咨询与建议

限定检索结果

文献类型

  • 30,657 篇 会议
  • 20,745 篇 期刊文献
  • 432 册 图书

馆藏范围

  • 51,834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,323 篇 工学
    • 21,994 篇 计算机科学与技术...
    • 17,644 篇 软件工程
    • 6,513 篇 信息与通信工程
    • 4,512 篇 控制科学与工程
    • 3,654 篇 电气工程
    • 3,454 篇 生物工程
    • 3,140 篇 电子科学与技术(可...
    • 2,486 篇 生物医学工程(可授...
    • 2,283 篇 光学工程
    • 2,027 篇 机械工程
    • 1,763 篇 化学工程与技术
    • 1,483 篇 动力工程及工程热...
    • 1,478 篇 材料科学与工程(可...
    • 1,448 篇 仪器科学与技术
    • 1,172 篇 网络空间安全
    • 1,095 篇 安全科学与工程
  • 19,005 篇 理学
    • 9,710 篇 数学
    • 6,501 篇 物理学
    • 3,903 篇 生物学
    • 3,081 篇 统计学(可授理学、...
    • 1,986 篇 化学
    • 1,844 篇 系统科学
  • 8,431 篇 管理学
    • 5,078 篇 管理科学与工程(可...
    • 3,690 篇 图书情报与档案管...
    • 2,301 篇 工商管理
  • 2,487 篇 医学
    • 2,108 篇 临床医学
    • 1,865 篇 基础医学(可授医学...
    • 1,119 篇 药学(可授医学、理...
    • 1,086 篇 公共卫生与预防医...
  • 1,415 篇 法学
    • 1,131 篇 社会学
  • 881 篇 经济学
  • 652 篇 农学
  • 617 篇 教育学
  • 174 篇 文学
  • 115 篇 军事学
  • 110 篇 艺术学
  • 33 篇 哲学
  • 12 篇 历史学

主题

  • 1,324 篇 accuracy
  • 1,287 篇 deep learning
  • 1,144 篇 feature extracti...
  • 1,088 篇 computational mo...
  • 1,011 篇 machine learning
  • 992 篇 training
  • 890 篇 computer science
  • 696 篇 predictive model...
  • 633 篇 semantics
  • 603 篇 real-time system...
  • 595 篇 data models
  • 589 篇 internet of thin...
  • 487 篇 artificial intel...
  • 471 篇 support vector m...
  • 469 篇 data mining
  • 455 篇 optimization
  • 449 篇 convolutional ne...
  • 435 篇 cloud computing
  • 410 篇 neural networks
  • 409 篇 educational inst...

机构

  • 910 篇 institute of com...
  • 859 篇 university of ch...
  • 353 篇 university of sc...
  • 265 篇 school of comput...
  • 210 篇 college of intel...
  • 209 篇 institute of hig...
  • 166 篇 key laboratory o...
  • 164 篇 department of co...
  • 155 篇 department of co...
  • 147 篇 department of co...
  • 146 篇 college of compu...
  • 141 篇 shandong provinc...
  • 138 篇 college of compu...
  • 131 篇 school of comput...
  • 124 篇 key laboratory o...
  • 112 篇 faculty of compu...
  • 110 篇 school of comput...
  • 109 篇 department of ph...
  • 103 篇 department of co...
  • 92 篇 school of mathem...

作者

  • 314 篇 hai jin
  • 197 篇 niyato dusit
  • 196 篇 jin hai
  • 158 篇 cheng xueqi
  • 114 篇 bastieri d.
  • 89 篇 zhang lei
  • 87 篇 ferrara g.
  • 87 篇 ardid m.
  • 86 篇 calvo d.
  • 85 篇 chen a.
  • 82 篇 li xin
  • 76 篇 fang j.
  • 76 篇 feng c.f.
  • 76 篇 li cheng
  • 69 篇 gal t.
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 64 篇 bozza c.
  • 57 篇 liu d.
  • 56 篇 wang lei

语言

  • 44,368 篇 英文
  • 6,988 篇 其他
  • 547 篇 中文
  • 21 篇 日文
  • 9 篇 德文
  • 4 篇 俄文
  • 4 篇 斯洛文尼亚文
  • 3 篇 法文
  • 3 篇 葡萄牙文
  • 2 篇 西班牙文
  • 1 篇 捷克文
检索条件"机构=Computing Science and Technology"
51834 条 记 录,以下是61-70 订阅
排序:
A reinforcement learning based backup queue strategy for reliable and fault tolerant scheduling
收藏 引用
International Journal of Information technology (Singapore) 2025年 1-6页
作者: Archana, R. Kumar, K. Pradeep Mohan Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India
Fog computing has the capability to perform tasks in the local distributed environment within the expected time period. The approaches used for managing the faults in a fog computing environment are not competent to r... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
Path signature-based XAI-enabled network time series classification
收藏 引用
science China(Information sciences) 2024年 第7期67卷 91-106页
作者: Le SUN Yueyuan WANG Yongjun REN Feng XIA Department of Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science and Technology School of Computing Technologies Royal Melbourne Institute of Technology
Classifying network time series(NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks,and the monitoring o... 详细信息
来源: 评论
Energy-Efficient Dynamic Configurable Datapath Architecture for IoT Devices
收藏 引用
Journal of Communications and Information Networks 2024年 第3期9卷 251-261页
作者: Ruizhe Zhang Junhui Liu Han Wang Li Lu Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfigurati... 详细信息
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
science China(Information sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of Computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Computer-Aided Diagnosis Model Using Machine Learning for Brain Tumor Detection and Classification
收藏 引用
Computer Systems science & Engineering 2023年 第8期46卷 1811-1826页
作者: M.Uvaneshwari M.Baskar Department of Computer Science and Engineering School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChengalpattu603203TamilnaduIndia Department of Computing Technologies School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChengalpattu603203TamilnaduIndia
The Brain Tumor(BT)is created by an uncontrollable rise of anomalous cells in brain tissue,and it consists of 2 types of cancers they are malignant and benign *** benevolent BT does not affect the neighbouring healthy... 详细信息
来源: 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Detecting the symptoms of COVID-19 during pandemic environment using smart spectacle thermal images and deep capsule networks
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4475-4501页
作者: Dwarakanath, B. Pandimurugan, V. Mohandas, R. Sambath, M. Baiju, B.V. Chinnasamy, A. SRM Institute of Science and Technology Ramapuram Chennai India Networking and Communications School of Computing SRMIST kattankulathur Chennai India Computational Intelligence School of Computing SRMIST kattankulathur Chennai India Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India School of Computer Science and Engineering Vellore Institute of Technology Vellore India Department of Data Science and Business Systems School of Computing SRMIST kattankulathur Chennai India
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known... 详细信息
来源: 评论
Anomaly graph: leveraging dynamic graph convolutional networks for enhanced video anomaly detection in surveillance and security applications
收藏 引用
Neural computing and Applications 2024年 第20期36卷 12011-12028页
作者: Chiranjeevi, V. Rahul Malathi, D. Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Chennai603203 India
Video abnormality behavior identification plays a pivotal role in improving the safety and security of surveillance systems by identifying unusual events within video streams. However, existing methods face challenges... 详细信息
来源: 评论