咨询与建议

限定检索结果

文献类型

  • 323,780 篇 会议
  • 138,092 篇 期刊文献
  • 3,274 册 图书
  • 2 篇 学位论文

馆藏范围

  • 465,147 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 270,339 篇 工学
    • 182,833 篇 计算机科学与技术...
    • 147,709 篇 软件工程
    • 64,170 篇 信息与通信工程
    • 41,871 篇 控制科学与工程
    • 35,831 篇 电气工程
    • 34,359 篇 电子科学与技术(可...
    • 30,984 篇 生物工程
    • 24,134 篇 生物医学工程(可授...
    • 20,839 篇 光学工程
    • 18,394 篇 机械工程
    • 15,079 篇 化学工程与技术
    • 14,194 篇 仪器科学与技术
    • 13,778 篇 动力工程及工程热...
    • 12,121 篇 材料科学与工程(可...
    • 9,664 篇 安全科学与工程
    • 8,994 篇 网络空间安全
  • 154,137 篇 理学
    • 79,037 篇 数学
    • 48,665 篇 物理学
    • 35,120 篇 生物学
    • 24,902 篇 统计学(可授理学、...
    • 17,606 篇 系统科学
    • 16,126 篇 化学
  • 68,832 篇 管理学
    • 40,941 篇 管理科学与工程(可...
    • 30,555 篇 图书情报与档案管...
    • 19,901 篇 工商管理
  • 22,841 篇 医学
    • 19,144 篇 临床医学
    • 17,160 篇 基础医学(可授医学...
    • 10,747 篇 药学(可授医学、理...
    • 8,981 篇 公共卫生与预防医...
  • 12,702 篇 法学
    • 10,393 篇 社会学
  • 7,745 篇 经济学
  • 6,191 篇 农学
  • 5,724 篇 教育学
  • 2,191 篇 文学
  • 1,060 篇 军事学
  • 668 篇 艺术学
  • 192 篇 哲学
  • 96 篇 历史学

主题

  • 23,556 篇 computer science
  • 10,139 篇 computational mo...
  • 10,108 篇 accuracy
  • 9,614 篇 feature extracti...
  • 8,685 篇 deep learning
  • 8,459 篇 machine learning
  • 7,853 篇 training
  • 6,557 篇 educational inst...
  • 6,496 篇 data mining
  • 5,922 篇 support vector m...
  • 5,779 篇 predictive model...
  • 5,761 篇 computer archite...
  • 5,575 篇 wireless sensor ...
  • 5,315 篇 costs
  • 5,277 篇 optimization
  • 5,216 篇 application soft...
  • 5,167 篇 algorithm design...
  • 5,048 篇 neural networks
  • 5,035 篇 testing
  • 4,976 篇 protocols

机构

  • 1,672 篇 department of co...
  • 1,334 篇 department of co...
  • 1,316 篇 department of el...
  • 1,137 篇 department of el...
  • 1,106 篇 college of compu...
  • 1,037 篇 department of co...
  • 1,019 篇 cavendish labora...
  • 975 篇 department of ph...
  • 966 篇 college of compu...
  • 882 篇 college of compu...
  • 868 篇 college of compu...
  • 834 篇 oliver lodge lab...
  • 832 篇 physikalisches i...
  • 797 篇 department of el...
  • 776 篇 university of ch...
  • 625 篇 department of co...
  • 591 篇 department of co...
  • 580 篇 department of co...
  • 576 篇 college of compu...
  • 553 篇 chitkara univers...

作者

  • 249 篇 niyato dusit
  • 248 篇 barter w.
  • 240 篇 s. chen
  • 235 篇 j. wang
  • 223 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 a. gomes
  • 215 篇 betancourt c.
  • 214 篇 amato s.
  • 213 篇 borsato m.
  • 210 篇 boettcher t.
  • 207 篇 beiter a.
  • 207 篇 brundu d.
  • 201 篇 c. alexa
  • 197 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 192 篇 c. amelung
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 445,625 篇 英文
  • 14,756 篇 其他
  • 4,819 篇 中文
  • 244 篇 日文
  • 50 篇 德文
  • 38 篇 法文
  • 38 篇 朝鲜文
  • 25 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 葡萄牙文
  • 3 篇 捷克文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering College of Computer Science"
465148 条 记 录,以下是1-10 订阅
排序:
Practical cloud storage auditing using serverless computing
收藏 引用
science China(Information sciences) 2024年 第3期67卷 33-47页
作者: Fei CHEN Jianquan CAI Tao XIANG Xiaofeng LIAO College of Computer Science and Software Engineering Shenzhen University College of Computer Science Chongqing University
Cloud storage auditing research is dedicated to solving the data integrity problem of outsourced storage on the cloud. In recent years, researchers have proposed various cloud storage auditing schemes using different ... 详细信息
来源: 评论
An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 957-977页
作者: Peda Narayana Bathula M.Sreenivasulu Department of Computer Science Engineering Jawaharlal Nehru Technological UniversityAnanthapur 515002India Department of Computer Science Engineering Matrusri Engineering CollegeHyderabad 500059India
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ... 详细信息
来源: 评论
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 735-759页
作者: Wael M.S.Yafooz Abdullah Alsaeedi Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
WebFLex:A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4177-4204页
作者: Mai Alzamel Hamza Ali Rizvi Najwa Altwaijry Isra Al-Turaiki Department of Computer Science College of Computer and Information SciencesKing Saud UniversityRiyadhKingdom of Saudi Arabia Department of Computer Science and Engineering Punjab Engineering CollegeChandigarhIndia
Scalability and information personal privacy are vital for training and deploying large-scale deep learning *** learning trains models on exclusive information by aggregating weights from various devices and taking ad... 详细信息
来源: 评论
Developing a Comprehensive NLP Framework for Indigenous Dialect Documentation and Revitalization
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 815-823页
作者: Fakhreldin, Mohammed Department of Computer Science-College of Engineering and Computer Science Jazan University Jazan45142 Saudi Arabia
The disappearance of Indigenous languages results in a decrease in cultural diversity, hence making the preservation of these languages extremely important. Conventional methods of documentation are lengthy, and the p... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
A Weakly-Supervised Crowd Density Estimation Method Based on Two-Stage Linear Feature Calibration
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 965-981页
作者: Yong-Chao Li Rui-Sheng Jia Ying-Xiang Hu Hong-Mei Sun the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590 the Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266000China the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590China the College of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210000China
In a crowd density estimation dataset,the annotation of crowd locations is an extremely laborious task,and they are not taken into the evaluation *** this paper,we aim to reduce the annotation cost of crowd datasets,a... 详细信息
来源: 评论
APF-GAN:Exploring asymmetric pre-training and fine-tuning strategy for conditional generative adversarial network
收藏 引用
Computational Visual Media 2024年 第1期10卷 187-192页
作者: Yuxuan Li Lingfeng Yang Xiang Li College of Computer Science Nankai UniversityTianjinChina School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingChina
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di... 详细信息
来源: 评论
Prediction and analysis of Covid-19 using the Deep Learning Models
收藏 引用
Research on Biomedical engineering 2024年 第1期40卷 183-197页
作者: Indira, V. Geetha, R. Umarani, Srikanth Priyadarshini, D. Annal Department of Computer Science and Engineering S.A. Engineering College Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India
Purpose: The difficulty of diagnosing several lung disorders, including atelectasis, cardiomegaly, lung cancer, and COVID-19, is a challenging problem and needs to be addressed. These conditions exhibit some symptoms ... 详细信息
来源: 评论