咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
81933 条 记 录,以下是211-220 订阅
排序:
Analysis of Software Trustworthiness Based on FAHP-CRITIC Method
收藏 引用
Journal of Shanghai Jiaotong university(science) 2024年 第3期29卷 588-600页
作者: 高晓彤 马艳芳 周伟 School of Computer Science and Technology Huaibei Normal UniversityHuaibei 235000AnhuiChina School of Computer Science and Information Engineering Changzhou Institute of TechnologyChangzhou 213000JiangsuChina
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Privacy-Preserving Knowledge Distillation in Latency-Critical Federated Task Offloading for Consumer IoT Networks
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 239-251页
作者: Chen, Yishan Zhang, Jianwei Wang, Zhiqiang Dai, Wenshuo Gao, Honghao Deng, Shuiguang Jiangxi University of Science and Technology College of Information Engineering China Shanghai University School of Computer Engineering and Science China Gachon University College of Future Industry Korea Republic of Zhejiang University College of Computer Science and Technology China
Along with the explosive demand for massive data computation, federated local-edge-cloud computing enables many IoT task offloading processes and has recently gained widespread attention in consumer-centric healthcare... 详细信息
来源: 评论
RoadFormer: Duplex Transformer for RGB-Normal Semantic Road Scene Parsing
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-10页
作者: Li, Jiahang Zhan, Yikang Yun, Peng Zhou, Guangliang Chen, Qijun Fan, Rui College of Electronic and Information Engineering Tongji University Shanghai China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
The recent advancements in deep convolutional neural networks have shown significant promise in the domain of road scene parsing. Nevertheless, the existing works focus primarily on freespace detection, with little at... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
PBCounter:weighted model counting on pseudo-boolean formulas
收藏 引用
Frontiers of computer science 2025年 第3期19卷 55-63页
作者: Yong LAI Zhenghang XU Minghao YIN College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China School of Computer Science and Information Technology Northeast Normal UniversityChangchun 130017China
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **... 详细信息
来源: 评论
High Dynamic Range Imaging for Dynamic Scenes Based on Multi-Level Spike Camera
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 5394-5406页
作者: Zhu, Zhenkun Xiong, Ruiqin Zhao, Jing Zhao, Rui Fan, Xiaopeng Zhu, Shuyuan Huang, Tiejun Peking University School of Computer Science Beijing100871 China Harbin Institute of Technology Department of Computer Science and Technology Harbin150001 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China
Spike camera is a retina-inspired neuromorphic camera which can capture dynamic scenes of high-speed motion by firing a continuous stream of spikes at an extremely high temporal resolution. The limitation in the curre... 详细信息
来源: 评论
Multi-Objective Offloading Optimization in MEC and Vehicular-Fog Systems: A Distributed-TD3 Approach
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第11期25卷 16897-16909页
作者: Wakgra, Frezer Guteta Kar, Binayak Tadele, Seifu Birhanu Shen, Shan-Hsiang Khan, Asif Uddin The Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei106 Taiwan The School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneswar751024 India
The emergence of 5G networks has enabled the deployment of a two-tier edge and vehicular-fog network. It comprises Multi-access Edge Computing (MEC) and Vehicular-Fogs (VFs), strategically positioned closer to Interne... 详细信息
来源: 评论
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu School of Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China School of Computer Science(School of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce... 详细信息
来源: 评论
EAMR-Net: A multiscale effective spatial and cross-channel attention network for retinal vessel segmentation
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 4742-4761页
作者: Prethija, G. Katiravan, Jeevaa School of Computer Science and Engineering Vellore Institute of Technology Chennai600127 India Department of Information Technology Velammal Engineering College Chennai600066 India
Delineation of retinal vessels in fundus images is essential for detecting a range of eye disorders. An automated technique for vessel segmentation can assist clinicians and enhance the efficiency of the diagnostic pr... 详细信息
来源: 评论