咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127946 条 记 录,以下是1121-1130 订阅
排序:
A Cost-Sensitive LSTM Model for Driving Risk Assessment from Vehicular Trajectory Data  100
A Cost-Sensitive LSTM Model for Driving Risk Assessment from...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Osho Pranay Kumar, Pradeep Chakraborty, Suchetana Indian Institute of Technology Jodhpur Department of Computer Science and Engineering India
Identifying risky driving behavior is crucial for early hazard detection, encouraging safer driving practices, and minimizing accident risks. Driving patterns, characterized by sensory data, can be used to classify ri... 详细信息
来源: 评论
A Survey on Recent Developments in Software Vulnerability Detection  1
A Survey on Recent Developments in Software Vulnerability De...
收藏 引用
1st International Conference on Pioneering Developments in computer Science and Digital Technologies, IC2SDT 2024
作者: Rajput, Sachin Kumar, Kuldeep National Institute of Technology Department of Computer Engineering Haryana Kurukshetra India
In recent years, the rise of cyber threats and attacks has led to significant financial losses for software industries and individuals worldwide. Early detection of software vulnerabilities is crucial for mitigating f... 详细信息
来源: 评论
Point-To-Set Principle and Constructive Dimension Faithfulness  49
Point-To-Set Principle and Constructive Dimension Faithfulne...
收藏 引用
49th International Symposium on Mathematical Foundations of computer Science, MFCS 2024
作者: Nandakumar, Satyadev Pulari, Subin Akhil, S. Department of Computer Science and Engineering Indian Institute of Technology Kanpur India
Hausdorff Φ-dimension is a notion of Hausdorff dimension developed using a restricted class of coverings of a set. We introduce a constructive analogue of Φ-dimension using the notion of constructive Φ-s-supergales... 详细信息
来源: 评论
A Contemporary Review of Interpolation-based Reversible Data Hiding  2
A Contemporary Review of Interpolation-based Reversible Data...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Pandey, Supriya Pandey, Shrawan Kumar Tripathi, Abhinandan Buddha Institute of Technology Department of Computer Science & Engineering Gorakhpur India
Reversible data hiding (RDH) has become a critical topic in modern information security, as it allows for secure communication by embedding secret data into a cover medium. Importantly, RDH also ensures that the hidde... 详细信息
来源: 评论
Energy-Aware Priority-Based Task Scheduling for Edge Devices in Internet of Things  5
Energy-Aware Priority-Based Task Scheduling for Edge Devices...
收藏 引用
5th IEEE India Council International Subsections Conference, INDISCON 2024
作者: Pawar, Vijaykumar Naik Mini, S. National Institute of Technology Department of Computer Science and Engineering Goa India
Billions of networked devices interact and collaborate with one another via the Internet as part of the Internet of Things (IoT). The performance and energy efficiency of IoT environments are greatly enhanced by effec... 详细信息
来源: 评论
Priority-Based MPTCP Scheduler for 5G and Beyond Heterogeneous Links  16
Priority-Based MPTCP Scheduler for 5G and Beyond Heterogeneo...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Gumasthi, Nikhil B. Baswade, Anand M. Indian Institute of Technology Bhilai Department of Computer Science and Engineering India
Modern cellular devices often have dual interfaces for providing high-speed data transfer. This dual-interface design enhances versatility and user convenience. Dual interface technology allows 5G NR devices to connec... 详细信息
来源: 评论
MediMind: A Comprehensive Health Prediction and Record-Keeping Platform  6th
MediMind: A Comprehensive Health Prediction and Record-Keep...
收藏 引用
6th International Conference on Information Systems and Management Science, ISMS 2023
作者: Naik, Darshana A. Sharma, Aditya Mahajan, Danish Khandelwal, Dhruv Gajya, Arpit Department of Computer Science and Engineering Ramaiah Institute of Technology Bangalore India
The "MediMind" project signifies a revolutionary fusion of predictive analytics, centered on diabetes and heart disease risk assessment, coupled with state-of-the-art skin disease prediction and ro... 详细信息
来源: 评论
Interpreting Fake Reviews Using Machine Learning and Deep Learning
Interpreting Fake Reviews Using Machine Learning and Deep Le...
收藏 引用
World Conference on Information Systems for Business Management, ISBM 2023
作者: Bhat, Mohammad Qazim Jayalakshmi, D.S. Mallegowda, M. Geetha, J. Department of Computer Science and Engineering Ramaiah Institute of Technology Bengaluru India
The issue of fake reviews on online platforms has increasingly become a huge concern in recent years, with the potential to mislead consumers and negatively impact businesses. In this paper, we present a comprehensive... 详细信息
来源: 评论
NLP Based Video SparkNotes Assistant  4
NLP Based Video SparkNotes Assistant
收藏 引用
4th International Conference on Soft Computing for Security Applications, ICSCSA 2024
作者: Bhilare, Amol Gaikwad, Namrata Kurapati, Aditya Dabade, Ronak Saklani, Daksh Vishwakarma Institute of Technology Department of Computer Engineering Maharashtra Pune India
This research presents a novel method of automatic video summarising and note-generating using Natural Language Processing (NLP) and audio recognition techniques. The exponential rise in internet video footage has inc... 详细信息
来源: 评论
SecureHD: Designing Low-Cost Reliable and Security Aware Hardware Accelerators During High-Level Synthesis for Computationally Intensive Application Frameworks  10
SecureHD: Designing Low-Cost Reliable and Security Aware Har...
收藏 引用
10th IEEE International Symposium on Smart Electronic Systems, iSES 2024
作者: Chaurasia, Rahul Sengupta, Anirban Indian Institute of Technology Department of Computer Science and Engineering Indore India
Reliable and low-cost hardware accelerator design and its security countermeasures are crucial to safeguard not only the end consumer but also the intellectual property (IP) vendor and system-on-chip (SoC) integrator.... 详细信息
来源: 评论