咨询与建议

限定检索结果

文献类型

  • 114,086 篇 会议
  • 52,490 篇 期刊文献
  • 1,515 册 图书

馆藏范围

  • 168,091 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,906 篇 工学
    • 65,587 篇 计算机科学与技术...
    • 53,024 篇 软件工程
    • 25,390 篇 信息与通信工程
    • 16,325 篇 控制科学与工程
    • 14,577 篇 电气工程
    • 13,948 篇 电子科学与技术(可...
    • 11,798 篇 生物工程
    • 9,373 篇 生物医学工程(可授...
    • 8,280 篇 光学工程
    • 6,937 篇 机械工程
    • 5,962 篇 化学工程与技术
    • 5,829 篇 动力工程及工程热...
    • 5,585 篇 仪器科学与技术
    • 5,247 篇 材料科学与工程(可...
    • 4,521 篇 网络空间安全
    • 4,152 篇 安全科学与工程
  • 56,614 篇 理学
    • 27,055 篇 数学
    • 19,437 篇 物理学
    • 13,388 篇 生物学
    • 8,869 篇 统计学(可授理学、...
    • 6,416 篇 化学
    • 6,315 篇 系统科学
  • 25,872 篇 管理学
    • 16,132 篇 管理科学与工程(可...
    • 10,787 篇 图书情报与档案管...
    • 7,567 篇 工商管理
  • 9,322 篇 医学
    • 7,761 篇 临床医学
    • 7,019 篇 基础医学(可授医学...
    • 4,366 篇 药学(可授医学、理...
    • 4,061 篇 公共卫生与预防医...
  • 4,907 篇 法学
    • 3,999 篇 社会学
  • 3,015 篇 经济学
  • 2,417 篇 农学
  • 1,605 篇 教育学
  • 862 篇 文学
  • 360 篇 军事学
  • 225 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,206 篇 computer science
  • 5,080 篇 accuracy
  • 4,302 篇 deep learning
  • 4,003 篇 feature extracti...
  • 3,614 篇 machine learning
  • 3,588 篇 computational mo...
  • 3,137 篇 training
  • 2,539 篇 support vector m...
  • 2,423 篇 convolutional ne...
  • 2,406 篇 internet of thin...
  • 2,397 篇 real-time system...
  • 2,340 篇 predictive model...
  • 2,179 篇 optimization
  • 2,000 篇 artificial intel...
  • 1,911 篇 data mining
  • 1,903 篇 wireless sensor ...
  • 1,711 篇 neural networks
  • 1,620 篇 computer archite...
  • 1,618 篇 security
  • 1,584 篇 data models

机构

  • 1,085 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 955 篇 physikalisches i...
  • 935 篇 oliver lodge lab...
  • 910 篇 department of co...
  • 830 篇 department of el...
  • 738 篇 university of ch...
  • 683 篇 department of el...
  • 674 篇 department of co...
  • 594 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 571 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 552 篇 infn sezione di ...
  • 538 篇 school of physic...
  • 534 篇 horia hulubei na...
  • 533 篇 fakultät physik ...
  • 517 篇 department of ph...
  • 514 篇 school of physic...
  • 513 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 252 篇 a. gomes
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 j. wang
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 d. calvet
  • 225 篇 beiter a.
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 144,930 篇 英文
  • 21,368 篇 其他
  • 1,944 篇 中文
  • 128 篇 日文
  • 29 篇 斯洛文尼亚文
  • 28 篇 德文
  • 28 篇 法文
  • 20 篇 朝鲜文
  • 6 篇 俄文
  • 5 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Engineering Science and Technology"
168091 条 记 录,以下是1171-1180 订阅
排序:
A Scalable and Fault-Tolerant 5G Core on Kubernetes  17
A Scalable and Fault-Tolerant 5G Core on Kubernetes
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Paul, Sourav Keluskar, Tanvi Vutukuru, Mythili Indian Institute of Technology Department of Computer Science and Engineering Bombay India
The 5G core is an important part of a 5G network, and with the exponential growth of connected devices and dynamic traffic conditions, it is essential for the 5G core to be scalable and fault-tolerant. This requiremen... 详细信息
来源: 评论
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate  38
LRS: Enhancing Adversarial Transferability through Lipschitz...
收藏 引用
38th AAAI Conference on Artificial Intelligence, AAAI 2024
作者: Wu, Tao Luo, Tie Wunsch, Donald C. Department of Computer Science Missouri University of Science and Technology United States Department of Electrical and Computer Engineering Missouri University of Science and Technology United States
The transferability of adversarial examples is of central importance to transfer-based black-box adversarial attacks. Previous works for generating transferable adversarial examples focus on attacking given pretrained... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
Skin Cancer Detection Using Deep Learning  10
Skin Cancer Detection Using Deep Learning
收藏 引用
10th International Conference on Electrical Energy Systems, ICEES 2024
作者: Mahalakshmi, A. Padmavathy, C. Priya, N. Priyanka, G. Babu, Lidiya Archana, B. Sri Ramakrishna Engineering College Department of Computer Science and Engineering Coimbatore India Hindusthan College of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
Skin cancer is a significant global health concern that requires early detection and accurate diagnosis for effective treatment. Traditionally, dermatologists with specialized training have been responsible for diagno... 详细信息
来源: 评论
MmHand: Towards Pixel-Level-Accuracy Hand Localization Using A Single Commodity mmWave Device
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20800-20814页
作者: Zhang, Xiaoyu Li, Zhengxiong Xu, Chenhan Song, Luchuan Li, Huining Xue, Hongfei Wu, Yingxiao Xu, Wenyao State University of New York at Buffalo Department of Computer Science and Engineering AmherstNY14068 United States University of Colorado Denver Department of Computer Science and Engineering DenverCO80204 United States North Carolina State University Department of Computer Science RaleighNC27695 United States University of Rochester Department of Computer Science RochesterNY14627 United States University of North Carolina at Charlotte Department of Computer Science CharlotteNC28223 United States Hangzhou Dianzi University College of Computer Science and Technology Hangzhou Zhejiang310018 China
The hand localization problem has been a longstanding focus due to its many applications. The task involves modeling the hand as a singular point and determining its position within a defined coordinate system. Howeve... 详细信息
来源: 评论
OSINT at GenAI Detection Task 1: Multilingual MGT Detection: Leveraging Cross-Lingual Adaptation for Robust LLMs Text Identification  1
OSINT at GenAI Detection Task 1: Multilingual MGT Detection:...
收藏 引用
1st Workshop on GenAI Content Detection, GenAIDetect 2025
作者: Agrahari, Shifali Singh, Sanasam Ranbir Department of Computer Science and Engineering Indian Institute of Technology Guwahati India
Detecting AI-generated text has become increasingly prominent. This paper presents our solution for the DAIGenC Task 1 Subtask 2, where we address the challenge of distinguishing human-authored text from machine-gener... 详细信息
来源: 评论
Enhance Vertical Handover Security During Execution Phase in Mobile Networks
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3863-3875页
作者: Omar Khattab Department of Computer Science and Engineering Kuwait College of Science and Technology(KCST)Kuwait
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile *** allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different ... 详细信息
来源: 评论
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted Smart Slide Supervision  17
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Mondal, Susmita Zingre, Sameeran Ravishankar Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
In corporate settings, conferences, or classrooms, an orator relies on manual slide transitions, which can disrupt their presentation flow. Presentation devices can be inaccessible due to the physical limitations of i... 详细信息
来源: 评论
Improving Gemstone Identification Accuracy Using Convolutional Neural Networks
Improving Gemstone Identification Accuracy Using Convolution...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Raheem, Raza Ahmad, Wakeel Adnan, Syed M. Department of Computer Science University of Engineering and Technology Taxila Pakistan
Accurate identification of gemstones is crucial in various fields, including gemology research, jewelry appraisal, and consumer protection, where authenticity verification is paramount to prevent fraud and ensure trus... 详细信息
来源: 评论
ResMHA-Net:Enhancing Glioma Segmentation and Survival Prediction Using a Novel Deep Learning Framework
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 885-909页
作者: Novsheena Rasool Javaid Iqbal Bhat Najib Ben Aoun Abdullah Alharthi Niyaz Ahmad Wani Vikram Chopra Muhammad Shahid Anwar Department of Computer Science School of Engineering and TechnologyIslamic University of Science and TechnologyAwantipora192122India Faculty of Computing and Technology Al-Baha UniversityAlaqiq65779-7738Saudi Arabia Research Groups in Intelligent Machines National School of Engineers of SfaxUniversity of SfaxSfax3038Tunisia Department of Electrical Engineering College of EngineeringKing Khalid UniversityAbha61421Saudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of Electrical and Instrumentation Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of AI and Software Gachon UniversitySeongnam-si13120Republic of Korea
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial... 详细信息
来源: 评论