咨询与建议

限定检索结果

文献类型

  • 290,150 篇 会议
  • 118,602 篇 期刊文献
  • 2,939 册 图书

馆藏范围

  • 411,690 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 238,710 篇 工学
    • 159,959 篇 计算机科学与技术...
    • 129,787 篇 软件工程
    • 57,196 篇 信息与通信工程
    • 37,477 篇 控制科学与工程
    • 32,757 篇 电气工程
    • 31,469 篇 电子科学与技术(可...
    • 27,410 篇 生物工程
    • 21,327 篇 生物医学工程(可授...
    • 18,633 篇 光学工程
    • 16,272 篇 机械工程
    • 13,592 篇 化学工程与技术
    • 12,722 篇 仪器科学与技术
    • 12,591 篇 动力工程及工程热...
    • 11,184 篇 材料科学与工程(可...
    • 8,760 篇 安全科学与工程
    • 8,107 篇 网络空间安全
  • 133,430 篇 理学
    • 66,767 篇 数学
    • 43,099 篇 物理学
    • 30,918 篇 生物学
    • 21,499 篇 统计学(可授理学、...
    • 15,554 篇 系统科学
    • 14,474 篇 化学
  • 59,858 篇 管理学
    • 36,081 篇 管理科学与工程(可...
    • 26,162 篇 图书情报与档案管...
    • 17,746 篇 工商管理
  • 20,061 篇 医学
    • 16,875 篇 临床医学
    • 15,173 篇 基础医学(可授医学...
    • 9,510 篇 药学(可授医学、理...
    • 8,076 篇 公共卫生与预防医...
  • 11,151 篇 法学
    • 9,114 篇 社会学
  • 6,821 篇 经济学
  • 5,295 篇 农学
  • 4,535 篇 教育学
  • 1,923 篇 文学
  • 927 篇 军事学
  • 555 篇 艺术学
  • 85 篇 哲学
  • 50 篇 历史学

主题

  • 20,570 篇 computer science
  • 9,436 篇 accuracy
  • 9,247 篇 computational mo...
  • 8,497 篇 feature extracti...
  • 7,927 篇 deep learning
  • 7,514 篇 machine learning
  • 7,004 篇 training
  • 5,591 篇 data mining
  • 5,414 篇 computer archite...
  • 5,233 篇 support vector m...
  • 5,190 篇 predictive model...
  • 5,108 篇 wireless sensor ...
  • 4,906 篇 costs
  • 4,798 篇 optimization
  • 4,727 篇 application soft...
  • 4,643 篇 bandwidth
  • 4,612 篇 testing
  • 4,566 篇 algorithm design...
  • 4,562 篇 protocols
  • 4,451 篇 neural networks

机构

  • 1,701 篇 department of co...
  • 1,349 篇 department of co...
  • 1,336 篇 department of el...
  • 1,174 篇 college of compu...
  • 1,167 篇 department of el...
  • 1,056 篇 cavendish labora...
  • 974 篇 department of ph...
  • 891 篇 department of co...
  • 842 篇 university of ch...
  • 837 篇 physikalisches i...
  • 831 篇 oliver lodge lab...
  • 816 篇 department of el...
  • 639 篇 department of co...
  • 555 篇 department of co...
  • 527 篇 infn sezione di ...
  • 516 篇 chitkara univers...
  • 507 篇 infn laboratori ...
  • 499 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 489 篇 infn sezione di ...

作者

  • 255 篇 j. wang
  • 254 篇 s. chen
  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 225 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 c. alexa
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 206 篇 j. m. izen
  • 204 篇 bencivenni g.
  • 193 篇 bay a.
  • 191 篇 niyato dusit
  • 190 篇 c. amelung
  • 189 篇 g. bella

语言

  • 386,853 篇 英文
  • 20,755 篇 其他
  • 4,117 篇 中文
  • 227 篇 日文
  • 58 篇 德文
  • 39 篇 朝鲜文
  • 34 篇 法文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 10 篇 土耳其文
  • 9 篇 俄文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
411691 条 记 录,以下是731-740 订阅
排序:
Proactive Crowdsourced Monitoring and Sensing With Expansible Activity Recognition Based on Internet of Things Localization
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17674-17686页
作者: Chen, Lien-Wu Liao, Chun-Wei Liu, Jun-Xian Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec... 详细信息
来源: 评论
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4441-4450页
作者: Kamble, Subhash Arunalatha, J.S. Venugopal, K.R. Computer Science and Engineering Bangalore University Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore University
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Designing a novel network anomaly detection framework using multi-serial stacked network with optimal feature selection procedures over DDOS attacks
收藏 引用
International Journal of Intelligent Networks 2025年 第1期6卷 1-13页
作者: Pradeep, K. Jeevan Shukla, Prashanth Kumar Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP India
- Distributed denial-of-service (DDoS) attacks are the major threat that disrupts the services in the computer system and networks using traffic and targeted sources. So, real-world attack detection techniques are con... 详细信息
来源: 评论
software development processes in ocean system modeling
收藏 引用
International Journal of Modeling, Simulation, and Scientific Computing 2022年 第2期13卷 47-69页
作者: Reiner Jung Sven Gundlach Wilhelm Hasselbring Software Engineering Group Department of Computer Science Kiel UniversityKielGermany
Scientific modeling provides mathematical abstractions of real-world systems and builds software as implementations of these mathematical *** science is a multidisciplinary discipline developing scientific models and ... 详细信息
来源: 评论
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2449-2463页
作者: Maher Alharby Cybersecurity Department College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effec... 详细信息
来源: 评论
Ensemble Learning Through Evolutionary Multitasking: A Formulation and Case Study
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2024年 第4期8卷 3081-3094页
作者: Liaw, Rung-Tzuo Wen, Yu-Wei Fu Jen Catholic University Department of Computer Science and Information Engineering New Taipei24205 Taiwan National United University Department of Computer Science and Information Engineering Miaoli36063 Taiwan
Evolutionary machine learning has drawn much attentions on solving data-driven learning problem in the past decades, where classification is a major branch of data-driven learning problem. To improve the quality of ob... 详细信息
来源: 评论
Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor network
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Kumar, Manni Goyal, Nitin Qaisi, Ramy Mohammed Aiesh Najim, Mohd Gupta, Sachin Kumar Department of Computer Science & Engineering Chandigarh University Gharuan Punjab India Department of Computer Science Engineering School of Engineering and Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Electrical and Electronic Engineering College of Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Electronics and Communication Engineering Central University of Jammu UT of J&K Jammu181143 India
Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf... 详细信息
来源: 评论
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3573-3581页
作者: Mahmood, Khalid Tariq, Tayyaba Sangaiah, Arun Kumar Ghaffar, Zahid Saleem, Muhammad Asad Shamshad, Salman National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China The University of Lahore Department of Software Engineering Lahore54590 Pakistan
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra... 详细信息
来源: 评论
Camouflaged Variational Graph AutoEncoder against Attribute Inference Attacks for Cross-Domain Recommendation
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 3916-3932页
作者: Xiong, Yudi Guo, Yongxin Pan, Weike Yang, Qiang Ming, Zhong Zhang, Xiaojin Yu, Han Lin, Tao Tang, Xiaoying Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China School of Science and Engineering Shenzhen518172 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong WeBank Shenzhen China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Westlake University School of Engineering Hangzhou China
Cross-domain recommendation (CDR) aims to alleviate the data sparsity problem by leveraging the benefits of modeling two domains. However, existing research often focuses on the recommendation performance while ignore... 详细信息
来源: 评论