咨询与建议

限定检索结果

文献类型

  • 111,945 篇 会议
  • 52,968 篇 期刊文献
  • 1,535 册 图书

馆藏范围

  • 166,448 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,672 篇 工学
    • 63,119 篇 计算机科学与技术...
    • 51,272 篇 软件工程
    • 23,332 篇 信息与通信工程
    • 15,422 篇 控制科学与工程
    • 13,902 篇 电气工程
    • 13,488 篇 电子科学与技术(可...
    • 11,722 篇 生物工程
    • 9,523 篇 生物医学工程(可授...
    • 9,051 篇 光学工程
    • 6,663 篇 机械工程
    • 6,441 篇 化学工程与技术
    • 5,596 篇 材料科学与工程(可...
    • 5,536 篇 仪器科学与技术
    • 5,365 篇 动力工程及工程热...
    • 4,105 篇 网络空间安全
    • 3,880 篇 安全科学与工程
  • 57,965 篇 理学
    • 26,695 篇 数学
    • 21,224 篇 物理学
    • 13,441 篇 生物学
    • 8,942 篇 统计学(可授理学、...
    • 7,213 篇 化学
    • 5,979 篇 系统科学
  • 24,177 篇 管理学
    • 14,933 篇 管理科学与工程(可...
    • 10,298 篇 图书情报与档案管...
    • 7,035 篇 工商管理
  • 9,475 篇 医学
    • 7,864 篇 临床医学
    • 7,077 篇 基础医学(可授医学...
    • 4,433 篇 药学(可授医学、理...
    • 3,918 篇 公共卫生与预防医...
  • 4,507 篇 法学
    • 3,723 篇 社会学
  • 2,802 篇 经济学
  • 2,652 篇 农学
  • 1,482 篇 教育学
  • 674 篇 文学
  • 371 篇 军事学
  • 191 篇 艺术学
  • 23 篇 哲学
  • 13 篇 历史学

主题

  • 5,514 篇 accuracy
  • 4,887 篇 computer science
  • 4,444 篇 deep learning
  • 4,104 篇 feature extracti...
  • 3,781 篇 computational mo...
  • 3,723 篇 machine learning
  • 3,439 篇 training
  • 2,752 篇 convolutional ne...
  • 2,582 篇 real-time system...
  • 2,576 篇 predictive model...
  • 2,540 篇 support vector m...
  • 2,203 篇 internet of thin...
  • 2,030 篇 optimization
  • 2,029 篇 artificial intel...
  • 1,920 篇 data models
  • 1,866 篇 neural networks
  • 1,705 篇 data mining
  • 1,579 篇 security
  • 1,556 篇 computer archite...
  • 1,503 篇 wireless sensor ...

机构

  • 2,177 篇 chitkara univers...
  • 1,085 篇 cavendish labora...
  • 1,035 篇 university of ch...
  • 1,009 篇 department of ph...
  • 957 篇 physikalisches i...
  • 945 篇 oliver lodge lab...
  • 598 篇 infn sezione di ...
  • 585 篇 infn laboratori ...
  • 573 篇 infn sezione di ...
  • 546 篇 infn sezione di ...
  • 545 篇 department of el...
  • 535 篇 fakultät physik ...
  • 534 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 517 篇 school of comput...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 511 篇 h.h. wills physi...
  • 507 篇 imperial college...
  • 495 篇 institute of inf...

作者

  • 260 篇 barter w.
  • 250 篇 a. gomes
  • 241 篇 c. alexa
  • 239 篇 j. m. izen
  • 234 篇 j. wang
  • 234 篇 s. chen
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 226 篇 bellee v.
  • 225 篇 beiter a.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 142,648 篇 英文
  • 22,023 篇 其他
  • 1,883 篇 中文
  • 152 篇 日文
  • 35 篇 德文
  • 22 篇 法文
  • 22 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Vels Institute of Science and Engineering"
166448 条 记 录,以下是191-200 订阅
排序:
Embeddings Between State and Action Based Probabilistic Logics
收藏 引用
Formal Aspects of Computing 2025年 第2期37卷 1-58页
作者: Das, Susmoy Sharma, Arpit Department of Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal Madhya Pradesh Bhopal India
This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter... 详细信息
来源: 评论
Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications
收藏 引用
Soft Computing 2025年 第3期29卷 1473-1496页
作者: Anusha, R. Saravanan, R. School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632014 India
Digital signatures, essential for establishing trust in the digital realm, have evolved in their application and importance alongside emerging technologies such as the Internet of Things (IoT), Blockchain, and cryptoc... 详细信息
来源: 评论
Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2269-2286页
作者: S.Abinaya K.Uttej Kumar School of Computer Science&Engineering Vellore Institute of TechnologyChennaiTamilnadu600127India
A Recommender System(RS)is a crucial part of several firms,particularly those involved in *** conventional RS,a user may only offer a single rating for an item-that is insufficient to perceive consumer ***,businesses ... 详细信息
来源: 评论
CRAQL: a novel clustering-based resource allocation using the Q-learning in fog environment
收藏 引用
International Journal of Cloud Computing 2024年 第3期13卷 243-266页
作者: Ahlawat, Chanchal Krishnamurthi, Rajalakshmi Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India
Fog computing is an emerging paradigm that provides services near the end-user. The tremendous increase in IoT devices and big data leads to complexity in fog resource allocation. Inefficient resource allocation can l... 详细信息
来源: 评论
Farm-Level Smart Crop Recommendation Framework Using Machine Learning
收藏 引用
Annals of Data science 2025年 第1期12卷 117-140页
作者: Bhola, Amit Kumar, Prabhat Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
Agriculture is the primary source of food, fuel, and raw materials and is vital to any country’s economy. Farmers, the backbone of agriculture, primarily rely on instinct to determine what crops to plant in any given... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
Convergence of various computer-aided systems for breast tumor diagnosis: a comparative insight
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 16709-16756页
作者: Singh, Saket Kumar Patnaik, K. Sridhar Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi835215 India
Breast Cancer, with an expected 42,780 deaths in the US alone in 2024, is one of the most prevalent types of cancer. The death toll due to breast cancer would be very high if it were to be totaled up globally. Early d... 详细信息
来源: 评论
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 985-1001页
作者: N.Meenakshi Sultan Ahmad A.V.Prabu J.Nageswara Rao Nashwan Adnan Othman Hikmat A.M.Abdeljaber R.Sekar Jabeen Nazeer SRM Institute of Science and Technology KattankulathurChennai 603203India Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabia University Center for Research and Development(UCRD) Department of Computer Science and EngineeringChandigarh UniversityGharuanMohali 140413India Department of ECE Koneru Lakshmaiah Education FoundationVaddeswaramGuntur 522502India Department of Computer Science and Engineering Lakireddy Balireddy College of Engineering(A)NTR District 521230India Department of Computer Engineering College of EngineeringKnowledge UniversityErbil 44001Iraq Department of Computer Science Faculty of Information TechnologyApplied Science Private UniversityAmman 11937Jordan Department of Electronics and Communication Engineering(ECE) School of EngineeringPresidency UniversityBangalore 834001India
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论