咨询与建议

限定检索结果

文献类型

  • 77,174 篇 会议
  • 49,199 篇 期刊文献
  • 1,344 册 图书

馆藏范围

  • 127,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77,803 篇 工学
    • 52,195 篇 计算机科学与技术...
    • 42,255 篇 软件工程
    • 18,968 篇 信息与通信工程
    • 12,641 篇 控制科学与工程
    • 10,974 篇 电气工程
    • 9,943 篇 电子科学与技术(可...
    • 9,571 篇 生物工程
    • 7,662 篇 生物医学工程(可授...
    • 6,793 篇 光学工程
    • 5,296 篇 机械工程
    • 4,549 篇 化学工程与技术
    • 4,280 篇 动力工程及工程热...
    • 4,078 篇 仪器科学与技术
    • 3,660 篇 材料科学与工程(可...
    • 3,329 篇 网络空间安全
    • 3,097 篇 安全科学与工程
  • 46,351 篇 理学
    • 22,807 篇 数学
    • 15,252 篇 物理学
    • 11,064 篇 生物学
    • 7,588 篇 统计学(可授理学、...
    • 5,169 篇 化学
    • 4,968 篇 系统科学
  • 20,359 篇 管理学
    • 12,744 篇 管理科学与工程(可...
    • 8,294 篇 图书情报与档案管...
    • 6,005 篇 工商管理
  • 7,955 篇 医学
    • 6,397 篇 临床医学
    • 5,676 篇 基础医学(可授医学...
    • 3,431 篇 药学(可授医学、理...
    • 3,360 篇 公共卫生与预防医...
  • 3,829 篇 法学
    • 3,241 篇 社会学
  • 2,329 篇 经济学
  • 1,733 篇 农学
  • 1,449 篇 教育学
  • 637 篇 文学
  • 255 篇 军事学
  • 176 篇 艺术学
  • 25 篇 哲学
  • 18 篇 历史学

主题

  • 3,508 篇 accuracy
  • 3,315 篇 computer science
  • 3,131 篇 deep learning
  • 2,763 篇 machine learning
  • 2,567 篇 computational mo...
  • 2,533 篇 feature extracti...
  • 2,350 篇 training
  • 1,685 篇 predictive model...
  • 1,647 篇 internet of thin...
  • 1,617 篇 artificial intel...
  • 1,577 篇 optimization
  • 1,577 篇 real-time system...
  • 1,518 篇 convolutional ne...
  • 1,487 篇 support vector m...
  • 1,313 篇 data models
  • 1,151 篇 neural networks
  • 1,137 篇 data mining
  • 1,106 篇 semantics
  • 1,073 篇 wireless sensor ...
  • 1,003 篇 security

机构

  • 1,093 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 972 篇 physikalisches i...
  • 949 篇 oliver lodge lab...
  • 940 篇 university of ch...
  • 564 篇 fakultät physik ...
  • 549 篇 department of el...
  • 539 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 538 篇 department of ph...
  • 533 篇 school of physic...
  • 533 篇 imperial college...
  • 513 篇 h.h. wills physi...
  • 508 篇 stfc rutherford ...
  • 506 篇 nikhef national ...
  • 488 篇 school of comput...
  • 482 篇 henryk niewodnic...
  • 478 篇 infn sezione di ...
  • 478 篇 center for high ...
  • 475 篇 iccub universita...

作者

  • 269 篇 a. gomes
  • 259 篇 niyato dusit
  • 257 篇 barter w.
  • 253 篇 c. alexa
  • 251 篇 d. calvet
  • 250 篇 j. m. izen
  • 245 篇 s. chen
  • 242 篇 g. bella
  • 241 篇 j. strandberg
  • 241 篇 c. amelung
  • 233 篇 beiter a.
  • 231 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 216 篇 g. spigo
  • 215 篇 brundu d.
  • 215 篇 borsato m.

语言

  • 120,581 篇 英文
  • 5,905 篇 其他
  • 1,167 篇 中文
  • 122 篇 日文
  • 19 篇 德文
  • 16 篇 法文
  • 10 篇 朝鲜文
  • 6 篇 荷兰文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 2 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
127717 条 记 录,以下是171-180 订阅
排序:
Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1973-1986页
作者: Khulud Salem Alshudukhi Mamoona Humayun Ghadah Naif Alwakid Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computing School of Arts Humanities and Social SciencesUniversity of RoehamptonLondonSW155PHUK
The Internet ofThings(IoT)and edge computing have substantially contributed to the development and growth of smart *** handled time-constrained services and mobile devices to capture the observing environment for surv... 详细信息
来源: 评论
Weak Multi-Label Data Stream Classification Under Distribution Changes in Labels
收藏 引用
IEEE Transactions on Big Data 2025年 第3期11卷 1369-1380页
作者: Zou, Yizhang Hu, Xuegang Li, Peipei Hu, Jun Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education School of Computer Science and Information Engineering Hefei230002 China National University of Singapore School of Computing 119077 Singapore
Multi-label stream classification aims to address the challenge of dynamically assigning multiple labels to sequentially arrived instances. In real situations, only partial labels of instances can be observed due to t... 详细信息
来源: 评论
Automated AI-Powered Fruit Identification Using Convolutional Neural Network
Automated AI-Powered Fruit Identification Using Convolutiona...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Sai Tejasree, K. Surendran, R. Rajakumar, B. Gomathi, R.M. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India J.N.N Institute of Engineering Department of Artificial Intelligence and Data Science Chennai India School of Computing Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
Clever system that can look at pictures of fruits and figure out what kind of fruit each picture shows. AI algorithms like deep learning, which is like giving the Machine learning model a crash course in fruit recogni... 详细信息
来源: 评论
AG Codes Have No List-Decoding Friends: Approaching the Generalized Singleton Bound Requires Exponential Alphabets
收藏 引用
IEEE Transactions on Information Theory 2025年 第4期71卷 2443-2451页
作者: Alrabiah, Omar Guruswami, Venkatesan Li, Ray University of California at Berkeley Department of Electrical Engineering and Computer Science BerkeleyCA94709 United States University of California at Berkeley Department of Electrical Engineering and Computer Science Department of Mathematics Simons Institute for the Theory of Computing BerkeleyCA94709 United States Santa Clara University Department of Mathematics and Computer Science Santa ClaraCA95053 United States
A simple, recently observed generalization of the classical Singleton bound to list-decoding asserts that rate R codes are not list-decodable using list-size L beyond an error fraction L/L+1 (1-R) (the Singleton bound... 详细信息
来源: 评论
Out-of-Distribution Data: An Acquaintance of Adversarial Examples - A Survey
收藏 引用
ACM computing Surveys 2025年 第8期57卷 1-40页
作者: Karunanayake, Naveen Gunawardena, Ravin Seneviratne, Suranga Chawla, Sanjay School of Computer Science The University of Sydney Sydney Australia Computer Science and Engineering University of New South Wales Sydney Australia Qatar Computing Research Institute Doha Qatar and Hamad Bin Khalifa University Doha Qatar
Deep neural networks (DNNs) deployed in real-world applications can encounter out-of-distribution (OOD) data and adversarial examples. These represent distinct forms of distributional shifts that can significantly imp... 详细信息
来源: 评论
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
Benchmarking Indian E-Commerce Giants: Insights from Festive Sales Performance
Benchmarking Indian E-Commerce Giants: Insights from Festive...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Pranav, H. Harshini, Muppavarapu Sri Tarun, Rachuri Radha, D. Amrita School of Computing Dept of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
This study presents a comparative analysis of the websites of three major e-commerce platforms in India: during the busy shopping sale of Diwali and Navratri. Using metrics derived from Lighthouse audits, the report e... 详细信息
来源: 评论
NC-Load: On-Demand Program Loading and Running for computing Sharing Among IoT Devices
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12242-12256页
作者: Dong, Yanhao Duan, Sijing Lyu, Feng Zhao, Peng Zhang, Yongmin Ren, Ju Zhang, Yaoxue Central South University School of Computer Science and Engineering Hunan Changsha410083 China Tsinghua University Department of Computer Science and Technology Beijing100084 China
The number of Internet of Things (IoT) devices has increased rapidly in recent years, but lack effective methods to integrate their computational power. In this article, we propose NC-Load, which couples IoT devices i... 详细信息
来源: 评论
Hybrid Approach for Electricity Price Forecasting using AlexNet and LSTM  3
Hybrid Approach for Electricity Price Forecasting using Alex...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Sambana, Bosubabu Devi, Kotamsetty Geethika Reddy, Bandi Rajeswara Hussain, Galeti Mohammad Siddartha, Gownivalla School of Computing Mohan Babu University Tirupati India Department of Computer Science and Systems Engineering Sree Vidyanikethan Engineering College Tirupati India
The recent development of advanced machine learning methods for hybrid models has greatly addressed the need for the correct prediction of electrical prices. This method combines AlexNet and LSTM algorithms, which are... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论