咨询与建议

限定检索结果

文献类型

  • 176,245 篇 会议
  • 75,752 篇 期刊文献
  • 1,848 册 图书
  • 3 篇 学位论文

馆藏范围

  • 253,848 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 150,415 篇 工学
    • 101,276 篇 计算机科学与技术...
    • 82,959 篇 软件工程
    • 38,258 篇 信息与通信工程
    • 24,197 篇 控制科学与工程
    • 20,328 篇 电气工程
    • 19,627 篇 电子科学与技术(可...
    • 17,801 篇 生物工程
    • 13,101 篇 生物医学工程(可授...
    • 12,231 篇 光学工程
    • 11,362 篇 机械工程
    • 8,853 篇 化学工程与技术
    • 8,453 篇 仪器科学与技术
    • 8,319 篇 动力工程及工程热...
    • 6,574 篇 材料科学与工程(可...
    • 6,180 篇 网络空间安全
    • 5,935 篇 安全科学与工程
    • 5,682 篇 交通运输工程
  • 83,744 篇 理学
    • 41,651 篇 数学
    • 26,772 篇 物理学
    • 19,854 篇 生物学
    • 13,550 篇 统计学(可授理学、...
    • 9,334 篇 系统科学
    • 9,260 篇 化学
  • 40,215 篇 管理学
    • 24,880 篇 管理科学与工程(可...
    • 17,053 篇 图书情报与档案管...
    • 10,930 篇 工商管理
  • 12,362 篇 医学
    • 10,322 篇 临床医学
    • 9,438 篇 基础医学(可授医学...
    • 5,979 篇 药学(可授医学、理...
  • 6,954 篇 法学
    • 5,606 篇 社会学
  • 4,370 篇 经济学
  • 3,625 篇 农学
  • 2,359 篇 教育学
  • 1,211 篇 文学
  • 583 篇 军事学
  • 394 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 7,287 篇 accuracy
  • 7,122 篇 computer science
  • 6,701 篇 feature extracti...
  • 6,271 篇 deep learning
  • 5,737 篇 computational mo...
  • 5,454 篇 training
  • 5,008 篇 machine learning
  • 3,673 篇 support vector m...
  • 3,672 篇 predictive model...
  • 3,669 篇 convolutional ne...
  • 3,421 篇 optimization
  • 3,318 篇 real-time system...
  • 3,183 篇 internet of thin...
  • 3,149 篇 data mining
  • 2,953 篇 data models
  • 2,856 篇 neural networks
  • 2,694 篇 wireless sensor ...
  • 2,598 篇 artificial intel...
  • 2,493 篇 semantics
  • 2,464 篇 security

机构

  • 2,437 篇 school of comput...
  • 2,154 篇 chitkara univers...
  • 1,501 篇 school of comput...
  • 1,319 篇 school of comput...
  • 1,070 篇 cavendish labora...
  • 1,007 篇 college of compu...
  • 969 篇 department of ph...
  • 963 篇 university of ch...
  • 942 篇 school of comput...
  • 885 篇 physikalisches i...
  • 883 篇 department of co...
  • 879 篇 oliver lodge lab...
  • 813 篇 department of el...
  • 725 篇 college of compu...
  • 649 篇 school of comput...
  • 648 篇 department of co...
  • 645 篇 department of el...
  • 556 篇 infn sezione di ...
  • 538 篇 infn laboratori ...
  • 532 篇 infn sezione di ...

作者

  • 293 篇 niyato dusit
  • 250 篇 barter w.
  • 249 篇 a. gomes
  • 245 篇 s. chen
  • 237 篇 c. alexa
  • 236 篇 j. wang
  • 232 篇 j. m. izen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 c. amelung
  • 210 篇 beiter a.
  • 209 篇 g. bella
  • 208 篇 j. strandberg
  • 208 篇 d. calvet

语言

  • 241,349 篇 英文
  • 9,016 篇 其他
  • 3,479 篇 中文
  • 207 篇 日文
  • 36 篇 朝鲜文
  • 24 篇 德文
  • 23 篇 法文
  • 16 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Technology"
253848 条 记 录,以下是71-80 订阅
排序:
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4573-4591页
作者: Aiguo Li Yunfei Jia Department of Network Engineering Xi’an University of Science and TechnologyXi’an710600China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710600China
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t... 详细信息
来源: 评论
PosParser: A Heuristic Online Log Parsing Method Based on Part-of-Speech Tagging
收藏 引用
IEEE Transactions on Big Data 2025年 第3期11卷 1334-1345页
作者: Jiang, Jinzhao Fu, Yuanyuan Xu, Jian Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Log parsing, the process of transforming raw logs into structured data, is a key step in the complex computer system's intelligent operation and maintenance and therefore has received extensive attention. Among al... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3331-3345页
作者: Das, Sangjukta Singh, Maheshwari Prasad Namasudra, Suyel Department of Computer Science and Engineering National Institute of Technology Patna Bihar India Department of Computer Science and Engineering National Institute of Technology Agartala Tripura India
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
MCWOA Scheduler:Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2593-2616页
作者: Chirag Chandrashekar Pradeep Krishnadoss Vijayakumar Kedalu Poornachary Balasundaram Ananthakrishnan School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Center for Cyber Physical Systems School of Computer Science and EngineeringVellore Institute of TechnologyChennai600127India
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha... 详细信息
来源: 评论
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 329-349页
作者: Qiang Fu JunWang Changfu Si Jiawei Liu College of Computer Science and Technology Shenyang University of Chemical TechnologyShenyang110142China College of Computer Science and Engineering Northeastern UniversityShenyang110169China
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa... 详细信息
来源: 评论
A Generative Model-Based Network Framework for Ecological Data Reconstruction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 929-948页
作者: Shuqiao Liu Zhao Zhang Hongyan Zhou Xuebo Chen School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)ana... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 239-258页
作者: Long Cai Ke Gu Jiaqi Lei School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer... 详细信息
来源: 评论