咨询与建议

限定检索结果

文献类型

  • 3,002 篇 会议
  • 2,036 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 5,082 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,813 篇 工学
    • 1,840 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 595 篇 信息与通信工程
    • 373 篇 电气工程
    • 364 篇 电子科学与技术(可...
    • 352 篇 控制科学与工程
    • 298 篇 生物工程
    • 251 篇 生物医学工程(可授...
    • 248 篇 光学工程
    • 182 篇 机械工程
    • 170 篇 化学工程与技术
    • 155 篇 仪器科学与技术
    • 142 篇 材料科学与工程(可...
    • 104 篇 动力工程及工程热...
    • 83 篇 安全科学与工程
  • 1,946 篇 理学
    • 884 篇 物理学
    • 794 篇 数学
    • 376 篇 生物学
    • 281 篇 统计学(可授理学、...
    • 205 篇 化学
    • 115 篇 系统科学
  • 677 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 277 篇 图书情报与档案管...
    • 218 篇 工商管理
  • 273 篇 医学
    • 221 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
  • 119 篇 法学
    • 94 篇 社会学
  • 99 篇 教育学
    • 88 篇 教育学
  • 82 篇 经济学
    • 81 篇 应用经济学
  • 61 篇 农学
  • 11 篇 文学
  • 10 篇 军事学
  • 10 篇 艺术学

主题

  • 190 篇 computer science
  • 85 篇 educational inst...
  • 79 篇 information scie...
  • 78 篇 data mining
  • 77 篇 computational mo...
  • 75 篇 wireless sensor ...
  • 72 篇 feature extracti...
  • 71 篇 training
  • 68 篇 electronic mail
  • 65 篇 artificial intel...
  • 64 篇 machine learning
  • 59 篇 accuracy
  • 51 篇 wireless communi...
  • 50 篇 deep learning
  • 49 篇 support vector m...
  • 47 篇 proton-proton in...
  • 46 篇 authentication
  • 45 篇 internet
  • 45 篇 clustering algor...
  • 44 篇 bandwidth

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 268 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 266 篇 institute of phy...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 257 篇 institute of phy...
  • 244 篇 fakultät für phy...
  • 235 篇 institut für ast...
  • 232 篇 yerevan physics ...
  • 231 篇 instituto de fís...
  • 222 篇 department of ph...
  • 222 篇 physics departme...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 213 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 262 篇 r. ströhmer
  • 261 篇 h. a. gordon
  • 259 篇 m. rijssenbeek
  • 258 篇 s. jin
  • 258 篇 g. gaudio
  • 256 篇 h. sakamoto
  • 256 篇 s. mohapatra
  • 256 篇 y. nagasaka
  • 253 篇 s. guindon
  • 252 篇 a. kaczmarska

语言

  • 4,859 篇 英文
  • 127 篇 其他
  • 58 篇 日文
  • 44 篇 中文
检索条件"机构=Computer and Information Science Program Graduate School of Engineering"
5082 条 记 录,以下是1-10 订阅
排序:
Integration of data science with the intelligent IoT(IIoT): Current challenges and future perspectives
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 280-298页
作者: Inam Ullah Deepak Adhikari Xin Su Francesco Palmieri Celimuge Wu Chang Choi Department of Computer Engineering Gachon University University of Electronic Science and Technology of China College of Information Science and Engineering Hohai University Department of Computer Science University of Salerno Graduate School of Informatics and Engineering The University of Electro-Communications
The Intelligent Internet of Things(IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent approache... 详细信息
来源: 评论
A deep learning framework for automatic assessment of presence in virtual reality using multimodal behavioral cues
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6283-6303页
作者: Pannattee, Peerawat Shimada, Shogo Yem, Vibol Nishiuchi, Nobuyuki Graduate School of Systems Design Tokyo Metropolitan University Tokyo191-0065 Japan Graduate School of Science and Technology Degree Program in Systems and Information Engineering University of Tsukuba Ibaraki3058573 Japan
Effective development of virtual reality (VR) applications is heavily reliant on the evaluation of user experience (UX). However, traditional methods such as questionnaires have inherent limitations which hinder their... 详细信息
来源: 评论
Privacy-Preserving Keyword Search with Access Control for Secret Sharing-Based Data Outsourcing
收藏 引用
IEEE Access 2025年 13卷 73625-73651页
作者: Kamal, Ahmad Akmal Aminuddin Mohd Okada, Masamune Fujisawa, Masaya Tokyo University of Science Department of Information and Computer Technology 125 Tokyo85858 Japan Tokyo University of Science Graduate School of Engineering Tokyo125-8585 Japan
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining its confidentiality. Extensive research has been conducted on searchable encryptio... 详细信息
来源: 评论
TaxDiff: taxonomic-guided diffusion model for protein sequence generation
收藏 引用
science China(information sciences) 2025年 第4期68卷 385-386页
作者: Zongying LIN Hao LI Liuzhenghao LV Yu WANG Bin LIN Junwu ZHANG Zijun CHEN Calvin Yu-Chian CHEN Li YUAN Yonghong TIAN School of Electronic and Computer Engineering Peking University AI for Science (AI4S)-Preferred Program Peking University Shenzhen Graduate School Peng Cheng Laboratory School of Chemical Biology and Biotechnology Peking University
Protein design aims to generate protein variants with targeted biological functions, which is significant in multiple biological areas, including enzyme reaction catalysis, vaccine design, and fluorescence intensity. ...
来源: 评论
A Lightweight Authentication Protocol for RFID-Assisted Supply Chain Management System
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12845-12852页
作者: Tariq, Tayyaba Kuo, Wen-Chung Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J. F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia
In the evolving landscape of supply chain management, the integration of radio-frequency identification (RFID) technology has marked a significant milestone. This development has led to the emergence of a new system i... 详细信息
来源: 评论
Physical Layer Security for CR-NOMA Network with Cooperative Jamming
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 708-720页
作者: Meiling Li Peng Xue Hu Yuan Yuxing Han School of Electronics Information Engineering Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Mathematics Kingston UniversityLondonKT12EEUK Shenzhen International Graduate School Tsinghua UniversityShenzhen 518055China
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the *** paper introduces cooperative jammi... 详细信息
来源: 评论
RobustFace: a novel image restoration technique for face adversarial robustness improvement
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 8965-8993页
作者: Sadu, Chiranjeevi Das, Pradip K. Yannam, V Ramanjaneyulu Nayyar, Anand Department of Computer Science and Engineering RGUKT Nuzvid Andhra Pradesh Nuzvid India Department of Computer Science and Engineering IIT Guwahati Assam Guwahati India School of Technology Woxsen University Telangana Hyderabad India Graduate School Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam
Machine Learning (ML) models, particularly Deep Learning (DL), have made rapid progress and achieved significant milestones across various applications, including numerous safety-critical contexts. However, these mode... 详细信息
来源: 评论
Innovative Approaches to Task Scheduling in Cloud Computing Environments Using an Advanced Willow Catkin Optimization Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2495-2520页
作者: Jeng-Shyang Pan Na Yu Shu-Chuan Chu An-Ning Zhang Bin Yan Junzo Watada College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Department of Information Management Chaoyang University of TechnologyTaichung41349Taiwan College of Electronics Communication and PhysicsShandong University of Science and TechnologyQingdao266590China Graduate School of Information Production and SystemsWaseda UniversityKitakyushu808-0135Japan
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resource... 详细信息
来源: 评论
An Extended Euclidean Algorithm Implementation over Ciphertext Space  2nd
An Extended Euclidean Algorithm Implementation over Ciphert...
收藏 引用
2nd International Conference on Security and information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chi, Po-Wen Lin, Yuan-Pang Wang, Ming-Hung Chuang, Yun-Hsin Department of Computer Science and Information Engineering National Taiwan Normal University Taiwan Taipei Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Taiwan Chiayi Taiwan Engineering Management Graduate Program College of Engineering National Cheng Kung University Taiwan Tainan Taiwan
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The... 详细信息
来源: 评论
Energy-Free Sensing and Context Recognition Using Photovoltaic Cells
收藏 引用
IEEE Sensors Journal 2025年 第9期25卷 15598-15611页
作者: Shintani, Kaede Rizk, Hamada Yamaguchi, Hirozumi Osaka University Graduate School of Information Science and Technology Department of Information Networking Suita565-0871 Japan Tanta University Tanta31733 Egypt RIKEN Center for Computational Science Kobe650-0047 Japan RIKEN Center for Computational Science Department of Computer and Control Engineering Kobe650-0047 Japan
The field of energy-free sensing and context recognition has recently gained significant attention as it allows operating systems without external power sources. Photovoltaic cells can convert light energy into electr... 详细信息
来源: 评论