咨询与建议

限定检索结果

文献类型

  • 287,144 篇 会议
  • 123,660 篇 期刊文献
  • 2,898 册 图书

馆藏范围

  • 413,701 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 239,873 篇 工学
    • 160,132 篇 计算机科学与技术...
    • 129,342 篇 软件工程
    • 58,066 篇 信息与通信工程
    • 38,615 篇 控制科学与工程
    • 33,513 篇 电气工程
    • 31,772 篇 电子科学与技术(可...
    • 28,043 篇 生物工程
    • 22,008 篇 生物医学工程(可授...
    • 19,031 篇 光学工程
    • 16,356 篇 机械工程
    • 14,085 篇 化学工程与技术
    • 13,018 篇 动力工程及工程热...
    • 12,926 篇 仪器科学与技术
    • 11,448 篇 材料科学与工程(可...
    • 9,143 篇 安全科学与工程
    • 8,729 篇 网络空间安全
  • 136,373 篇 理学
    • 67,805 篇 数学
    • 44,269 篇 物理学
    • 31,784 篇 生物学
    • 22,345 篇 统计学(可授理学、...
    • 15,747 篇 系统科学
    • 15,164 篇 化学
  • 60,371 篇 管理学
    • 36,319 篇 管理科学与工程(可...
    • 26,541 篇 图书情报与档案管...
    • 17,812 篇 工商管理
  • 21,377 篇 医学
    • 17,710 篇 临床医学
    • 15,781 篇 基础医学(可授医学...
    • 9,799 篇 药学(可授医学、理...
    • 8,746 篇 公共卫生与预防医...
  • 11,404 篇 法学
    • 9,384 篇 社会学
  • 6,944 篇 经济学
  • 5,451 篇 农学
  • 4,471 篇 教育学
  • 1,991 篇 文学
  • 909 篇 军事学
  • 525 篇 艺术学
  • 79 篇 哲学
  • 48 篇 历史学

主题

  • 20,112 篇 computer science
  • 10,099 篇 accuracy
  • 9,229 篇 computational mo...
  • 8,613 篇 deep learning
  • 8,576 篇 feature extracti...
  • 8,015 篇 machine learning
  • 7,112 篇 training
  • 5,524 篇 data mining
  • 5,432 篇 predictive model...
  • 5,390 篇 support vector m...
  • 5,270 篇 computer archite...
  • 4,965 篇 wireless sensor ...
  • 4,911 篇 optimization
  • 4,835 篇 real-time system...
  • 4,820 篇 costs
  • 4,563 篇 bandwidth
  • 4,550 篇 convolutional ne...
  • 4,501 篇 neural networks
  • 4,477 篇 testing
  • 4,455 篇 application soft...

机构

  • 1,715 篇 department of co...
  • 1,360 篇 department of co...
  • 1,339 篇 department of el...
  • 1,176 篇 department of el...
  • 1,058 篇 cavendish labora...
  • 978 篇 department of ph...
  • 940 篇 department of co...
  • 853 篇 university of ch...
  • 849 篇 physikalisches i...
  • 832 篇 oliver lodge lab...
  • 816 篇 department of el...
  • 646 篇 department of co...
  • 589 篇 department of co...
  • 576 篇 chitkara univers...
  • 535 篇 infn sezione di ...
  • 516 篇 infn laboratori ...
  • 511 篇 infn sezione di ...
  • 499 篇 horia hulubei na...
  • 499 篇 infn sezione di ...
  • 485 篇 department of co...

作者

  • 258 篇 niyato dusit
  • 256 篇 barter w.
  • 250 篇 s. chen
  • 249 篇 j. wang
  • 231 篇 blake t.
  • 226 篇 a. gomes
  • 222 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 borsato m.
  • 219 篇 amato s.
  • 217 篇 bowcock t.j.v.
  • 215 篇 boettcher t.
  • 212 篇 brundu d.
  • 207 篇 c. alexa
  • 201 篇 j. m. izen
  • 201 篇 beiter a.
  • 201 篇 bencivenni g.
  • 192 篇 bay a.
  • 191 篇 c. amelung
  • 190 篇 g. bella

语言

  • 347,468 篇 英文
  • 62,592 篇 其他
  • 4,203 篇 中文
  • 222 篇 日文
  • 85 篇 德文
  • 63 篇 法文
  • 55 篇 斯洛文尼亚文
  • 36 篇 朝鲜文
  • 15 篇 阿拉伯文
  • 15 篇 俄文
  • 12 篇 西班牙文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 葡萄牙文
  • 3 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Data Science Engineering"
413702 条 记 录,以下是4831-4840 订阅
排序:
Multimodal Online Manipulation: Empirical Analysis of Fact-Checking Reports  10
Multimodal Online Manipulation: Empirical Analysis of Fact-C...
收藏 引用
10th Italian Conference on Computational Linguistics, CLiC-it 2024
作者: Uryupina, Olga Department of Information Engineering and Computer Science University of Trento Italy
This paper presents an in-depth exploratory quantitative study of the interaction between multimedia and textual components in online manipulative content. We discuss relations between content layers (such as proof or... 详细信息
来源: 评论
Enhanced Video Monitoring Using Stae Autoencoder  2
Enhanced Video Monitoring Using Stae Autoencoder
收藏 引用
2nd International Conference on Artificial Intelligence Trends and Pattern Recognition, ICAITPR 2024
作者: Kumar, Vitta Yaswanth Abdullah, Shaik Jayvardhan, G. Reddy, G.S. Prasada Vardhaman College of Engineering Computer Science Department Hyderabad India
Big data applications have become widespread across different sectors and research domains, incorporating a vast array of sources such as social media information, sensor data, agricultural data, medical data, and dat... 详细信息
来源: 评论
Strengthening QR code Anti-Counterfeit through Multi-Encryption Algorithm  1
Strengthening QR code Anti-Counterfeit through Multi-Encrypt...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Narayanan, S. Dhivyalakshmi Prabhu, S. Department of Computer Science and Engineering Tamil Nadu Erode India
The rise in digital information sharing poses risks to privacy and personal identity, making data vulnerable to theft and swift modifications during transfer. Safeguarding digital data against attackers is crucial. To... 详细信息
来源: 评论
Delay Minimization for Offloaded Tasks in UAV-Assisted Mobile Edge Computing Using Ant Colony Optimization  6
Delay Minimization for Offloaded Tasks in UAV-Assisted Mobil...
收藏 引用
6th International Conference on Sustainable Technologies for Industry 5.0, STI 2024
作者: Ahmed, Tanzir Ahmed, Jargis Green University of Bangladesh Department of Computer Science and Engineering Bangladesh
Mobile Edge Computing (MEC) server plays a crucial role in executing the tasks offloaded by the edge users. As MEC is deployed at the edge of the network, it helps to reduce computation latency and increase reliabilit... 详细信息
来源: 评论
An MEC-based Platform for IoT Applications  23
An MEC-based Platform for IoT Applications
收藏 引用
2023 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2023
作者: Chen, Whai-En Department of Computer Science and Information Engineering Asia University Taichung Taiwan Computer Science and Information Engineering National Ilan University Yilan Taiwan
The key technologies for the future development of mobile communications are: Provide end-To-end ultra-low latency, reliability and availability;Provide different network slices according to different business needs;P... 详细信息
来源: 评论
Application of Generative Graph Models in Biological Network Regeneration: A Selective Review and Qualitative Analysis
Application of Generative Graph Models in Biological Network...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Teji, Binon Roy, Swarup Guzzi, Pietro Hiram Bhandari, Dinabandhu Lab Department of Computer Applications Gangtok India University of Catanzaro School of Computer Science and Biomedical Engineering Italy Heritage Institute of Technology Department of Computer Science and Engineering Kolkata India
Biological networks are essential for understanding the complex cellular mechanisms of living organisms. Simulating biological networks allows researchers to model and understand complex cellular processes without the... 详细信息
来源: 评论
Cryptographic Analysis: Popular Social Media Applications and Mitigations of Vulnerabilities  26
Cryptographic Analysis: Popular Social Media Applications an...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Moon, Iffath Tanjim Mimi, Afsana Rahman Mridha, Md. Musfiqur Pundra University of Science & Technology Department of Computer Science & Engineering Bogura Bangladesh Varendra University Department of Computer Science & Engineering Rajshahi Bangladesh
In this paper, we have conducted a cryptographic analysis of the most widely used Android social media applications. In Android social media applications, cryptography plays a vital role in protecting data and communi... 详细信息
来源: 评论
Synergistic Approach for UAV Target Tracking: A Voronoi-GWO-Reinforcement Learning Framework  30th
Synergistic Approach for UAV Target Tracking: A Voronoi-GWO-...
收藏 引用
30th International Conference on Computational and Experimental engineering and sciences, ICCES 2024
作者: Bhat, Pranamya P. Sudheer, Neeraj Manoj, Nandana Kumar, Preethika Ajay Sharma, Richa Arya, Arti Department of Computer Science Engineering PES University Karnataka Bengaluru India
Unmanned Aerial Vehicles (UAVs) are integral to diverse applications, spanning surveillance, search and rescue operations, and precision agriculture. This paper addresses a critical challenge in these domains offering... 详细信息
来源: 评论
Generating Images from Text Using GANs vs Transformers  8
Generating Images from Text Using GANs vs Transformers
收藏 引用
8th International Conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Kumar, Jatin Tanvi, Tanisha Ghosh, Aitijya Mondal, Ritankar Das, Soma Institute of Engineering and Management University of Engineering and Management Department of Computer Science and Engineering Kolkata India
This paper compares Generative Adversarial Networks (GANs) and transformer-based models for text-to-image generation, examining each approach's ability to convert textual descriptions into realistic images. GANs, ... 详细信息
来源: 评论
A Strategic Framework for the Development of a Microtext AI Chatbot for Tourism in Indian Cities  8
A Strategic Framework for the Development of a Microtext AI ...
收藏 引用
8th International Conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Sultan, Adnan A. Mukherjee, Unmesh Mondal, Anupam Institute of Engineering & Management University of Engineering & Management Department of Computer Science & Engineering Kolkata India
Tourism plays a crucial role in India's economy, with its diverse cultural, historical, and geographical richness attracting millions of domes-tic and international visitors annually. To cater to the needs of thes... 详细信息
来源: 评论