咨询与建议

限定检索结果

文献类型

  • 21,713 篇 会议
  • 14,320 篇 期刊文献
  • 493 册 图书

馆藏范围

  • 36,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,312 篇 工学
    • 12,264 篇 计算机科学与技术...
    • 9,957 篇 软件工程
    • 5,461 篇 控制科学与工程
    • 4,073 篇 信息与通信工程
    • 3,100 篇 电气工程
    • 2,539 篇 电子科学与技术(可...
    • 2,136 篇 生物工程
    • 2,131 篇 机械工程
    • 1,679 篇 生物医学工程(可授...
    • 1,327 篇 光学工程
    • 1,175 篇 动力工程及工程热...
    • 1,169 篇 仪器科学与技术
    • 1,057 篇 化学工程与技术
    • 798 篇 交通运输工程
    • 793 篇 材料科学与工程(可...
    • 723 篇 安全科学与工程
  • 12,614 篇 理学
    • 6,538 篇 数学
    • 3,196 篇 物理学
    • 2,634 篇 系统科学
    • 2,550 篇 生物学
    • 2,170 篇 统计学(可授理学、...
    • 1,140 篇 化学
  • 5,003 篇 管理学
    • 3,404 篇 管理科学与工程(可...
    • 1,737 篇 图书情报与档案管...
    • 1,628 篇 工商管理
  • 1,765 篇 医学
    • 1,459 篇 临床医学
    • 1,220 篇 基础医学(可授医学...
    • 722 篇 药学(可授医学、理...
  • 871 篇 法学
    • 730 篇 社会学
  • 630 篇 经济学
    • 622 篇 应用经济学
  • 372 篇 农学
  • 362 篇 教育学
  • 87 篇 文学
  • 69 篇 军事学
  • 57 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,257 篇 computer science
  • 1,041 篇 control systems
  • 529 篇 deep learning
  • 501 篇 computational mo...
  • 443 篇 machine learning
  • 415 篇 artificial intel...
  • 364 篇 robustness
  • 354 篇 optimization
  • 348 篇 feature extracti...
  • 331 篇 systems engineer...
  • 324 篇 accuracy
  • 305 篇 neural networks
  • 299 篇 application soft...
  • 295 篇 training
  • 291 篇 internet of thin...
  • 279 篇 support vector m...
  • 277 篇 mathematical mod...
  • 265 篇 laboratories
  • 258 篇 computer archite...
  • 231 篇 testing

机构

  • 61 篇 department of el...
  • 58 篇 hubei key labora...
  • 54 篇 department of sy...
  • 46 篇 college of contr...
  • 44 篇 department of co...
  • 43 篇 shanghai key lab...
  • 43 篇 department of co...
  • 42 篇 department of co...
  • 42 篇 department of el...
  • 42 篇 department of la...
  • 37 篇 school of automa...
  • 37 篇 department of co...
  • 37 篇 department of el...
  • 36 篇 department of ad...
  • 35 篇 academy of mathe...
  • 35 篇 department of co...
  • 35 篇 department of el...
  • 35 篇 department of in...
  • 34 篇 department of co...
  • 34 篇 ieee

作者

  • 99 篇 niyato dusit
  • 59 篇 li li
  • 52 篇 hisao ishibuchi
  • 38 篇 bernhard schölko...
  • 38 篇 m. zahn
  • 34 篇 e. rogers
  • 32 篇 sofotasios pasch...
  • 32 篇 long wang
  • 27 篇 abdelwahed motwa...
  • 26 篇 hong choong seon
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 tao yang
  • 24 篇 liu jiaming
  • 23 篇 wang lei
  • 22 篇 zhang lei
  • 22 篇 henrik sandberg
  • 22 篇 lindemann lars
  • 22 篇 jiang liu
  • 22 篇 rojas cristian r...
  • 22 篇 shen xuemin

语言

  • 34,917 篇 英文
  • 1,187 篇 其他
  • 357 篇 中文
  • 60 篇 日文
  • 9 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
检索条件"机构=Computer Science and Control Systems Engineering Department"
36526 条 记 录,以下是211-220 订阅
排序:
Pervasive Indoor User Identification Leveraging Mobile Single Station Localization
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15224-15237页
作者: Nie, Wendi Liu, Zexing Wang, Xiaoyang Duan, Yaoxin Lam, Kam-Yiu Liu, Kai Ng, Joseph K. Y. Xue, Chun Jason Gui, Guan Ministry of Education Key Laboratory of Industrial Internet of Things and Networked Control China Chongqing University of Posts and Telecommunications School of Automation/School of Industrial Internet Chongqing40065 China Institute of Industrial Internet Chongqing401120 China City University of Hong Kong Computer Science Department Hong Kong Chongqing University College of Computer Science Chongqing400030 China Hong Kong Baptist University Computer Science Department Hong Kong Mohamed Bin Zayed University of Artificial Intelligence Department of Computer Science Abu Dhabi United Arab Emirates Nanjing University of Posts and Telecommunications College of Telecommunications and Information Engineering Nanjing210003 China
The utilization of Wi-Fi-based technology for pervasive indoor user identification has gained prominence due to its cost-effective nature and compatibility with user devices. Previous works proposed capturing the medi... 详细信息
来源: 评论
Disentangling Spatio-Temporal Knowledge for Weakly Supervised Object Detection and Segmentation in Surgical Video
Disentangling Spatio-Temporal Knowledge for Weakly Supervise...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Liao, Guiqiu Jogan, Matjaz Koushik, Sai Eaton, Eric Hashimoto, Daniel A. University of Pennsylvania Pcaso Laboratory Department of Surgery United States University of Pennsylvania Department of Electrical and Systems Engineering United States University of Pennsylvania Department of Computer and Information Science United States
Weakly supervised video object segmentation (WSVOS) enables the identification of segmentation maps without requiring extensive annotations of object masks, relying instead on coarse video labels indicating object pre... 详细信息
来源: 评论
Evaluating the Impact on Usability and Acceptance of ECAs in m-Health Applications for Older Adults  11
Evaluating the Impact on Usability and Acceptance of ECAs in...
收藏 引用
11th International Conference on Information and Communication Technologies for Ageing Well and e-Health, ICT4AWE 2025
作者: Gilaberte, Raquel Lacuesta Bagdasari, Eva Cerezo Navarro-Alamán, Javier EUPT Universidad de Zaragoza Spain EINA Universidad de Zaragoza Spain Department of Computer Science and Engineering of Systems EUPT Universidad de Zaragoza Spain
In the context of m-health applications, developing user-friendly interfaces to improve usability and acceptance by older adults has become a prominent research topic. The use of embodied conversational agents (ECAs) ... 详细信息
来源: 评论
UAV -Based Object Tracking Using Siamese Networks and Kalman Filtering
UAV -Based Object Tracking Using Siamese Networks and Kalman...
收藏 引用
2025 International Conference on Multi-Agent systems for Collaborative Intelligence, ICMSCI 2025
作者: Ramanan, S.V. Rajasekar, M. Shanmugapriya, G. Sujitha, R. Akshya, J. Choudhry, Mani Deepak P Pg Institute of Technology Department of Electronics and Communication Engineering Coimbatore India Vsb college of Engineering Department of Computer Science and Engineering Technical Campus Coimbatore India Dr.N G.P Institute of Technology Department of Computer Science and Business Systems Coimbatore India Christ The King Engineering College Department of Information Technology Coimbatore India Srm Institute of Science and Technology Department of Computational Intelligence Chennai India Srm Institute of Science and Technology Department of Computing Technologies Chennai India
The ability to match features and keep track of objects in changing dynamic environments is still an important problem, particularly due to varying noise levels, diverse datasets, and high dimensional feature spaces. ... 详细信息
来源: 评论
Scanning the Issue
收藏 引用
IEEE Transactions on Intelligent Transportation systems 2025年 第1期26卷 3-21页
作者: Simona Sacone Department of Computer Science Bioengineering Robotics and Systems Engineering University of Genova Genova Italy
“Scanning the Issue.“
来源: 评论
Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery  25
Achilles: Efficient TEE-Assisted BFT Consensus via Rollback ...
收藏 引用
20th European Conference on computer systems, EuroSys 2025, co-located 30th ACM International Conference on Architectural Support for Programming Languages and Operating systems, ASPLOS 2025
作者: Niu, Jianyu Wen, Xiaoqing Wu, Guanlong Liu, Shenqi Yu, Jianshan Zhang, Yinqian SUSTech China University of British Columbia Canada University of Sydney Australia Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering SUSTech China
BFT consensus that uses Trusted Execution Environments (TEEs) to improve the system tolerance and performance is gaining popularity. However, existing works suffer from TEE rollback issues, resulting in a tolerance-pe... 详细信息
来源: 评论
Anomaly-Based Detection of Log4j Attack in SDN
Anomaly-Based Detection of Log4j Attack in SDN
收藏 引用
International Conference on Smart systems and Wireless Communication, SSWC 2024
作者: Deshmukh, Pruthviraj Nitin Harish, R. Sangeetha, V. Praveen, K. TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani India
The widely used Java library Log4j logging framework has lately come under attack from a major vulnerability known as CVE-2021–44228, also known as Log4Shell. Through the use of malicious log messages, the vulnerabil... 详细信息
来源: 评论
Prior-Boosted GRL: Microarchitecture Design Space Exploration via Graph Representation Learning
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年 第3期44卷 1141-1154页
作者: Wu, Zheng Shen, Jinyi Yi, Xiaoling Shang, Li Yang, Fan Zeng, Xuan Fudan University State Key Laboratory of Integrated Circuits and Systems The School of Microelectronics Shanghai200433 China Fudan University State Key Laboratory of Integrated Circuits and Systems Shanghai200433 China KU Leuven Department of Electrical Engineering Microelectronics Circuits and Systems Leuven3000 Belgium Fudan University State Key Laboratory of Integrated Circuits and Systems The School of Computer Science Shanghai200433 China
The design space exploration (DSE) of contemporary microprocessors faces a significant challenge of high-computational cost. In this context, we introduce Prior-boosted graph representation learning (GRL), a novel fra... 详细信息
来源: 评论
An Energy Efficient Hybrid Communication Protocol for Large Area Wireless Sensor Networks  4
An Energy Efficient Hybrid Communication Protocol for Large ...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karthigeyan, Shreyas Bhol, Sampark Jain, Akshat Yadav, Karthik Sinha, Akash Padma Priya, R. School of Computer Science and Information Systems Vellore Institute of Technology Vellore Campus Tamil Nadu Vellore632014 India School of Computer Science and Engineering Vellore Institute of Technology Vellore Campus Tamil Nadu Vellore632014 India Department of Computer Science and Engineering Maulana Azad National Institute of Technology Madhya Pradesh Bhopal462003 India
Energy conservation is an indispensable aspect of the protocols designed for Wireless Sensor Networks (WSNs). The communication protocols for WSN fall mainly under two categories: centralized and distributed. Centrali... 详细信息
来源: 评论
Optimizing the LSTM Model for Electricity Price Forecasting Using the MSADBO Algorithm
Optimizing the LSTM Model for Electricity Price Forecasting ...
收藏 引用
2025 IEEE Texas Power and Energy Conference, TPEC 2025
作者: Ahmadvand, Fatemeh Imani, Mahmood Hosseini Andani, Hamid Taheri Andani, Mansour Taheri Politecnico di Torino Department of Control and Computer Engineering Torino Italy Torino Italy Isfahan University of Technology Department of Electronic Engineering Isfahan Iran School of Manufacturing Systems and Networks Arizona State University TempeAZ United States
Achieving accurate electricity price prediction is essential for market participants aiming to maximize their profits. In this respect, forecasting wholesale electricity market price plays a pivotal role. The advanced... 详细信息
来源: 评论