咨询与建议

限定检索结果

文献类型

  • 21,782 篇 会议
  • 19,363 篇 期刊文献
  • 514 册 图书

馆藏范围

  • 41,659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,275 篇 工学
    • 13,938 篇 计算机科学与技术...
    • 10,999 篇 软件工程
    • 5,217 篇 信息与通信工程
    • 4,155 篇 电子科学与技术(可...
    • 4,100 篇 电气工程
    • 3,373 篇 控制科学与工程
    • 3,020 篇 光学工程
    • 2,833 篇 生物工程
    • 2,581 篇 生物医学工程(可授...
    • 2,010 篇 化学工程与技术
    • 1,843 篇 材料科学与工程(可...
    • 1,639 篇 仪器科学与技术
    • 1,502 篇 机械工程
    • 1,346 篇 动力工程及工程热...
    • 874 篇 网络空间安全
    • 806 篇 力学(可授工学、理...
  • 17,375 篇 理学
    • 8,240 篇 物理学
    • 6,469 篇 数学
    • 3,506 篇 生物学
    • 2,441 篇 化学
    • 2,210 篇 统计学(可授理学、...
    • 1,293 篇 系统科学
  • 5,462 篇 管理学
    • 3,460 篇 管理科学与工程(可...
    • 2,117 篇 图书情报与档案管...
    • 1,680 篇 工商管理
  • 2,923 篇 医学
    • 2,363 篇 临床医学
    • 1,962 篇 基础医学(可授医学...
    • 1,208 篇 药学(可授医学、理...
    • 1,098 篇 公共卫生与预防医...
  • 1,010 篇 法学
    • 857 篇 社会学
  • 663 篇 经济学
  • 641 篇 农学
  • 397 篇 教育学
  • 173 篇 文学
  • 80 篇 军事学
  • 52 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 979 篇 accuracy
  • 971 篇 deep learning
  • 836 篇 machine learning
  • 819 篇 computer science
  • 612 篇 computational mo...
  • 602 篇 feature extracti...
  • 550 篇 training
  • 541 篇 artificial intel...
  • 532 篇 internet of thin...
  • 451 篇 real-time system...
  • 406 篇 support vector m...
  • 361 篇 predictive model...
  • 361 篇 convolutional ne...
  • 336 篇 optimization
  • 286 篇 reliability
  • 268 篇 scalability
  • 255 篇 data models
  • 232 篇 computer archite...
  • 227 篇 neural networks
  • 226 篇 reinforcement le...

机构

  • 1,105 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 979 篇 physikalisches i...
  • 703 篇 university of ch...
  • 658 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 596 篇 fakultät physik ...
  • 593 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 553 篇 department of ph...
  • 544 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 524 篇 school of physic...
  • 523 篇 iccub universita...
  • 523 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 513 篇 stfc rutherford ...

作者

  • 265 篇 barter w.
  • 254 篇 a. gomes
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 231 篇 c. amelung
  • 231 篇 s. chen
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 j. wang
  • 229 篇 d. calvet
  • 229 篇 brundu d.
  • 227 篇 blake t.
  • 226 篇 g. spigo
  • 226 篇 bowcock t.j.v.
  • 222 篇 f. siegert
  • 221 篇 amato s.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.

语言

  • 39,533 篇 英文
  • 1,781 篇 其他
  • 345 篇 中文
  • 20 篇 日文
  • 9 篇 德文
  • 9 篇 法文
  • 5 篇 朝鲜文
  • 3 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department Computer Science and Computer Engineering and Applied Computing Research Institute"
41659 条 记 录,以下是41-50 订阅
排序:
Deep Neural Network Empowered Movie Recommender System Using Hesitant Fuzzy Bi Objective Clustering
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 1-11页
作者: Shrivastava, Vineet Kumar, Suresh Department of Computer Science and Engineering Manav Rachna International Institute of Research and Studies Haryana Faridabad India
The movie recommender system is a highly influential and practical tool that assists individuals in efficiently choosing films to watch. Although recommender systems have been extensively used in academic research for... 详细信息
来源: 评论
Out-of-Distribution Data: An Acquaintance of Adversarial Examples - A Survey
收藏 引用
ACM computing Surveys 2025年 第8期57卷 1-40页
作者: Karunanayake, Naveen Gunawardena, Ravin Seneviratne, Suranga Chawla, Sanjay School of Computer Science The University of Sydney Sydney Australia Computer Science and Engineering University of New South Wales Sydney Australia Qatar Computing Research Institute Doha Qatar and Hamad Bin Khalifa University Doha Qatar
Deep neural networks (DNNs) deployed in real-world applications can encounter out-of-distribution (OOD) data and adversarial examples. These represent distinct forms of distributional shifts that can significantly imp... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
science China(Information sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
An Assessment Towards 2D and 3D Human Pose Estimation and its Applications to Activity Recognition: A Review
收藏 引用
SN computer science 2025年 第2期6卷 1-24页
作者: Verma, Pratishtha Srivastava, Rajeev Tripathy, Santosh Kumar Department of Computer Engineering National Institute of Technology Haryana Kurukshetra India Computer Science and Engineering IIT BHU Varanasi India Department of Computing Science and Engineering National Institute of Technology Patna Bihar Patna India
Human pose estimation (HPE) from images or video is not only a major issue of computer vision, but also it plays a vital role in many real-world applications. The most challenging problems of human pose estimation are... 详细信息
来源: 评论
Enhancing Healthcare Record Privacy Through the Integration of Visual Cryptography and Diverse Image Encryption Techniques  9
Enhancing Healthcare Record Privacy Through the Integration ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Sandeep, Dayina Ganesh, Addala Siva Krishna, Angalakurthi Jaya Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
The methodology of this research focuses on analyzing real-world breaches, such as the Star Health Insurance leak, and demonstrating how multi-layered encryption techniques could have mitigated the impact. By splittin... 详细信息
来源: 评论
Clinical deep model to analyse medical multivariate time-series data for health diagnosis
收藏 引用
Cyber-Physical Systems 2025年 第2期11卷 139-164页
作者: Almahadeen, Layth Vijay, Richa Shabaz, Mohammad Soni, Mukesh Singh, Pavitar Parkash Patel, Pavan Byeon, Haewon Department of Financial and Administrative Sciences Al- Balqa’Applied University Al-Salt Jordan Department of computer science Amity University UP Noida India Department of Computer Science Engineering Model Institute of Engineering and Technology Jammu Jammu and Kashmir India Department of Computer Science Engineering University Centre for Research & Development Chandigarh University Mohali India Department of Management Lovely Professional University Phagwara India Department of Computer Science Engineering Ahmedabad Institute of Technology Ahmedabad India Department of Digital Anti-Aging Healthcare Inje University Gimhae Korea Republic of
Clinical auxiliary decision-making is related to life and health of patients, so the deep model needs to extract the personalised representation of patients to ensure high analysis and prediction accuracy;and provide ... 详细信息
来源: 评论
Secure Student Record Management using Visual Cryptography in Educational Systems  9
Secure Student Record Management using Visual Cryptography i...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Kiranchandu, E. Gireesh, C. Kiran, G. Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
Cloud computing is vital for data transmission and storage in the digital era, highlighting the urgent requirement for strong data security measures. Conventional encryption techniques such as RSA, while dependable, h... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
TRS Scheduling for Improved QoS Performance in Cloud System
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1547-1559页
作者: G.John Samuel Babu M.Baskar Department of Computer Science and Engineering School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChengalpattuTamilnadu603203India Department of Computing Technologies School of ComputingCollege of Engineering andTechnologySRM Institute of Science and TechnologyKattankulathurChengalpattuTamilnadu603203India
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli... 详细信息
来源: 评论