咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,423 篇 期刊文献
  • 757 册 图书

馆藏范围

  • 82,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,015 篇 工学
    • 36,693 篇 计算机科学与技术...
    • 29,783 篇 软件工程
    • 13,881 篇 信息与通信工程
    • 8,177 篇 控制科学与工程
    • 6,003 篇 电气工程
    • 5,997 篇 生物工程
    • 5,711 篇 电子科学与技术(可...
    • 4,127 篇 生物医学工程(可授...
    • 3,804 篇 机械工程
    • 3,632 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,382 篇 化学工程与技术
    • 2,278 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,958 篇 交通运输工程
  • 26,701 篇 理学
    • 14,356 篇 数学
    • 7,341 篇 物理学
    • 6,653 篇 生物学
    • 4,653 篇 统计学(可授理学、...
    • 3,040 篇 系统科学
    • 2,500 篇 化学
  • 14,635 篇 管理学
    • 9,001 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,109 篇 医学
    • 3,439 篇 临床医学
    • 3,088 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,795 篇 公共卫生与预防医...
  • 2,380 篇 法学
    • 1,867 篇 社会学
  • 1,417 篇 经济学
  • 1,159 篇 农学
  • 974 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,215 篇 feature extracti...
  • 2,083 篇 computer science
  • 2,011 篇 accuracy
  • 1,985 篇 deep learning
  • 1,632 篇 computational mo...
  • 1,619 篇 machine learning
  • 1,568 篇 training
  • 1,225 篇 data mining
  • 1,097 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,066 篇 optimization
  • 1,013 篇 predictive model...
  • 889 篇 educational inst...
  • 876 篇 wireless sensor ...
  • 864 篇 semantics
  • 861 篇 artificial intel...
  • 859 篇 real-time system...
  • 806 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 694 篇 school of comput...
  • 542 篇 school of comput...
  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 276 篇 department of ph...
  • 262 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 222 篇 department of ph...
  • 222 篇 departamento de ...
  • 218 篇 physics division...
  • 216 篇 department of co...
  • 210 篇 department of ph...
  • 202 篇 school of comput...
  • 199 篇 department of ph...
  • 186 篇 department of ph...
  • 173 篇 college of compu...
  • 171 篇 department for p...
  • 168 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 234 篇 niyato dusit
  • 228 篇 d. guest
  • 227 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 71,183 篇 英文
  • 9,666 篇 其他
  • 1,294 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
82061 条 记 录,以下是4681-4690 订阅
排序:
DB Workload Management Through Characterization and Idleness Detection  26
DB Workload Management Through Characterization and Idleness...
收藏 引用
26th International Conference on Advanced Communications technology, ICACT 2024
作者: Mateen, Abdul Mahmood, Khawaja Tahir Nam, Seung Yeob Federal Urdu University of Arts Science and Technology Department of Computer Science Islamabad45570 Pakistan Yeungnam University Department of Information and Communication Engineering Gyeongsan Korea Republic of
It is difficult to handle the database (DB) workload due to the huge increase in data., the functionality demand from the user., and the rapid changes in data. It is not easy to manage the DB workload., which therefor... 详细信息
来源: 评论
Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural Network  24
Analyzing the Effect of Observer Node Addition Strategy on B...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: Kang, Changhoon Woo, Jongsoo Hong, James Won-Ki Department of Computer Science and Engineering POSTECH Korea Republic of Graduate School of Information Technology POSTECH Korea Republic of
Bitcoin transactions are created through the concept called Unspent Transaction Output (UTXO). Users put their own UTXOs as inputs into a transaction for Bitcoin transfer and create multiple outputs, each specifying t... 详细信息
来源: 评论
Methods for Detecting Android Malware: Employing Mobile Devices to Improve Procedures for Inquiry-Based Learning
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第6期19卷 103-114页
作者: Yelisetti, Sandeep Suresh, P. Jha, Suresh Kumar Arora, Neha Anand, Ketan Sailaja, Vedala Naga Information Technology Velagapudi Ramakrishna Siddhartha Engineering College Deemed to be University Andhra Pradesh Vijayawada India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Tamil Nadu Thandalam Chennai India Manipal University Rajasthan Jaipur India School of Information Science Presidency University Karnataka Bengaluru India Telangana Hyderabad India Dept of MBA KLEF Deemed to be University Green Fields Andhra Pradesh Vaddeswaram India
The operating system (OS) of a computer controls both its hardware and software. It handles necessary functions including input and output processing, file and memory management, and peripheral device management, incl... 详细信息
来源: 评论
DBNode: A Decentralized Storage System for Big Data Storage in Consortium Blockchains  9
DBNode: A Decentralized Storage System for Big Data Storage ...
收藏 引用
9th International Conference on Big Data Analytics, ICBDA 2024
作者: Dadkhah, Narges Ma, Xuyang Wolter, Katinka Wunder, Gerhard Freie Universität Berlin Department of Mathematics and Computer Science Berlin Germany School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
Storing big data directly on a blockchain poses a substantial burden due to the need to maintain a consistent ledger across all nodes. Numerous studies in decentralized storage systems have been conducted to tackle th... 详细信息
来源: 评论
Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model
收藏 引用
SN computer science 2024年 第8期5卷 1-15页
作者: Chakraborty, Sanjay Pandey, Saroj Kumar Maity, Saikat Dey, Lopamudra Department of Computer and Information Science (IDA) REAL AIICS at Linköping University Linköping Sweden Department of Computer Science and Engineering Techno International New Town Kolkata India Department of Computer Engineering and Applications GLA University Mathura India Department of Computer Science and Engineering Sister Nivedita University Kolkata India Department of Computer Science and Engineering Meghnad Saha Institute of Technology Kolkata India Department of Biomedical and Clinical Sciences Linköping University Linköping Sweden
Attackers are now using sophisticated techniques, like polymorphism, to change the attack pattern for each new attack. Thus, the detection of novel attacks has become the biggest challenge for cyber experts and resear... 详细信息
来源: 评论
Book Genre Classification System Using Machine Learning Approach: A Survey  5th
Book Genre Classification System Using Machine Learning Appr...
收藏 引用
5th International Conference on Soft Computing and Signal Processing, ICSCSP 2022
作者: Sethy, Abhisek Rout, Ajit Kumar Gunda, Chandra Routhu, Sai Kiran Kallepalli, Srinu Garbhapu, Geetha Department of Information Technology GMR Institute of Technology Srikakulam Rajam India Department of Computer Science & Engineering Silicon Institute of Technology Bhubaneswar India
The amount of complicated texts and documents that require a deeper understanding of machine learning techniques has expanded rapidly in recent decades. Several machine learning approaches have shown exceptional resul... 详细信息
来源: 评论
Agent Selection Framework for Federated Learning in Resource-Constrained Wireless Networks
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 1265-1282页
作者: Raftopoulou, Maria Da Silva, Jose Mairton B. Litjens, Remco Vincent Poor, H. Van Mieghem, Piet Uppsala University Department of Information Technology Uppsala751 05 Sweden Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft2628 CD Netherlands Department of Networks The Hague2595 DA Netherlands Princeton University Department of Electrical and Computer Engineering PrincetonNJ08544 United States
Federated learning is an effective method to train a machine learning model without requiring to aggregate the potentially sensitive data of agents in a central server. However, the limited communication bandwidth, th... 详细信息
来源: 评论
Research on Amplification Algorithm of Small Sample Soil Composite Data Based on Probability Distribution  7
Research on Amplification Algorithm of Small Sample Soil Com...
收藏 引用
7th International Conference on computer Network, Electronic and Automation, ICCNEA 2024
作者: Zhang, Shuyue Liang, Xiangyang Song, Yang School of Computer Science and Engineering Xi’an Technological University Xi’an China Shaanxi Kaizhou Information Technology Co. Ltd Xi’an China
Analyzing and studying the data of soil compounds from 10 cities, two important features were found in this project. First, the data for all compounds in soil follow a normal distribution with different parameters. Th...
来源: 评论
Open-Vocabulary Calibration for Fine-tuned CLIP  41
Open-Vocabulary Calibration for Fine-tuned CLIP
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wang, Shuoyuan Wang, Jindong Wang, Guoqing Zhang, Bob Zhou, Kaiyang Wei, Hongxin Department of Statistics and Data Science Southern University of Science and Technology Shenzhen China Department of Computer and Information Science University of Macau Taipa China William & Mary WilliamsburgVA United States School of Computer Science and Engineering University of Electronic Science and Technology of China China Department of Computer Science Hong Kong Baptist University Hong Kong
Vision-language models (VLMs) have emerged as formidable tools, showing their strong capability in handling various open-vocabulary tasks in image recognition, text-driven visual content generation, and visual chatbot... 详细信息
来源: 评论
Design and Implementation of an Astute Infant Monitoring System Based on YOLO v8 Algorithm  15
Design and Implementation of an Astute Infant Monitoring Sys...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Arunkumar, T. Maheswaran, S. Dineshkumar, P. Geetha, K. Sureshkumar, A. Praveenkumar, S. Kongu Engineering College Department of Computer Science and Engineering Tamilnadu Perundurai India Kongu Engineering College Department of Electronics and Communication Engineering Tamilnadu Perundurai India K.S.Rangasamy college of Technology Department of Information Technology Tamilnadu Tiruchengode India Excel Engineering College Department of Computer Science and Engineering Tamilnadu Namakkal India
Parents today have a greater workload because they are working hard at their careers. As a result, there is less opportunity of giving babies better care. Children's health may suffer greatly as a result of this. ... 详细信息
来源: 评论