咨询与建议

限定检索结果

文献类型

  • 42,852 篇 会议
  • 26,414 篇 期刊文献
  • 693 册 图书

馆藏范围

  • 69,959 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 43,100 篇 工学
    • 31,791 篇 计算机科学与技术...
    • 26,664 篇 软件工程
    • 10,382 篇 信息与通信工程
    • 6,297 篇 控制科学与工程
    • 5,976 篇 生物工程
    • 5,099 篇 生物医学工程(可授...
    • 4,774 篇 电气工程
    • 3,878 篇 电子科学与技术(可...
    • 3,453 篇 光学工程
    • 2,612 篇 机械工程
    • 2,208 篇 仪器科学与技术
    • 2,076 篇 化学工程与技术
    • 1,989 篇 动力工程及工程热...
    • 1,894 篇 网络空间安全
    • 1,745 篇 安全科学与工程
    • 1,574 篇 交通运输工程
  • 24,883 篇 理学
    • 12,492 篇 数学
    • 7,119 篇 生物学
    • 6,632 篇 物理学
    • 4,867 篇 统计学(可授理学、...
    • 2,443 篇 系统科学
    • 2,430 篇 化学
  • 13,208 篇 管理学
    • 7,508 篇 管理科学与工程(可...
    • 6,210 篇 图书情报与档案管...
    • 3,804 篇 工商管理
  • 5,552 篇 医学
    • 4,568 篇 临床医学
    • 4,073 篇 基础医学(可授医学...
    • 2,475 篇 公共卫生与预防医...
    • 2,315 篇 药学(可授医学、理...
  • 2,482 篇 法学
    • 2,102 篇 社会学
  • 1,495 篇 经济学
  • 1,173 篇 农学
  • 1,007 篇 教育学
  • 325 篇 文学
  • 135 篇 军事学
  • 108 篇 艺术学
  • 12 篇 哲学
  • 12 篇 历史学

主题

  • 2,306 篇 accuracy
  • 2,016 篇 deep learning
  • 1,860 篇 machine learning
  • 1,659 篇 computer science
  • 1,619 篇 data models
  • 1,609 篇 data mining
  • 1,544 篇 training
  • 1,511 篇 feature extracti...
  • 1,338 篇 computational mo...
  • 1,271 篇 predictive model...
  • 1,151 篇 internet of thin...
  • 1,059 篇 real-time system...
  • 998 篇 support vector m...
  • 943 篇 artificial intel...
  • 932 篇 convolutional ne...
  • 684 篇 optimization
  • 659 篇 cloud computing
  • 634 篇 security
  • 608 篇 semantics
  • 577 篇 wireless sensor ...

机构

  • 979 篇 cavendish labora...
  • 950 篇 department of ph...
  • 887 篇 oliver lodge lab...
  • 871 篇 physikalisches i...
  • 600 篇 university of ch...
  • 566 篇 fakultät physik ...
  • 520 篇 department of ph...
  • 512 篇 horia hulubei na...
  • 504 篇 school of physic...
  • 501 篇 imperial college...
  • 496 篇 school of physic...
  • 488 篇 stfc rutherford ...
  • 488 篇 nikhef national ...
  • 483 篇 h.h. wills physi...
  • 482 篇 iccub universita...
  • 481 篇 school of physic...
  • 475 篇 physik-institut ...
  • 470 篇 department of co...
  • 469 篇 henryk niewodnic...
  • 465 篇 school of physic...

作者

  • 255 篇 barter w.
  • 239 篇 a. gomes
  • 236 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 s. chen
  • 216 篇 brundu d.
  • 211 篇 bowcock t.j.v.
  • 210 篇 c. alexa
  • 210 篇 blake t.
  • 209 篇 j. m. izen
  • 207 篇 g. bella
  • 207 篇 j. strandberg
  • 207 篇 d. calvet
  • 207 篇 c. amelung
  • 205 篇 boettcher t.
  • 204 篇 betancourt c.
  • 204 篇 amato s.
  • 203 篇 borsato m.
  • 199 篇 bencivenni g.
  • 197 篇 bay a.

语言

  • 58,546 篇 英文
  • 10,890 篇 其他
  • 599 篇 中文
  • 31 篇 日文
  • 15 篇 德文
  • 13 篇 法文
  • 13 篇 斯洛文尼亚文
  • 6 篇 朝鲜文
  • 3 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
69959 条 记 录,以下是1171-1180 订阅
排序:
Recognition of data Breach Method from Story Using Advanced Deep Learning  3
Recognition of Data Breach Method from Story Using Advanced ...
收藏 引用
3rd International Conference for Innovation in Technology, INOCON 2024
作者: Jeba, Samiha Maisha Aurpa, Tanjim Taharat Alom, Md Samiul Joy, Md. Wadud Mahmud Ahamed, Asm Shakil Dash, Satya Ranjan Ahmed, Md Shoaib International University of Business Agriculture and Technology Dept. of Computer Science and Engineering Bangladesh Bangabandhu Sheikh Mujibur Rahman Digital University Department of Data Science Bangladesh Kiit University School of Computer Applications Odisha India Boise State University Department of Computer Science BoiseID United States
We often open our eyes in the morning with the appalling news of data breaches of different popular companies. This is a significant threat not only to giant companies but also to the general people's privacy. Var... 详细信息
来源: 评论
Massive Parallel Simulation for Tensor Network Contraction Ordering Solving  4
Massive Parallel Simulation for Tensor Network Contraction O...
收藏 引用
4th International Conference on Neural Networks, Information and Communication Engineering, NNICE 2024
作者: Xu, Wei Tong, Weiqin Liu, Xiaoyang Shanghai University School of Computer Engineering and Science Shanghai China Rensselaer Polytechnic Institute Department of Computer Science New York United States
Tensor network contraction is a powerful mathematical tool for dealing with complex systems and high-dimensional data, which is widely used in classical simulations of molecules and quantum circuits. To improve the pe... 详细信息
来源: 评论
Regression-Based Exploration of Factors Influencing Movie Profits
Regression-Based Exploration of Factors Influencing Movie Pr...
收藏 引用
International Seminar on Application for Technology of Information and Communication (ISemantic)
作者: Lindawaty Veronica Tifara Beata Wibowo Alexander Agung Santoso Gunawan Karli Eka Setiawan Computer Science Department Data Science Program School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Accurate box office prediction is crucial for managing financial risks in film production. The internet has transformed consumer behavior, affecting marketing strategies. Critical online reviews, more than early reven... 详细信息
来源: 评论
Resource Allocation in Edge Computing Environment Using Deterministic Policy Gradient Algorithm  10
Resource Allocation in Edge Computing Environment Using Dete...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Shabariram, C.P. Shanthi, N. Ponnuswamy, P. Priya Subramaniyaswamy, V. Sathana, V. Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India Kongu Engineering College Department of Computer Science and Engineering Erode India School of Computing Sastra University Department of Computer Science and Engineering Thanjavur India
In recent years, the edge computing paradigm enables the movement of processing units and storage nearer to the data available locations. The mechanism completes the computation in a short span of time in minimum band... 详细信息
来源: 评论
CE-CDNet:A Transformer-Based Channel Optimization Approach for Change Detection in Remote Sensing
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 803-822页
作者: Jia Liu Hang Gu Fangmei Liu Hao Chen Zuhe Li Gang Xu Qidong Liu Wei Wang School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450002China Department of Computing Xi’an Jiaotong-Liverpool UniversitySuzhou215123China
In recent years,convolutional neural networks(CNN)and Transformer architectures have made significant progress in the field of remote sensing(RS)change detection(CD).Most of the existing methods directly stack multipl... 详细信息
来源: 评论
Intention to Participate in MOOCs: Case of University Students in Northwestern Nigeria During COVID-19 Pandemic
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第7期17卷 97-117页
作者: Ahmed, Abubakar Mu’azu Abdullah, Nor Athiyah Husin, Mohd Heikal Bello, Hassan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Malaysia Department of Computer Science Kaduna State University Kaduna Nigeria
Massive open online courses (MOOCs) have been introduced over the past few decades to account for the twenty-first-era education and recent COVID-19 pandemic trials driven by the spread of internet-based technology on... 详细信息
来源: 评论
Applying an Information Retrieval Approach to Retrieve Relevant Articles in the Legal Domain
收藏 引用
Annals of data science 2024年 第5期11卷 1563-1580页
作者: Kanapala, Ambedkar Pal, Sukomal Dara, Suresh Jannu, Srikanth Department of Computer Science and Engineering Geethanjali College of Engineering and Technology TS Hyderabad501301 India Varanasi India School of Technology Woxsen University TS Hyderabad502345 India Department of Computer Science and Engineering Vaagdevi Engineering College TS Warangal506005 India
Retrieving legal texts is an important step for building a question answering system on law domain, which needs relevant articles to answer a query. Remarkable research has been done on legal information retrieval. Ho... 详细信息
来源: 评论
Towards More Robust and Scalable Deep Learning Systems for Medical Image Analysis
Towards More Robust and Scalable Deep Learning Systems for M...
收藏 引用
2024 IEEE International Conference on Big data, Bigdata 2024
作者: Yenumala, Akshaj Zhang, Xinyue Lo, Dan School of Computer Science Georgia Institute of Technology Atlanta United States Kennesaw State University Department of Computer Science Kennesaw United States
Deep learning (DL) has attracted interest in healthcare for disease diagnosis systems in medical imaging analysis (MedIA) and is especially applicable in Big data environments like federated learning (FL) and edge com... 详细信息
来源: 评论
Extensive analysis of IoT Architecture and Access Control Policies in Fog Enabled Environment  2
Extensive analysis of IoT Architecture and Access Control Po...
收藏 引用
2nd International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2024
作者: Lalit, Mohit Maurya, Sant Kumar Khurana, Shiraz Gupta, Nishant Computer Science and Engineering Department Chandigarh University Punjab Mohali India Computer Science and Engineering Department School of ICT Gautam Buddha University Greater Noida India Computer Science and Engineering Department Sharda University Greater Noida India
Cloud technology provides solutions to a variety of software platform and data accessibility issues. However, as the industrial revolution 4.0 progresses, innovations such as healthcare 4.0 smart buildings, IoT enable... 详细信息
来源: 评论
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 38-44页
作者: Mianjie Li Senfeng Lai Jiao Wang Zhihong Tian Nadra Guizani Xiaojiang Du Chun Shan School of Electronics and Information Guangdong Polytechnic Normal UniversityGuangzhou510665China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Schoolof Electrical Engineering and Computer Science Washington State UniversityPullmanWA99164USA Department of Computer and Information Science Temple UniversityPhiladelphiaPA19122USA
Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication *** that intelligent applications to B5G wireless communications will involve security issues regarding user data and opera... 详细信息
来源: 评论