咨询与建议

限定检索结果

文献类型

  • 514,191 篇 会议
  • 182,897 篇 期刊文献
  • 3,623 册 图书

馆藏范围

  • 700,707 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 382,634 篇 工学
    • 210,726 篇 计算机科学与技术...
    • 168,245 篇 软件工程
    • 91,441 篇 信息与通信工程
    • 76,583 篇 电气工程
    • 74,740 篇 电子科学与技术(可...
    • 63,241 篇 控制科学与工程
    • 36,377 篇 生物工程
    • 32,752 篇 光学工程
    • 29,152 篇 生物医学工程(可授...
    • 27,294 篇 机械工程
    • 24,282 篇 仪器科学与技术
    • 23,786 篇 动力工程及工程热...
    • 23,371 篇 材料科学与工程(可...
    • 22,813 篇 化学工程与技术
    • 11,332 篇 交通运输工程
    • 11,275 篇 安全科学与工程
    • 10,122 篇 力学(可授工学、理...
  • 217,070 篇 理学
    • 102,141 篇 数学
    • 83,542 篇 物理学
    • 40,754 篇 生物学
    • 33,226 篇 统计学(可授理学、...
    • 27,460 篇 系统科学
    • 24,321 篇 化学
  • 76,875 篇 管理学
    • 48,681 篇 管理科学与工程(可...
    • 30,752 篇 图书情报与档案管...
    • 24,232 篇 工商管理
  • 26,233 篇 医学
    • 21,827 篇 临床医学
    • 19,319 篇 基础医学(可授医学...
    • 12,213 篇 药学(可授医学、理...
  • 14,156 篇 法学
    • 11,824 篇 社会学
  • 9,750 篇 经济学
  • 6,581 篇 农学
  • 6,242 篇 教育学
  • 3,144 篇 文学
  • 1,590 篇 军事学
  • 766 篇 艺术学
  • 94 篇 哲学
  • 55 篇 历史学

主题

  • 22,277 篇 computer science
  • 15,595 篇 computational mo...
  • 11,891 篇 accuracy
  • 11,685 篇 feature extracti...
  • 11,606 篇 bandwidth
  • 9,560 篇 control systems
  • 9,549 篇 training
  • 9,527 篇 computer archite...
  • 9,511 篇 costs
  • 9,411 篇 testing
  • 9,396 篇 delay
  • 9,321 篇 hardware
  • 9,286 篇 machine learning
  • 9,033 篇 application soft...
  • 9,013 篇 deep learning
  • 8,809 篇 algorithm design...
  • 8,673 篇 robustness
  • 8,558 篇 mathematical mod...
  • 8,525 篇 frequency
  • 8,492 篇 switches

机构

  • 5,279 篇 department of el...
  • 1,686 篇 department of co...
  • 1,329 篇 department of co...
  • 1,312 篇 department of el...
  • 1,287 篇 department of el...
  • 1,251 篇 ieee
  • 1,150 篇 department of el...
  • 1,087 篇 department of el...
  • 1,027 篇 department of el...
  • 983 篇 department of el...
  • 966 篇 department of ph...
  • 950 篇 department of el...
  • 942 篇 cavendish labora...
  • 816 篇 physikalisches i...
  • 806 篇 oliver lodge lab...
  • 781 篇 department of el...
  • 771 篇 department of co...
  • 761 篇 department of el...
  • 746 篇 university of ch...
  • 697 篇 department of el...

作者

  • 253 篇 s. chen
  • 250 篇 barter w.
  • 250 篇 j. wang
  • 229 篇 niyato dusit
  • 229 篇 blake t.
  • 222 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 213 篇 amato s.
  • 210 篇 brundu d.
  • 209 篇 han zhu
  • 207 篇 boettcher t.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 y. chen
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella

语言

  • 633,261 篇 英文
  • 58,999 篇 其他
  • 8,479 篇 中文
  • 287 篇 日文
  • 126 篇 朝鲜文
  • 89 篇 德文
  • 61 篇 法文
  • 45 篇 斯洛文尼亚文
  • 30 篇 土耳其文
  • 19 篇 西班牙文
  • 17 篇 阿拉伯文
  • 13 篇 葡萄牙文
  • 10 篇 俄文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 2 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Computer Science and Electrical Engineering"
700711 条 记 录,以下是1021-1030 订阅
排序:
Zero-dynamics attack detection based on data association in feedback pathway
收藏 引用
Cognitive Robotics 2025年 5卷 126-139页
作者: Zhang, Zeyu Li, Hongran Todo, Yuki Division of Electrical Engineering and Computer Science Kanazawa University Ishikawa Kanazawa9201192 Japan School of Computer Engineering Jiangsu Ocean University Jiangsu Lianyungang222005 China Faculty of Electrical Information and Communication Engineering Kanazawa University Ishikawa Kanazawa9201192 Japan
This paper considers the security of non-minimum phase systems, a typical kind of cyber-physical systems. Non-minimum phase systems are characterized by unstable zeros in their transfer functions, making them particul... 详细信息
来源: 评论
Diffusion Posterior Sampling is Computationally Intractable  41
Diffusion Posterior Sampling is Computationally Intractable
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Gupta, Shivam Jalal, Ajil Parulekar, Aditya Price, Eric Xun, Zhiyang Department of Computer Science University of Texas Austin United States Department of Electrical Engineering and Computer Science University of California Berkeley United States
Diffusion models are a remarkably effective way of learning and sampling from a distribution p(x). In posterior sampling, one is also given a measurement model p(y | x) and a measurement y, and would like to sample fr... 详细信息
来源: 评论
computer-aided diagnosis for multi-class classification of brain tumors using CNN features via transfer-learning
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Yadav, Agnesh Chandra Shah, Krish Purohit, Aaryan Kolekar, Maheshkumar H. Electrical Engineering IIT Bihta Bihar Patna801106 India Computer Science Engineering SPIT Andheri Maharashtra Mumbai400058 India
Brain tumor classification is essential for accurate diagnosis and treatment planning, significantly enhancing patient outcomes and survival rates. The complexity of multi-class classification, which includes Glioma, ... 详细信息
来源: 评论
IWM-LSTM encoder for abstractive text summarization
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5883-5904页
作者: Gangundi, Ravindra Sridhar, Rajeswari Department of Computer Science and Engineering National Institute of Technology Tamilnadu Tiruchirappalli620015 India
Sequence-to-sequence models are fundamental building blocks for generating abstractive text summaries, which can produce precise and coherent summaries. Recently proposed, different text summarization models aimed to ... 详细信息
来源: 评论
Next-Generation DDoS Attacks on IoT Deployments: Targeting the Advanced Features of MQTT v5.0 Protocol
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 22090-22109页
作者: Lakshminarayana, Sujitha Thilagam, P. Santhi National Institute of Technology Karnataka Computer Science and Engineering Department Surathkal575025 India
Message Queuing Telemetry Transport (MQTT) has emerged as the widely adopted application layer protocol for IoT environments because of its lightweight header, minimal power, and bandwidth requirements. Despite its po... 详细信息
来源: 评论
AD-Aligning: Emulating Human-Like Generalization for Cognitive Domain Adaptation in Deep Learning  5
AD-Aligning: Emulating Human-Like Generalization for Cogniti...
收藏 引用
5th International Conference on Electronic Communication and Artificial Intelligence, ICECAI 2024
作者: Li, Zhuoying Wan, Bohua Mu, Cong Zhao, Ruzhang Qiu, Shushan Yan, Chao Johns Hopkins University Department of Computer Science Baltimore United States University of Houston Department of Electrical and Computer Engineering Houston United States Northeastern University Department of Electrical and Computer Engineering Sunnyvale United States
Domain adaptation is pivotal for enabling deep learning models to generalize across diverse domains, a task complicated by variations in presentation and cognitive nuances. In this paper, we introduce AD-Aligning, a n... 详细信息
来源: 评论
Physics-Based 2D Direction Finding of an Amplitude Modulated Signal Using a Uniform Triangular Array
收藏 引用
Progress in Electromagnetics Research C 2025年 155卷 121-126页
作者: Ren, Kai Department of Electrical Engineering and Computer Science South Dakota School of Mines and Technology Rapid CitySD57701 United States
A uniform triangular array (UTA) is proposed for physics-based 2D direction-of-arrival (DOA) estimations of unknown incoming signals. Three capacitively loaded top-hat antennas are used as array elements. Unlike conve... 详细信息
来源: 评论
Ensuring Privacy and Integrity in IoT Supply Chains through Blockchain and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25547-25558页
作者: Din, Ikram Ud Almogren, Ahmad Han, Zhu Guizani, Mohsen The University of Haripur Department of Information Technology Haripur22620 Pakistan King Saud University College of Computer and Information Sciences Department of Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Ensuring data security and privacy in Internet of Things (IoT) is increasingly critical due to the growing interconnectedness of devices and the sensitivity of the data they handle. This paper presents a novel approac... 详细信息
来源: 评论
Machine learning and data analytics driven model for income tax rebate estimation: A neoteric and benign approach  4th
Machine learning and data analytics driven model for income ...
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Sharma, Viney Kumar, Achal Singh, Archana Kumar, Manish Department of Computer Science & Engineering Sharda University Agra India Department of Computer Science & Engineering Anand Engineering College Agra India Department of Computer Science & Engineering Chandigarh Engineering College Landran India
The provision of rebate to needy/underprivileged sections of society has been in practice since long in government organizations. The efficacy of such provisions lies in the fact that whether this rebate reaches peopl... 详细信息
来源: 评论
Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor network
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Kumar, Manni Goyal, Nitin Qaisi, Ramy Mohammed Aiesh Najim, Mohd Gupta, Sachin Kumar Department of Computer Science & Engineering Chandigarh University Gharuan Punjab India Department of Computer Science Engineering School of Engineering and Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Electrical and Electronic Engineering College of Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Electronics and Communication Engineering Central University of Jammu UT of J&K Jammu181143 India
Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf... 详细信息
来源: 评论