咨询与建议

限定检索结果

文献类型

  • 10,202 篇 会议
  • 5,568 篇 期刊文献
  • 273 册 图书
  • 7 篇 学位论文

馆藏范围

  • 16,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,284 篇 工学
    • 7,020 篇 计算机科学与技术...
    • 5,722 篇 软件工程
    • 1,883 篇 信息与通信工程
    • 1,266 篇 生物工程
    • 1,241 篇 控制科学与工程
    • 1,022 篇 生物医学工程(可授...
    • 744 篇 电气工程
    • 656 篇 光学工程
    • 602 篇 电子科学与技术(可...
    • 537 篇 机械工程
    • 408 篇 化学工程与技术
    • 361 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 293 篇 建筑学
  • 5,299 篇 理学
    • 2,632 篇 数学
    • 1,490 篇 物理学
    • 1,455 篇 生物学
    • 915 篇 统计学(可授理学、...
    • 550 篇 系统科学
    • 441 篇 化学
  • 2,781 篇 管理学
    • 1,468 篇 管理科学与工程(可...
    • 1,389 篇 图书情报与档案管...
    • 834 篇 工商管理
  • 1,122 篇 医学
    • 960 篇 临床医学
    • 854 篇 基础医学(可授医学...
    • 512 篇 药学(可授医学、理...
    • 450 篇 公共卫生与预防医...
  • 598 篇 法学
    • 513 篇 社会学
  • 360 篇 教育学
    • 334 篇 教育学
  • 315 篇 经济学
    • 311 篇 应用经济学
  • 205 篇 农学
  • 54 篇 文学
  • 29 篇 军事学
  • 24 篇 艺术学
  • 9 篇 哲学
  • 2 篇 历史学

主题

  • 356 篇 informatics
  • 299 篇 computational mo...
  • 267 篇 machine learning
  • 226 篇 deep learning
  • 197 篇 feature extracti...
  • 195 篇 semantics
  • 192 篇 computer archite...
  • 182 篇 predictive model...
  • 175 篇 data mining
  • 170 篇 training
  • 168 篇 educational inst...
  • 166 篇 visualization
  • 164 篇 optimization
  • 162 篇 internet of thin...
  • 154 篇 support vector m...
  • 152 篇 accuracy
  • 149 篇 monitoring
  • 139 篇 quality of servi...
  • 128 篇 covid-19
  • 128 篇 image segmentati...

机构

  • 107 篇 school of inform...
  • 103 篇 school of comput...
  • 87 篇 faculty of compu...
  • 68 篇 institute of art...
  • 68 篇 school of comput...
  • 65 篇 national institu...
  • 64 篇 college of compu...
  • 63 篇 graduate school ...
  • 60 篇 college of compu...
  • 60 篇 college of compu...
  • 56 篇 school of inform...
  • 55 篇 fujian key labor...
  • 45 篇 college of compu...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 39 篇 department of ph...

作者

  • 66 篇 ji rongrong
  • 44 篇 geyong min
  • 42 篇 alfred rayner
  • 36 篇 mustafa mamat
  • 35 篇 wang cheng
  • 33 篇 liu lantao
  • 33 篇 lai yu-kun
  • 33 篇 fox geoffrey
  • 33 篇 zivkovic miodrag
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo

语言

  • 15,467 篇 英文
  • 492 篇 其他
  • 90 篇 中文
  • 5 篇 葡萄牙文
  • 4 篇 日文
  • 3 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 捷克文
检索条件"机构=Computing and Informatics"
16050 条 记 录,以下是111-120 订阅
排序:
Cutting-edge approaches in intrusion detection systems: a systematic review of deep learning, reinforcement learning, and ensemble techniques
收藏 引用
Iran Journal of Computer Science 2025年 1-31页
作者: Kalpani, Nethma Rodrigo, Nureka Seneviratne, Dilmi Ariyadasa, Subhash Senanayake, Janaka Department of Computer Science and Informatics Uva Wellassa University Badulla Sri Lanka School of Computing Engineering and Technology Robert Gordon University Aberdeen AB10 7GJ United Kingdom
The growing number of networked devices and complex network infrastructures necessitates robust network security measures. Network intrusion detection systems are crucial for identifying and mitigating malicious activ... 详细信息
来源: 评论
Detecting data manipulation errors in android applications using scene-guided exploration
收藏 引用
Empirical Software Engineering 2025年 第4期30卷 1-38页
作者: Liu, Shuqi Zhou, Yu Yang, Wenhua Chen, Taolue Gall, Harald College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Computing and Mathematical Sciences Birkbeck University of London London United Kingdom Department of Informatics University of Zurich Zurich Switzerland
Data manipulation functionalities (DMFs) refer to operations such as create, read, update and delete which are crucial for maintaining the integrity of Android application (app) data. Existing testing techniques often... 详细信息
来源: 评论
Multi-input CNN: a deep learning-based approach for predicting breast cancer prognosis using multi-modal data
收藏 引用
Discover Data 2025年 第1期3卷 1-11页
作者: Uma Kandan, Shamita Alketbi, Mariam Mohamed Al Aghbari, Zaher College of Engineering University of Sharjah Sharjah UAE College of Computing and Informatics University of Sharjah Sharjah UAE
Breast cancer prognosis prediction is pivotal to improving the survival chances of breast cancer patients. Recently, deep learning models integrated with multi-modal data have been explored extensively to improve the ...
来源: 评论
Underwater Sonar Image Targets Detection Based on Improved RT-DETR
收藏 引用
IEEE Geoscience and Remote Sensing Letters 2025年 22卷
作者: Li, Ang Hamzah, Raseeda Gao, Yousheng Jiujiang Vocational University College of Information Engineering Jiangxi Jiujiang332000 China College of Computing Informatics and Mathematics Selangor Shah Alam40450 Malaysia Melaka College of Computing Informatics and Mathematics Jasin Melaka77300 Malaysia
Underwater sonar imagery is characterized by small target sizes and low resolution, which can result in detection failures or false positives. To counteract these challenges, we introduce the underwater sonar detectio... 详细信息
来源: 评论
A GPU-Accelerated High-Performance Design for CRYSTALS-Dilithium Digital Signature
A GPU-Accelerated High-Performance Design for CRYSTALS-Dilit...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Hien Nguyen Bertrand Cambou Tuy Tan Nguyen School of Informatics Computing and Cyber Systems Northern Arizona University USA
Our approach leverages the massive parallelism and computational power of a modern Graphics Processing Unit (GPU) to accelerate CRYSTALS-Dilithium's key operations. While post-quantum cryptographic algorithms like... 详细信息
来源: 评论
Latency Insensitivity Testing for Dataflow HLS Designs  25
Latency Insensitivity Testing for Dataflow HLS Designs
收藏 引用
33rd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, FPGA 2025
作者: Cheng, Jianyi Wang, Lianghui Jiang, Zijian Bao, Yungang Shi, Kan School of Informatics The University of Edinburgh Edinburgh United Kingdom Institute of Computing Technology Chinese Academy of Sciences University of Science and Technology of China Beijing China State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
Dataflow high-level synthesis (HLS) tools automatically map a high-level software program to a dataflow hardware design. When testing the design, the HLS tool takes a testing function written in the same software lang... 详细信息
来源: 评论
Cultural Heritage in The Digital Age: Evaluating User Experience in Virtual Reality Cultural Heritage Learning Application  27
Cultural Heritage in The Digital Age: Evaluating User Experi...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Afendi bin Abdul Ghani, Mohamad Shahfik Kiffli, Sudirman bin Kuan, Tenh Hock Shamsuddin, Syadiah Nor binti Wan Rahim, Normala binti Faculty of Creative Technology and Heritage Universiti Malaysia Kelantan Kelantan Bachok16300 Malaysia Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Terengganu Kuala Nerus21300 Malaysia
The Fourth Industrial Revolution (IR4.0) has transformed various sectors, including cultural heritage preservation, education, and tourism, through advanced technologies like virtual reality (VR). This study explores ... 详细信息
来源: 评论
Exploring Quantum Processors in Decentralized Edge computing for Improved Data Processing
Exploring Quantum Processors in Decentralized Edge Computing...
收藏 引用
Machine Learning and Autonomous Systems (ICMLAS), International Conference on
作者: Harshad Pitkar Luddy School of Informatics Computing and Engineering Indiana University Bloomington IN USA
The rapid growth of data generated by Internet of Things (IoT) devices necessitates the development of advanced computational frameworks that can efficiently handle real-time data processing. Traditional cloud and edg... 详细信息
来源: 评论
Efficient Medical File Protection via Adaptive CRP-based Ephemeral Key Encapsulation and Robust Error Correction
Efficient Medical File Protection via Adaptive CRP-based Eph...
收藏 引用
IEEE Annual computing and Communication Workshop and Conference (CCWC)
作者: Adil Alshammari Dina Ghanai Miandoab Sareh Assiri Bertrand Cambou Brit Riggs School of Informatics and Computing Northern Arizona University Flagstaff Arizona USA
Ahstract- The healthcare sector faces significant challenges in balancing adaptability, security, and resource efficiency in medi-cal file management. This paper introduces a lightweight protocol that optimizes crypto... 详细信息
来源: 评论
Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission  19
Optimizing VPN Security in Financial Services: Implementing ...
收藏 引用
19th International Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Ilias, Irma Syarlina Che Sameon, Sera Syarmila Zulkifli, Muhammad Zaqwan Ezzad Salleh, Mohammad Zahir Mat Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia College of Computing and Informatics Universiti Tenaga Nasional Selangor Malaysia CyberSecurity RawSec Kuala Lumpur Malaysia
This study examines the essential importance of security in contemporary network settings, emphasizing the increasing dependence on Virtual Private Networks (VPNs) for safe data transfer. The emphasis is on assessing ... 详细信息
来源: 评论