咨询与建议

限定检索结果

文献类型

  • 273,162 篇 会议
  • 112,863 篇 期刊文献
  • 2,781 册 图书

馆藏范围

  • 388,805 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,103 篇 工学
    • 149,617 篇 计算机科学与技术...
    • 121,008 篇 软件工程
    • 54,628 篇 信息与通信工程
    • 35,815 篇 控制科学与工程
    • 31,966 篇 电气工程
    • 30,609 篇 电子科学与技术(可...
    • 26,000 篇 生物工程
    • 20,441 篇 生物医学工程(可授...
    • 17,850 篇 光学工程
    • 15,546 篇 机械工程
    • 13,079 篇 化学工程与技术
    • 12,209 篇 仪器科学与技术
    • 12,154 篇 动力工程及工程热...
    • 10,920 篇 材料科学与工程(可...
    • 8,327 篇 安全科学与工程
    • 7,877 篇 网络空间安全
  • 127,332 篇 理学
    • 63,220 篇 数学
    • 41,829 篇 物理学
    • 29,490 篇 生物学
    • 20,402 篇 统计学(可授理学、...
    • 14,882 篇 系统科学
    • 14,048 篇 化学
  • 55,978 篇 管理学
    • 33,687 篇 管理科学与工程(可...
    • 24,484 篇 图书情报与档案管...
    • 16,673 篇 工商管理
  • 19,407 篇 医学
    • 16,215 篇 临床医学
    • 14,576 篇 基础医学(可授医学...
    • 9,158 篇 药学(可授医学、理...
    • 7,764 篇 公共卫生与预防医...
  • 10,518 篇 法学
    • 8,605 篇 社会学
  • 6,451 篇 经济学
  • 5,099 篇 农学
  • 4,167 篇 教育学
  • 1,866 篇 文学
  • 872 篇 军事学
  • 511 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,985 篇 computer science
  • 8,799 篇 accuracy
  • 8,606 篇 computational mo...
  • 7,863 篇 feature extracti...
  • 7,458 篇 deep learning
  • 7,238 篇 machine learning
  • 6,427 篇 training
  • 5,257 篇 data mining
  • 5,110 篇 computer archite...
  • 5,016 篇 support vector m...
  • 4,932 篇 wireless sensor ...
  • 4,799 篇 predictive model...
  • 4,649 篇 costs
  • 4,531 篇 bandwidth
  • 4,483 篇 optimization
  • 4,478 篇 application soft...
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,321 篇 testing
  • 4,273 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,364 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 973 篇 department of ph...
  • 879 篇 department of co...
  • 856 篇 physikalisches i...
  • 844 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 745 篇 university of ch...
  • 638 篇 department of co...
  • 550 篇 infn sezione di ...
  • 539 篇 department of co...
  • 521 篇 infn laboratori ...
  • 519 篇 infn sezione di ...
  • 516 篇 chitkara univers...
  • 502 篇 horia hulubei na...
  • 502 篇 infn sezione di ...
  • 486 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 193 篇 g. bella
  • 193 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 372,465 篇 英文
  • 12,661 篇 其他
  • 3,698 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 33 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Computer Engineering"
388806 条 记 录,以下是71-80 订阅
Task offloading delay minimization in vehicular edge computing based on vehicle trajectory prediction
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 537-546页
作者: Feng Zeng Zheng Zhang Jinsong Wu School of Computer Science and Engineering Central South University School of Artificial Intelligence Guilin University of Electronic Technology The Department of Computer Science Universidad de Chile
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen... 详细信息
来源: 评论
Enhancing patient-independent detection of freezing of gait in Parkinson’s disease with deep adversarial network
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Fahad, Md Shah Ranjan, Ashish Kumar, Gautam Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India Department of Computer Science and Engineering C. V. Raman Global University Odisha Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Delhi Delhi India
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra... 详细信息
来源: 评论
Enhancing Voice Phishing Detection Using Multilingual Back-Translation and SMOTE: An Empirical Study
收藏 引用
IEEE Access 2025年 13卷 37946-37965页
作者: Boussougou, Milandu Keith Moussavou Hamandawana, Prince Park, Dong-Joo Soongsil University Department of Computer Science and Engineering Seoul06978 Korea Republic of Ajou University Department of Software and Computer Engineering Suwon16499 Korea Republic of Soongsil University School of Computer Science and Engineering Seoul06978 Korea Republic of
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o... 详细信息
来源: 评论
Isomorphic Classification of First Degree Cellular Automata
收藏 引用
Complex Systems 2025年 第1期34卷 59-90页
作者: Vikrant, Vicky Bhattacharjee, Kamalika Mukherjee, Sukanya Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli620015 India Department of Computer Science and Engineering Institute of Engineering and Management West Bengal Kolkata700091 India
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to... 详细信息
来源: 评论
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论
Detection of Stuttered Speech with Repetition Using Wavelet Packet Transformation and Neuro Fuzzy Classifier
收藏 引用
SN computer science 2025年 第5期6卷 1-9页
作者: Drakshayini, K.B. Anusuya, M.A. Vani, H.Y. Chayadevi, M.L. Department of Computer Science and Engineering VTU Belagaum India Department of Computer Science and Engineering JSSSTU Mysuru India Department of Information Science and Engineering JSSSTU Mysuru India Department of Computer Science and Engineering BNMIT Mysuru India
Repetition is the most prominent type of dysfluency in stuttered speech. Spectral energy, entropy, ZCR, and centroid are extracted using wavelet packet transformation, and similarity between these features for adjacen... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
Deep learning approaches to address cold start and long tail challenges in recommendation systems: a systematic review
收藏 引用
Multimedia Tools and Applications 2025年 第5期84卷 2293-2325页
作者: Jangid, Manisha Kumar, Rakesh Department of Computer Science & Engineering Central University of Haryana Haryana India
Recommendation systems (RS) have become prevalent across different domains including music, e-commerce, e-learning, entertainment, and social media to address the issue of information overload. While traditional RS ap... 详细信息
来源: 评论
An ensemble based approach for violence detection in videos using deep transfer learning
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 11001-11025页
作者: Kaur, Gurmeet Singh, Sarbjeet Department of Computer Science and Engineering UIET Panjab University Chandigarh India
The detection of violence in videos has become an extremely valuable application in real-life situations, which aim to maintain and protect people’s safety. Despite the complexities inherent in videos and the abrupt ... 详细信息
来源: 评论