咨询与建议

限定检索结果

文献类型

  • 698,215 篇 会议
  • 231,706 篇 期刊文献
  • 4,491 册 图书
  • 19 篇 学位论文

馆藏范围

  • 934,425 篇 电子文献
  • 28 种 纸本馆藏

日期分布

学科分类号

  • 516,572 篇 工学
    • 296,999 篇 计算机科学与技术...
    • 238,505 篇 软件工程
    • 125,600 篇 信息与通信工程
    • 95,895 篇 电气工程
    • 95,035 篇 电子科学与技术(可...
    • 85,599 篇 控制科学与工程
    • 49,778 篇 生物工程
    • 43,074 篇 光学工程
    • 38,274 篇 生物医学工程(可授...
    • 37,841 篇 机械工程
    • 32,724 篇 仪器科学与技术
    • 31,552 篇 动力工程及工程热...
    • 29,956 篇 化学工程与技术
    • 27,198 篇 材料科学与工程(可...
    • 16,039 篇 交通运输工程
    • 15,910 篇 安全科学与工程
    • 13,584 篇 网络空间安全
  • 286,706 篇 理学
    • 137,760 篇 数学
    • 105,347 篇 物理学
    • 55,363 篇 生物学
    • 44,538 篇 统计学(可授理学、...
    • 35,340 篇 系统科学
    • 31,984 篇 化学
  • 109,545 篇 管理学
    • 68,724 篇 管理科学与工程(可...
    • 44,969 篇 图书情报与档案管...
    • 32,777 篇 工商管理
  • 34,382 篇 医学
    • 28,405 篇 临床医学
    • 25,100 篇 基础医学(可授医学...
    • 15,942 篇 药学(可授医学、理...
  • 19,604 篇 法学
    • 16,338 篇 社会学
  • 13,243 篇 经济学
  • 9,194 篇 农学
  • 8,650 篇 教育学
  • 4,173 篇 文学
  • 2,178 篇 军事学
  • 1,108 篇 艺术学
  • 126 篇 哲学
  • 68 篇 历史学

主题

  • 26,885 篇 computer science
  • 21,498 篇 computational mo...
  • 17,606 篇 feature extracti...
  • 17,516 篇 accuracy
  • 14,835 篇 training
  • 14,091 篇 bandwidth
  • 13,594 篇 deep learning
  • 12,933 篇 machine learning
  • 12,328 篇 computer archite...
  • 11,809 篇 costs
  • 11,687 篇 testing
  • 11,533 篇 hardware
  • 11,484 篇 optimization
  • 11,362 篇 predictive model...
  • 11,244 篇 robustness
  • 11,152 篇 neural networks
  • 11,136 篇 control systems
  • 11,115 篇 mathematical mod...
  • 11,108 篇 algorithm design...
  • 10,889 篇 delay

机构

  • 5,296 篇 department of el...
  • 3,272 篇 school of electr...
  • 2,476 篇 school of comput...
  • 2,210 篇 chitkara univers...
  • 2,166 篇 school of comput...
  • 2,035 篇 school of comput...
  • 1,755 篇 school of comput...
  • 1,662 篇 department of co...
  • 1,571 篇 ieee
  • 1,532 篇 school of electr...
  • 1,429 篇 school of comput...
  • 1,395 篇 school of comput...
  • 1,288 篇 department of co...
  • 1,286 篇 school of comput...
  • 1,252 篇 school of electr...
  • 1,241 篇 department of el...
  • 1,233 篇 department of el...
  • 1,121 篇 department of el...
  • 1,102 篇 school of comput...
  • 1,101 篇 college of compu...

作者

  • 443 篇 niyato dusit
  • 419 篇 liu yang
  • 355 篇 yang yang
  • 255 篇 s. chen
  • 250 篇 barter w.
  • 249 篇 wang wei
  • 243 篇 wei li
  • 230 篇 j. wang
  • 229 篇 blake t.
  • 217 篇 bellee v.
  • 216 篇 borsato m.
  • 212 篇 betancourt c.
  • 210 篇 brundu d.
  • 208 篇 li yang
  • 207 篇 bowcock t.j.v.
  • 203 篇 a. gomes
  • 200 篇 x. chen
  • 199 篇 wei wang
  • 195 篇 zhang rui
  • 194 篇 c. alexa

语言

  • 815,384 篇 英文
  • 106,947 篇 其他
  • 12,562 篇 中文
  • 415 篇 日文
  • 348 篇 朝鲜文
  • 119 篇 德文
  • 80 篇 法文
  • 65 篇 斯洛文尼亚文
  • 31 篇 土耳其文
  • 25 篇 阿拉伯文
  • 24 篇 西班牙文
  • 22 篇 葡萄牙文
  • 18 篇 俄文
  • 6 篇 捷克文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Computer Science and Engineering and Electrical and Computer Engineering"
934431 条 记 录,以下是381-390 订阅
排序:
Component adaptive sparse representation for hyperspectral image classification
收藏 引用
Soft Computing 2024年 第20期28卷 11911-11925页
作者: Bortiew, Amos Patra, Swarnajyoti Bruzzone, Lorenzo Department of Computer Science and Engineering Tezpur University Assam Tezpur India Department of Information Engineering and Computer Science University of Trento Trento Italy
Techniques that exploit spectral-spatial information have proven to be very effective in hyperspectral image classification. Joint sparse representation classification (JSRC) is one such technique which has been exten... 详细信息
来源: 评论
On the Generalisation Performance of Geometric Semantic Genetic Programming for Boolean Functions: Learning Block Mutations
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-33页
作者: Corus, Dogan Oliveto, Pietro S. Department of Computer Engineering Kadir Has University Istanbul Turkey Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ... 详细信息
来源: 评论
Exploiting Kubernetes Autoscaling for Economic Denial of Sustainability
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing Systems 2025年 第2期9卷 1-29页
作者: Chamberlain, Jonathan Zheng, Jilin Zhu, Zeying Liu, Zaoxing Starobinski, David Boston University Department of Electrical and Computer Engineering BostonMA United States University of Maryland Department of Computer Science College ParkMD United States
The flexibility and scale of networks achievable by modern cloud computer architectures, particularly Kubernetes (K8s)-based applications, are rivaled only by the resulting complexity required to operate at scale in a... 详细信息
来源: 评论
A New Method for Stealthy False Data Injection Attack Detection Using Advanced Feasibility Areas Considering Spatial Distribution
收藏 引用
IEEE Transactions on Smart Grid 2025年 第4期16卷 3346-3358页
作者: Elsayed, Ahmed Abd Elaziz Khani, Hadi Farag, Hany E. Z. Department Lassonde School of Engineering Engineering and Computer Science York University Toronto ON Canada
The Feasibility Area (FA) in power system applications defines the region within which Power System State Variables (PSSVs) typically exist under normal operating conditions. Accurate characterization of the FA helps ... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论
Efficient Heuristic Replication Techniques for High Data Availability in Cloud
收藏 引用
computer Systems science & engineering 2023年 第6期45卷 3151-3164页
作者: H.L.Chandrakala R.Loganathan Department of Computer Science and Engineering School of EngineeringPresidency UniversityIndia Department of Computer Science and Engineering HKBK College of EngineeringIndia
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论
Proposing a digital twin-based sustainable water governance system for rural Indian villages
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1777-1783页
作者: Singh, Dineshkumar Sharma, Vishnu Department of Computer Science and Engineering Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India Department of Computer Science and Application Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论
Federated Learning With Meta-Layers Training for Privacy-Preserving in Vehicular Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 621-629页
作者: Shen, Xiaoyang Li, Haibin Li, Yaqian Zhang, Wenming Alenazi, Mohammed J.F. Agarwal, Kadambri Yanshan University College of Electrical Engineering Hebei Qinhuangdao066000 China Key Laboratory of Industrial Computer Control Engineering of Hebei Province Hebei Qinhuangdao066000 China King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia ABES Engineering College Department of Computer Science and Engineering Ghaziabad201009 India
Vehicular consumer electronics, such as autonomous vehicles (AVs), need collecting large amounts of private user information, which face the risk of privacy leakage. To protect the privacy of consumers, researchers ha... 详细信息
来源: 评论