咨询与建议

限定检索结果

文献类型

  • 85,981 篇 会议
  • 45,846 篇 期刊文献
  • 1,257 册 图书

馆藏范围

  • 133,084 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 80,597 篇 工学
    • 58,180 篇 计算机科学与技术...
    • 46,807 篇 软件工程
    • 20,344 篇 信息与通信工程
    • 12,597 篇 控制科学与工程
    • 9,542 篇 电气工程
    • 9,325 篇 生物工程
    • 8,581 篇 电子科学与技术(可...
    • 7,184 篇 生物医学工程(可授...
    • 5,685 篇 光学工程
    • 5,560 篇 机械工程
    • 4,097 篇 仪器科学与技术
    • 4,004 篇 动力工程及工程热...
    • 3,875 篇 化学工程与技术
    • 3,758 篇 网络空间安全
    • 3,367 篇 安全科学与工程
    • 2,874 篇 交通运输工程
  • 45,136 篇 理学
    • 23,050 篇 数学
    • 13,664 篇 物理学
    • 10,735 篇 生物学
    • 7,282 篇 统计学(可授理学、...
    • 4,905 篇 系统科学
    • 4,293 篇 化学
  • 23,584 篇 管理学
    • 14,280 篇 管理科学与工程(可...
    • 10,297 篇 图书情报与档案管...
    • 6,491 篇 工商管理
  • 7,630 篇 医学
    • 6,333 篇 临床医学
    • 5,585 篇 基础医学(可授医学...
    • 3,348 篇 药学(可授医学、理...
    • 3,303 篇 公共卫生与预防医...
  • 4,078 篇 法学
    • 3,292 篇 社会学
  • 2,442 篇 经济学
  • 2,074 篇 农学
  • 1,839 篇 教育学
  • 667 篇 文学
  • 361 篇 军事学
  • 264 篇 艺术学
  • 53 篇 哲学
  • 31 篇 历史学

主题

  • 3,968 篇 computer science
  • 3,648 篇 accuracy
  • 3,355 篇 deep learning
  • 3,284 篇 feature extracti...
  • 2,920 篇 machine learning
  • 2,664 篇 computational mo...
  • 2,464 篇 training
  • 2,301 篇 educational inst...
  • 2,035 篇 internet of thin...
  • 1,952 篇 support vector m...
  • 1,923 篇 data mining
  • 1,750 篇 predictive model...
  • 1,739 篇 artificial intel...
  • 1,680 篇 convolutional ne...
  • 1,606 篇 real-time system...
  • 1,595 篇 optimization
  • 1,428 篇 security
  • 1,425 篇 wireless sensor ...
  • 1,342 篇 data models
  • 1,269 篇 cloud computing

机构

  • 1,093 篇 department of co...
  • 1,019 篇 department of ph...
  • 1,014 篇 cavendish labora...
  • 964 篇 oliver lodge lab...
  • 959 篇 physikalisches i...
  • 783 篇 university of ch...
  • 643 篇 college of compu...
  • 617 篇 infn sezione di ...
  • 589 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 561 篇 department of ph...
  • 547 篇 infn sezione di ...
  • 543 篇 fakultät physik ...
  • 541 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 538 篇 imperial college...
  • 532 篇 school of physic...
  • 517 篇 h.h. wills physi...
  • 510 篇 stfc rutherford ...
  • 499 篇 school of physic...

作者

  • 252 篇 barter w.
  • 245 篇 a. gomes
  • 236 篇 s. chen
  • 234 篇 c. alexa
  • 233 篇 j. m. izen
  • 231 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 225 篇 c. amelung
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 216 篇 bay a.

语言

  • 126,534 篇 英文
  • 4,857 篇 其他
  • 1,707 篇 中文
  • 101 篇 日文
  • 18 篇 法文
  • 18 篇 斯洛文尼亚文
  • 17 篇 德文
  • 4 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science/ College of Computer Science and Information Technology"
133084 条 记 录,以下是41-50 订阅
排序:
Self-Dual Cyclic Codes With Square-Root-Like Lower Bounds on Their Minimum Distances
收藏 引用
IEEE Transactions on information Theory 2025年 第4期71卷 2389-2396页
作者: Chen, Hao Ding, Cunsheng Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Binary self-dual cyclic codes have been studied since the classical work of Sloane and Thompson published in IEEE Trans. Inf. Theory, vol. 29, 1983. Twenty five years later, an infinite family of binary self-dual cycl... 详细信息
来源: 评论
L2H-NeRF: low- to high-frequency-guided NeRF for 3D reconstruction with a few input scenes
收藏 引用
Visual computer 2025年 1-12页
作者: Bao, Taoqi Ye, Jiangnan Bao, Zhankong Leow, Chee Siang Hu, Haoji Lu, Jianfeng Fujishiro, Issei Xu, Jiayi School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China College of Information Science & Electronic Engineering Zhejiang University Hangzhou China Department of Mechatronics University of Yamanashi Kofu Japan Department of Information and Computer Science Faculty of Science and Technology Keio University Yokohama Japan
Nowadays, three-dimensional (3D) reconstruction techniques are becoming increasingly important in the fields of architecture, game development, movie production, and more. Due to common issues in the reconstruction pr... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
Comparison of Machine Learning Algorithms for Predicting Thyroid Disorders in Diabetic Patients
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第12期49卷 105-114页
作者: Sayyid, Hiba O. Mahmood, Salma A. Hamadi, Saad S. Department of Computer Science University of Basrah College of Computer Sciences and Information Technology Basrah Iraq Department of Intelligent Medical Systems University of Basrah College of Computer Sciences and Information Technology Basrah Iraq Department of Internal Medicine University of Basrah College of Medicine Basrah Iraq
Machine Learning (ML), a subfield of Artificial Intelligence (AI), has been used successfully in the healthcare domain for disease diagnosis. Thyroid disorders and diabetes are two of the most prevalent and interconne... 详细信息
来源: 评论
Quantum Machine and Deep Learning for Medical Image Classification: A Systematic Review of Trends, Methodologies, and Future Directions
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2025年 第2期6卷 107-138页
作者: Radhi, Eman A. Kamil, Mohammed Y. Mohammed, Mazin Abed College of Science Mustansiriyah University Baghdad Iraq Department of Artificial Intelligence College of Computer Science and Information Technology University of Anbar Anbar31001 Iraq
Quantum Learning (QL) has emerged as a promising approach to medical image classification, leveraging the principles of quantum mechanics to improve the performance and efficiency of machine learning algorithms. This ... 详细信息
来源: 评论
Detecting Fake Reviews in E-Commerce using Deep Learning Techniques  1
Detecting Fake Reviews in E-Commerce using Deep Learning Tec...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Abd, Maysam Jalal Hussein, Mohsin Hasan University of Kerbala College of Computer Science and Information Technology Department of Computer Science Karbala Iraq
Users may now create and use large amounts of data saved online thanks to e-commerce systems. Modern shoppers examine online reviews before making purchases. Evaluations are essential for both people and organizations... 详细信息
来源: 评论
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Object Segmentation in Thermal Images Using YOLOv8  5th
Object Segmentation in Thermal Images Using YOLOv8
收藏 引用
5th International Conference on Computing and Network Communications, CoCoNet 2023
作者: Muften, Haider Ali Khayeat, Ali Retha Hasoon College of Computer Science and Information Technology University of Kerbala Computer Science Department Karbala Iraq
Thermal images are crucial for object detection in surveillance, security, industrial automation, and vehicular navigation due to their ability to capture heat signatures. However, complexities like low contrast, fluc... 详细信息
来源: 评论
An Improved Graph Partitioning Algorithm Based Approach for Workflow Offloading in a Fog Environment
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 623-634页
作者: Mahajan, Neetu Narang Kaur, Parmeet Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India
The paper addresses the critical problem of application workflow offloading in a fog environment. Resource constrained mobile and Internet of Things devices may not possess specialized hardware to run complex workflow... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论