咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127946 条 记 录,以下是1101-1110 订阅
排序:
NeuroSense: Smartwatch-based Early Detection Framework for Alzheimer’s Disease  22
NeuroSense: Smartwatch-based Early Detection Framework for A...
收藏 引用
22nd International Symposium on Network Computing and Applications, NCA 2024
作者: Dixit, Aarju Das, Debasis Department of Computer Science and Engineering Indian Institute of Technology Jodhpur India
Alzheimer’s disease (AD) is a progressive neurodegenerative disorder with an annual global economic impact of approximately $1 trillion. Early diagnosis is crucial to mitigate disease progression, yet current detecti... 详细信息
来源: 评论
An approach to on-stream DDoS blitz detection using machine learning algorithms
收藏 引用
Materials Today: Proceedings 2023年 80卷 3492-3499页
作者: Manjula, H.T. Neha Mangla Atria Institute Of Technology Bengaluru India Department Of Computer Science & Engineering CMRIT Bengaluru India Department of Information Science & Engineering Atria Institute of Technology Bengaluru India
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima... 详细信息
来源: 评论
Label Flipping Attacks on Federated Learning: GAN-Based Poisoning and Countermeasures  2
Label Flipping Attacks on Federated Learning: GAN-Based Pois...
收藏 引用
2nd IEEE International Conference on Data Science and Network Security, ICDSNS 2024
作者: Abdullah, Muhammad Bapu, Vidhatri Akash, K.A. Khan, Abdul Mannan Bhargavi, M.S. Bangalore Institute of Technology Department of Computer Science and Engineering Bengaluru India
Federated Learning (FL) is a promising approach for training machine learning models in a decentralized manner to preserve data privacy. However, FL is vulnerable to various attacks, including label-flipping attacks w... 详细信息
来源: 评论
Overlapping Community Detection based on Facets of Social Network: An Empirical Analysis  4
Overlapping Community Detection based on Facets of Social Ne...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Das, Soumita Biswas, Anupam National Institute of Technology Silchar Department of Computer Science and Engineering India
Detection of overlapping communities is a challenging problem that has drawn a lot of research interest. This is motivated by the fact that in real-world networks, individuals frequently join multiple groups subsequen... 详细信息
来源: 评论
Integrating Deep Learning with Ensemble Approach for Anomaly Detection in Network Traffic  4
Integrating Deep Learning with Ensemble Approach for Anomaly...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Sangeetha, V. Naidu, R. China Appala Bhat, Avinash Kulkarni, Pranav Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India
Intrusion Detection Systems (IDS) is frequently automated using expert systems and applied machine learning methods. Because of the interplay between different industrial control systems and the Internet environment t... 详细信息
来源: 评论
Parallel Complexity of Geometric Bipartite Matching  44
Parallel Complexity of Geometric Bipartite Matching
收藏 引用
44th IARCS Annual Conference on Foundations of Software technology and Theoretical computer Science, FSTTCS 2024
作者: Bhore, Sujoy Equbal, Sarfaraz Gurjar, Rohit Department of Computer Science & Engineering Indian Institute of Technology Bombay India
In this work, we study the parallel complexity of the geometric minimum-weight bipartite perfect matching (GWBPM) problem in 2. Here our graph is the complete bipartite graph G on two sets of points A and B in 2 (|A| ... 详细信息
来源: 评论
Validating δ-Currency Using Model Checking
Validating δ-Currency Using Model Checking
收藏 引用
International Conference on Data Science and Network engineering, ICDSNE 2023
作者: Prabhu, Shreekanth M. Department of Computer Science and Engineering CMR Institute of Technology Bengaluru India
In recent years, there is a surfeit of digital currencies, virtual currencies, and cryptocurrencies. These currencies serve as alternatives to fiat currencies in the form of physical currencies or deposits in banks. S... 详细信息
来源: 评论
Exploring Transformer-Based Approaches for Hyperspectral Image Classification: A Comparative Analysis  3rd
Exploring Transformer-Based Approaches for Hyperspectral Ima...
收藏 引用
3rd International Conference on Machine Vision and Augmented Intelligence, MAI 2023
作者: Arya, Rajat Kumar Srivastava, Rajeev Department of Computer Science and Engineering Indian Institute of Technology-BHU Varanasi India
Hyperspectral imaging (HSI) is a technique that captures and analyzes multiple spectral bands for each pixel in an image. Convolutional neural networks (CNNs) effectively extract local features for HSI classification ... 详细信息
来源: 评论
Multimodal Hate Speech Detection using Fine-Tuned Llama 2 Model
Multimodal Hate Speech Detection using Fine-Tuned Llama 2 Mo...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Sasidaran, Keerthana Geetha, J. Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India
Hate speech detection is crucial for secure online environments, especially with recent policy changes on social media. This study enhances the Llama 2 model by fine-tuning it with a comprehensive Twitter dataset to i... 详细信息
来源: 评论
Evaluating Neural Network Parameter Obliteration in Catastrophic Forgetting
Evaluating Neural Network Parameter Obliteration in Catastro...
收藏 引用
2024 IEEE Region 10 Symposium, TENSYMP 2024
作者: Sehra, Udit Dutta, Rishi Raj Pandit, Mohammad Khalid National Institute of Technology Hamirpur Department of Computer Science & Engineering India
One of the major weaknesses of Neural Networks is their inability to learn multiple functions (tasks) sequentially. This phenomenon is observed when a data distribution shift is encountered in continual learning, lead... 详细信息
来源: 评论