5期17卷 12-23页
作者: Kumar, Dharmendra Solanki, Anil Kumar Ahlawat, Anil Kumar Department of Computer Science & Engineering KIET Group of Institutions NCR Delhi Ghaziabad India Department of Computer Science & Engineering Bundelkhand Institute of Engineering and Technology Jhansi India Affiliated to Dr. APJ Abdul Kalam Technical University Lucknow India
Background: The most important aspect of medical image processing and analysis is image segmentation. Fundamentally, the outcomes of segmentation have an impact on all subsequent image testing methods, including objec... 详细信息
来源: 评论