咨询与建议

限定检索结果

文献类型

  • 7,627 篇 会议
  • 3,537 篇 期刊文献
  • 248 册 图书

馆藏范围

  • 11,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,287 篇 工学
    • 4,621 篇 计算机科学与技术...
    • 3,521 篇 软件工程
    • 1,598 篇 信息与通信工程
    • 820 篇 控制科学与工程
    • 805 篇 电气工程
    • 738 篇 电子科学与技术(可...
    • 700 篇 生物工程
    • 505 篇 生物医学工程(可授...
    • 391 篇 光学工程
    • 372 篇 机械工程
    • 307 篇 化学工程与技术
    • 301 篇 动力工程及工程热...
    • 250 篇 安全科学与工程
    • 223 篇 仪器科学与技术
    • 219 篇 网络空间安全
    • 190 篇 材料科学与工程(可...
    • 185 篇 交通运输工程
  • 3,782 篇 理学
    • 2,012 篇 数学
    • 1,216 篇 物理学
    • 786 篇 生物学
    • 543 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 317 篇 化学
  • 1,506 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 754 篇 图书情报与档案管...
    • 412 篇 工商管理
  • 421 篇 医学
    • 367 篇 临床医学
    • 346 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 311 篇 法学
    • 254 篇 社会学
  • 171 篇 经济学
  • 143 篇 农学
  • 56 篇 教育学
  • 49 篇 文学
  • 14 篇 军事学
  • 5 篇 艺术学

主题

  • 674 篇 computer science
  • 268 篇 feature extracti...
  • 212 篇 computational mo...
  • 179 篇 computer archite...
  • 171 篇 support vector m...
  • 166 篇 deep learning
  • 156 篇 machine learning
  • 152 篇 optimization
  • 149 篇 costs
  • 147 篇 bandwidth
  • 142 篇 protocols
  • 141 篇 routing
  • 134 篇 accuracy
  • 126 篇 neural networks
  • 124 篇 quality of servi...
  • 122 篇 application soft...
  • 122 篇 wireless sensor ...
  • 122 篇 algorithm design...
  • 122 篇 hardware
  • 120 篇 throughput

机构

  • 415 篇 department of co...
  • 281 篇 warsaw universit...
  • 197 篇 department of co...
  • 161 篇 wayne state univ...
  • 158 篇 yerevan physics ...
  • 154 篇 university of sc...
  • 148 篇 department of ph...
  • 145 篇 centro brasileir...
  • 144 篇 universidad iber...
  • 144 篇 national and kap...
  • 143 篇 istanbul technic...
  • 142 篇 university of sp...
  • 140 篇 brunel universit...
  • 139 篇 wigner research ...
  • 138 篇 indian institute...
  • 137 篇 institut für ker...
  • 136 篇 academy of scien...
  • 136 篇 helsinki institu...
  • 133 篇 università di to...
  • 131 篇 infn sezione di ...

作者

  • 161 篇 t. k. nayak
  • 152 篇 m. r. cosentino
  • 138 篇 a. k. bhati
  • 136 篇 l. valencia palo...
  • 134 篇 y. zhang
  • 129 篇 m. bombara
  • 125 篇 k. oyama
  • 124 篇 d. röhrich
  • 120 篇 o. karavichev
  • 120 篇 s. das
  • 119 篇 p. kurashvili
  • 119 篇 s. grigoryan
  • 117 篇 d. peresunko
  • 116 篇 r. bailhache
  • 113 篇 t. b. skaali
  • 113 篇 b. mohanty
  • 111 篇 i. pshenichnov
  • 111 篇 a. kisiel
  • 108 篇 z. vilakazi
  • 104 篇 l. didenko

语言

  • 10,832 篇 英文
  • 536 篇 其他
  • 53 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Computer Science and Engineering Indian Institute of Technology Jammu"
11412 条 记 录,以下是21-30 订阅
排序:
Influence Maximization with Tag Revisited: Exploiting the Bi-submodularity of the Tag-Based Influence Function  9th
Influence Maximization with Tag Revisited: Exploiting the ...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Tekawade, Atharva Banerjee, Suman Department of Computer Science and Engineering Indian Institute of Technology Jammu Jammu181221 India
Given a Social Network how to select a small number of influential users to maximize the influence in the network has been studied extensively in the past two decades and formally referred to as the Influence Maximiza... 详细信息
来源: 评论
Analyzing Hierarchical Relationships and Quality of Embedding in Latent Space
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 843-858页
作者: Chatterjee, Ankita Mukherjee, Jayanta Das, Partha Pratim Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Kharagpur721302 India
Existing learning models partition the generated representations using hyperplanes which form well defined groups of similar embeddings that is uniquely mapped to a particular class. However, in practical applications... 详细信息
来源: 评论
A novel binary quantizer for variational autoencoder-based image compressor
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 604-620页
作者: Thulasidharan, Pillai Praveen Nath, Keshab Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam India
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t... 详细信息
来源: 评论
Automatic Creation of Ontologies and Rules from ML Models for Access Control in IoT  15
Automatic Creation of Ontologies and Rules from ML Models fo...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Tyagi, Surendra Jinwala, Devesh C. Bhattacharjee, Subhasis Computer Science & Engineering Indian Institute of Technology Jammu India Computer Science & Engineering S. V. National Institute of Technology Surat India
Ontologies have been increasingly used in designing access control policies in Internet of Things (IoT) systems. Machine Learning (ML) has been extensively used to identify patterns from existing data. Trained ML mode... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
TREAT: Temporal and Relational Attention-Based Tensor Representation Learning for Ethereum Phishing Users
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1838-1851页
作者: Ghosh, Medhasree Halder, Raju Chandra, Joydeep Indian Institute of Technology Patna Deprtment of Computer Science and Engineering India
The Ethereum blockchain platform has witnessed a surge in crypto-cybercrimes, particularly phishing attacks, resulting in significant financial losses. Analyzing the Ethereum transaction network to detect phishing use... 详细信息
来源: 评论
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Shukla, Sanjeev Misra, Manoj Varshney, Gaurav Department of Computer Science and Engineering Indian Institute of Technology Roorkee India Department of Computer Science and Engineering Indian Institute of Technology Jammu India
Emails encounter many types of cyber-attacks and email spoofing is one of the most common and challenging investigation problems. This paper identifies spoofing-based email attacks in an organization by analyzing rece... 详细信息
来源: 评论
A multi-fused convolutional neural network model for fruit image classification
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 416-424页
作者: Sinha, Bam Bahadur Dhanalakshmi, R. Computer Science and Engineering National Institute of Technology Sikkim 737139 India Computer Science and Engineering Indian Institute of Information Technology Tiruchirappalli Tamil Nadu 620012 India
Fruit categorization presents a significant challenge due to the diverse range of fruit types and their similarities in color, shape, size, and structure. This challenge is addressed in this research by proposing a mu... 详细信息
来源: 评论
Cellular Automaton–Based Sentiment Analysis for Bipolar Classification of Reviews
收藏 引用
Complex Systems 2025年 第1期34卷 29-57页
作者: Elizabeth, M.J. Chaudhuri, Parimal Pal Hazari, Raju Department of Computer Science and Engineering National Institute of Technology Kerala Calicut India Indian Institute of Technology Kharagpur India
One of the main goals of sentiment analysis is to analyze human perception to continuously adapt to each person’s demands. The information gathered is structured to understand the mood or emotional tone of the review... 详细信息
来源: 评论
Integrated Crowd Counting System Utilizing IoT Sensors, OpenCV and YOLO Models for Accurate People Density Estimation in Real-Time Environments  1
Integrated Crowd Counting System Utilizing IoT Sensors, Open...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Jayasingh, Suvendra Kumar Naik, Pintu Swain, Satyaprakash Patra, Kumar Janardan Kabat, Manas Ranjan Institute of Management and Information Technology BPUT Department of Computer Science and Engineering Odisha Cuttack India Indian Institute of Technology Department of Computer Science and Engineering Jammu India
Real-time crowd monitoring plays a pivotal role in effectively managing public spaces and ensuring safety. This study investigates the fusion of IoT devices and the YOLO object detection model to accurately count crow... 详细信息
来源: 评论