咨询与建议

限定检索结果

文献类型

  • 203,211 篇 会议
  • 98,712 篇 期刊文献
  • 2,379 册 图书

馆藏范围

  • 304,302 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 181,183 篇 工学
    • 117,774 篇 计算机科学与技术...
    • 94,561 篇 软件工程
    • 45,948 篇 信息与通信工程
    • 28,488 篇 控制科学与工程
    • 25,424 篇 电子科学与技术(可...
    • 25,122 篇 电气工程
    • 19,428 篇 生物工程
    • 15,187 篇 生物医学工程(可授...
    • 14,820 篇 光学工程
    • 13,249 篇 机械工程
    • 11,236 篇 化学工程与技术
    • 10,770 篇 仪器科学与技术
    • 9,810 篇 动力工程及工程热...
    • 9,044 篇 材料科学与工程(可...
    • 7,012 篇 网络空间安全
    • 6,625 篇 安全科学与工程
    • 6,258 篇 交通运输工程
  • 103,161 篇 理学
    • 49,779 篇 数学
    • 35,958 篇 物理学
    • 22,136 篇 生物学
    • 15,950 篇 统计学(可授理学、...
    • 11,763 篇 化学
    • 11,156 篇 系统科学
  • 46,563 篇 管理学
    • 28,753 篇 管理科学与工程(可...
    • 19,678 篇 图书情报与档案管...
    • 12,975 篇 工商管理
  • 15,058 篇 医学
    • 12,452 篇 临床医学
    • 10,914 篇 基础医学(可授医学...
    • 6,785 篇 药学(可授医学、理...
  • 8,130 篇 法学
    • 6,574 篇 社会学
  • 5,187 篇 经济学
  • 4,142 篇 农学
  • 3,317 篇 教育学
  • 1,454 篇 文学
  • 764 篇 军事学
  • 449 篇 艺术学
  • 51 篇 哲学
  • 30 篇 历史学

主题

  • 9,643 篇 computer science
  • 7,387 篇 accuracy
  • 6,892 篇 feature extracti...
  • 6,304 篇 deep learning
  • 5,976 篇 computational mo...
  • 5,476 篇 machine learning
  • 5,306 篇 training
  • 4,131 篇 data mining
  • 3,948 篇 support vector m...
  • 3,787 篇 optimization
  • 3,603 篇 predictive model...
  • 3,506 篇 internet of thin...
  • 3,463 篇 wireless sensor ...
  • 3,370 篇 real-time system...
  • 3,244 篇 convolutional ne...
  • 3,232 篇 artificial intel...
  • 3,066 篇 neural networks
  • 2,900 篇 bandwidth
  • 2,893 篇 computer archite...
  • 2,892 篇 protocols

机构

  • 1,705 篇 department of co...
  • 1,354 篇 department of co...
  • 1,179 篇 university of ch...
  • 1,055 篇 physikalisches i...
  • 1,044 篇 cavendish labora...
  • 976 篇 department of ph...
  • 874 篇 infn laboratori ...
  • 858 篇 oliver lodge lab...
  • 836 篇 department of el...
  • 802 篇 department of el...
  • 795 篇 infn sezione di ...
  • 723 篇 school of comput...
  • 631 篇 department of el...
  • 617 篇 infn sezione di ...
  • 615 篇 department of co...
  • 586 篇 chitkara univers...
  • 536 篇 nikhef national ...
  • 516 篇 infn sezione di ...
  • 510 篇 school of comput...
  • 493 篇 university of sc...

作者

  • 253 篇 niyato dusit
  • 247 篇 j. wang
  • 244 篇 barter w.
  • 229 篇 s. chen
  • 227 篇 a. gomes
  • 217 篇 blake t.
  • 212 篇 bellee v.
  • 210 篇 y. zhang
  • 205 篇 bowcock t.j.v.
  • 204 篇 borsato m.
  • 204 篇 betancourt c.
  • 200 篇 brundu d.
  • 199 篇 c. alexa
  • 197 篇 j. m. izen
  • 195 篇 amato s.
  • 193 篇 beiter a.
  • 187 篇 c. amelung
  • 185 篇 g. bella
  • 185 篇 j. strandberg
  • 185 篇 d. calvet

语言

  • 255,420 篇 英文
  • 44,346 篇 其他
  • 4,798 篇 中文
  • 358 篇 日文
  • 74 篇 德文
  • 65 篇 斯洛文尼亚文
  • 63 篇 法文
  • 55 篇 朝鲜文
  • 16 篇 俄文
  • 10 篇 阿拉伯文
  • 4 篇 土耳其文
  • 3 篇 捷克文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering and Information Technology Department"
304302 条 记 录,以下是4481-4490 订阅
排序:
TruChain: A Blockchain-based Access Control to Improve the Security of Smart Water Grid Systems  17
TruChain: A Blockchain-based Access Control to Improve the S...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Mondal, Susmita Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ... 详细信息
来源: 评论
Three Eyed Raven: An On-Chip Side Channel Analysis Framework for Run-Time Evaluation
Three Eyed Raven: An On-Chip Side Channel Analysis Framework...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Dhilipkumar, M. Bagade, Priyanka Roy, Debapriya Basu Indian Institute of Technology Department of Computer Science & Engineering Kanpur India
Side-channel attacks exploit the physical leakages from hardware components, such as power consumption, to break secure cryptographic algorithms and retrieve their secret key. Evaluating implementations of cryptograph... 详细信息
来源: 评论
Timeliness of CSMA/CA-Based Wireless Networks With HARQ in the FBL Regime: Explicit Age Characterizations and Resource Allocation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23614-23626页
作者: Bao, Zhiwei Hu, Yulin Gan, Ming Dong, Yunquan Gross, James Wuhan University School of Electronic Information China Huawei Technologies Company Ltd China Nanjing University of Information Science and Technology School of Electronic and Information Engineering China KTH Royal Institute of Technology Department of Intelligent Systems Sweden
In this paper, we consider an industrial internet of things (IIoT) network operating under a carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Latency-sensitive packets generated at multiple s... 详细信息
来源: 评论
Ownership Verification Based on Dynamic Concealment of Multiple Copyright Signatures  4th
Ownership Verification Based on Dynamic Concealment of Multi...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Bose, Saikat Arjariya, Tripti Goswami, Anirban Department of Computer Science Engineering Bhabha University Bhopal India Department of Information Technology Techno Main Salt Lake Kolkata India
This study raises a novel data security solution that focuses on dynamic authentication of e-documents transmitted in wireless domain. This is mainly achieved by concealing multiple signatures dynamically in circular ... 详细信息
来源: 评论
A globally shared resource paradigm for encoded storage systems in the public cloud
收藏 引用
Fundamental Research 2024年 第3期4卷 642-650页
作者: Zhiyue Li Guangyan Zhang Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology Tsinghua UniversityBeijing 100084China
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with ... 详细信息
来源: 评论
Reinforcement Learning Based Dark Image Enhancement Through Color Feature Balancing  3
Reinforcement Learning Based Dark Image Enhancement Through ...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic engineering, ICAEEE 2024
作者: Rab, Raqeebir Ahmed, Towkir Alam, Arfayet Rahman, Ashikur Leshob, Abderrahmane Ahsanullah University of Science and Technology Department of Computer Science and Engineering Tejgaon Dhaka1208 Bangladesh Bangladesh University of Engineering and Technology Department of Computer Science and Engineering West Palashi Dhaka1000 Bangladesh University of Quebec in Montreal Department of Computer Science and Engineering Montreal Canada
Image enhancement refers to the process of manipulating an image to improve the visual information it contains. Images can degrade due to various factors, such as operator incompetence or low-quality picture- recordin... 详细信息
来源: 评论
A Scrutiny of Machine Learning Methods for the Detection and Identification of Cyber Intrusion
A Scrutiny of Machine Learning Methods for the Detection and...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Eluri, Rama Krishna Valicharla, Karunakumar Divya, Modalavalasa Anusha, K.B. Narasaraopeta Engineering College Department Of Computer Science & Engineering Narasaraopet India Aditya Institute Of Technology And Management Department Of Computer Science & Engineering Tekkali India
This study investigates the interruption identification problem for organization safe havens;the main goal is to classify network behavior as normal or abnormal while minimizing misclassification. In this investigatio... 详细信息
来源: 评论
A Memory-Guided Anomaly Detection Model with Contrastive Learning for Multivariate Time Series
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 1893-1910页
作者: Wei Zhang Ping He Ting Li Fan Yang Ying Liu School of Electronic and Information Engineering Hebei University of TechnologyTianjin300401China School of Artificial Intelligence Hebei University of TechnologyTianjin300401China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
Some reconstruction-based anomaly detection models in multivariate time series have brought impressive performance advancements but suffer from weak generalization ability and a lack of anomaly *** limitations can res... 详细信息
来源: 评论
Gannet Optimizer-Based Clustering Scheme for Wireless Sensor Networks  15th
Gannet Optimizer-Based Clustering Scheme for Wireless Senso...
收藏 引用
15th International Conference on Genetic and Evolutionary Computing, ICGEC 2023
作者: Yue, Longkang Pan, Jeng-Shyang Chu, Shu-Chuan Chen, Shi-Huang Watada, Junzo College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Computer Science and Information Engineering Shu-Te University Kaohsiung824 Taiwan Graduate School of Information Production and Systems Waseda University Kitakyushu808-0135 Japan Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Wireless Sensor Network (WSN) is a wireless self-organizing network based on sensor nodes. Small batteries or power supply with weak computing power are usually used, so how to effectively control the energy consumpti... 详细信息
来源: 评论
MediClass-RF: An Optimized Random Forest Framework for Medicinal Plant Classification with Feature Importance and Comprehensive Performance Evaluation
MediClass-RF: An Optimized Random Forest Framework for Medic...
收藏 引用
2024 IEEE International Conference on Modeling, Simulation and Intelligent Computing, MoSICom 2024
作者: Sapna, R. Sheshappa, S.N. Raja, S Pravinth Preethi Devadas, Raghavendra M Hiremani, Vani Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Information Technology Manipal India Sir Mvit Department of Information Science and Engineering Bangalore India Presidency University Department of Computer Science and Engineering Bangalore India University Pune India
Proper categorization of medicinal and non-medicinal herbs is essential for further application in healthcare and the herbal industries. In our work, we proposed MediClass-RF, the Random Forest-based optimized framewo... 详细信息
来源: 评论