咨询与建议

限定检索结果

文献类型

  • 42,726 篇 会议
  • 26,412 篇 期刊文献
  • 693 册 图书

馆藏范围

  • 69,831 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 43,015 篇 工学
    • 31,878 篇 计算机科学与技术...
    • 26,741 篇 软件工程
    • 10,400 篇 信息与通信工程
    • 6,311 篇 控制科学与工程
    • 5,982 篇 生物工程
    • 5,118 篇 生物医学工程(可授...
    • 4,806 篇 电气工程
    • 3,879 篇 电子科学与技术(可...
    • 3,497 篇 光学工程
    • 2,607 篇 机械工程
    • 2,224 篇 仪器科学与技术
    • 2,079 篇 化学工程与技术
    • 1,989 篇 动力工程及工程热...
    • 1,893 篇 网络空间安全
    • 1,751 篇 安全科学与工程
    • 1,580 篇 交通运输工程
  • 24,979 篇 理学
    • 12,509 篇 数学
    • 7,128 篇 生物学
    • 6,654 篇 物理学
    • 4,849 篇 统计学(可授理学、...
    • 2,448 篇 系统科学
    • 2,438 篇 化学
  • 13,240 篇 管理学
    • 7,517 篇 管理科学与工程(可...
    • 6,222 篇 图书情报与档案管...
    • 3,805 篇 工商管理
  • 5,591 篇 医学
    • 4,591 篇 临床医学
    • 4,102 篇 基础医学(可授医学...
    • 2,510 篇 公共卫生与预防医...
    • 2,316 篇 药学(可授医学、理...
  • 2,493 篇 法学
    • 2,109 篇 社会学
  • 1,496 篇 经济学
  • 1,178 篇 农学
  • 1,013 篇 教育学
  • 326 篇 文学
  • 136 篇 军事学
  • 107 篇 艺术学
  • 12 篇 哲学
  • 12 篇 历史学

主题

  • 2,259 篇 accuracy
  • 1,975 篇 deep learning
  • 1,846 篇 machine learning
  • 1,661 篇 computer science
  • 1,607 篇 data mining
  • 1,596 篇 data models
  • 1,532 篇 training
  • 1,487 篇 feature extracti...
  • 1,312 篇 computational mo...
  • 1,256 篇 predictive model...
  • 1,128 篇 internet of thin...
  • 1,006 篇 real-time system...
  • 988 篇 support vector m...
  • 926 篇 artificial intel...
  • 924 篇 convolutional ne...
  • 669 篇 optimization
  • 645 篇 cloud computing
  • 605 篇 semantics
  • 605 篇 security
  • 573 篇 wireless sensor ...

机构

  • 976 篇 cavendish labora...
  • 945 篇 department of ph...
  • 884 篇 oliver lodge lab...
  • 864 篇 physikalisches i...
  • 597 篇 university of ch...
  • 559 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 511 篇 horia hulubei na...
  • 501 篇 school of physic...
  • 500 篇 imperial college...
  • 497 篇 school of physic...
  • 490 篇 nikhef national ...
  • 489 篇 stfc rutherford ...
  • 484 篇 iccub universita...
  • 482 篇 h.h. wills physi...
  • 476 篇 school of physic...
  • 476 篇 physik-institut ...
  • 470 篇 henryk niewodnic...
  • 468 篇 department of co...
  • 468 篇 school of physic...

作者

  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 235 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 s. chen
  • 211 篇 c. alexa
  • 211 篇 brundu d.
  • 211 篇 bowcock t.j.v.
  • 210 篇 j. m. izen
  • 209 篇 g. bella
  • 209 篇 j. strandberg
  • 209 篇 d. calvet
  • 209 篇 c. amelung
  • 203 篇 blake t.
  • 202 篇 boettcher t.
  • 201 篇 amato s.
  • 199 篇 betancourt c.
  • 198 篇 borsato m.
  • 195 篇 g. spigo
  • 194 篇 m. gandelman

语言

  • 63,669 篇 英文
  • 5,608 篇 其他
  • 577 篇 中文
  • 31 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 7 篇 斯洛文尼亚文
  • 6 篇 朝鲜文
  • 3 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
69831 条 记 录,以下是871-880 订阅
排序:
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
IoT-Based Indoor Air Quality Management System for Intelligent Education Environments
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18031-18041页
作者: Rosa-Bilbao, Jesus Butt, Fatima Sajid Merkl, David Wagner, Matthias F. Schafer, Jorg Boubeta-Puig, Juan University of Cadiz Department of Computer Science and Engineering Cádiz11519 Spain University of Cadiz School of Engineering Cádiz11519 Spain Frankfurt University of Applied Sciences FB2 Computer Science and Engineering Frankfurt60318 Germany
One of the leading causes of early health detriment is the increasing levels of air pollution in major cities and eventually in indoor spaces. Monitoring the air quality effectively in closed spaces like educational i... 详细信息
来源: 评论
Predicting Anger Proneness Using Deep Learning Techniques  9
Predicting Anger Proneness Using Deep Learning Techniques
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Adhinegoro, Ammar Yaafi Adiputra, Ida Bagus Gede Purwa Manik Tionando, Vincent Colin Setiawan, Karli Eka Hasani, Muhammad Fikri Bina Nusantara University Computer Science Department Jakarta Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta Indonesia
High levels of anger proneness can affect the individuals and others around them in the society. Anger proneness or the likelihood of experiencing anger in response to certain stimuli or situations is influenced by a ... 详细信息
来源: 评论
Domain Adaptation in Color-Shifted datasets Through Adversarial Learning Balancing  4
Domain Adaptation in Color-Shifted Datasets Through Adversar...
收藏 引用
4th International Conference on Artificial Intelligence and data sciences, AiDAS 2023
作者: Hidayaturrahman Trisetyarso, Agung Kartowisastro, Iman Herwidiana Budiharto, Widodo School of Computer Science Bina Nusatara University Mathematics Department Jakarta11480 Indonesia Bina Nusatara University Binus Graduate Program-Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Faculty of Engineering Computer Engineering Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Due to the disparity in the levels of difficulty presented by the several tasks, doing domain adaptation in an adversarial way may result in an imbalanced learning process. In the MNIST dataset, this phenomenon also m... 详细信息
来源: 评论
Trade Ease with Machine Learning and AWS
收藏 引用
IEEE Access 2023年 11卷 25893-25905页
作者: Teja, Kamurthi Ravi Liu, Chuan-Ming National Taipei University of Technology International Program of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
Global trading is undergoing significant changes, necessitating modifications to the trading strategies. This study presents a newly developed cloud-based trading strategy that uses Amazon Web Services (AWS), machine ... 详细信息
来源: 评论
Emotional Reactivity Classification Using Artificial Intelligence Based on Twitter in Bahasa Indonesia  3
Emotional Reactivity Classification Using Artificial Intelli...
收藏 引用
3rd IEEE International Conference on Social sciences and Intelligence Management, SSIM 2023
作者: Paramita, Greta V. Andangsari, Esther W. Kemala, Ade P. Ali, Moondore M. Putri, Trisa M. Puspita, Katarina I. Bina Nusantara University Faculty of Humanities Psychology Department Jakarta Indonesia Data Science Program School of Computer Science Bina Nusantara University Jakarta Indonesia
Twitter is one of Indonesia's most widely used social media to express positive and negative emotions. Negative emotions are referred to as emotional reactivity, an example of which is depression. To detect emotio... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
Aerial Reliable Collaborative Communications for Terrestrial Mobile Users via Evolutionary Multi-Objective Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5731-5748页
作者: Sun, Geng Xiao, Jian Li, Jiahui Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen the College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China the College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore the School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore the School of Automation Guangdong University of Technology Guangzhou510641 China the Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati... 详细信息
来源: 评论
Signup page using Face recognition authentication
Signup page using Face recognition authentication
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Modi, Akash Rayar, Prajwal V Kavya, A.G. Vaishnavi, R. Dravya, B.S. Tamilarisi, R. Alliance School of Advanced Computing Department of Computer Science Bengaluru India
Improvements in artificial intelligence and machine learning have led to the growing integration of face recognition technology for a wide range of applications, from security systems to social media. Three related us... 详细信息
来源: 评论
Introduction to the Special Issue on the Bottleneck of Blockchain Techniques Scalability,Security and Privacy Protection
收藏 引用
computer Modeling in Engineering & sciences 2024年 第12期141卷 1933-1937页
作者: Shen Su Daojing He Neeraj Kumar Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Computer Science and Technology Harbin Institute of Technology(Shenzhen)Shenzhen518055China Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004India
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi... 详细信息
来源: 评论