咨询与建议

限定检索结果

文献类型

  • 282,980 篇 会议
  • 122,374 篇 期刊文献
  • 2,876 册 图书

馆藏范围

  • 408,229 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 236,389 篇 工学
    • 157,483 篇 计算机科学与技术...
    • 127,897 篇 软件工程
    • 56,659 篇 信息与通信工程
    • 37,033 篇 控制科学与工程
    • 32,727 篇 电气工程
    • 31,331 篇 电子科学与技术(可...
    • 27,897 篇 生物工程
    • 21,784 篇 生物医学工程(可授...
    • 18,822 篇 光学工程
    • 15,979 篇 机械工程
    • 13,877 篇 化学工程与技术
    • 12,687 篇 动力工程及工程热...
    • 12,662 篇 仪器科学与技术
    • 11,224 篇 材料科学与工程(可...
    • 8,765 篇 安全科学与工程
    • 8,066 篇 网络空间安全
  • 134,865 篇 理学
    • 67,127 篇 数学
    • 43,811 篇 物理学
    • 31,595 篇 生物学
    • 22,015 篇 统计学(可授理学、...
    • 15,720 篇 系统科学
    • 14,803 篇 化学
  • 59,191 篇 管理学
    • 35,430 篇 管理科学与工程(可...
    • 26,078 篇 图书情报与档案管...
    • 17,623 篇 工商管理
  • 20,777 篇 医学
    • 17,398 篇 临床医学
    • 15,588 篇 基础医学(可授医学...
    • 9,777 篇 药学(可授医学、理...
    • 8,297 篇 公共卫生与预防医...
  • 11,148 篇 法学
    • 9,154 篇 社会学
  • 6,847 篇 经济学
  • 5,390 篇 农学
  • 4,369 篇 教育学
  • 1,920 篇 文学
  • 902 篇 军事学
  • 520 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,110 篇 computer science
  • 9,465 篇 accuracy
  • 8,975 篇 computational mo...
  • 8,331 篇 feature extracti...
  • 7,993 篇 deep learning
  • 7,723 篇 machine learning
  • 6,946 篇 training
  • 5,482 篇 data mining
  • 5,267 篇 support vector m...
  • 5,254 篇 predictive model...
  • 5,212 篇 computer archite...
  • 4,957 篇 wireless sensor ...
  • 4,787 篇 costs
  • 4,729 篇 optimization
  • 4,559 篇 bandwidth
  • 4,461 篇 application soft...
  • 4,429 篇 real-time system...
  • 4,419 篇 neural networks
  • 4,414 篇 protocols
  • 4,403 篇 testing

机构

  • 1,688 篇 department of co...
  • 1,352 篇 department of co...
  • 1,344 篇 department of el...
  • 1,154 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 973 篇 department of ph...
  • 944 篇 department of co...
  • 843 篇 physikalisches i...
  • 839 篇 university of ch...
  • 829 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 636 篇 department of co...
  • 572 篇 department of co...
  • 538 篇 infn sezione di ...
  • 533 篇 chitkara univers...
  • 510 篇 infn sezione di ...
  • 510 篇 infn laboratori ...
  • 497 篇 horia hulubei na...
  • 492 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 251 篇 j. wang
  • 250 篇 barter w.
  • 249 篇 s. chen
  • 238 篇 niyato dusit
  • 226 篇 a. gomes
  • 223 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 207 篇 brundu d.
  • 205 篇 c. alexa
  • 205 篇 beiter a.
  • 199 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 190 篇 c. amelung
  • 189 篇 g. bella
  • 189 篇 bay a.

语言

  • 390,759 篇 英文
  • 13,673 篇 其他
  • 3,822 篇 中文
  • 220 篇 日文
  • 51 篇 德文
  • 36 篇 法文
  • 35 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 9 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering-Data Science"
408230 条 记 录,以下是161-170 订阅
排序:
Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
收藏 引用
Soft Computing 2024年 第23期28卷 13701-13713页
作者: Hombal, Uma Rangapura Basavaraju, Dayananda Shinde, Ashwini S. Department of Computer Science and Engineering KSIT Bengaluru India Department of Computer Science and Engineering MSRIT Bengaluru India Department of CSE-AI Nutan College of Engineering and Research Pune India
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4691-4708页
作者: Sachin Sharma Brajesh Kumar Singh Hitendra Garg Department of Computer Science Abdul Kalam Technical UniversityLucknow226031India Department of Computer Engineering & Applications GLA UniversityMathura281406India Department of Computer Science Raja Balwant Singh Engineering Technical CampusAgra283105India
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing... 详细信息
来源: 评论
A Novel Certificateless Signature-based Access Control Scheme for Named In-network Computing Service
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 38-45页
作者: Li, Wanji Liu, Qiangbin Zhu, Yi School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
ETiSeg-Net: edge-aware self attention to enhance tissue segmentation in histopathological images
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Rashmi, R. Girisha, S. Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal India
Digital pathology employing Whole Slide Images (WSIs) plays a pivotal role in cancer detection. Nevertheless, the manual examination of WSIs for the identification of various tissue regions presents formidable challen... 详细信息
来源: 评论
CLIP-Flow:Decoding images encoded in CLIP space
收藏 引用
Computational Visual Media 2024年 第6期10卷 1157-1168页
作者: Hao Ma Ming Li Jingyuan Yang Or Patashnik Dani Lischinski Daniel Cohen-Or Hui Huang Visual Computing Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060China Department of Computer Science Tel Aviv UniversityTel Aviv 6997801Israel School of Computer Science and Engineering the Hebrew University of JerusalemJerusalem 91904Israel
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-... 详细信息
来源: 评论
An intelligent approach for autism spectrum disorder diagnosis and rehabilitation features identification
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2557-2580页
作者: Ghnemat, Rawan Al-Madi, Nailah Awad, Mohammad Computer Science department Princess Sumaya University for Technology Amman Jordan Data Science department Princess Sumaya University for Technology Amman Jordan
Autism spectrum disorder (ASD) affects 1 in 100 children globally. Early detection and intervention can enhance life quality for individuals diagnosed with ASD. This research utilizes the support vector machine-recurs... 详细信息
来源: 评论
Isomorphic Classification of First Degree Cellular Automata
收藏 引用
Complex Systems 2025年 第1期34卷 59-90页
作者: Vikrant, Vicky Bhattacharjee, Kamalika Mukherjee, Sukanya Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli620015 India Department of Computer Science and Engineering Institute of Engineering and Management West Bengal Kolkata700091 India
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to... 详细信息
来源: 评论