咨询与建议

限定检索结果

文献类型

  • 683,450 篇 会议
  • 280,134 篇 期刊文献
  • 6,832 册 图书
  • 21 篇 学位论文
  • 7 篇 专利
  • 6 篇 科技报告

馆藏范围

  • 970,446 篇 电子文献
  • 23 种 纸本馆藏

日期分布

学科分类号

  • 566,419 篇 工学
    • 410,153 篇 计算机科学与技术...
    • 326,921 篇 软件工程
    • 121,645 篇 信息与通信工程
    • 81,699 篇 控制科学与工程
    • 59,878 篇 电气工程
    • 57,572 篇 生物工程
    • 54,086 篇 电子科学与技术(可...
    • 41,868 篇 生物医学工程(可授...
    • 35,692 篇 光学工程
    • 35,370 篇 机械工程
    • 26,694 篇 化学工程与技术
    • 24,474 篇 仪器科学与技术
    • 22,008 篇 动力工程及工程热...
    • 18,759 篇 材料科学与工程(可...
    • 16,947 篇 安全科学与工程
    • 15,382 篇 网络空间安全
    • 15,039 篇 建筑学
  • 315,518 篇 理学
    • 181,703 篇 数学
    • 83,975 篇 物理学
    • 65,400 篇 生物学
    • 53,431 篇 统计学(可授理学、...
    • 34,042 篇 系统科学
    • 28,522 篇 化学
  • 147,779 篇 管理学
    • 83,445 篇 管理科学与工程(可...
    • 70,496 篇 图书情报与档案管...
    • 40,409 篇 工商管理
  • 38,117 篇 医学
    • 32,118 篇 临床医学
    • 28,692 篇 基础医学(可授医学...
    • 17,726 篇 药学(可授医学、理...
  • 25,074 篇 法学
    • 20,843 篇 社会学
  • 14,903 篇 经济学
  • 13,591 篇 教育学
  • 11,813 篇 农学
  • 4,697 篇 文学
  • 1,904 篇 军事学
  • 1,638 篇 艺术学
  • 759 篇 哲学
  • 311 篇 历史学

主题

  • 63,831 篇 computer science
  • 21,841 篇 computational mo...
  • 18,866 篇 feature extracti...
  • 17,441 篇 accuracy
  • 15,410 篇 training
  • 15,086 篇 data mining
  • 15,008 篇 machine learning
  • 14,323 篇 deep learning
  • 13,642 篇 application soft...
  • 12,874 篇 computer archite...
  • 12,213 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,431 篇 costs
  • 11,383 篇 protocols
  • 11,261 篇 testing
  • 10,820 篇 artificial intel...
  • 10,756 篇 predictive model...
  • 10,493 篇 support vector m...
  • 10,473 篇 neural networks
  • 10,078 篇 optimization

机构

  • 5,009 篇 department of co...
  • 2,889 篇 school of comput...
  • 2,475 篇 college of compu...
  • 2,461 篇 school of comput...
  • 2,420 篇 college of compu...
  • 2,127 篇 chitkara univers...
  • 2,048 篇 department of co...
  • 1,652 篇 department of co...
  • 1,553 篇 university of ch...
  • 1,519 篇 school of comput...
  • 1,491 篇 department of co...
  • 1,440 篇 school of comput...
  • 1,273 篇 department of el...
  • 1,270 篇 department of co...
  • 1,270 篇 school of comput...
  • 1,250 篇 school of comput...
  • 1,224 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,056 篇 department of el...

作者

  • 527 篇 liu yang
  • 426 篇 wang wei
  • 382 篇 niyato dusit
  • 305 篇 yang yang
  • 285 篇 wei li
  • 266 篇 wei wang
  • 254 篇 li li
  • 244 篇 li yang
  • 242 篇 zhang lei
  • 240 篇 barter w.
  • 232 篇 s. chen
  • 215 篇 j. wang
  • 214 篇 blake t.
  • 208 篇 bellee v.
  • 206 篇 bowcock t.j.v.
  • 204 篇 zhang wei
  • 203 篇 borsato m.
  • 203 篇 a. gomes
  • 201 篇 brundu d.
  • 199 篇 betancourt c.

语言

  • 917,518 篇 英文
  • 42,290 篇 其他
  • 10,597 篇 中文
  • 448 篇 日文
  • 219 篇 德文
  • 93 篇 法文
  • 76 篇 西班牙文
  • 67 篇 朝鲜文
  • 58 篇 俄文
  • 57 篇 斯洛文尼亚文
  • 29 篇 葡萄牙文
  • 25 篇 意大利文
  • 10 篇 土耳其文
  • 6 篇 荷兰文
  • 5 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
970450 条 记 录,以下是151-160 订阅
排序:
Robust Network Security:A Deep Learning Approach to Intrusion Detection in IoT
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4149-4169页
作者: Ammar Odeh Anas Abu Taleb Department of Computer Science Princess Sumaya University of TechnologyAmman1196Jordan
The proliferation of Internet of Things(IoT)technology has exponentially increased the number of devices interconnected over networks,thereby escalating the potential vectors for cybersecurity *** response,this study ... 详细信息
来源: 评论
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
science China(Information sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
收藏 引用
Journal of computer science & technology 2024年 第2期39卷 245-266页
作者: 廖小飞 赵文举 金海 姚鹏程 黄禹 王庆刚 赵进 郑龙 张宇 邵志远 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Zhejiang Lab Hangzhou 311121China
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra... 详细信息
来源: 评论
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Tackling the Berth Allocation Problem via Harmony Search Algorithm
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第3期5卷 501-512页
作者: Ahmed, Bilal Hamdan, Hazlina Muhammed, Abdullah Husin, Nor Azura Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 UPM Malaysia Department of Communication Technology and Networks Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 UPM Malaysia
Berth Allocation Problem (BAP) is a renowned difficult combinatorial optimization problem that plays a crucial role in maritime transportation systems. BAP is categorized as non-deterministic polynomial-time hard (NP-... 详细信息
来源: 评论
Low-light image enhancement using the illumination boost algorithm along with the SKWGIF method
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18651-18685页
作者: Radmand, Elnaz Saberi, Erfan Sorkhi, Ali Ghanbari Pirgazi, Jamshid Department of Computer Engineering University of Science and Technology of Mazandaran Behshahr Iran
Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main... 详细信息
来源: 评论
Predicting Liver Cirrhosis Stages Using Extra Trees, Random Forest, and SVM with Data Mining Techniques
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第21期48卷 15-26页
作者: Ali, Duaa S. Aljabery, Maalim A. Faculty of Computer Science & Information Technology Computer Science Dept University of Basrah Basrah Iraq
Liver cirrhosis often occurs as a result of the lengthy and persistent progression of chronic liver disorders. It is a key crucial cause of death on a global scale. Early diagnosis and identification of cirrhosis are ... 详细信息
来源: 评论
Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3111-3130页
作者: Yuanjun Qu Xiameng Si Haiyan Kang Hanlin Zhou College of Computer Science Beijing Information Science and Technology UniversityBeijing100192China
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论