咨询与建议

限定检索结果

文献类型

  • 2,777 篇 会议
  • 2,286 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 5,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,972 篇 工学
    • 1,501 篇 计算机科学与技术...
    • 1,210 篇 软件工程
    • 549 篇 电子科学与技术(可...
    • 504 篇 电气工程
    • 470 篇 信息与通信工程
    • 405 篇 生物工程
    • 397 篇 生物医学工程(可授...
    • 375 篇 化学工程与技术
    • 353 篇 材料科学与工程(可...
    • 349 篇 光学工程
    • 349 篇 控制科学与工程
    • 206 篇 仪器科学与技术
    • 187 篇 动力工程及工程热...
    • 184 篇 机械工程
    • 116 篇 土木工程
    • 109 篇 冶金工程
  • 2,252 篇 理学
    • 1,043 篇 物理学
    • 716 篇 数学
    • 558 篇 生物学
    • 441 篇 化学
    • 284 篇 统计学(可授理学、...
    • 129 篇 系统科学
  • 603 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 222 篇 工商管理
  • 406 篇 医学
    • 322 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 162 篇 药学(可授医学、理...
  • 176 篇 教育学
    • 159 篇 教育学
  • 113 篇 法学
  • 85 篇 农学
  • 78 篇 经济学
  • 7 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 98 篇 computer science
  • 77 篇 computational mo...
  • 76 篇 deep learning
  • 74 篇 training
  • 70 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 feature extracti...
  • 54 篇 students
  • 51 篇 computer archite...
  • 50 篇 neural networks
  • 47 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 visualization
  • 41 篇 support vector m...
  • 40 篇 data models
  • 40 篇 convolutional ne...
  • 39 篇 internet of thin...
  • 35 篇 artificial intel...
  • 34 篇 testing
  • 33 篇 neurons

机构

  • 41 篇 renewable and su...
  • 34 篇 department of el...
  • 31 篇 department of ph...
  • 30 篇 department of ph...
  • 30 篇 photonics initia...
  • 29 篇 photonics initia...
  • 28 篇 department of ma...
  • 24 篇 physics program ...
  • 23 篇 department of el...
  • 23 篇 renewable and su...
  • 21 篇 department of el...
  • 21 篇 department of el...
  • 20 篇 department of in...
  • 19 篇 department of co...
  • 18 篇 applied mathemat...
  • 17 篇 computer science...
  • 16 篇 department of el...
  • 16 篇 physics program ...
  • 16 篇 peng cheng labor...
  • 16 篇 interdisciplinar...

作者

  • 40 篇 andrea alù
  • 40 篇 smalyukh ivan i.
  • 33 篇 alù andrea
  • 33 篇 lukas
  • 32 篇 ivan i. smalyukh
  • 29 篇 kono junichiro
  • 29 篇 zhang byoung-tak
  • 28 篇 heryadi yaya
  • 25 篇 yaya heryadi
  • 23 篇 pardamean bens
  • 23 篇 bens pardamean
  • 19 篇 balandin alexand...
  • 18 篇 kargar fariborz
  • 17 篇 niyato dusit
  • 16 篇 tay fuyang
  • 16 篇 weiss sharon m.
  • 16 篇 wayan suparta
  • 16 篇 jasra ajay
  • 15 篇 daniel schneider
  • 14 篇 hakan bagci

语言

  • 4,897 篇 英文
  • 136 篇 其他
  • 32 篇 中文
  • 6 篇 日文
  • 3 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Engineering Program"
5075 条 记 录,以下是291-300 订阅
排序:
Large Scale Analytics of Vector+Raster Big Spatial Data?  17
Large Scale Analytics of Vector+Raster Big Spatial Data?
收藏 引用
25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2017
作者: Eldawy, Ahmed Haynes, David Niu, Lyuye Su, Zhiba Computer Science and Engineering University of California Riverside United States Program in Health Disparities University of Minnesota Twin Cities United States Computer Science and Engineering University of California Riverside United States Computer Science and Engineering University of California Riverside United States
Significant increases in the volume of big spatial data have driven researchers and practitioners to build specialized systems to process and analyze this data. Existing efforts focus on either big raster data, e.g., ... 详细信息
来源: 评论
BME Senior design and freshmen engineering
BME Senior design and freshmen engineering
收藏 引用
2005 ASEE Annual Conference and Exposition: The Changing Landscape of engineering and Technology Education in a Global World
作者: Rowley, Blair A. College of Engineering and Computer Science Wright State University Dayton OH 45435 United States Biomedical Industrial and Human Factors Engineering United States Freshman Engineering and Computer Science Program United States
This paper reports the results for a senior-freshman teaming event that took place during the fall quarter 2004. It describes the rational for the event, the design leadership required of the seniors, the structure of... 详细信息
来源: 评论
DeepDTAGen: a multitask deep learning framework for drug-target affinity prediction and target-aware drugs generation
收藏 引用
Nature communications 2025年 第1期16卷 5021页
作者: Pir Masoom Shah Huimin Zhu Zhangli Lu Kaili Wang Jing Tang Min Li School of Computer Science and Engineering Central South University Changsha China. School of Computer Science and Technology Donghua University Shanghai China. Research Program in Systems Oncology Faculty of Medicine University of Helsinki Helsinki Finland. Department of Biochemistry and Developmental Biology Faculty of Medicine University of Helsinki Helsinki Finland. School of Computer Science and Engineering Central South University Changsha China. limin@***. Xiangjiang Laboratory Changsha China. limin@***. Furong Laboratory Central South University Changsha China. limin@***.
Identifying novel drugs that can interact with target proteins is a highly challenging, time-consuming, and costly task in drug discovery and development. Numerous machine learning-based models have recently been util...
来源: 评论
Formalizing concurrent common knowledge as product of modal logics
Formalizing concurrent common knowledge as product of modal ...
收藏 引用
作者: Costa, Vania Benevides, Mario System Engineering and Computer Science Program UFRJ Mailbox 68511 21945-970 Rio de Janeiro Brazil System Engineering and Computer Science Program Institute of Mathematics UFRJ Mailbox 68511 21945-970 Rio de Janeiro Brazil
This work introduces a two-dimensional modal logic to represent agents' Concurrent Common Knowledge in distributed systems. Unlike Common Knowledge, Concurrent Common Knowledge is a kind of agreement reachable in ... 详细信息
来源: 评论
On a combined electrical engineering and computer science Department
On a combined electrical engineering and Computer Science De...
收藏 引用
114th Annual ASEE Conference and Exposition, 2007
作者: Blandford, Dick Hwang, Deborah University of Evansville United States Electrical Engineering and Computer Science Department University of Evansville United States Computer Science Program University of Evansville United States
In the United States, more than 10% of traditional electrical engineering programs have combined with computer science into a single department \Historically computer science programs emerged from mathematics or elect... 详细信息
来源: 评论
Enhancing Security Information and Event Management (SIEM) by Incorporating Machine Learning for Cyber Attack Detection  9
Enhancing Security Information and Event Management (SIEM) b...
收藏 引用
9th IEEE International Conference on Computing, engineering and Design, ICCED 2023
作者: Ayu, Media Anugerah Erlangga, Dimas Mantoro, Teddy Handayani, Dini Sampoerna University Faculty of Engineering and Technology Department of Computer Science Jakarta Indonesia Nusa Putra University - Sukabumi Postgraduate Program - School of Computer Science Indonesia
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne... 详细信息
来源: 评论
Diabetes Classification Using Support Vector Machine: Binary Classification Model  4
Diabetes Classification Using Support Vector Machine: Binary...
收藏 引用
4th International Conference on Information and Communications Technology, ICOIACT 2021
作者: Rabiha, Suciana Ghadati Wibowo, Antoni Lukas Heryadi, Yaya Computer Science Department BINUS Graduate Program-Doctor of Computer Science. Information Systems Department BINUS Online Learning Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program-Doctor of Computer Science Bina Nusantara University 11480 Indonesia Faculty of Engineering Universitas Katolik Indonesia Atma Jaya Indonesia Computer Science Department BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University 11480 Indonesia
One of the health problems that require special attention is diabetes, besides the growth of this disease infection is increasing in various circles ranging from children, adults, men, women and the elderly. So to det... 详细信息
来源: 评论
Sentiment Analysis with N-Gram Preprocessing for Online-Shopping Reviews in Indonesian Language  9
Sentiment Analysis with N-Gram Preprocessing for Online-Shop...
收藏 引用
9th IEEE International Conference on Computing, engineering and Design, ICCED 2023
作者: Asian, Jelita Putra, Oktavianus Tegar N.K. Ayu, Media Anugerah Mantoro, Teddy Nusa Putra University Postgraduate Program - School of Computer Science Sukabumi Indonesia Sampoerna University Faculty of Engineering and Technology Department of Computer Science Jakarta Indonesia
Currently, online Shopping platforms have grown significantly, especially during the COVID-19 pandemic. This condition motivates the need for analyzing how the users/customers' opinions on using such platform. Sen... 详细信息
来源: 评论
Using modal logics to express and check global graph properties
Using modal logics to express and check global graph propert...
收藏 引用
作者: Benevides, Mario R.F. Schechter, L. Menasché Computer Science Department Systems and Computer Engineering Program Federal University of Rio de Janeiro Rio de Janeiro Brazil Systems and Computer Engineering Program Federal University of Rio de Janeiro Rio de Janeiro Brazil
Graphs are among the most frequently used structures in computer science. Some of the properties that must be checked in many applications are connectivity, acyclicity and the Eulerian and Hamiltonian properties. In t... 详细信息
来源: 评论
An efficient decryption method for RSA cryptosystem
An efficient decryption method for RSA cryptosystem
收藏 引用
19th International Conference on Advanced Information Networking and Applications, AINA 2005
作者: Hwang, Ren-Junn Su, Feng-Fu Yeh, Yi-Shiung Chen, Chia-Yao Department of Computer Science and Information Engineering TamKang University Tamsui Taipei 251 Taiwan Degree Program of Electrical Engineering and Computer Science National Chiao Tung University Hsinchu 300 Taiwan
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most attractive and popular security technique for many applications, such as electronic commerce and secure inter... 详细信息
来源: 评论