咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127946 条 记 录,以下是1111-1120 订阅
排序:
Workplace Wingman: Enhancing Indoor Autonomy for Efficient Workplace Operations  2
Workplace Wingman: Enhancing Indoor Autonomy for Efficient W...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Potdar, Komal Mahajan, Yash Thakare, Ajinkya Amrutkar, Ruturaj Joglekar, Pushkar Vishwakarma Institute of Technology Department of Computer Engineering Maharashtra Pune India
This paper presents the 'Workplace Wingman,' an innovative autonomous system designed for workplace environments. Our solution integrates advanced features to optimize indoor operations. The system navigates c... 详细信息
来源: 评论
An Essay on Detailed Performance Assessment Ensemble-Based Predictive Modelling in Network Intrusion Detection Systems
An Essay on Detailed Performance Assessment Ensemble-Based P...
收藏 引用
2024 IEEE Students Conference on engineering and Systems, SCES 2024
作者: Khajgiwale, Parth International Institute of Information Technology Department of Computer Engineering Pune India
Network Intrusion Detection Systems (NIDS) play a critical role in safeguarding computer networks against malicious activities and cyber threats. To improve the accuracy and robustness of NIDS, this research explores ... 详细信息
来源: 评论
A New Approach for Prevention of Malicious Attack in Post Disaster Using Delay Tolerant Network
A New Approach for Prevention of Malicious Attack in Post Di...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Chakrabarti, Chandrima Bal, Saptarshi Jaiswal, Rishabh Ansari, Arbaz Akhtar Narula Institute of Technology Department of Computer Science and Engineering Kolkata India
Natural disasters still have a crippling effect on our infrastructure notwithstanding society's development. Communication systems, the backbone of our network, sustain the most damage during such crises. When it ... 详细信息
来源: 评论
Pedestrian Trajectory Prediction with Missing Data: Datasets, Imputation, and Benchmarking  38
Pedestrian Trajectory Prediction with Missing Data: Datasets...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chib, Pranav Singh Singh, Pravendra Department of Computer Science and Engineering Indian Institute of Technology Roorkee India
Pedestrian trajectory prediction is crucial for several applications such as robotics and self-driving vehicles. Significant progress has been made in the past decade thanks to the availability of pedestrian trajector...
来源: 评论
Mixed-decomposed convolutional network:A lightweight yet efficient convolutional neural network for ocular disease recognition
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 319-332页
作者: Xiaoqing Zhang Xiao Wu Zunjie Xiao Lingxi Hu Zhongxi Qiu Qingyang Sun Risa Higashita Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhenChina Tomey Corporation NagoyaJapan Guangdong Provincial Key Laboratory of Brain‐inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhenChina Singapore Eye Research Institute SingaporeSingapore
Eye health has become a global health concern and attracted broad *** the years,researchers have proposed many state-of-the-art convolutional neural networks(CNNs)to assist ophthalmologists in diagnosing ocular diseas... 详细信息
来源: 评论
An ensemble learning approach for large scale birds species classification
An ensemble learning approach for large scale birds species ...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Vardhan, Harsh Verma, Aryan Singh, Nagendra Pratap Department of Computer Science and Engineering National Institute of Technology Hamirpur India
Birds are vertebrate animals that are adapted for flight due to the presence of hollow bone structures. The entire population of birds contributes 0.08 % to the total animal biomass. In the past two decades, there has... 详细信息
来源: 评论
"Event Evolution- A Modern Approach To Timeless Celebration"
"Event Evolution- A Modern Approach To Timeless Celebration"
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer Science, SCEECS 2024
作者: Bhawanani, Meher Sachadeo, Khushbu Meshram, Komal Marsettiwwar, Rounit Rawat, Mayur Sarode, Pranali Jhulelal Institute of Technology Department of Computer Science & Engineering Nagpur India
The event management system is a valuable tool that allows organizations to effectively maintain client engagement, even when clients are on the move. In today's fast-paced and technologically advanced world, the ... 详细信息
来源: 评论
Tolerant Testing and Distance Estimation for Distributions Under Memory Constraints  50th
Tolerant Testing and Distance Estimation for Distributions...
收藏 引用
50th International Conference on Current Trends in Theory and Practice of computer Science, SOFSEM 2025
作者: Roy, Sampriti Vasudev, Yadu Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var... 详细信息
来源: 评论
Effortless Meeting Analysis Automation  15
Effortless Meeting Analysis Automation
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Mohit, Harsh Chaitanya, K. Kumar, Maneesh Kushal, B. Shanthakumara, A.H. Department of Computer Science and Engineering Siddaganga Institute of Technology Tumakuru India
The "Automated DSM Insight Analyzer" is a groundbreaking initiative that revolutionizes the analysis of Daily Stand-Up Meetings (DSMs). Leveraging a sophisticated combination of cutting-edge technologies, in... 详细信息
来源: 评论
Enhancing Security in Logic-Locked Systems Through UART-Based Key Authentication
Enhancing Security in Logic-Locked Systems Through UART-Base...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information technology, ICCCIT 2025
作者: Jaisachin, B. SRM Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr... 详细信息
来源: 评论