咨询与建议

限定检索结果

文献类型

  • 1,958 篇 会议
  • 1,773 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,124 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 377 篇 信息与通信工程
    • 290 篇 控制科学与工程
    • 257 篇 电气工程
    • 242 篇 光学工程
    • 234 篇 电子科学与技术(可...
    • 195 篇 生物工程
    • 167 篇 生物医学工程(可授...
    • 120 篇 材料科学与工程(可...
    • 115 篇 仪器科学与技术
    • 108 篇 化学工程与技术
    • 92 篇 机械工程
    • 86 篇 动力工程及工程热...
    • 73 篇 核科学与技术
  • 1,685 篇 理学
    • 830 篇 物理学
    • 676 篇 数学
    • 246 篇 生物学
    • 239 篇 统计学(可授理学、...
    • 177 篇 地球物理学
    • 171 篇 化学
    • 118 篇 系统科学
  • 474 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 132 篇 工商管理
  • 205 篇 医学
    • 173 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 89 篇 公共卫生与预防医...
    • 83 篇 药学(可授医学、理...
  • 95 篇 法学
    • 86 篇 社会学
  • 59 篇 农学
  • 46 篇 经济学
  • 33 篇 教育学
  • 13 篇 文学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 143 篇 computer science
  • 134 篇 accuracy
  • 106 篇 deep learning
  • 89 篇 educational inst...
  • 82 篇 feature extracti...
  • 81 篇 computational mo...
  • 81 篇 machine learning
  • 69 篇 predictive model...
  • 66 篇 training
  • 57 篇 artificial intel...
  • 53 篇 support vector m...
  • 52 篇 real-time system...
  • 52 篇 convolutional ne...
  • 47 篇 internet of thin...
  • 44 篇 data models
  • 43 篇 optimization
  • 39 篇 data mining
  • 39 篇 machine learning...
  • 38 篇 cloud computing
  • 36 篇 semantics

机构

  • 100 篇 university of sc...
  • 89 篇 tianfu cosmic ra...
  • 85 篇 hebei normal uni...
  • 83 篇 faculty of scien...
  • 83 篇 department for p...
  • 83 篇 department of ph...
  • 83 篇 state key labora...
  • 80 篇 department of ph...
  • 80 篇 west university ...
  • 79 篇 department of ph...
  • 78 篇 department of mo...
  • 78 篇 department of ph...
  • 78 篇 department of ph...
  • 78 篇 yunnan observato...
  • 77 篇 department of ph...
  • 77 篇 research center ...
  • 77 篇 university of ch...
  • 75 篇 infn e laborator...
  • 71 篇 kirchhoff-instit...
  • 69 篇 centre de calcul...

作者

  • 100 篇 bastieri d.
  • 72 篇 fang j.
  • 72 篇 feng c.f.
  • 70 篇 axikegu
  • 69 篇 jiang k.
  • 63 篇 m. klein
  • 62 篇 c. alexa
  • 62 篇 j. m. izen
  • 62 篇 g. bella
  • 62 篇 j. strandberg
  • 62 篇 d. calvet
  • 62 篇 c. amelung
  • 62 篇 n. orlando
  • 62 篇 y. tayalati
  • 62 篇 g. spigo
  • 62 篇 v. chiarella
  • 62 篇 f. siegert
  • 61 篇 a. dimitrievska
  • 61 篇 f. deliot
  • 61 篇 r. ströhmer

语言

  • 3,478 篇 英文
  • 271 篇 其他
  • 20 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Institute for Advanced Computing Studies"
3767 条 记 录,以下是251-260 订阅
排序:
Simulate the Machine Learning Algorithm to Organize the CRAHN Network System  3
Simulate the Machine Learning Algorithm to Organize the CRAH...
收藏 引用
3rd International Conference on Advancement in Electronics and Communication Engineering, AECE 2023
作者: Prabakaran, P. Chandra Sekhar Reddy, L. Ravikumar, L.V.D. Verma, Manish Kumar School of Computing Sciences Vels Institute of Science Technology and Advanced Studies Department of Computer Applications Chennai India Hyderabad Medchal India Shri Vishnu Engineering College for Women Department of Information Technology Bhimavaram India Lovely Professional University Department of Psychology Phagwara India
Using available channels in a wireless spectrum, cognitive radio (CR) may automatically adjust transmission settings to optimize radio operational behaviour. To function properly, a CR ad hoc network (CRAHN) has to be... 详细信息
来源: 评论
Securing Distributed Database Using Elongated RSA Algorithm  7
Securing Distributed Database Using Elongated RSA Algorithm
收藏 引用
7th International Conference on advanced computing and Communication Systems, ICACCS 2021
作者: Radhakrishnan, Sangeetha Akila, A. Vels Institute of Science Technology and Advanced Studies School of Computing Sciences Department of Computer Science Chennai India
Securing data, management of the authorised access of the user and maintaining the privacy of the data are some of the problems relating with the stored data in the database. The security of the data stored is conside... 详细信息
来源: 评论
Enhancing Video Anomaly Detection Using Spatio-Temporal Autoencoders and Convolutional LSTM Networks
收藏 引用
SN computer science 2024年 第1期5卷 190页
作者: Almahadin, Ghayth Subburaj, Maheswari Hiari, Mohammad Sathasivam Singaram, Saranya Kolla, Bhanu Prakash Dadheech, Pankaj Vibhute, Amol D. Sengan, Sudhakar Department of Networks and Cybersecurity Faculty of Information Technology Al Ahliyya Amman University Country Amman Jordan School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai 600127 India Department of Networks and Cybersecurity Information Technology Al Ahliyya Amman University Amman Jordan Department Computing Technology School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur 522302 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management and Gramothan (SKIT) Rajasthan Jaipur 302017 India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) MH Pune 411016 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Identifying suspicious activities or behaviors is essential in the domain of Anomaly Detection (AD). In crowded scenes, the presence of inter-object occlusions often complicates the detection of such behaviors. Theref... 详细信息
来源: 评论
Machine Learning based Anomaly and Threat Detection System in Real Time Social Internet of Things using Dimensionality Reduction Techniques  2
Machine Learning based Anomaly and Threat Detection System i...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Jenifer, Anciline Piramu, Preethika S.K. Vels Institute of Science Technology & Advanced Studies Department of Computer Science Tamil Nadu Chennai India
The Social Internet-of-Things (SIoT) is an innovative model developing in the struggle to safeguard privacy and increase trust inside the Internet-of-Things(IoT). The revolutionary notion of SIoT combines the IoT with... 详细信息
来源: 评论
Deep Learning-Driven SIoT Security: Detecting Anomalies and Community Attacks with SPY IoT Devices
Deep Learning-Driven SIoT Security: Detecting Anomalies and ...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Anciline Jenifer J Piramu Preethika. S. K. Department of Computer Science Vels Institute of Science Technology & Advanced Studies Chennai Tamil Nadu India
The rapid growth of Social Internet of Things (SIoT) networks, new security vulnerabilities have evolved, including irregularity detection and community-based hacks. Given the large degree of decentralization in SIoT ... 详细信息
来源: 评论
Machine Learning based Anomaly and Threat Detection System in Real Time Social Internet of Things using Dimensionality Reduction Techniques
Machine Learning based Anomaly and Threat Detection System i...
收藏 引用
Machine Learning and Autonomous Systems (ICMLAS), International Conference on
作者: Anciline Jenifer J Preethika S.K. Piramu Department of Computer Science Vels Institute of Science Technology & Advanced Studies Chennai Tamil Nadu India
The Social Internet-of-Things (SIoT) is an innovative model developing in the struggle to safeguard privacy and increase trust inside the Internet-of-Things(IoT). The revolutionary notion of SIoT combines the IoT with... 详细信息
来源: 评论
An Automated Detection System of Autism Spectrum Disorder Using Optimal Feature Selection-Based Adaptive RNN with Attention Mechanism
An Automated Detection System of Autism Spectrum Disorder Us...
收藏 引用
International Conference on computer and Communications Technologies (ICCCT)
作者: J. Jegan Amarnath S. Meera Department of Computer Science and Engineering Vels Institute of Science Technology & Advanced Studies Chennai Tamilnadu India
The research introduces an automated system for ASD detection through the implementation of an adaptive RNN combined with optimal features selection together with an attention mechanism. The system operates to detect ... 详细信息
来源: 评论
Secure Multi-Party Computation for Collaborative Data Analysis in Network Security  2
Secure Multi-Party Computation for Collaborative Data Analys...
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Tamilselvi, P. Lathika, V. Jayachitra, S. Arunkumar, S. Balasubramani, M. Kalaichelvi, V. Vels Institute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Department of Cse Salem India Psna College of Engineering and Technology Department of Ece Dindigul India Coimbatore Institute of Engineering and Technology Department of Ece Coimbatore India Vsb Engineering College Department of Computer Science and Engineering Karur India Sastra Deemed to Be University Srinivasa Ramanujan Centre Department of Cse Kumbakonam India
Within the scope of this research, we provide a Secure Multi-Party Computation (SMPC) architecture that has been adapted specifically for the purpose of collaborative data analysis in network protection. Significant i... 详细信息
来源: 评论
Preface to the 13th Workshop on Bibliometric-enhanced Information Retrieval at ECIR 2023  13
Preface to the 13th Workshop on Bibliometric-enhanced Inform...
收藏 引用
13th International Workshop on Bibliometric-Enhanced Information Retrieval, BIR 2023
作者: Frommholz, Ingo Mayr, Philipp Cabanac, Guillaume Verberne, Suzan Brennan, Jordan School of Engineering Computing and Mathematical Sciences University of Wolverhampton United Kingdom GESIS Leibniz-Institute for the Social Sciences Cologne Germany University of Toulouse Computer Science Department IRIT UMR 5505 France Leiden Institute of Advanced Computer Science Leiden University Netherlands
This preface summarizes the 13th Workshop on Bibliometric-enhanced Information Retrieval (BIR). BIR 2023 was held as hybrid event at April 2nd, 2023, co-located with the 45th European Conference on Information Retriev...
来源: 评论
Boosting Performance and QoS for Concurrent GPU B+trees by Combining-Based Synchronization  23
Boosting Performance and QoS for Concurrent GPU B+trees by C...
收藏 引用
28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023
作者: Zhang, Weihua Zhao, Chuanlei Peng, Lu Lin, Yuzhe Zhang, Fengzhe Lu, Yunping School of Computer Science Fudan University China Institute of Big Data Fudan University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Parallel Processing Institute Fudan University China Department of Computer Science Tulane University United States
Concurrent B+trees have been widely used in many systems. With the scale of data requests increasing exponentially, the systems are facing tremendous performance pressure. GPU has shown its potential to accelerate con... 详细信息
来源: 评论