咨询与建议

限定检索结果

文献类型

  • 89,152 篇 会议
  • 38,592 篇 期刊文献
  • 1,303 册 图书

馆藏范围

  • 129,047 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,939 篇 工学
    • 46,491 篇 计算机科学与技术...
    • 37,158 篇 软件工程
    • 18,985 篇 信息与通信工程
    • 12,507 篇 控制科学与工程
    • 11,938 篇 电气工程
    • 11,515 篇 电子科学与技术(可...
    • 8,313 篇 生物工程
    • 7,068 篇 生物医学工程(可授...
    • 6,829 篇 光学工程
    • 5,177 篇 机械工程
    • 4,684 篇 化学工程与技术
    • 4,565 篇 仪器科学与技术
    • 4,448 篇 动力工程及工程热...
    • 4,147 篇 材料科学与工程(可...
    • 3,451 篇 网络空间安全
    • 3,090 篇 安全科学与工程
  • 43,612 篇 理学
    • 19,436 篇 数学
    • 16,770 篇 物理学
    • 9,558 篇 生物学
    • 6,365 篇 统计学(可授理学、...
    • 5,287 篇 化学
    • 4,683 篇 系统科学
  • 17,902 篇 管理学
    • 11,310 篇 管理科学与工程(可...
    • 7,404 篇 图书情报与档案管...
    • 5,398 篇 工商管理
  • 7,305 篇 医学
    • 5,947 篇 临床医学
    • 5,320 篇 基础医学(可授医学...
    • 3,283 篇 药学(可授医学、理...
    • 3,158 篇 公共卫生与预防医...
  • 3,535 篇 法学
    • 2,902 篇 社会学
  • 2,242 篇 经济学
  • 1,869 篇 农学
  • 1,155 篇 教育学
  • 595 篇 文学
  • 282 篇 军事学
  • 123 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,891 篇 accuracy
  • 3,173 篇 deep learning
  • 2,932 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,793 篇 machine learning
  • 2,666 篇 computational mo...
  • 2,291 篇 training
  • 1,993 篇 real-time system...
  • 1,881 篇 internet of thin...
  • 1,849 篇 support vector m...
  • 1,794 篇 convolutional ne...
  • 1,776 篇 predictive model...
  • 1,638 篇 artificial intel...
  • 1,470 篇 optimization
  • 1,405 篇 neural networks
  • 1,350 篇 wireless sensor ...
  • 1,261 篇 security
  • 1,254 篇 data mining
  • 1,219 篇 bandwidth
  • 1,216 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 970 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 770 篇 university of ch...
  • 680 篇 chitkara univers...
  • 650 篇 department of el...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 502 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 229 篇 beiter a.
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 217 篇 bencivenni g.

语言

  • 105,757 篇 英文
  • 21,997 篇 其他
  • 1,509 篇 中文
  • 119 篇 日文
  • 26 篇 斯洛文尼亚文
  • 25 篇 法文
  • 24 篇 德文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 阿拉伯文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
129047 条 记 录,以下是1231-1240 订阅
排序:
Label Flipping Attacks on Federated Learning: GAN-Based Poisoning and Countermeasures  2
Label Flipping Attacks on Federated Learning: GAN-Based Pois...
收藏 引用
2nd IEEE International Conference on Data Science and Network Security, ICDSNS 2024
作者: Abdullah, Muhammad Bapu, Vidhatri Akash, K.A. Khan, Abdul Mannan Bhargavi, M.S. Bangalore Institute of Technology Department of Computer Science and Engineering Bengaluru India
Federated Learning (FL) is a promising approach for training machine learning models in a decentralized manner to preserve data privacy. However, FL is vulnerable to various attacks, including label-flipping attacks w... 详细信息
来源: 评论
Workplace Wingman: Enhancing Indoor Autonomy for Efficient Workplace Operations  2
Workplace Wingman: Enhancing Indoor Autonomy for Efficient W...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Potdar, Komal Mahajan, Yash Thakare, Ajinkya Amrutkar, Ruturaj Joglekar, Pushkar Vishwakarma Institute of Technology Department of Computer Engineering Maharashtra Pune India
This paper presents the 'Workplace Wingman,' an innovative autonomous system designed for workplace environments. Our solution integrates advanced features to optimize indoor operations. The system navigates c... 详细信息
来源: 评论
Multimodal Hate Speech Detection using Fine-Tuned Llama 2 Model
Multimodal Hate Speech Detection using Fine-Tuned Llama 2 Mo...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Sasidaran, Keerthana Geetha, J. Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India
Hate speech detection is crucial for secure online environments, especially with recent policy changes on social media. This study enhances the Llama 2 model by fine-tuning it with a comprehensive Twitter dataset to i... 详细信息
来源: 评论
Mixed-decomposed convolutional network:A lightweight yet efficient convolutional neural network for ocular disease recognition
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 319-332页
作者: Xiaoqing Zhang Xiao Wu Zunjie Xiao Lingxi Hu Zhongxi Qiu Qingyang Sun Risa Higashita Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhenChina Tomey Corporation NagoyaJapan Guangdong Provincial Key Laboratory of Brain‐inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhenChina Singapore Eye Research Institute SingaporeSingapore
Eye health has become a global health concern and attracted broad *** the years,researchers have proposed many state-of-the-art convolutional neural networks(CNNs)to assist ophthalmologists in diagnosing ocular diseas... 详细信息
来源: 评论
Effortless Meeting Analysis Automation  15
Effortless Meeting Analysis Automation
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Mohit, Harsh Chaitanya, K. Kumar, Maneesh Kushal, B. Shanthakumara, A.H. Department of Computer Science and Engineering Siddaganga Institute of Technology Tumakuru India
The "Automated DSM Insight Analyzer" is a groundbreaking initiative that revolutionizes the analysis of Daily Stand-Up Meetings (DSMs). Leveraging a sophisticated combination of cutting-edge technologies, in... 详细信息
来源: 评论
Parallel Complexity of Geometric Bipartite Matching  44
Parallel Complexity of Geometric Bipartite Matching
收藏 引用
44th IARCS Annual Conference on Foundations of Software technology and Theoretical computer Science, FSTTCS 2024
作者: Bhore, Sujoy Equbal, Sarfaraz Gurjar, Rohit Department of Computer Science & Engineering Indian Institute of Technology Bombay India
In this work, we study the parallel complexity of the geometric minimum-weight bipartite perfect matching (GWBPM) problem in 2. Here our graph is the complete bipartite graph G on two sets of points A and B in 2 (|A| ... 详细信息
来源: 评论
An Essay on Detailed Performance Assessment Ensemble-Based Predictive Modelling in Network Intrusion Detection Systems
An Essay on Detailed Performance Assessment Ensemble-Based P...
收藏 引用
2024 IEEE Students Conference on engineering and Systems, SCES 2024
作者: Khajgiwale, Parth International Institute of Information Technology Department of Computer Engineering Pune India
Network Intrusion Detection Systems (NIDS) play a critical role in safeguarding computer networks against malicious activities and cyber threats. To improve the accuracy and robustness of NIDS, this research explores ... 详细信息
来源: 评论
Energy-Aware Priority-Based Task Scheduling for Edge Devices in Internet of Things  5
Energy-Aware Priority-Based Task Scheduling for Edge Devices...
收藏 引用
5th IEEE India Council International Subsections Conference, INDISCON 2024
作者: Pawar, Vijaykumar Naik Mini, S. National Institute of Technology Department of Computer Science and Engineering Goa India
Billions of networked devices interact and collaborate with one another via the Internet as part of the Internet of Things (IoT). The performance and energy efficiency of IoT environments are greatly enhanced by effec... 详细信息
来源: 评论
Point-To-Set Principle and Constructive Dimension Faithfulness  49
Point-To-Set Principle and Constructive Dimension Faithfulne...
收藏 引用
49th International Symposium on Mathematical Foundations of computer Science, MFCS 2024
作者: Nandakumar, Satyadev Pulari, Subin Akhil, S. Department of Computer Science and Engineering Indian Institute of Technology Kanpur India
Hausdorff Φ-dimension is a notion of Hausdorff dimension developed using a restricted class of coverings of a set. We introduce a constructive analogue of Φ-dimension using the notion of constructive Φ-s-supergales... 详细信息
来源: 评论
A Contemporary Review of Interpolation-based Reversible Data Hiding  2
A Contemporary Review of Interpolation-based Reversible Data...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Pandey, Supriya Pandey, Shrawan Kumar Tripathi, Abhinandan Buddha Institute of Technology Department of Computer Science & Engineering Gorakhpur India
Reversible data hiding (RDH) has become a critical topic in modern information security, as it allows for secure communication by embedding secret data into a cover medium. Importantly, RDH also ensures that the hidde... 详细信息
来源: 评论