咨询与建议

限定检索结果

文献类型

  • 511,566 篇 会议
  • 183,177 篇 期刊文献
  • 3,570 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 698,323 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 381,224 篇 工学
    • 210,791 篇 计算机科学与技术...
    • 168,341 篇 软件工程
    • 91,870 篇 信息与通信工程
    • 75,905 篇 电气工程
    • 74,200 篇 电子科学与技术(可...
    • 63,336 篇 控制科学与工程
    • 36,426 篇 生物工程
    • 33,232 篇 光学工程
    • 29,170 篇 生物医学工程(可授...
    • 27,530 篇 机械工程
    • 24,405 篇 仪器科学与技术
    • 23,847 篇 动力工程及工程热...
    • 22,928 篇 化学工程与技术
    • 22,206 篇 材料科学与工程(可...
    • 11,375 篇 交通运输工程
    • 11,300 篇 安全科学与工程
    • 10,185 篇 力学(可授工学、理...
  • 217,688 篇 理学
    • 102,108 篇 数学
    • 83,818 篇 物理学
    • 40,929 篇 生物学
    • 32,975 篇 统计学(可授理学、...
    • 27,496 篇 系统科学
    • 24,484 篇 化学
  • 76,972 篇 管理学
    • 48,696 篇 管理科学与工程(可...
    • 30,808 篇 图书情报与档案管...
    • 24,220 篇 工商管理
  • 26,450 篇 医学
    • 21,913 篇 临床医学
    • 19,349 篇 基础医学(可授医学...
    • 12,221 篇 药学(可授医学、理...
  • 14,124 篇 法学
    • 11,796 篇 社会学
  • 9,772 篇 经济学
  • 6,606 篇 农学
  • 6,222 篇 教育学
  • 3,160 篇 文学
  • 1,592 篇 军事学
  • 772 篇 艺术学
  • 97 篇 哲学
  • 56 篇 历史学

主题

  • 22,259 篇 computer science
  • 15,323 篇 computational mo...
  • 11,574 篇 bandwidth
  • 11,511 篇 feature extracti...
  • 11,393 篇 accuracy
  • 9,508 篇 control systems
  • 9,463 篇 costs
  • 9,441 篇 computer archite...
  • 9,391 篇 training
  • 9,366 篇 delay
  • 9,278 篇 machine learning
  • 9,275 篇 testing
  • 9,268 篇 hardware
  • 9,001 篇 application soft...
  • 8,792 篇 deep learning
  • 8,784 篇 algorithm design...
  • 8,580 篇 robustness
  • 8,541 篇 mathematical mod...
  • 8,453 篇 switches
  • 8,420 篇 frequency

机构

  • 5,282 篇 department of el...
  • 1,659 篇 department of co...
  • 1,318 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,275 篇 department of el...
  • 1,139 篇 department of el...
  • 1,080 篇 department of el...
  • 1,017 篇 department of el...
  • 982 篇 department of el...
  • 962 篇 department of ph...
  • 945 篇 department of el...
  • 943 篇 cavendish labora...
  • 810 篇 oliver lodge lab...
  • 810 篇 physikalisches i...
  • 776 篇 department of el...
  • 774 篇 department of co...
  • 764 篇 department of el...
  • 731 篇 university of ch...
  • 701 篇 department of el...

作者

  • 257 篇 s. chen
  • 251 篇 j. wang
  • 242 篇 barter w.
  • 233 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 215 篇 han zhu
  • 208 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 202 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung
  • 192 篇 y. chen
  • 190 篇 g. bella

语言

  • 670,719 篇 英文
  • 19,111 篇 其他
  • 8,281 篇 中文
  • 286 篇 日文
  • 124 篇 朝鲜文
  • 63 篇 德文
  • 44 篇 法文
  • 31 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 12 篇 葡萄牙文
  • 10 篇 荷兰文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer and Electrical Engineering and Computer Science"
698327 条 记 录,以下是4821-4830 订阅
排序:
Highly-Efficient, Dual-Polarized Huygens’ Metasurfaces for Scan-Angle Enhancement Without Directivity Degradation
收藏 引用
IEEE Access 2025年 13卷 83219-83228页
作者: Kim, Jaemin Soltani, Mohammad Kim, Minseok Eleftheriades, George V. University of Toronto The Edward S. Rogers Sr. Department of Electrical and Computer Engineering TorontoONM5S 3G4 Canada Hongik University School of Electronic and Electrical Engineering Seoul04066 Korea Republic of
We hereby propose a dual-polarized beam-deflecting metasurface that can double the scan-angle range of a phased-array antenna without compromising the directivity across all scan angles, including broadside. In partic... 详细信息
来源: 评论
Exploratory data analysis to study the impact of MGNREGA on employment generation  5
Exploratory data analysis to study the impact of MGNREGA on ...
收藏 引用
5th International Conference on Emerging Systems and Intelligent Computing, ESIC 2025
作者: Hazarika, Nandini Hazarika, Balin Dayananda Sagar University Department of Computer Science and Engineering Bengaluru India Girijananda Chaudhury University Department of Commerce Guwahati India
The Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) was designed the enhance the livelihood of rural households all across India, providing opportunities for wage employment. In recent years the progr... 详细信息
来源: 评论
Implementation and Analysis of Using Autoencoder to Suppress Noise Interference on Side-Channel Attacks  2nd
Implementation and Analysis of Using Autoencoder to Suppress...
收藏 引用
2nd International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Tsai, Kuo-Yu Kuo, Chung-Wei Weng, Wei-Ming Wang, Guan-Ling Lin, Chun-Chang Department of Information Engineering and Computer Science Feng Chia University No. 100 Wenhua Rd. Xitun Taichung40724 Taiwan
In recent years, Side-Channel Attack (SCA) has been widely used in hardware security analysis. Such an attack uses the power characteristics generated by the switching of internal logic gates during chip operation to ... 详细信息
来源: 评论
Exploring Large Language Models’ Ability to Imitate Coping’s Influence on Beliefs and Goals  17th
Exploring Large Language Models’ Ability to Imitate Coping...
收藏 引用
17th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2024
作者: Yongsatianchot, Nutchanon Marsella, Stacy Faculty of Engineering Thammasat School of Engineering Thammasat University Bangkok Thailand Khoury College of Computer Science and Department of Psychology Northeastern University Boston United States
Large Language Models (LLMs) have shown impressive capabilities across various fields, including across social sciences. While research has explored LLMs’ emotion capabilities, studies on coping mechanisms are limite... 详细信息
来源: 评论
Simulink Mutation Testing using CodeBERT
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Jingfan Ghobari, Delaram Sabetzadeh, Mehrdad Nejati, Shiva School of Electrical Engineering and Computer Science University of Ottawa Canada
We present BERTiMuS, an approach that uses CodeBERT to generate mutants for Simulink models. BERTiMuS converts Simulink models into textual representations, masks tokens from the derived text, and uses CodeBERT to pre...
来源: 评论
CND-IDS: Continual Novelty Detection for Intrusion Detection Systems
arXiv
收藏 引用
arXiv 2025年
作者: Fuhrman, Sean Gungor, Onat Rosing, Tajana Department of Electrical and Computer Engineering University of California San Diego United States Department of Computer Science and Engineering University of California San Diego United States
Intrusion detection systems (IDS) play a crucial role in IoT and network security by monitoring system data and alerting to suspicious activities. Machine learning (ML) has emerged as a promising solution for IDS, off... 详细信息
来源: 评论
The Design of Security Algorithm RPBB-24-2 in Circuitous Route Across the Distributed Ledger  8th
The Design of Security Algorithm RPBB-24-2 in Circuitous Rou...
收藏 引用
8th World Conference on Smart Trends in Systems Security and Sustainability, WorldS4 2024
作者: Rajaprakash, S. Basha, C. Bagath Karthik Ali, Amjad Rahman, Sahil Siddique, Md. Irshad Saif, Afroj Ansari Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering Kommuri Pratap Reddy Institute of Technology Autonomous Telagana Hyderabad India Aarupadai Veedu Institute of Technology Vinayaka Mission Research Foundation Chennai India
The technology known as Block Chain is one of the technologies that is seeing one of the fastest increase rates around the world. The technique known as blockchain is used to guarantee the security of a variety of dat... 详细信息
来源: 评论
Physiological Radar-Based Sedentary State Classification using Recurrent Neural Networks
Physiological Radar-Based Sedentary State Classification usi...
收藏 引用
IEEE MTT-S International Microwave Bio Conference ((IMBIOC)
作者: Milos Suvakovic Mohammad Shadman Ishrak Olga Borić-Lubecke Victor M. Lubecke Department of Computer Science and Engineering University of California Santa Cruz Santa Cruz California Department of Electrical and Computer Engineering University of Hawaii at Manoa Honolulu USA
While continuous-wave (CW) Doppler radar can be used to unobtrusively monitor human cardiopulmonary vital signs in uncontrolled settings, locomotion or other extraneous motion can sometimes obscure or distort such mea... 详细信息
来源: 评论
Transformer-Based Contrastive Meta-Learning For Low-Resource Generalizable Activity Recognition
Transformer-Based Contrastive Meta-Learning For Low-Resource...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Junyao Wang Mohammad Abdullah Al Faruque Department of Computer Science University of California Irvine CA United States Department of Electrical Engineering and Computer Science University of California Irvine CA United States
Deep learning has been widely adopted for human activity recognition (HAR) while generalizing a trained model across diverse users and scenarios remains challenging due to distribution shifts (DS). The inherent low-re... 详细信息
来源: 评论
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ning Shi, Shanghao Chen, Yimin Lou, Wenjing Hou, Y. Thomas Virginia Tech Department of Electrical and Computer Engineering BlacksburgVA24061 United States Virginia Tech Department of Computer Science BlacksburgVA24061 United States University of Massachusetts Lowell Department of Computer Science LowellMA01854 United States
Over the last decade, Internet of Things (IoT) has permeated our daily life with a broad range of applications. However, a lack of adequate security in IoT devices renders IoT systems vulnerable to various network-bas... 详细信息
来源: 评论