咨询与建议

限定检索结果

文献类型

  • 114,086 篇 会议
  • 52,233 篇 期刊文献
  • 1,502 册 图书

馆藏范围

  • 167,821 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,948 篇 工学
    • 65,562 篇 计算机科学与技术...
    • 53,010 篇 软件工程
    • 25,379 篇 信息与通信工程
    • 16,303 篇 控制科学与工程
    • 14,604 篇 电气工程
    • 13,983 篇 电子科学与技术(可...
    • 11,799 篇 生物工程
    • 9,375 篇 生物医学工程(可授...
    • 8,259 篇 光学工程
    • 6,936 篇 机械工程
    • 5,959 篇 化学工程与技术
    • 5,827 篇 动力工程及工程热...
    • 5,585 篇 仪器科学与技术
    • 5,298 篇 材料科学与工程(可...
    • 4,509 篇 网络空间安全
    • 4,151 篇 安全科学与工程
  • 56,593 篇 理学
    • 27,060 篇 数学
    • 19,431 篇 物理学
    • 13,384 篇 生物学
    • 8,886 篇 统计学(可授理学、...
    • 6,418 篇 化学
    • 6,315 篇 系统科学
  • 25,860 篇 管理学
    • 16,126 篇 管理科学与工程(可...
    • 10,782 篇 图书情报与档案管...
    • 7,567 篇 工商管理
  • 9,315 篇 医学
    • 7,756 篇 临床医学
    • 7,018 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,060 篇 公共卫生与预防医...
  • 4,904 篇 法学
    • 3,998 篇 社会学
  • 3,011 篇 经济学
  • 2,415 篇 农学
  • 1,604 篇 教育学
  • 862 篇 文学
  • 360 篇 军事学
  • 225 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,205 篇 computer science
  • 5,077 篇 accuracy
  • 4,296 篇 deep learning
  • 4,000 篇 feature extracti...
  • 3,605 篇 machine learning
  • 3,583 篇 computational mo...
  • 3,142 篇 training
  • 2,542 篇 support vector m...
  • 2,445 篇 convolutional ne...
  • 2,407 篇 internet of thin...
  • 2,388 篇 real-time system...
  • 2,351 篇 predictive model...
  • 2,166 篇 optimization
  • 1,998 篇 artificial intel...
  • 1,897 篇 data mining
  • 1,881 篇 wireless sensor ...
  • 1,729 篇 neural networks
  • 1,619 篇 computer archite...
  • 1,612 篇 security
  • 1,575 篇 data models

机构

  • 1,079 篇 cavendish labora...
  • 1,004 篇 department of ph...
  • 939 篇 physikalisches i...
  • 929 篇 oliver lodge lab...
  • 915 篇 department of co...
  • 837 篇 department of el...
  • 730 篇 university of ch...
  • 683 篇 department of el...
  • 682 篇 department of co...
  • 595 篇 infn sezione di ...
  • 576 篇 infn laboratori ...
  • 569 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 539 篇 infn sezione di ...
  • 535 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 528 篇 fakultät physik ...
  • 513 篇 school of physic...
  • 513 篇 department of ph...
  • 510 篇 imperial college...

作者

  • 255 篇 barter w.
  • 253 篇 a. gomes
  • 242 篇 c. alexa
  • 240 篇 s. chen
  • 238 篇 j. m. izen
  • 235 篇 j. wang
  • 232 篇 blake t.
  • 229 篇 c. amelung
  • 228 篇 g. bella
  • 228 篇 j. strandberg
  • 228 篇 d. calvet
  • 226 篇 beiter a.
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 211 篇 g. spigo

语言

  • 144,687 篇 英文
  • 21,357 篇 其他
  • 1,928 篇 中文
  • 128 篇 日文
  • 29 篇 斯洛文尼亚文
  • 28 篇 德文
  • 28 篇 法文
  • 20 篇 朝鲜文
  • 6 篇 俄文
  • 5 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Engineering Science and Technology"
167821 条 记 录,以下是1111-1120 订阅
排序:
Analyzing the Impact of Demographic and Operational Variables on 1-to-Many Face ID Search
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on technology and Society 2024年 第2期5卷 217-230页
作者: Pangelinan, Gabriella Bhatta, Aman Wu, Haiyu King, Michael C. Bowyer, Kevin W. Florida Institute of Technology Department of Electrical Engineering and Computer Science MelbourneFL32901 United States University of Notre Dame Department of Computer Science and Engineering Notre DameIN46556 United States
Concerns related to the proliferation of automated face recognition technology with the intent of solving or preventing crimes continue to mount. The technology being implicated in wrongful arrest following 1-to-many ... 详细信息
来源: 评论
Multi-factor Authentication and Data Integrity for WBAN Using Hash-Based Techniques  5th
Multi-factor Authentication and Data Integrity for WBAN Usin...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Pabitha, B. Vani, V. Sanshi, Shridhar Karthik, N. Department of Computer Science and Engineering National Institute of Technology Puducherry Karaikal India Department of Computer Science and Engineering National Institute of Technology Karnataka Mangalore India
In recent days, a wireless body area network (WBAN) has been developed as part of the Internet of Things (IoT) with sensors and actuators in three different modes, building its network, i.e., in-body sensors, wearable... 详细信息
来源: 评论
emapDiffP: A novel learning algorithm for convolutional neural network optimization
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 11987-12010页
作者: Bhakta, Shubhankar Nandi, Utpal Changdar, Chiranjit Ghosal, Sudipta Kr Pal, Rajat Kumar Department of Computer Science Vidyasagar University West Bengal Midnapore721102 India Department of Computer Science Belda College West Bengal Belda721424 India Department of Computer Science and Technology Behala Goverment Polytechnic West Bengal Kolkata720060 India Department of Computer Science and Engineering University of Calcutta West Bengal Kolkata700106 India
Deep neural networks (DNNs) having multiple hidden layers are very efficient to learn large volume datasets and applied in a wide range of applications. The DNNs are trained on these datasets using learning algorithms... 详细信息
来源: 评论
Leveraging XGBoost and Clinical Attributes for Heart Disease Prediction  5
Leveraging XGBoost and Clinical Attributes for Heart Disease...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Susmitha, Kota Bhargavi, Maridu Sri, Achyuta Mohitha Sai Reddy, Bogala Devi Prasaad Satyanarayana, Paladugu Siva Rao, K V Ranga Vignan's Foundation for Science Technology and Research Department of Computer Science and Engineering Guntur India Department of Computer Science and Engineering-Data Science Hyderabad India
Despite the various advances in medical technology, heart disease continues to rank among the leading causes of mortality in the world, killing millions each year. There is hope that the risks involved with heart dise... 详细信息
来源: 评论
Neural Network-Driven Base Station Selection in Next-Generation Cellular Networks  17
Neural Network-Driven Base Station Selection in Next-Generat...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Harrithha, B. Kotagi, Vijeth J. Thakur, Rahul Indian Institute of Technology Dharwad Department of Computer Science and Engineering Karnataka Dharwad India Indian Institute of Technology Roorkee Department of Computer Science and Engineering Uttarakhand Roorkee India
With the exponential increase in data consumption from activities like streaming, gaming, and IoT applications, existing network infrastructure is under significant strain. To address the growing demand for higher dat... 详细信息
来源: 评论
An Adaptive IDS Scheduling Framework for Host Based Mimicry Attack Detection in IoT Networks  18
An Adaptive IDS Scheduling Framework for Host Based Mimicry ...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Sanyal, Surja Khatua, Manas Chattopadhyay, Pratik Indian Institute of Technology Guwahati Department of Computer Science and Engineering Guwahati India Varanasi Department of Computer Science and Engineering Varanasi India
With the expanding applicability of the Internet of Things (IoT), novel IoT network security challenges also appear more frequently. Host-based Mimicry Attacks (HMA) are one of them that is difficult to detect by trad... 详细信息
来源: 评论
An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization
收藏 引用
International Journal of computers and Applications 2023年 第1期45卷 36-50页
作者: Shukla, Alok Kumar Pippal, Sanjeev Kumar Chauhan, Sansar Singh Department of Computer Science and Engineering G.L. Bajaj Institute of Technology & Management Greater Noida India Department of Computer Science & Engineering Galgotias University Greater Noida India
Metaheuristic algorithms have probable to solve global optimization problems in various fields of engineering and industry. To find a global solution by exploring irregular or non-linear surfaces, classical optimizati... 详细信息
来源: 评论
Reinforcement Learning based Adaptive Healthcare Decision Support Systems using Time Series Forecasting  5
Reinforcement Learning based Adaptive Healthcare Decision Su...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Shirley, C.P. Berin Jeba Jingle, I. Abisha, M.B. Venkadesan, R. Absin, S.J. Karunya Institute of Technology and Sciences Department of Computer Science Engineering Coimbatore India Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India
Healthcare decision-making is a complex and crucial process that must take into account changing patient situations and medical trends. It is frequently difficult for conventional decision support systems to adjust to... 详细信息
来源: 评论
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 1-12页
作者: WANG Zhibo LIU Kaixin HU Jiahui REN Ju GUO Hengchang YUAN Wei School of Cyber Science and Engineering Wuhan University School of Cyber Science and Technology Zhejiang University Department of Computer Science and Technology Tsinghua University
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform... 详细信息
来源: 评论
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV's Against DDoS Attacks  18
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Kotha, Aditya Venkanna, U. International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India National Institute of Technology Department of Computer Science and Engineering Warangal India
Autonomous vehicles (AVs) increasingly rely on vehicle-to-everything (V2X) networks for communication. However, due to the devices' heterogeneity, they are more susceptible to attacks like distributed denial of se... 详细信息
来源: 评论