咨询与建议

限定检索结果

文献类型

  • 12,981 篇 会议
  • 6,966 篇 期刊文献
  • 346 册 图书

馆藏范围

  • 20,293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,621 篇 工学
    • 8,110 篇 计算机科学与技术...
    • 6,642 篇 软件工程
    • 2,738 篇 信息与通信工程
    • 1,667 篇 控制科学与工程
    • 1,535 篇 生物工程
    • 1,484 篇 生物医学工程(可授...
    • 1,278 篇 电气工程
    • 1,137 篇 电子科学与技术(可...
    • 982 篇 光学工程
    • 780 篇 机械工程
    • 629 篇 仪器科学与技术
    • 518 篇 化学工程与技术
    • 472 篇 动力工程及工程热...
    • 404 篇 安全科学与工程
    • 372 篇 交通运输工程
    • 352 篇 建筑学
  • 7,095 篇 理学
    • 3,411 篇 数学
    • 2,367 篇 物理学
    • 1,753 篇 生物学
    • 1,117 篇 统计学(可授理学、...
    • 794 篇 系统科学
    • 558 篇 化学
  • 3,159 篇 管理学
    • 1,801 篇 管理科学与工程(可...
    • 1,505 篇 图书情报与档案管...
    • 980 篇 工商管理
  • 1,420 篇 医学
    • 1,220 篇 临床医学
    • 1,112 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 514 篇 公共卫生与预防医...
  • 537 篇 法学
    • 447 篇 社会学
  • 324 篇 经济学
  • 286 篇 教育学
  • 263 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 29 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 272 篇 computer archite...
  • 271 篇 deep learning
  • 253 篇 computer science
  • 234 篇 machine learning
  • 218 篇 data mining
  • 203 篇 training
  • 202 篇 image segmentati...
  • 194 篇 internet of thin...
  • 194 篇 feature extracti...
  • 182 篇 artificial intel...
  • 181 篇 support vector m...
  • 181 篇 optimization
  • 173 篇 accuracy
  • 158 篇 neural networks
  • 155 篇 quality of servi...
  • 151 篇 bandwidth
  • 149 篇 monitoring
  • 135 篇 application soft...

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 399 篇 department of ph...
  • 389 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 384 篇 department of ph...
  • 347 篇 fakultät für phy...
  • 324 篇 institute of phy...
  • 307 篇 institute of phy...
  • 304 篇 department of ph...
  • 280 篇 department of ph...
  • 274 篇 instituto de fís...
  • 272 篇 department of ph...
  • 271 篇 universidade fed...
  • 265 篇 ictp trieste
  • 264 篇 graduate school ...
  • 254 篇 yerevan physics ...
  • 252 篇 nikhef national ...
  • 249 篇 department of ph...
  • 248 篇 graduate school ...

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 317 篇 g. gaudio
  • 316 篇 s. mohapatra
  • 300 篇 y. tayalati
  • 299 篇 s. guindon
  • 288 篇 a. kaczmarska
  • 283 篇 m. klein
  • 267 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 254 篇 a. d. pilkington

语言

  • 19,616 篇 英文
  • 529 篇 其他
  • 133 篇 中文
  • 18 篇 日文
  • 2 篇 法文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer engineering and informatics"
20293 条 记 录,以下是101-110 订阅
排序:
Edge Energy Orchestration  20th
Edge Energy Orchestration
收藏 引用
20th International Conference on the Economics of Grids, Clouds, Systems, and Services, GECON 2024
作者: Kumar, Vijay Valizadeh, Nima Petri, Ioan Rana, Omer Nag, Ambarish Zisman, Sagi Tripp, Charles Paul, Shuva School of Computer Science and Informatics Cardiff University Cardiff United Kingdom School of Engineering Cardiff University Cardiff United Kingdom Colorado United States Colorado United States
Edge computing devices have increased in number and capability over recent years. The ability to process data and execute machine learning in proximity to data generation and collection sources provides several advant... 详细信息
来源: 评论
A framework for object tracking in videos with complex backgrounds and obstructions
收藏 引用
Neural Computing and Applications 2025年 1-20页
作者: Chang, Tsui-Ping Chen, Tzer-Long Hsiao, Tsung-Chih Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung Taiwan Department of Healthcare Administration and Medical Informatics Kaohsiung Medical University Gaoxiong807 Taiwan Department of Radio Television and Film Shih Hsin University Taipei11604 Taiwan
The research of object tracking in videos utilizes computer vision and machine learning techniques to identify and track objects in the consecutive image frames of videos. The popular algorithms used in the research a... 详细信息
来源: 评论
Cutting-edge approaches in intrusion detection systems: a systematic review of deep learning, reinforcement learning, and ensemble techniques
收藏 引用
Iran Journal of computer Science 2025年 1-31页
作者: Kalpani, Nethma Rodrigo, Nureka Seneviratne, Dilmi Ariyadasa, Subhash Senanayake, Janaka Department of Computer Science and Informatics Uva Wellassa University Badulla Sri Lanka School of Computing Engineering and Technology Robert Gordon University Aberdeen AB10 7GJ United Kingdom
The growing number of networked devices and complex network infrastructures necessitates robust network security measures. Network intrusion detection systems are crucial for identifying and mitigating malicious activ... 详细信息
来源: 评论
HPPH: computer Vision-Based Service for High-Performance Pavement Health Recognition
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15987-15996页
作者: Tsung, Chen-Kun Kristiani, Endah Chiu, Chen-Kang Liu, Jung-Chun Yang, Chao-Tung National Chin-Yi University of Technology Department of Computer Science and Information Engineering Taichung City411030 Taiwan Tunghai University Department of Computer Science Taichung City407224 Taiwan Krida Wacana Christian University Department of Informatics Jakarta11470 Indonesia Tunghai University Research Center of Smart Sustainable Circular Economy Taichung City407224 Taiwan
Identifying pavement damage is a crucial component in road maintenance and infrastructure management. Prompt detection and corrective action of pavement defects can prevent severe deterioration, maintain safety, and p... 详细信息
来源: 评论
To Risk Analyse, or Not to Risk Analyse: That’s the Question  18th
To Risk Analyse, or Not to Risk Analyse: That’s the Ques...
收藏 引用
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024
作者: Bergström, Erik Andersson, Simon Lundgren, Martin School of Engineering Jönköping University Jönköping Sweden Computer Science Electrical and Space Engineering Luleå University of Technology Luleå Sweden School of Informatics University of Skövde Skövde Sweden
Risk analysis is a key activity for organisations that are looking to protect their valuable information assets against threats, such as malicious actors. It is one of the essential parts of risk management and is use... 详细信息
来源: 评论
Progressive Semantic-Visual Alignment and Refinement for Vision-Language Tracking
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第5期35卷 4271-4286页
作者: Liang, Yanjie Wu, Qiangqiang Cheng, Lin Xia, Changqun Li, Jia Peng Cheng Laboratory Shenzhen518000 China City University of Hong Kong Department of Computer Science Hong Kong Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen361005 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beijing100191 China
In recent years, vision-language tracking has drawn emerging attention in the tracking field. The critical challenge for the task is to fuse semantic representations of language information and visual representations ... 详细信息
来源: 评论
Partition Strategies for Vertex-Centric Historical Graph Systems  25
Partition Strategies for Vertex-Centric Historical Graph Sys...
收藏 引用
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing
作者: Alexandros Spitalas Georgios Tsolas Kostas Tsichlas Computer Engineering and Informatics Department University of Patras Rio Achaia Greece
This paper explores partitioning strategies for vertex-centric historical graph systems within distributed environments, focusing on efficient data management and query execution. Historical graphs, which capture the ... 详细信息
来源: 评论
AI-Driven Predictive Analytics for CRM to Enhance Retention Personalization and Decision-Making
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 552-563页
作者: Gaidhani, Yashika Ramesh, Janjhyam Venkata Naga Singh, Sanjit Dagar, Reetika Rao, T. Subha Mastan Godla, Sanjiv Rao Baker El-Ebiary, Yousef A. Department of Electronics Engineering Yeshwantrao Chavan College of Engineering Maharashtra Nagpur India Department of CSE Graphic Era Hill University Dehradun248002 India Department of CSE Graphic Era Deemed to Be University Uttarakhand Dehradun248002 India Department of MBA-Sanjivani College of Engineering Savitribai Phule Pune University Pune India GD Goenka University Haryana Gurugram India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh Guntur India Department of Computer Science and Engineering Aditya University Andhra Pradesh Surampalem India Faculty of Informatics and Computing UniSZA University Malaysia
The advent of Artificial Intelligence (AI) has dramatically altered Customer Relationship Management (CRM) by allowing organizations to anticipate customer behavior, customize interactions and automate service deliver... 详细信息
来源: 评论
DR3DH: A DoS resistant extended triple Diffie–Hellman for mobile edge networks
收藏 引用
computer Networks 2025年 265卷
作者: Altaweel, Ala Bouridane, Ahmed Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH... 详细信息
来源: 评论
How Lasers Exploit Photoacoustic and Photoelectric Phenomena to Inject Signals into MEMS Microphones
收藏 引用
Journal of Hardware and Systems Security 2025年 1-17页
作者: Cyr, Benjamin Sumaria, Vedant Long, Yan Tadigadapa, Srinivas Sugawara, Takeshi Fu, Kevin Computer Science and Engineering University of Michigan Ann Arbor USA Electrical & Computer Engineering Northeastern University Boston USA Department of Informatics The University of Electro-Communications Tokyo Japan
An amplitude-modulated laser can be used to generate false, yet coherent acoustic signals on the outputs of MEMS microphones. While this vulnerability has ramifications on the security of cyber-physical systems that t...
来源: 评论