咨询与建议

限定检索结果

文献类型

  • 148,104 篇 会议
  • 70,349 篇 期刊文献
  • 2,035 册 图书
  • 7 篇 专利

馆藏范围

  • 220,494 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 128,083 篇 工学
    • 88,223 篇 计算机科学与技术...
    • 71,049 篇 软件工程
    • 29,734 篇 信息与通信工程
    • 19,340 篇 控制科学与工程
    • 16,040 篇 电气工程
    • 14,949 篇 电子科学与技术(可...
    • 14,651 篇 生物工程
    • 10,900 篇 生物医学工程(可授...
    • 10,142 篇 光学工程
    • 8,748 篇 机械工程
    • 7,319 篇 化学工程与技术
    • 6,632 篇 仪器科学与技术
    • 6,215 篇 动力工程及工程热...
    • 5,897 篇 材料科学与工程(可...
    • 5,122 篇 网络空间安全
    • 4,720 篇 安全科学与工程
  • 75,310 篇 理学
    • 37,169 篇 数学
    • 25,574 篇 物理学
    • 16,603 篇 生物学
    • 11,969 篇 统计学(可授理学、...
    • 8,134 篇 化学
    • 7,588 篇 系统科学
  • 33,509 篇 管理学
    • 20,219 篇 管理科学与工程(可...
    • 14,768 篇 图书情报与档案管...
    • 9,178 篇 工商管理
  • 10,515 篇 医学
    • 8,778 篇 临床医学
    • 7,896 篇 基础医学(可授医学...
    • 4,880 篇 药学(可授医学、理...
    • 4,411 篇 公共卫生与预防医...
  • 5,959 篇 法学
    • 4,897 篇 社会学
  • 3,575 篇 经济学
  • 3,253 篇 农学
  • 2,251 篇 教育学
  • 952 篇 文学
  • 503 篇 军事学
  • 316 篇 艺术学
  • 72 篇 哲学
  • 39 篇 历史学

主题

  • 8,081 篇 computer science
  • 6,455 篇 accuracy
  • 5,388 篇 feature extracti...
  • 5,348 篇 deep learning
  • 5,197 篇 computational mo...
  • 4,522 篇 training
  • 4,475 篇 machine learning
  • 3,212 篇 predictive model...
  • 3,149 篇 convolutional ne...
  • 3,043 篇 real-time system...
  • 2,981 篇 support vector m...
  • 2,766 篇 artificial intel...
  • 2,760 篇 data mining
  • 2,721 篇 data models
  • 2,568 篇 optimization
  • 2,544 篇 internet of thin...
  • 2,455 篇 neural networks
  • 2,382 篇 semantics
  • 2,295 篇 computer archite...
  • 2,165 篇 security

机构

  • 2,873 篇 school of comput...
  • 2,269 篇 university of ch...
  • 2,180 篇 chitkara univers...
  • 1,366 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,036 篇 department of co...
  • 986 篇 department of ph...
  • 973 篇 institute of com...
  • 918 篇 physikalisches i...
  • 915 篇 oliver lodge lab...
  • 569 篇 infn sezione di ...
  • 553 篇 infn laboratori ...
  • 542 篇 infn sezione di ...
  • 524 篇 horia hulubei na...
  • 512 篇 department of ph...
  • 511 篇 infn sezione di ...
  • 506 篇 h.h. wills physi...
  • 503 篇 school of physic...
  • 501 篇 fakultät physik ...
  • 498 篇 school of physic...

作者

  • 258 篇 barter w.
  • 256 篇 j. wang
  • 243 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 225 篇 c. alexa
  • 224 篇 amato s.
  • 223 篇 j. m. izen
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 218 篇 boettcher t.
  • 215 篇 beiter a.
  • 213 篇 d. calvet
  • 211 篇 bencivenni g.
  • 205 篇 g. bella
  • 205 篇 j. strandberg
  • 205 篇 c. amelung

语言

  • 190,845 篇 英文
  • 27,018 篇 其他
  • 2,803 篇 中文
  • 213 篇 日文
  • 34 篇 德文
  • 24 篇 法文
  • 21 篇 斯洛文尼亚文
  • 16 篇 朝鲜文
  • 15 篇 俄文
  • 5 篇 葡萄牙文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 意大利文
  • 2 篇 波兰文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
220495 条 记 录,以下是781-790 订阅
排序:
Measuring code maintainability with deep neural networks
收藏 引用
Frontiers of computer science 2023年 第6期17卷 61-75页
作者: Yamin HU Hao JIANG Zongyao HU School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Artificial Intelligence Anhui UniversityHefei 230601China
The maintainability of source code is a key quality characteristic for software *** approaches have been proposed to quantitatively measure code *** approaches rely heavily on code metrics,e.g.,the number of Lines of ... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Identity-Preserving Adversarial Training for Robust Network Embedding
收藏 引用
Journal of computer science & technology 2024年 第1期39卷 177-191页
作者: 岑科廷 沈华伟 曹婍 徐冰冰 程学旗 Data Intelligence System Research Center Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 101480China Beijing Academy of Artificial Intelligence Beijing 100000China Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link ***,existing network embed-ding models are ... 详细信息
来源: 评论
Geometric-like imaginarity:Quantification and state conversion
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第2期68卷 13-22页
作者: Meng-Li Guo Bo Li Shao-Ming Fei School of Science East China University of TechnologyNanchang 330006China School of Computer and Computing Science Hangzhou City University Hangzhou 310015China School of Mathematical Sciences Capital Normal UniversityBeijing 100048China
From the perspective of resource-theoretic approach,this study explores the quantification of imaginary in quantum *** propose a well defined measure of imaginarity,the geometric-like measure of *** with the usual geo... 详细信息
来源: 评论
Automated breast nuclei feature extraction for segmentation in histopathology images using Deep-CNN-based gaussian mixture model and color optimization technique
收藏 引用
Multimedia Tools and Applications 2025年 1-27页
作者: Murmu, Anita Kumar, Piyush Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Hematoxylin and eosin (H&E) staining are the key sources for identifying breast cancer patterns with different colors and shapes of nuclei cells for segmenting histopathology nucleus images. In nucleus cells, the ... 详细信息
来源: 评论
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
收藏 引用
Frontiers of computer science 2024年 第3期18卷 183-197页
作者: Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of TechnologyZhengzhou 450001China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i... 详细信息
来源: 评论
ZeroMark: Towards Dataset Ownership Verification without Disclosing Watermarks  38
ZeroMark: Towards Dataset Ownership Verification without Dis...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Guo, Junfeng Li, Yiming Chen, Ruibo Wu, Yihan Liu, Chenxi Huang, Heng Department of Computer Science Institute of Health Computing University of Maryland College Park United States College of Computing and Data Science Nanyang Technology University Singapore
High-quality public datasets significantly prompt the prosperity of deep neural networks (DNNs). Currently, dataset ownership verification (DOV), which consists of dataset watermarking and ownership verification, is t...
来源: 评论
Leveraging machine learning for intelligent agriculture
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-21页
作者: Sowmya, B.J. Meeradevi, A.K. Supreeth, S. Pradeep Kumar, D. Ravi Kumar, B.N. Rohith, S. Mishra, Divyansh Koushik, Abhishek Patil, Ankit U. Department of Artificial Intelligence and Data Science Ramaiah Institute of Technology Bengaluru560054 India Department of Artificial Intelligence and Machine Learning M S Ramaiah Institute of Technology Bengaluru560054 India School of Computer Science and Engineering REVA University Bengaluru560064 India Department of Computer Science Ramaiah Institute of Technology Bengaluru560054 India Department of Information Science and Engineering BMS Institute of Technology & Management Bengaluru560119 India Department of Electronics and Engineering Nagarjuna College of Engineering and Technology Bengaluru562164 India
Agriculture, the backbone of many economies, faces challenges like lack of information, outdated practices, and limited access to technology, hindering farmer productivity. This work proposes a user-friendly, multilin... 详细信息
来源: 评论
A privacy and compliance in regulated anonymous payment system based on blockchain
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2024年 第8期15卷 3141-3157页
作者: Elfadul, Issameldeen Wu, Lijun Elhabob, Rashad Elkhalil, Ahmed School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer and Information Engineering Qilu Institute of Technology Shandong Jinan250200 China Faculty of Computer Science and Information Technology Karary University Khartoum Sudan
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention... 详细信息
来源: 评论
CLASSIFICATION OF DIABETES USING ENSEMBLE MACHINE LEARNING TECHNIQUES
收藏 引用
Scalable computing 2024年 第4期25卷 3172-3180页
作者: Ashisha, G.R. Mary, X Anitha Raja, J Mahimai Electronics and Instrumentation Engineering Karunya Institute of Technology and Sciences Coimbatore India Robotics Engineering Karunya Institute of Technology and Sciences Coimbatore India Computer Science Engineering Karunya Institute of Technology and Sciences Coimbatore India
Diabetes is a widespread chronic condition that impacts people all over the globe and requires a clear and timely diagnosis. Untreated diabetes leads to retinopathy, nephropathy, and damage to the nervous system. In t... 详细信息
来源: 评论