咨询与建议

限定检索结果

文献类型

  • 247,083 篇 会议
  • 94,655 篇 期刊文献
  • 2,183 册 图书
  • 25 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 343,948 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 198,813 篇 工学
    • 127,406 篇 计算机科学与技术...
    • 103,311 篇 软件工程
    • 50,813 篇 信息与通信工程
    • 32,806 篇 控制科学与工程
    • 30,160 篇 电气工程
    • 29,950 篇 电子科学与技术(可...
    • 21,608 篇 生物工程
    • 16,281 篇 生物医学工程(可授...
    • 16,039 篇 光学工程
    • 15,262 篇 机械工程
    • 11,851 篇 仪器科学与技术
    • 11,769 篇 化学工程与技术
    • 11,648 篇 动力工程及工程热...
    • 9,309 篇 材料科学与工程(可...
    • 7,338 篇 安全科学与工程
    • 7,217 篇 网络空间安全
    • 7,060 篇 交通运输工程
  • 109,568 篇 理学
    • 53,822 篇 数学
    • 36,883 篇 物理学
    • 24,037 篇 生物学
    • 17,321 篇 统计学(可授理学、...
    • 12,699 篇 系统科学
    • 12,198 篇 化学
  • 49,839 篇 管理学
    • 31,319 篇 管理科学与工程(可...
    • 20,618 篇 图书情报与档案管...
    • 14,022 篇 工商管理
  • 15,143 篇 医学
    • 12,662 篇 临床医学
    • 11,447 篇 基础医学(可授医学...
    • 7,258 篇 药学(可授医学、理...
  • 8,551 篇 法学
    • 6,890 篇 社会学
  • 5,688 篇 经济学
  • 4,378 篇 农学
  • 3,312 篇 教育学
  • 1,572 篇 文学
  • 813 篇 军事学
  • 488 篇 艺术学
  • 26 篇 哲学
  • 17 篇 历史学

主题

  • 8,898 篇 accuracy
  • 8,442 篇 feature extracti...
  • 7,752 篇 computational mo...
  • 7,325 篇 deep learning
  • 7,266 篇 computer science
  • 6,788 篇 training
  • 6,060 篇 machine learning
  • 4,681 篇 predictive model...
  • 4,627 篇 optimization
  • 4,531 篇 support vector m...
  • 4,247 篇 convolutional ne...
  • 4,181 篇 real-time system...
  • 4,150 篇 data mining
  • 4,054 篇 neural networks
  • 3,880 篇 wireless sensor ...
  • 3,771 篇 internet of thin...
  • 3,681 篇 computer archite...
  • 3,570 篇 data models
  • 3,468 篇 bandwidth
  • 3,363 篇 robustness

机构

  • 3,273 篇 school of electr...
  • 2,477 篇 school of comput...
  • 2,247 篇 chitkara univers...
  • 1,507 篇 school of comput...
  • 1,349 篇 school of comput...
  • 1,118 篇 department of el...
  • 1,058 篇 university of ch...
  • 1,043 篇 cavendish labora...
  • 985 篇 college of compu...
  • 971 篇 department of ph...
  • 944 篇 school of comput...
  • 884 篇 department of co...
  • 847 篇 physikalisches i...
  • 837 篇 oliver lodge lab...
  • 816 篇 department of el...
  • 721 篇 college of compu...
  • 714 篇 department of co...
  • 636 篇 department of co...
  • 621 篇 school of comput...
  • 562 篇 school of electr...

作者

  • 285 篇 niyato dusit
  • 250 篇 barter w.
  • 247 篇 j. wang
  • 238 篇 a. gomes
  • 232 篇 s. chen
  • 225 篇 blake t.
  • 222 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 borsato m.
  • 214 篇 j. m. izen
  • 212 篇 boettcher t.
  • 209 篇 brundu d.
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 vinay kukreja
  • 193 篇 g. bella

语言

  • 321,482 篇 英文
  • 17,468 篇 其他
  • 4,983 篇 中文
  • 262 篇 日文
  • 53 篇 朝鲜文
  • 35 篇 德文
  • 28 篇 法文
  • 27 篇 斯洛文尼亚文
  • 20 篇 土耳其文
  • 7 篇 阿拉伯文
  • 6 篇 俄文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 2 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Technology Engineering"
343948 条 记 录,以下是231-240 订阅
排序:
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
A secure double spectrum auction scheme
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1415-1427页
作者: Jiaqi Wang Ning Lu Ziyang Gong Wenbo Shi Chang Choi School of Computer Science and Engineering Northeastern UniversityShenyang110004China School of Computer Science and Technology Xidian UniversityXi©anChina Dept.of Computer Engineering Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120G School of Computer and Communication Engineering Northeastern UniversityQinhuangdao066004China
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ... 详细信息
来源: 评论
Using the SCRM method to repair a damaged planning graph for service composition
收藏 引用
International Journal of Web engineering and technology 2024年 第4期19卷 421-442页
作者: Gao, Zhihao Zhu, Ming Li, Jing Lu, Rui College of Computer Science and Technology Shandong University of Technology Zibo China College of Engineering and Computer Science The Australian National University Canberra Australia
Software, hardware, data, and computing power can be abstracted and encapsulated as services authorised to users in a paid or free manner for on demand deployment. Service composition combines multiple existing servic... 详细信息
来源: 评论
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
Minimal Context-Switching Data Race Detection with Dataflow Tracking
收藏 引用
Journal of computer Science & technology 2024年 第1期39卷 211-226页
作者: 郑龙 李洋 辛杰 刘海峰 郑然 廖小飞 金海 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Data race is one of the most important concurrent anomalies in multi-threaded *** con-straint-based techniques are leveraged into race detection,which is able to find all the races that can be found by any oth-er soun... 详细信息
来源: 评论
Security in Bluetooth and Wearable Devices: A Survey  4
Security in Bluetooth and Wearable Devices: A Survey
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Kumar, Hardik Bhaidasna, Hetal Patel, Kajol Parul Institute of Engineering and Technology Computer Engineering Vadodara India Parul Institute of Engineering and Technology-Diploma Computer Engineering Vadodara India
The rise of Bluetooth tech & wearable gadgets has greatly changed our personal lives. These devices offer amazing convenience & help us connect in many areas like healthcare, fitness, and daily activities. But... 详细信息
来源: 评论
Enhancing patient-independent detection of freezing of gait in Parkinson’s disease with deep adversarial network
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Fahad, Md Shah Ranjan, Ashish Kumar, Gautam Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India Department of Computer Science and Engineering C. V. Raman Global University Odisha Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Delhi Delhi India
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra... 详细信息
来源: 评论
On the Generalisation Performance of Geometric Semantic Genetic Programming for Boolean Functions: Learning Block Mutations
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-33页
作者: Corus, Dogan Oliveto, Pietro S. Department of Computer Engineering Kadir Has University Istanbul Turkey Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ... 详细信息
来源: 评论
Fault-tolerant capability analysis of six-phase induction motor with distributed, concentrated, and pseudo-concentrated windings
收藏 引用
Scientia Iranica 2024年 第10期31卷 775-789页
作者: Alemi-Rostami, Mehdi Rezazadeh, Ghasem Tahami, Farzad Akbari-Resketi, Hamid Reza Ministry of Science Research and Technology Tehran Iran School of Electrical and Computer Engineering College of Engineering University of Tehran Tehran Iran Department of Electrical Engineering Sharif University of Technology Tehran Iran Department of Electrical and Computer Engineering Babol Noshirvani University of Technology Babol Iran
Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one... 详细信息
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论