咨询与建议

限定检索结果

文献类型

  • 286,670 篇 会议
  • 123,094 篇 期刊文献
  • 2,907 册 图书

馆藏范围

  • 412,670 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 239,444 篇 工学
    • 159,788 篇 计算机科学与技术...
    • 128,984 篇 软件工程
    • 57,222 篇 信息与通信工程
    • 37,704 篇 控制科学与工程
    • 32,916 篇 电气工程
    • 31,554 篇 电子科学与技术(可...
    • 27,987 篇 生物工程
    • 22,018 篇 生物医学工程(可授...
    • 19,087 篇 光学工程
    • 16,150 篇 机械工程
    • 13,976 篇 化学工程与技术
    • 12,801 篇 动力工程及工程热...
    • 12,774 篇 仪器科学与技术
    • 11,319 篇 材料科学与工程(可...
    • 8,915 篇 安全科学与工程
    • 8,269 篇 网络空间安全
  • 135,937 篇 理学
    • 67,550 篇 数学
    • 44,243 篇 物理学
    • 31,743 篇 生物学
    • 22,243 篇 统计学(可授理学、...
    • 15,751 篇 系统科学
    • 14,913 篇 化学
  • 59,820 篇 管理学
    • 35,857 篇 管理科学与工程(可...
    • 26,358 篇 图书情报与档案管...
    • 17,857 篇 工商管理
  • 21,213 篇 医学
    • 17,721 篇 临床医学
    • 15,849 篇 基础医学(可授医学...
    • 9,790 篇 药学(可授医学、理...
    • 8,633 篇 公共卫生与预防医...
  • 11,317 篇 法学
    • 9,284 篇 社会学
  • 6,913 篇 经济学
  • 5,506 篇 农学
  • 4,452 篇 教育学
  • 1,922 篇 文学
  • 907 篇 军事学
  • 526 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,122 篇 computer science
  • 10,056 篇 accuracy
  • 9,208 篇 computational mo...
  • 8,542 篇 feature extracti...
  • 8,477 篇 deep learning
  • 7,840 篇 machine learning
  • 7,095 篇 training
  • 5,516 篇 data mining
  • 5,414 篇 predictive model...
  • 5,404 篇 support vector m...
  • 5,260 篇 computer archite...
  • 4,983 篇 wireless sensor ...
  • 4,877 篇 optimization
  • 4,820 篇 real-time system...
  • 4,818 篇 costs
  • 4,564 篇 bandwidth
  • 4,561 篇 convolutional ne...
  • 4,481 篇 testing
  • 4,473 篇 neural networks
  • 4,455 篇 application soft...

机构

  • 1,713 篇 department of co...
  • 1,361 篇 department of co...
  • 1,339 篇 department of el...
  • 1,178 篇 department of el...
  • 1,053 篇 cavendish labora...
  • 973 篇 department of ph...
  • 939 篇 department of co...
  • 849 篇 university of ch...
  • 841 篇 physikalisches i...
  • 826 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 647 篇 department of co...
  • 586 篇 department of co...
  • 576 篇 chitkara univers...
  • 530 篇 infn sezione di ...
  • 509 篇 infn laboratori ...
  • 504 篇 infn sezione di ...
  • 497 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 487 篇 department of co...

作者

  • 256 篇 barter w.
  • 253 篇 niyato dusit
  • 247 篇 j. wang
  • 245 篇 s. chen
  • 231 篇 blake t.
  • 224 篇 a. gomes
  • 222 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 219 篇 amato s.
  • 215 篇 boettcher t.
  • 212 篇 brundu d.
  • 206 篇 c. alexa
  • 203 篇 beiter a.
  • 201 篇 bencivenni g.
  • 200 篇 j. m. izen
  • 192 篇 bay a.
  • 190 篇 c. amelung
  • 189 篇 g. bella

语言

  • 346,642 篇 英文
  • 62,382 篇 其他
  • 4,194 篇 中文
  • 222 篇 日文
  • 84 篇 德文
  • 61 篇 法文
  • 55 篇 斯洛文尼亚文
  • 36 篇 朝鲜文
  • 16 篇 阿拉伯文
  • 14 篇 俄文
  • 12 篇 西班牙文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 4 篇 荷兰文
  • 3 篇 葡萄牙文
  • 3 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering with Data Science"
412671 条 记 录,以下是661-670 订阅
Analyzing Hierarchical Relationships and Quality of Embedding in Latent Space
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 843-858页
作者: Chatterjee, Ankita Mukherjee, Jayanta Das, Partha Pratim Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Kharagpur721302 India
Existing learning models partition the generated representations using hyperplanes which form well defined groups of similar embeddings that is uniquely mapped to a particular class. However, in practical applications... 详细信息
来源: 评论
IWM-LSTM encoder for abstractive text summarization
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5883-5904页
作者: Gangundi, Ravindra Sridhar, Rajeswari Department of Computer Science and Engineering National Institute of Technology Tamilnadu Tiruchirappalli620015 India
Sequence-to-sequence models are fundamental building blocks for generating abstractive text summaries, which can produce precise and coherent summaries. Recently proposed, different text summarization models aimed to ... 详细信息
来源: 评论
A novel attention based deep learning model for software defect prediction with bidirectional word embedding system
收藏 引用
Soft Computing 2025年 第4期29卷 2171-2188页
作者: Devi, M. Chitra Rajkumar, T. Dhiliphan Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil626126 India
Software defect prediction (SDP) is considered a dynamic research problem and is beneficial during the testing stage of the software development life cycle. Several artificial intelligence-based methods were avai... 详细信息
来源: 评论
CRAQL: a novel clustering-based resource allocation using the Q-learning in fog environment
收藏 引用
International Journal of Cloud Computing 2024年 第3期13卷 243-266页
作者: Ahlawat, Chanchal Krishnamurthi, Rajalakshmi Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India
Fog computing is an emerging paradigm that provides services near the end-user. The tremendous increase in IoT devices and big data leads to complexity in fog resource allocation. Inefficient resource allocation can l... 详细信息
来源: 评论
Network Security and Cryptography: Threats, Obstacles and Solutions-A Bibliometric Analysis
Recent Advances in Computer Science and Communications
收藏 引用
Recent Advances in computer science and Communications 2025年 第2期18卷 83-101页
作者: Singh, Purushottam Dutta, Sandip Pranav, Prashant Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi835215 India
Background: In the wake of escalating cyber threats and the indispensability of ro-bust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the s... 详细信息
来源: 评论
Attention enabled viewport selection with graph convolution for omnidirectional visual quality assessment
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 12925-12948页
作者: C, Nandhini M, Brindha Department of Computer Science and Engineering National Institute of Technology TamilNadu Tiruchirappalli620015 India
Omnidirectional images provide an immersive viewing experience in a Virtual Reality (VR) environment, surpassing the limitations of traditional 2D media beyond the conventional screen. This VR technology allows users ... 详细信息
来源: 评论
Hybrid ECD model for firewall tuning and attack detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第1期28卷 86-102页
作者: Thyagarajan, C. Vijay Bhanu S., S.V. Suthir, S. Department of Computer Science and Engineering Annamalai University Tamil Nadu Annamalai Nagar India
The rigorous security requirements and domain experts are necessary for the tuning of firewalls and for the detection of attacks. Those firewalls may create an incorrect sense or state of protection if they are improp... 详细信息
来源: 评论
Heartbeat: Effective Access to Off-Path Cached Content in NDN
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第4期12卷 2974-2988页
作者: Lee, Junseok Kim, Dohyung Department of Computer Science & Engineering Kangwon National University Chuncheon Gangwon South Korea
In Information-centric networking(ICN), content is distributed across network caches and accessed using content names instead of location identifiers. This characteristic effectively reduces network costs and latency,... 详细信息
来源: 评论
Adaptive Cyber Defense Technique Based on Multiagent Reinforcement Learning Strategies
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2757-2771页
作者: Adel Alshamrani Abdullah Alshahrani Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论