咨询与建议

限定检索结果

文献类型

  • 280,398 篇 会议
  • 114,666 篇 期刊文献
  • 2,873 册 图书

馆藏范围

  • 397,936 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 229,933 篇 工学
    • 152,653 篇 计算机科学与技术...
    • 123,531 篇 软件工程
    • 55,349 篇 信息与通信工程
    • 36,287 篇 控制科学与工程
    • 32,444 篇 电气工程
    • 31,199 篇 电子科学与技术(可...
    • 26,476 篇 生物工程
    • 20,862 篇 生物医学工程(可授...
    • 17,981 篇 光学工程
    • 15,622 篇 机械工程
    • 13,270 篇 化学工程与技术
    • 12,393 篇 仪器科学与技术
    • 12,373 篇 动力工程及工程热...
    • 11,545 篇 材料科学与工程(可...
    • 8,486 篇 安全科学与工程
    • 7,973 篇 网络空间安全
  • 129,637 篇 理学
    • 64,625 篇 数学
    • 42,492 篇 物理学
    • 29,956 篇 生物学
    • 21,059 篇 统计学(可授理学、...
    • 15,139 篇 系统科学
    • 14,188 篇 化学
  • 57,177 篇 管理学
    • 34,415 篇 管理科学与工程(可...
    • 25,025 篇 图书情报与档案管...
    • 17,028 篇 工商管理
  • 19,703 篇 医学
    • 16,541 篇 临床医学
    • 14,883 篇 基础医学(可授医学...
    • 9,346 篇 药学(可授医学、理...
    • 7,958 篇 公共卫生与预防医...
  • 10,786 篇 法学
    • 8,824 篇 社会学
  • 6,589 篇 经济学
  • 5,223 篇 农学
  • 4,264 篇 教育学
  • 1,890 篇 文学
  • 898 篇 军事学
  • 520 篇 艺术学
  • 77 篇 哲学
  • 46 篇 历史学

主题

  • 20,127 篇 computer science
  • 9,527 篇 accuracy
  • 8,990 篇 computational mo...
  • 8,219 篇 feature extracti...
  • 7,870 篇 deep learning
  • 7,439 篇 machine learning
  • 6,709 篇 training
  • 5,400 篇 data mining
  • 5,296 篇 support vector m...
  • 5,256 篇 computer archite...
  • 5,114 篇 predictive model...
  • 4,984 篇 wireless sensor ...
  • 4,751 篇 costs
  • 4,646 篇 optimization
  • 4,598 篇 application soft...
  • 4,570 篇 bandwidth
  • 4,500 篇 real-time system...
  • 4,445 篇 testing
  • 4,441 篇 protocols
  • 4,411 篇 algorithm design...

机构

  • 1,717 篇 department of co...
  • 1,368 篇 department of el...
  • 1,366 篇 department of co...
  • 1,178 篇 department of el...
  • 1,054 篇 cavendish labora...
  • 977 篇 department of ph...
  • 897 篇 department of co...
  • 853 篇 physikalisches i...
  • 840 篇 oliver lodge lab...
  • 812 篇 department of el...
  • 748 篇 university of ch...
  • 633 篇 department of co...
  • 549 篇 department of co...
  • 535 篇 chitkara univers...
  • 530 篇 infn sezione di ...
  • 518 篇 infn laboratori ...
  • 508 篇 infn sezione di ...
  • 499 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 258 篇 barter w.
  • 244 篇 s. chen
  • 241 篇 j. wang
  • 231 篇 blake t.
  • 228 篇 a. gomes
  • 222 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 betancourt c.
  • 219 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 218 篇 borsato m.
  • 214 篇 c. alexa
  • 214 篇 brundu d.
  • 210 篇 j. m. izen
  • 207 篇 beiter a.
  • 207 篇 bencivenni g.
  • 198 篇 bay a.
  • 193 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 351,501 篇 英文
  • 42,775 篇 其他
  • 3,898 篇 中文
  • 220 篇 日文
  • 71 篇 德文
  • 50 篇 法文
  • 43 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 13 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Computer Applications"
397937 条 记 录,以下是641-650 订阅
排序:
Blockchain - A Deployment Mechanism for IoT Based Security  1
Blockchain - A Deployment Mechanism for IoT Based Security
收藏 引用
1st International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Kant, Ravi Sharma, Shashank Vikas, Vikas Chaudhary, Sachin Jain, Animesh Kumar Sharma, Kewal Krishan Iimt Engineering College Computer Science and Engineering Department Meerut India Iimt University School of Computer Science & Applications Meerut India
Implementation of IoT domain invites tremendous attacking opportunities which demands end to - end security mechanism. applications related to the domain of IoT varies from critical applications to normal business-ori... 详细信息
来源: 评论
EMaC: Dynamic VM Consolidation Framework for Energy-Efficiency and Multi-metric SLA Compliance in Cloud Data Centers
收藏 引用
SN computer science 2024年 第5期5卷 1-17页
作者: Mongia, Vikas Computer Science and Applications Department Guru Nanak College Punjab Moga 142001 India
Cloud industry is facing significant challenges related to resource under-utilization and high energy consumption. Virtual Machine Consolidation serves as an effective solution to address these issues. However, Virtua... 详细信息
来源: 评论
IWM-LSTM encoder for abstractive text summarization
收藏 引用
Multimedia Tools and applications 2025年 第9期84卷 5883-5904页
作者: Gangundi, Ravindra Sridhar, Rajeswari Department of Computer Science and Engineering National Institute of Technology Tamilnadu Tiruchirappalli620015 India
Sequence-to-sequence models are fundamental building blocks for generating abstractive text summaries, which can produce precise and coherent summaries. Recently proposed, different text summarization models aimed to ... 详细信息
来源: 评论
Next-Generation DDoS Attacks on IoT Deployments: Targeting the Advanced Features of MQTT v5.0 Protocol
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 22090-22109页
作者: Lakshminarayana, Sujitha Thilagam, P. Santhi National Institute of Technology Karnataka Computer Science and Engineering Department Surathkal575025 India
Message Queuing Telemetry Transport (MQTT) has emerged as the widely adopted application layer protocol for IoT environments because of its lightweight header, minimal power, and bandwidth requirements. Despite its po... 详细信息
来源: 评论
Machine learning and data analytics driven model for income tax rebate estimation: A neoteric and benign approach  4th
Machine learning and data analytics driven model for income ...
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Sharma, Viney Kumar, Achal Singh, Archana Kumar, Manish Department of Computer Science & Engineering Sharda University Agra India Department of Computer Science & Engineering Anand Engineering College Agra India Department of Computer Science & Engineering Chandigarh Engineering College Landran India
The provision of rebate to needy/underprivileged sections of society has been in practice since long in government organizations. The efficacy of such provisions lies in the fact that whether this rebate reaches peopl... 详细信息
来源: 评论
Hybrid ECD model for firewall tuning and attack detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第1期28卷 86-102页
作者: Thyagarajan, C. Vijay Bhanu S., S.V. Suthir, S. Department of Computer Science and Engineering Annamalai University Tamil Nadu Annamalai Nagar India
The rigorous security requirements and domain experts are necessary for the tuning of firewalls and for the detection of attacks. Those firewalls may create an incorrect sense or state of protection if they are improp... 详细信息
来源: 评论
Attention enabled viewport selection with graph convolution for omnidirectional visual quality assessment
收藏 引用
Multimedia Tools and applications 2025年 第14期84卷 12925-12948页
作者: C, Nandhini M, Brindha Department of Computer Science and Engineering National Institute of Technology TamilNadu Tiruchirappalli620015 India
Omnidirectional images provide an immersive viewing experience in a Virtual Reality (VR) environment, surpassing the limitations of traditional 2D media beyond the conventional screen. This VR technology allows users ... 详细信息
来源: 评论
Effective and Efficient Video Compression by the Deep Learning Techniques
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1047-1061页
作者: Karthick Panneerselvam K.Mahesh V.L.Helen Josephine A.Ranjith Kumar Department of Computer Applications Alagappa UniversityKaraikudiIndia Department of Computer Science and Engineering lovely professional UniversityPhagwaraPunjabIndia School of Business and Management Christ UniversityBengaluruKarnatakaIndia
Deep learning has reached many successes in Video *** has become a growing important part of our daily digital *** advancement of better resolution content and the large volume offers serious challenges to the goal of... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
Underwater object detection based on enhanced YOLOv4 architecture
收藏 引用
Multimedia Tools and applications 2024年 第18期83卷 53759-53783页
作者: Liu, Ching-Hua Lin, Chang Hong Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan
Object detection and image restoration pose significant challenges in deep learning and computer vision. These tasks are widely employed in various applications, and there is an increasing demand for specialized envir... 详细信息
来源: 评论