咨询与建议

限定检索结果

文献类型

  • 282,421 篇 会议
  • 121,640 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 404,172 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 235,907 篇 工学
    • 157,257 篇 计算机科学与技术...
    • 127,856 篇 软件工程
    • 56,643 篇 信息与通信工程
    • 37,006 篇 控制科学与工程
    • 32,558 篇 电气工程
    • 31,180 篇 电子科学与技术(可...
    • 27,889 篇 生物工程
    • 21,768 篇 生物医学工程(可授...
    • 18,798 篇 光学工程
    • 15,954 篇 机械工程
    • 13,837 篇 化学工程与技术
    • 12,653 篇 动力工程及工程热...
    • 12,651 篇 仪器科学与技术
    • 11,200 篇 材料科学与工程(可...
    • 8,762 篇 安全科学与工程
    • 8,065 篇 网络空间安全
  • 134,631 篇 理学
    • 67,039 篇 数学
    • 43,666 篇 物理学
    • 31,564 篇 生物学
    • 22,000 篇 统计学(可授理学、...
    • 15,707 篇 系统科学
    • 14,762 篇 化学
  • 59,155 篇 管理学
    • 35,404 篇 管理科学与工程(可...
    • 26,076 篇 图书情报与档案管...
    • 17,618 篇 工商管理
  • 20,729 篇 医学
    • 17,371 篇 临床医学
    • 15,573 篇 基础医学(可授医学...
    • 9,771 篇 药学(可授医学、理...
    • 8,290 篇 公共卫生与预防医...
  • 11,147 篇 法学
    • 9,153 篇 社会学
  • 6,843 篇 经济学
  • 5,374 篇 农学
  • 4,363 篇 教育学
  • 1,919 篇 文学
  • 902 篇 军事学
  • 519 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,105 篇 computer science
  • 9,385 篇 accuracy
  • 8,945 篇 computational mo...
  • 8,280 篇 feature extracti...
  • 7,922 篇 deep learning
  • 7,524 篇 machine learning
  • 6,881 篇 training
  • 5,478 篇 data mining
  • 5,250 篇 support vector m...
  • 5,219 篇 predictive model...
  • 5,198 篇 computer archite...
  • 4,952 篇 wireless sensor ...
  • 4,781 篇 costs
  • 4,641 篇 optimization
  • 4,556 篇 bandwidth
  • 4,473 篇 application soft...
  • 4,421 篇 neural networks
  • 4,411 篇 protocols
  • 4,393 篇 testing
  • 4,390 篇 algorithm design...

机构

  • 1,659 篇 department of co...
  • 1,346 篇 department of el...
  • 1,346 篇 department of co...
  • 1,125 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 973 篇 department of ph...
  • 926 篇 department of co...
  • 847 篇 physikalisches i...
  • 843 篇 university of ch...
  • 829 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 625 篇 department of co...
  • 558 篇 department of co...
  • 541 篇 infn sezione di ...
  • 530 篇 chitkara univers...
  • 517 篇 infn laboratori ...
  • 513 篇 infn sezione di ...
  • 497 篇 infn sezione di ...
  • 495 篇 horia hulubei na...
  • 480 篇 department of co...

作者

  • 254 篇 j. wang
  • 252 篇 s. chen
  • 250 篇 barter w.
  • 238 篇 niyato dusit
  • 229 篇 a. gomes
  • 225 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 208 篇 c. alexa
  • 207 篇 brundu d.
  • 205 篇 beiter a.
  • 204 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 191 篇 j. strandberg

语言

  • 386,702 篇 英文
  • 13,674 篇 其他
  • 3,821 篇 中文
  • 220 篇 日文
  • 50 篇 德文
  • 36 篇 法文
  • 35 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 9 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering-Data Science"
404173 条 记 录,以下是1-10 订阅
排序:
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
An Integrated Blockchain Framework for Secure data Sharing in IoT Fog Computing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 957-977页
作者: Peda Narayana Bathula M.Sreenivasulu Department of Computer Science Engineering Jawaharlal Nehru Technological UniversityAnanthapur 515002India Department of Computer Science Engineering Matrusri Engineering CollegeHyderabad 500059India
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ... 详细信息
来源: 评论
Route selection for opportunity-sensing and prediction of waterlogging
收藏 引用
Frontiers of computer science 2024年 第4期18卷 147-159页
作者: Jingbin WANG Weijie ZHANG Zhiyong YU Fangwan HUANG Weiping ZHU Longbiao CHEN College of Computer and Data Science Fuzhou UniversityFuzhou 350108China Department of Computer Science and Technology Xiamen UniversityXiamen 361005China
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlog... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
Secure container Orchestration: A framework for detecting and mitigating Orchestrator - level vulnerabilities
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Mahavaishnavi, V. Saminathan, R. Prithviraj, R. Department of Artificial Intelligence and Data Science Panimalar Engineering College Tamil Nadu Chennai600123 India Department of Computer Science and Engineering Annamalai University Chidambaram India Department of Computer Science and Engineering Annamalai University Chidambaram India
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial... 详细信息
来源: 评论
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 98-113页
作者: Hengmin Zhang Jian Yang Wenli Du Bob Zhang Zhiyuan Zha Bihan Wen School of Electrical and Electronic Engineering Nanyang Technological University School of Computer Science and Engineering Nanjing University of Science and Technology School of Information Science and Engineering East China University of Science and Technology Department of Electrical and Computer Engineering University of Macau
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher... 详细信息
来源: 评论
SGformer:Boosting transformers for indoor lighting estimation from a single image
收藏 引用
Computational Visual Media 2024年 第4期10卷 671-686页
作者: Junhong Zhao Bing Xue Mengjie Zhang Centre for Data Science and Artificial Intelligence&School of Engineering and Computer Science Victoria University of WellingtonWellington 6012New Zealand
Estimating lighting from standard images can effectively circumvent the need for resourceintensive high-dynamic-range(HDR)lighting ***,this task is often ill-posed and challenging,particularly for indoor scenes,due to... 详细信息
来源: 评论
Probabilistic Automata-Based Method for Enhancing Performance of Deep Reinforcement Learning Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2327-2339页
作者: Min Yang Guanjun Liu Ziyuan Zhou Jiacun Wang the Department of Computer Science Tongji University IEEE the Computer Science and Software Engineering Department Monmouth UniversityWest Long Branch
Deep reinforcement learning(DRL) has demonstrated significant potential in industrial manufacturing domains such as workshop scheduling and energy system ***, due to the model's inherent uncertainty, rigorous vali... 详细信息
来源: 评论