咨询与建议

限定检索结果

文献类型

  • 67,361 篇 会议
  • 37,123 篇 期刊文献
  • 1,275 册 图书

馆藏范围

  • 105,759 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 63,153 篇 工学
    • 45,322 篇 计算机科学与技术...
    • 36,250 篇 软件工程
    • 15,561 篇 信息与通信工程
    • 9,746 篇 控制科学与工程
    • 7,318 篇 电气工程
    • 7,130 篇 生物工程
    • 6,605 篇 电子科学与技术(可...
    • 5,609 篇 生物医学工程(可授...
    • 4,261 篇 机械工程
    • 4,182 篇 光学工程
    • 3,247 篇 仪器科学与技术
    • 3,135 篇 化学工程与技术
    • 3,029 篇 动力工程及工程热...
    • 2,576 篇 网络空间安全
    • 2,534 篇 安全科学与工程
    • 2,179 篇 交通运输工程
  • 35,863 篇 理学
    • 18,182 篇 数学
    • 11,281 篇 物理学
    • 8,177 篇 生物学
    • 5,783 篇 统计学(可授理学、...
    • 4,043 篇 系统科学
    • 3,412 篇 化学
  • 18,639 篇 管理学
    • 11,138 篇 管理科学与工程(可...
    • 8,279 篇 图书情报与档案管...
    • 5,348 篇 工商管理
  • 5,908 篇 医学
    • 4,940 篇 临床医学
    • 4,331 篇 基础医学(可授医学...
    • 2,600 篇 药学(可授医学、理...
    • 2,520 篇 公共卫生与预防医...
  • 3,150 篇 法学
    • 2,563 篇 社会学
  • 2,003 篇 经济学
  • 1,521 篇 农学
  • 1,461 篇 教育学
  • 569 篇 文学
  • 249 篇 军事学
  • 191 篇 艺术学
  • 31 篇 哲学
  • 21 篇 历史学

主题

  • 3,373 篇 computer science
  • 2,461 篇 accuracy
  • 2,357 篇 deep learning
  • 2,296 篇 feature extracti...
  • 2,144 篇 machine learning
  • 1,982 篇 computational mo...
  • 1,675 篇 training
  • 1,589 篇 data mining
  • 1,415 篇 artificial intel...
  • 1,404 篇 support vector m...
  • 1,385 篇 internet of thin...
  • 1,318 篇 information tech...
  • 1,143 篇 optimization
  • 1,136 篇 predictive model...
  • 919 篇 security
  • 910 篇 neural networks
  • 897 篇 educational inst...
  • 893 篇 convolutional ne...
  • 887 篇 wireless sensor ...
  • 875 篇 computer archite...

机构

  • 1,100 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 967 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 910 篇 department of co...
  • 700 篇 university of ch...
  • 621 篇 infn laboratori ...
  • 611 篇 infn sezione di ...
  • 592 篇 infn sezione di ...
  • 578 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 549 篇 department of ph...
  • 540 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 516 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 515 篇 school of physic...
  • 513 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 255 篇 barter w.
  • 248 篇 a. gomes
  • 238 篇 c. alexa
  • 237 篇 beiter a.
  • 235 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 230 篇 c. amelung
  • 228 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 s. chen
  • 224 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 brundu d.
  • 217 篇 betancourt c.
  • 216 篇 g. spigo
  • 215 篇 borsato m.
  • 212 篇 bencivenni g.

语言

  • 99,083 篇 英文
  • 5,550 篇 其他
  • 1,086 篇 中文
  • 102 篇 日文
  • 24 篇 斯洛文尼亚文
  • 20 篇 德文
  • 15 篇 法文
  • 7 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department Of Computer Science Faculty of Computer Science and Information Technology"
105759 条 记 录,以下是81-90 订阅
排序:
Generative adversarial networks based motion learning towards robotic calligraphy synthesis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 452-466页
作者: Xiaoming Wang Yilong Yang Weiru Wang Yuanhua Zhou Yongfeng Yin Zhiguo Gong Department of Computer and Information Science University of MacaoMacaoChina School of Software Beihang UniversityBeijingChina Department of Computer Science and Technology Faculty of Information TechnologyBeijing University of TechnologyBeijingChina School of Foreign Languages Guangzhou Huashang CollegeGuangzhouChina
Robot calligraphy visually reflects the motion capability of robotic *** traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a gen... 详细信息
来源: 评论
An Improved Graph Partitioning Algorithm Based Approach for Workflow Offloading in a Fog Environment
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 623-634页
作者: Mahajan, Neetu Narang Kaur, Parmeet Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India
The paper addresses the critical problem of application workflow offloading in a fog environment. Resource constrained mobile and Internet of Things devices may not possess specialized hardware to run complex workflow... 详细信息
来源: 评论
Data Hiding Methods Using Voting Strategy and Mapping Table
收藏 引用
Journal of Internet technology 2024年 第3期25卷 365-377页
作者: Chi, Hengxiao Chang, Chin-Chen Lin, Chia-Chen Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base... 详细信息
来源: 评论
Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 297-320页
作者: Rasha Almarshdi Laila Nassef Etimad Fadel Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science Faculty of Computer Science and EngineeringUniversity of HailHailSaudi Arabia
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Rice spikelet’s disease detection using hybrid optimization model and optimized CNN
收藏 引用
Soft Computing 2024年 第21期28卷 12787-12806页
作者: Patel, Bharati Department of Computer Science and Engineering Faculty of Science and Technology ICFAI University Raipur India
Rice fields all across the world are affected by spikelet sterility, often known as rice spikelet's disease. It is characterized by the improper development of spikelet’s, which lowers grain output and quality. F... 详细信息
来源: 评论
PerFedKG: two-stage information-loop federated knowledge graph for personalized privacy-preserving recommendation systems
收藏 引用
science China(information sciences) 2025年 第4期68卷 98-99页
作者: Fan WANG Xuyun ZHANG Weiming LIU Li LI Yuwen LIU Zhongyuan ZHANG Guanfeng LIU Shengye PANG Xiaolong XU Lianyong QI College of Computer Science and Technology Zhejiang University Department of Computing Macquarie University College of Computer Science and Technology China University of Petroleum (East China) School of Software Nanjing University of Information Science and Technology
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy ...
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
Dynamic Modeling of Robotic Manipulator via an Augmented Deep Lagrangian Network
收藏 引用
Tsinghua science and technology 2024年 第5期29卷 1604-1614页
作者: Shuangshuang Wu Zhiming Li Wenbai Chen Fuchun Sun School of Automation Beijing Information Science and Technology UniversityBeijing 100192China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
Learning the accurate dynamics of robotic systems directly from the trajectory data is currently a prominent research *** physics-enforced networks,exemplified by Hamiltonian neural networks and Lagrangian neural netw... 详细信息
来源: 评论
A prediction model for improving virtual machine live migration performance in cloud computing using artificial intelligence techniques
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1069-1087页
作者: Alubaidan, Haya A. Aljameel, Sumayh S. Department of Computer Science College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
Over recent years, virtualization has worked as the powerhouse of the data centers. To positively influence datacenter utilization, power consumption, and management, live migration presents a technique which must be ... 详细信息
来源: 评论