咨询与建议

限定检索结果

文献类型

  • 134,409 篇 会议
  • 78,849 篇 期刊文献
  • 1,897 册 图书
  • 7 篇 专利

馆藏范围

  • 215,158 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 124,574 篇 工学
    • 78,276 篇 计算机科学与技术...
    • 62,773 篇 软件工程
    • 26,998 篇 信息与通信工程
    • 17,540 篇 控制科学与工程
    • 16,722 篇 电气工程
    • 16,255 篇 电子科学与技术(可...
    • 13,256 篇 生物工程
    • 10,311 篇 光学工程
    • 10,016 篇 生物医学工程(可授...
    • 8,734 篇 化学工程与技术
    • 8,239 篇 机械工程
    • 7,910 篇 材料科学与工程(可...
    • 7,339 篇 仪器科学与技术
    • 6,506 篇 动力工程及工程热...
    • 4,435 篇 网络空间安全
    • 4,346 篇 安全科学与工程
  • 82,610 篇 理学
    • 34,772 篇 数学
    • 33,982 篇 物理学
    • 15,511 篇 生物学
    • 11,589 篇 统计学(可授理学、...
    • 10,243 篇 化学
    • 6,877 篇 系统科学
    • 5,406 篇 地球物理学
  • 29,820 篇 管理学
    • 17,999 篇 管理科学与工程(可...
    • 12,949 篇 图书情报与档案管...
    • 8,161 篇 工商管理
  • 10,169 篇 医学
    • 8,163 篇 临床医学
    • 7,334 篇 基础医学(可授医学...
    • 4,522 篇 药学(可授医学、理...
  • 5,379 篇 法学
    • 4,456 篇 社会学
  • 3,268 篇 经济学
  • 3,196 篇 农学
  • 2,042 篇 教育学
  • 872 篇 文学
  • 473 篇 军事学
  • 277 篇 艺术学
  • 99 篇 哲学
  • 82 篇 历史学

主题

  • 7,701 篇 computer science
  • 5,694 篇 accuracy
  • 4,713 篇 feature extracti...
  • 4,614 篇 deep learning
  • 4,507 篇 computational mo...
  • 3,966 篇 machine learning
  • 3,892 篇 training
  • 2,799 篇 convolutional ne...
  • 2,776 篇 predictive model...
  • 2,709 篇 support vector m...
  • 2,668 篇 real-time system...
  • 2,492 篇 artificial intel...
  • 2,426 篇 data mining
  • 2,271 篇 data models
  • 2,264 篇 optimization
  • 2,236 篇 internet of thin...
  • 2,103 篇 neural networks
  • 2,004 篇 computer archite...
  • 1,933 篇 semantics
  • 1,837 篇 security

机构

  • 2,823 篇 school of comput...
  • 2,136 篇 chitkara univers...
  • 1,748 篇 cavendish labora...
  • 1,544 篇 university of ch...
  • 1,243 篇 school of comput...
  • 929 篇 department for p...
  • 919 篇 department of ph...
  • 899 篇 institute of phy...
  • 816 篇 institute of phy...
  • 781 篇 fakultät physik ...
  • 779 篇 oliver lodge lab...
  • 756 篇 school of physic...
  • 749 篇 department of ph...
  • 741 篇 physikalisches i...
  • 723 篇 infn laboratori ...
  • 723 篇 physics departme...
  • 723 篇 cern geneva
  • 715 篇 department of co...
  • 714 篇 institute of hig...
  • 709 篇 department of ph...

作者

  • 595 篇 j. m. izen
  • 516 篇 a. soffer
  • 508 篇 g. eigen
  • 495 篇 r. j. barlow
  • 458 篇 a. jawahery
  • 453 篇 c. chen
  • 451 篇 x. chen
  • 446 篇 v. tisserand
  • 440 篇 c. patrignani
  • 429 篇 r. kowalewski
  • 426 篇 m. morii
  • 425 篇 a. bocci
  • 422 篇 p. j. clark
  • 421 篇 b. stugu
  • 417 篇 annovi a.
  • 416 篇 bachacou h.
  • 410 篇 g. marchiori
  • 405 篇 j. ocariz
  • 402 篇 azuelos g.
  • 388 篇 s. h. robertson

语言

  • 186,566 篇 英文
  • 26,199 篇 其他
  • 2,494 篇 中文
  • 203 篇 日文
  • 33 篇 德文
  • 26 篇 法文
  • 18 篇 斯洛文尼亚文
  • 16 篇 朝鲜文
  • 14 篇 俄文
  • 6 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 葡萄牙文
  • 2 篇 意大利文
  • 2 篇 波兰文
  • 1 篇 西班牙文
检索条件"机构=Computer Science and Technology Cambridge Institute of Technology"
215162 条 记 录,以下是321-330 订阅
排序:
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论
A smart hybrid memory scheduling approach using neural models
收藏 引用
science China(Information sciences) 2024年 第4期67卷 333-334页
作者: Yanjie ZHEN Huijun ZHANG Yongheng DENG Weining CHEN Wei GAO Ju REN Yu CHEN Department of Computer Science and Technology Tsinghua University China Huaneng Clean Energy Research Institute
Traditional dynamic random access memory is limited by its low capacity and high cost because of the increasing demand for the memory capacity of applications. Hybrid memory architectures, including new memory hardwar... 详细信息
来源: 评论
Imbalanced multilabel retinal disease classification using threshold moving and ensemble learning
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Pendharkar, Gaurav Balaji, Sudharshanan Kumar, B. Muhesh Malathi, G. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
Billions of people worldwide are affected by vision impairment majorly caused due to age-related degradation and refractive errors. Diabetic Retinopathy(DR) and Macular Hole(MH) are among the most prevalent senescent ... 详细信息
来源: 评论
An Insightful Approach to Cardiomegaly through CNN and Feature Mapping  1
An Insightful Approach to Cardiomegaly through CNN and Featu...
收藏 引用
1st International Conference on Computational Intelligence for Security, Communication and Sustainable Development, CISCSD 2024
作者: Manikandan, R. Mythili, B. Pushyaraga, R. Reddy, M. Karthik Reddy, B. Mallikarjun Madanapalle Institute of Technology and Science Computer Science and Technology Madanapalle India
The study presents a new approach to identifying cardiomegaly using advanced convolutional neural networks, more specifically, MobileNet and VGG architectures, with interpretative feature maps. Cardiomegaly, or an enl... 详细信息
来源: 评论
Undefinability of Approximation of 2-To-2 Games  33
Undefinability of Approximation of 2-To-2 Games
收藏 引用
33rd EACSL Annual Conference on computer science Logic, CSL 2025
作者: Dawar, Anuj Molnár, Bálint Department of Computer Science and Technology University of Cambridge United Kingdom
Recent work by Atserias and Dawar [6] and Tucker-Foltz [26] has established undefinability results in fixed-point logic with counting (FPC) corresponding to many classical complexity results from the hardness of appro... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
Innovative Deep Learning Approach for malware Categorization  1
Innovative Deep Learning Approach for malware Categorization
收藏 引用
1st International Conference on Computational Intelligence for Security, Communication and Sustainable Development, CISCSD 2024
作者: Lakshmi, B. Lakshmi, B. Maha Pallavi, P. Reddy, M. Pavan Kumar Kumar, B. Naveen Madanapalle Institute of Technology and Science Computer Science and Technology Madanapalle India
With the improvement of wireless communique, many security threats have emerged. An internet site malware detection gadget (IDS) facilitates come across assaults the business enterprise and the barbarians had been arr... 详细信息
来源: 评论
Enhancing patient-independent detection of freezing of gait in Parkinson’s disease with deep adversarial network
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Fahad, Md Shah Ranjan, Ashish Kumar, Gautam Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India Department of Computer Science and Engineering C. V. Raman Global University Odisha Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Delhi Delhi India
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra... 详细信息
来源: 评论
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论