咨询与建议

限定检索结果

文献类型

  • 513,188 篇 会议
  • 182,692 篇 期刊文献
  • 3,614 册 图书

馆藏范围

  • 699,490 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 382,039 篇 工学
    • 210,373 篇 计算机科学与技术...
    • 167,967 篇 软件工程
    • 91,304 篇 信息与通信工程
    • 76,455 篇 电气工程
    • 74,637 篇 电子科学与技术(可...
    • 63,155 篇 控制科学与工程
    • 36,325 篇 生物工程
    • 32,703 篇 光学工程
    • 29,103 篇 生物医学工程(可授...
    • 27,255 篇 机械工程
    • 24,247 篇 仪器科学与技术
    • 23,754 篇 动力工程及工程热...
    • 23,342 篇 材料科学与工程(可...
    • 22,785 篇 化学工程与技术
    • 11,320 篇 交通运输工程
    • 11,264 篇 安全科学与工程
    • 10,111 篇 力学(可授工学、理...
  • 216,759 篇 理学
    • 101,977 篇 数学
    • 83,433 篇 物理学
    • 40,698 篇 生物学
    • 33,178 篇 统计学(可授理学、...
    • 27,425 篇 系统科学
    • 24,291 篇 化学
  • 76,753 篇 管理学
    • 48,600 篇 管理科学与工程(可...
    • 30,707 篇 图书情报与档案管...
    • 24,188 篇 工商管理
  • 26,203 篇 医学
    • 21,803 篇 临床医学
    • 19,292 篇 基础医学(可授医学...
    • 12,195 篇 药学(可授医学、理...
  • 14,138 篇 法学
    • 11,808 篇 社会学
  • 9,724 篇 经济学
  • 6,576 篇 农学
  • 6,227 篇 教育学
  • 3,140 篇 文学
  • 1,583 篇 军事学
  • 765 篇 艺术学
  • 94 篇 哲学
  • 55 篇 历史学

主题

  • 22,173 篇 computer science
  • 15,562 篇 computational mo...
  • 11,875 篇 accuracy
  • 11,665 篇 feature extracti...
  • 11,577 篇 bandwidth
  • 9,540 篇 training
  • 9,533 篇 control systems
  • 9,508 篇 computer archite...
  • 9,485 篇 costs
  • 9,390 篇 testing
  • 9,372 篇 delay
  • 9,293 篇 hardware
  • 9,281 篇 machine learning
  • 9,017 篇 application soft...
  • 9,005 篇 deep learning
  • 8,788 篇 algorithm design...
  • 8,659 篇 robustness
  • 8,538 篇 mathematical mod...
  • 8,499 篇 frequency
  • 8,471 篇 switches

机构

  • 5,279 篇 department of el...
  • 1,686 篇 department of co...
  • 1,329 篇 department of co...
  • 1,312 篇 department of el...
  • 1,287 篇 department of el...
  • 1,247 篇 ieee
  • 1,150 篇 department of el...
  • 1,087 篇 department of el...
  • 1,027 篇 department of el...
  • 983 篇 department of el...
  • 966 篇 department of ph...
  • 950 篇 department of el...
  • 942 篇 cavendish labora...
  • 816 篇 physikalisches i...
  • 806 篇 oliver lodge lab...
  • 781 篇 department of el...
  • 771 篇 department of co...
  • 761 篇 department of el...
  • 746 篇 university of ch...
  • 697 篇 department of el...

作者

  • 253 篇 s. chen
  • 250 篇 barter w.
  • 250 篇 j. wang
  • 229 篇 blake t.
  • 228 篇 niyato dusit
  • 222 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 213 篇 amato s.
  • 210 篇 brundu d.
  • 209 篇 han zhu
  • 207 篇 boettcher t.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 y. chen
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella

语言

  • 632,125 篇 英文
  • 58,939 篇 其他
  • 8,459 篇 中文
  • 287 篇 日文
  • 126 篇 朝鲜文
  • 89 篇 德文
  • 61 篇 法文
  • 44 篇 斯洛文尼亚文
  • 30 篇 土耳其文
  • 18 篇 西班牙文
  • 17 篇 阿拉伯文
  • 13 篇 葡萄牙文
  • 10 篇 俄文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 2 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Electrical and Computer Engineering and Computer Science and Engineering"
699494 条 记 录,以下是791-800 订阅
排序:
Piercing Diametral Disks Induced by Edges of Maximum Spanning Trees
收藏 引用
Journal of Graph Algorithms and Applications 2024年 第3期28卷 3-10页
作者: Karim Abu-Affash, A. Carmi, Paz Maman, Meytal Department of Software Engineering Shamoon College of Engineering Israel Department of Computer Science Ben-Gurion University Israel
Let P be a set of points in the plane and let T be a maximum-weight spanning tree of P. For an edge (p, q), let Dpq be the diametral disk induced by (p, q), i.e., the disk having the segment pq as its diameter. Let DT... 详细信息
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
Data Augmentation and Random Multi-Model Deep Learning for Data Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5191-5207页
作者: Fatma Harby Adel Thaljaoui Durre Nayab Suliman Aladhadh Salim EL Khediri Rehan Ullah Khan Computer Science Department Future Academy-Higher Future Institute for Specialized Technological StudiesEgypt Department of Computer Systems Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawar25120Pakistan Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computer Sciences Faculty of Sciences of GafsaUniversity of GafsaGafsaTunisia
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance... 详细信息
来源: 评论
IBAttack: Being Cautious about Data Labels
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第6期4卷 1484-1493页
作者: Agarwal, Akshay Singh, Richa Vatsa, Mayank Ratha, Nalini IISER Bhopal Department of Data Science and Engineering Bhopal462066 India IIT Jodhpur Department of Computer Science and Engineering Rajasthan Jodhpur342037 India University at Buffalo Department of Computer Science and Electrical Engineering BuffaloNY14260 United States
Traditional backdoor attacks insert a trigger patch in the training images and associate the trigger with the targeted class label. Backdoor attacks are one of the rapidly evolving types of attack which can have a sig... 详细信息
来源: 评论
Multi-objective cloud load-balancing with hybrid optimization
收藏 引用
International Journal of computers and Applications 2023年 第10期45卷 611-625页
作者: Geeta, Koppula Kamakshi Prasad, V. Department of Computer Science and Engineering Rajiv Gandhi University of Knowledge Technologies Basar India Department of Computer Science and Engineering JNTUH College of Engineering Hyderabad India
In this study, the cloud computing platform is equipped with a hybrid multi-objective meta-heuristic optimization-based load balancing model. Physical Machine (PM) allocates a specific virtual machine (VM) depending o... 详细信息
来源: 评论
Classification of autism severity levels using facial features and eye gaze patterns
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 15853-15866页
作者: Jiji, G. Wiselin Department of Computer Science and Engineering Dr. Sivanthi Aditanar College of Engineering Tamil Nadu Thiruchendur India
Autism Spectrum Disorder (ASD) is a complex neurodevelopmental condition with varying degrees of severity. Early diagnosis and classification of autism severity are crucial for personalized intervention and support. T... 详细信息
来源: 评论
Message from Guest Editors of the CVM 2024 Special Issue
收藏 引用
Computational Visual Media 2024年 第4期10卷 611-612页
作者: Andrei Sharf Fang-Lue Zhang Department of Computer Science Ben-Gurion University Beer-Sheva 84105 Israel School of Engineering and Computer Science Victoria University of Wellington Wellington6012 NewZealand
The Computational Visual Media(CVM)conference series is intended to provide a prominent international forum for exchanging innovative research ideas and significant computational methodologies that either underpin or ... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Exploration, Collaboration, and Applications in Multi-Agent Reinforcement Learning
收藏 引用
Performance Evaluation Review 2025年 第3期52卷 31-34页
作者: Chen, Jingdi Department of Electrical and Computer Engineering Carnegie Mellon University PittsburghPA United States
In recent years, the field of humancentric decision-making has emerged as a critical area of research, driven by its potential to fundamentally reshape how decisions are made across a variety of complex systems. Human... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论