咨询与建议

限定检索结果

文献类型

  • 290,594 篇 会议
  • 118,814 篇 期刊文献
  • 2,943 册 图书

馆藏范围

  • 412,350 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 239,092 篇 工学
    • 159,756 篇 计算机科学与技术...
    • 129,426 篇 软件工程
    • 57,100 篇 信息与通信工程
    • 37,422 篇 控制科学与工程
    • 33,167 篇 电气工程
    • 31,750 篇 电子科学与技术(可...
    • 27,389 篇 生物工程
    • 21,301 篇 生物医学工程(可授...
    • 18,381 篇 光学工程
    • 16,256 篇 机械工程
    • 13,602 篇 化学工程与技术
    • 12,670 篇 仪器科学与技术
    • 12,595 篇 动力工程及工程热...
    • 11,813 篇 材料科学与工程(可...
    • 8,736 篇 安全科学与工程
    • 8,113 篇 网络空间安全
  • 133,152 篇 理学
    • 66,752 篇 数学
    • 43,041 篇 物理学
    • 30,889 篇 生物学
    • 21,608 篇 统计学(可授理学、...
    • 15,540 篇 系统科学
    • 14,487 篇 化学
  • 59,765 篇 管理学
    • 36,024 篇 管理科学与工程(可...
    • 26,141 篇 图书情报与档案管...
    • 17,696 篇 工商管理
  • 19,985 篇 医学
    • 16,808 篇 临床医学
    • 15,122 篇 基础医学(可授医学...
    • 9,517 篇 药学(可授医学、理...
    • 8,028 篇 公共卫生与预防医...
  • 11,141 篇 法学
    • 9,112 篇 社会学
  • 6,811 篇 经济学
  • 5,260 篇 农学
  • 4,522 篇 教育学
  • 1,919 篇 文学
  • 926 篇 军事学
  • 558 篇 艺术学
  • 85 篇 哲学
  • 50 篇 历史学

主题

  • 20,581 篇 computer science
  • 9,626 篇 accuracy
  • 9,333 篇 computational mo...
  • 8,573 篇 feature extracti...
  • 8,021 篇 deep learning
  • 7,544 篇 machine learning
  • 7,059 篇 training
  • 5,604 篇 data mining
  • 5,452 篇 computer archite...
  • 5,259 篇 support vector m...
  • 5,258 篇 predictive model...
  • 5,115 篇 wireless sensor ...
  • 4,929 篇 costs
  • 4,840 篇 optimization
  • 4,741 篇 application soft...
  • 4,664 篇 testing
  • 4,638 篇 bandwidth
  • 4,582 篇 algorithm design...
  • 4,577 篇 protocols
  • 4,558 篇 real-time system...

机构

  • 1,715 篇 department of co...
  • 1,364 篇 department of el...
  • 1,361 篇 department of co...
  • 1,171 篇 college of compu...
  • 1,170 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 979 篇 department of ph...
  • 869 篇 department of co...
  • 847 篇 physikalisches i...
  • 842 篇 university of ch...
  • 831 篇 oliver lodge lab...
  • 806 篇 department of el...
  • 637 篇 department of co...
  • 553 篇 department of co...
  • 530 篇 infn sezione di ...
  • 515 篇 chitkara univers...
  • 515 篇 infn laboratori ...
  • 502 篇 infn sezione di ...
  • 499 篇 horia hulubei na...
  • 498 篇 infn sezione di ...

作者

  • 258 篇 barter w.
  • 255 篇 s. chen
  • 251 篇 j. wang
  • 234 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 216 篇 c. alexa
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 207 篇 beiter a.
  • 206 篇 j. m. izen
  • 198 篇 bay a.
  • 192 篇 c. amelung
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 364,687 篇 英文
  • 43,713 篇 其他
  • 4,187 篇 中文
  • 227 篇 日文
  • 74 篇 德文
  • 49 篇 法文
  • 42 篇 斯洛文尼亚文
  • 39 篇 朝鲜文
  • 12 篇 阿拉伯文
  • 12 篇 西班牙文
  • 11 篇 俄文
  • 9 篇 土耳其文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
412351 条 记 录,以下是1241-1250 订阅
排序:
Utilizing Evidential Reasoning (ER) Approach for software Components Selection
收藏 引用
SN computer science 2025年 第3期6卷 1-13页
作者: Ahmad, Nabot Al-Qerem, Ahmad Omar, Firas Jebreen, Issam Department of Software Engineering Al Zaytoonah University of Jordan Amman Jordan Computer Science Department Zarqa University Zarqa Jordan Business Intelligence Department Al Zaytoonah University of Jordan Amman Jordan Software Engineering Department Middle East University Amman Lebanon
software component selection is one of the most challenging problems for software developers to meet customer needs. Despite various methods researchers propose to aid in component selection, a gap exists in addressin... 详细信息
来源: 评论
Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
收藏 引用
International Journal of computers and Applications 2024年 第9期46卷 702-714页
作者: Al-Rjoob, Ayat M. Ababnah, Ahmad A. Al-Mistarihi, Mamoun F. Darabkh, Khalid A. Electrical and Communication Engineering Department German-Jordanian University and Technology Amman Jordan Electrical Engineering Department Faculty of Engineering Jordan University of Science and Technology Irbid Jordan Computer Engineering Department School of Engineering The University of Jordan Amman Jordan
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi... 详细信息
来源: 评论
Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL
收藏 引用
Journal of Cyber Security and Mobility 2023年 第1期12卷 103-128页
作者: Ulla, Mohammed Mujeer Sakkari, Deepak S. Department of Computer Science and Engineering Presidency University Bangalore India
Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA ... 详细信息
来源: 评论
Climate Geoscience–Based Disaster Management in Healthcare Analysis by Markov Q-Transfer Adversarial with Cloud Computing
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第2期8卷 474-483页
作者: Srinivas, Jhade Rebecca, B. Bhargavi, Kovvuri N Swetha, Velma Reddy Spandana, S. Degala, Divya Priya Department of Computer Science and Engineering-Data Science KG Reddy College of Engineering and Technology Moinabad Telangana Hyderabad India Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Telangana Dundigal 500043 India Department of CSE Aditya University AP Surampalem India Department of Computer Science and Engineering (AI-ML) Malla Reddy Engineering College Hyderabad India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Bowrampet Telangana Hyderabad India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
Analysis and reaction to natural disasters have made extensive use of deep learning methods using semantic segmentation networks. These implementations’ foundation is based on convolutional neural networks (CNNs), wh... 详细信息
来源: 评论
Identifying Athletics Tracks using Keypoint Detection  38
Identifying Athletics Tracks using Keypoint Detection
收藏 引用
38th International Conference on Image and Vision Computing New Zealand, IVCNZ 2023
作者: Harcombe, Gareth Green, Richard Neshatian, Kourosh University of Canterbury Department of Computer Science and Software Engineering Christchurch New Zealand
This paper proposes the first known approaches to locating an athletics track from GPS data of a running workout. This is done by mapping the GPS points onto an image and applying computer Vision methods, including: p... 详细信息
来源: 评论
A study on dynamic group signature scheme with threshold traceability for blockchain
收藏 引用
High-Confidence Computing 2024年 第2期4卷 73-81页
作者: Hyo-jin Song Teahoon Kim Yong-Woon Hwang Daehee Seo Im-Yeong Lee Department of Software Convergence Soonchunhyang UniversityAsan 31538Republic of Korea Faculty of Artificial Intelligence and Data Engineering Sangmyung UniversitySeoul 03016Republic of Korea Department of Computer Software Engineering Soonchunhyang UniversityAsan 31538Republic of Korea
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user i... 详细信息
来源: 评论
Anomaly Detection in Retinal Imagery Using Variational Autoencoders  24
Anomaly Detection in Retinal Imagery Using Variational Autoe...
收藏 引用
7th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2024
作者: Lebaka, Kagiso Blessing Sithungu, Siphesihle Philezwini Academy of Computer Science and Software Engineering University of Johannesburg Gauteng Johannesburg South Africa
This paper situates itself within the broader medical imaging field, focusing on applying generative modelling techniques for anomaly detection in retinal images. Given the complexity of retinal structures, detecting ... 详细信息
来源: 评论
Self-knowledge distillation with dimensional history knowledge
收藏 引用
science China(Information sciences) 2025年
作者: Wenke HUANG Mang YE Zekun SHI He LI Bo DU National Engineering Research Center for Multimedia Software School of Computer ScienceWuhan University
Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for e...
来源: 评论
Brain Tumor Retrieval in MRI Images with Integration of Optimal Features
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2024年 第6期31卷 71-83页
作者: N V Shamna B Aziz Musthafa Department of Computer Science and Engineering PA College of EngineeringMangaluru 574153KarnatakaIndia Department of Computer Science and Engineering Bearys Institute of TechnologyMangaluru 5754199KarnatakaIndia
This paper presents an approach to improve medical image retrieval, particularly for brain tumors, by addressing the gap between low-level visual and high-level perceived contents in MRI, X-ray, and CT scans. Traditio... 详细信息
来源: 评论
CEMOP: Enhancing MOBA match outcome predictions by understanding teammates and opponents effects  3
CEMOP: Enhancing MOBA match outcome predictions by understan...
收藏 引用
3rd International Symposium on computer Applications and Information Systems, ISCAIS 2024
作者: Zhao, Jiangfeng College of Computer Science and Software Engineering Shenzhen University Shenzhen518057 China
Multiplayer Online Battle Arena (MOBA) games currently dominate the esports landscape, offering a concrete and vivid embodiment for team comparisons, where accurately predicting the winning team is both important and ... 详细信息
来源: 评论