咨询与建议

限定检索结果

文献类型

  • 176,544 篇 会议
  • 76,158 篇 期刊文献
  • 1,852 册 图书
  • 3 篇 学位论文

馆藏范围

  • 254,557 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 150,608 篇 工学
    • 101,370 篇 计算机科学与技术...
    • 82,965 篇 软件工程
    • 38,260 篇 信息与通信工程
    • 24,205 篇 控制科学与工程
    • 20,376 篇 电气工程
    • 19,634 篇 电子科学与技术(可...
    • 17,801 篇 生物工程
    • 13,103 篇 生物医学工程(可授...
    • 12,240 篇 光学工程
    • 11,373 篇 机械工程
    • 8,857 篇 化学工程与技术
    • 8,452 篇 仪器科学与技术
    • 8,331 篇 动力工程及工程热...
    • 6,580 篇 材料科学与工程(可...
    • 6,181 篇 网络空间安全
    • 5,937 篇 安全科学与工程
    • 5,683 篇 交通运输工程
  • 83,795 篇 理学
    • 41,660 篇 数学
    • 26,791 篇 物理学
    • 19,865 篇 生物学
    • 13,552 篇 统计学(可授理学、...
    • 9,335 篇 系统科学
    • 9,264 篇 化学
  • 40,238 篇 管理学
    • 24,897 篇 管理科学与工程(可...
    • 17,055 篇 图书情报与档案管...
    • 10,931 篇 工商管理
  • 12,391 篇 医学
    • 10,338 篇 临床医学
    • 9,442 篇 基础医学(可授医学...
    • 5,979 篇 药学(可授医学、理...
  • 6,956 篇 法学
    • 5,608 篇 社会学
  • 4,370 篇 经济学
  • 3,635 篇 农学
  • 2,362 篇 教育学
  • 1,211 篇 文学
  • 582 篇 军事学
  • 394 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 7,345 篇 accuracy
  • 7,127 篇 computer science
  • 6,742 篇 feature extracti...
  • 6,317 篇 deep learning
  • 5,765 篇 computational mo...
  • 5,506 篇 training
  • 5,037 篇 machine learning
  • 3,695 篇 predictive model...
  • 3,694 篇 convolutional ne...
  • 3,688 篇 support vector m...
  • 3,443 篇 optimization
  • 3,349 篇 real-time system...
  • 3,183 篇 internet of thin...
  • 3,154 篇 data mining
  • 2,969 篇 data models
  • 2,862 篇 neural networks
  • 2,694 篇 wireless sensor ...
  • 2,609 篇 artificial intel...
  • 2,512 篇 semantics
  • 2,475 篇 security

机构

  • 2,450 篇 school of comput...
  • 2,154 篇 chitkara univers...
  • 1,511 篇 school of comput...
  • 1,329 篇 school of comput...
  • 1,070 篇 cavendish labora...
  • 1,009 篇 college of compu...
  • 969 篇 department of ph...
  • 965 篇 university of ch...
  • 943 篇 school of comput...
  • 897 篇 department of co...
  • 883 篇 physikalisches i...
  • 877 篇 oliver lodge lab...
  • 817 篇 department of el...
  • 725 篇 college of compu...
  • 650 篇 department of co...
  • 649 篇 department of el...
  • 649 篇 school of comput...
  • 553 篇 infn sezione di ...
  • 531 篇 infn sezione di ...
  • 529 篇 infn laboratori ...

作者

  • 293 篇 niyato dusit
  • 250 篇 barter w.
  • 248 篇 a. gomes
  • 242 篇 s. chen
  • 235 篇 c. alexa
  • 235 篇 j. wang
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 beiter a.
  • 208 篇 c. amelung
  • 208 篇 bencivenni g.
  • 207 篇 g. bella
  • 206 篇 j. strandberg

语言

  • 242,057 篇 英文
  • 9,016 篇 其他
  • 3,480 篇 中文
  • 207 篇 日文
  • 36 篇 朝鲜文
  • 24 篇 德文
  • 23 篇 法文
  • 16 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Technology"
254557 条 记 录,以下是4841-4850 订阅
排序:
A Blockchain-Based Scheme to Prevent the Sybil Attack in VANET  15
A Blockchain-Based Scheme to Prevent the Sybil Attack in VAN...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Tomar, Ashish Bennett University School of Computer Science Engineering and Technology Greater Noida India
Security and privacy are always major issues in Vehicular ad hoc networks. For ensuring privacy and avoiding tracking of the vehicle, recently some researchers proposed the idea of providing multiple pseudo identities... 详细信息
来源: 评论
Exploring The Trade-off between Efficient Service Placement Time and Optimized Fog Colonies Utilizing Advanced Genetic Algorithm with Diverse Network Topologies  24
Exploring The Trade-off between Efficient Service Placement ...
收藏 引用
13th International Conference on Software and computer Applications, ICSCA 2024
作者: Verma, Nilesh Kumar Khetavath, Jairam Naik Department Of Computer Science And Engineering National Institute Of Technology Raipur Raipur India
Optimized Fog colony is one of the aid of fog computing, consisting of fog devices, enable efficient management of large fog domains. Well-designed fog colonies can operate independently, resulting in effectively reso... 详细信息
来源: 评论
Extend Wave Function Collapse Algorithm to Large-Scale Content Generation  5
Extend Wave Function Collapse Algorithm to Large-Scale Conte...
收藏 引用
5th Annual IEEE Conference on Games, CoG 2023
作者: Nie, Yuhe Zheng, Shaoming Zhuang, Zhan Song, Xuan Southern University of Science and Technology Computer Science and Engineering Guangdong China
Wave Function Collapse (WFC) is a widely used tile-based algorithm in procedural content generation, including textures, objects, and scenes. However, the current WFC algorithm and related research lack the ability to... 详细信息
来源: 评论
Banking in the Digital Age: Predicting Eligible Customers through Machine Learning and AWS  1
Banking in the Digital Age: Predicting Eligible Customers th...
收藏 引用
1st IEEE Karachi Section Humanitarian technology Conference, Khi-HTC 2024
作者: Ali, Asfand Irfan, Asim Raza, Ali Memon, Zainab Mehran University of Engineering and Technology Department of Telecommunication Engineering Jamshoro Pakistan Mehran University of Engineering and Technology Computer Systems Engineering Jamshoro Pakistan Quaid-e-Awam University of Engineering Science and Technology Computer Systems Engineering Nawabshah Pakistan
This research project focuses on utilizing machine learning techniques to predict loan default among applicants in the context of financial organizations. Loan approval decisions carry substantial risks, and not all a... 详细信息
来源: 评论
Optimized Model Identification for Malware Detection in a File Using Machine Learning  3
Optimized Model Identification for Malware Detection in a Fi...
收藏 引用
3rd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Laya, N. Shruthi Shetty, J. Sarojadevi, H. Sowmya, P. Nitte Meenakshi Institute Of Technology Department Of Computer Science And Engineering Bengaluru India
Malware remains one of the most critical digital threats today due to the rapidly evolving landscape of online activities. Detecting malware has become a pivotal aspect of safeguarding computer system, especially as p... 详细信息
来源: 评论
Enhancing User Experience and Design in Agricultural Information Portals: A Study of Websites for Indian Farmers
Enhancing User Experience and Design in Agricultural Informa...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging technology, Global AI Summit 2024
作者: Sharma, Mradula Garg, Sahil Srivastava, Ashutosh Srivastava, Divya Verma, Madhushi Bhardwaj, Arpit School of Computer Science Engineering and Technology Bennett University Greater Noida India
Agriculture plays a significant role in India's economy, not only in terms of its GDP share but also in employment, rural development, and food security. As per the 2022-2023 economic survey, the gross value added... 详细信息
来源: 评论
Choosing the Right Cloud Provider for Limitless Growth and Maximize ROI
Choosing the Right Cloud Provider for Limitless Growth and M...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging technology, Global AI Summit 2024
作者: Kumar, Naween Saini, Vaibhav School of Computer Science Engineering and Technology Bennett University Greater Noida India
The present article explores the most critical criteria organizations must consider in choosing a proper Cloud Service Provider (CSP) to enable growth strategies and optimize Return on Investment (ROI). It assists org... 详细信息
来源: 评论
Arbitrary Time Information Modeling via Polynomial Approximation for Temporal Knowledge Graph Embedding  30
Arbitrary Time Information Modeling via Polynomial Approxima...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Fang, Zhiyu Qin, Jingyan Zhu, Xiaobin Yang, Chun Yin, Xu-Cheng School of Computer & Communication Engineering University of Science and Technology Beijing Beijing China
Distinguished from traditional knowledge graphs (KGs), temporal knowledge graphs (TKGs) must explore and reason over temporally evolving facts adequately. However, existing TKG approaches still face two main challenge... 详细信息
来源: 评论
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects
收藏 引用
science China(Information sciences) 2022年 第7期65卷 102-120页
作者: Di CUI Lingling FAN Sen CHEN Yuanfang CAI Qinghua ZHENG Yang LIU Ting LIU School of Computer Science and Technology Xi'an Jiaotong University College of Cyber Science Nankai University College of Intelligence and Computing Tianjin University Department of Computer Science Drexel University School of Computer Science and Engineering Nanyang Technological University School of Cyber Science and Engineering Xi'an Jiaotong University
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an import... 详细信息
来源: 评论
Suricata-Based Intrusion Detection and Isolation System for Local Area Networks
Suricata-Based Intrusion Detection and Isolation System for ...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Mohamed Shalman Kursheeth, K. Sree, Thinnavalli Sendil Vadivu, D. Harsha, Y Sai Sri Rajagopalan, Narendran National Institute of Technology Puducherry Department of Computer Science and Engineering Karaikal India
Malicious activity includes intentionally disrupting or damaging computer systems, networks, or data, including distributing malware, phishing attempts, denial of service, and unauthorized access. Criminals exploit vu... 详细信息
来源: 评论