咨询与建议

限定检索结果

文献类型

  • 476,617 篇 会议
  • 172,735 篇 期刊文献
  • 3,378 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 652,729 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 355,738 篇 工学
    • 197,599 篇 计算机科学与技术...
    • 157,705 篇 软件工程
    • 85,884 篇 信息与通信工程
    • 70,767 篇 电气工程
    • 68,950 篇 电子科学与技术(可...
    • 58,596 篇 控制科学与工程
    • 34,332 篇 生物工程
    • 31,137 篇 光学工程
    • 27,697 篇 生物医学工程(可授...
    • 25,342 篇 机械工程
    • 22,564 篇 仪器科学与技术
    • 22,186 篇 动力工程及工程热...
    • 21,335 篇 化学工程与技术
    • 20,956 篇 材料科学与工程(可...
    • 10,694 篇 安全科学与工程
    • 10,605 篇 交通运输工程
    • 9,468 篇 力学(可授工学、理...
  • 203,701 篇 理学
    • 95,212 篇 数学
    • 78,617 篇 物理学
    • 38,664 篇 生物学
    • 30,809 篇 统计学(可授理学、...
    • 25,587 篇 系统科学
    • 22,937 篇 化学
  • 72,305 篇 管理学
    • 45,592 篇 管理科学与工程(可...
    • 29,110 篇 图书情报与档案管...
    • 22,708 篇 工商管理
  • 25,316 篇 医学
    • 20,930 篇 临床医学
    • 18,485 篇 基础医学(可授医学...
    • 11,642 篇 药学(可授医学、理...
  • 13,393 篇 法学
    • 11,167 篇 社会学
  • 9,176 篇 经济学
  • 6,300 篇 农学
  • 5,866 篇 教育学
  • 3,010 篇 文学
  • 1,509 篇 军事学
  • 725 篇 艺术学
  • 95 篇 哲学
  • 54 篇 历史学

主题

  • 20,368 篇 computer science
  • 14,411 篇 computational mo...
  • 10,936 篇 bandwidth
  • 10,791 篇 accuracy
  • 10,693 篇 feature extracti...
  • 8,972 篇 costs
  • 8,935 篇 delay
  • 8,929 篇 control systems
  • 8,914 篇 computer archite...
  • 8,782 篇 testing
  • 8,750 篇 machine learning
  • 8,697 篇 hardware
  • 8,661 篇 application soft...
  • 8,620 篇 training
  • 8,372 篇 deep learning
  • 8,347 篇 algorithm design...
  • 8,111 篇 frequency
  • 8,068 篇 robustness
  • 7,891 篇 switches
  • 7,862 篇 mathematical mod...

机构

  • 5,282 篇 department of el...
  • 1,662 篇 department of co...
  • 1,318 篇 department of co...
  • 1,291 篇 department of el...
  • 1,275 篇 department of el...
  • 1,252 篇 ieee
  • 1,143 篇 department of el...
  • 1,082 篇 department of el...
  • 1,019 篇 department of el...
  • 984 篇 department of el...
  • 964 篇 department of ph...
  • 957 篇 department of el...
  • 943 篇 cavendish labora...
  • 816 篇 physikalisches i...
  • 810 篇 oliver lodge lab...
  • 783 篇 department of el...
  • 776 篇 department of el...
  • 776 篇 department of co...
  • 711 篇 department of el...
  • 708 篇 department of el...

作者

  • 265 篇 s. chen
  • 258 篇 j. wang
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 211 篇 han zhu
  • 208 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 203 篇 beiter a.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 193 篇 y. chen
  • 192 篇 c. amelung
  • 191 篇 niyato dusit
  • 190 篇 g. bella

语言

  • 626,874 篇 英文
  • 18,167 篇 其他
  • 7,546 篇 中文
  • 259 篇 日文
  • 97 篇 朝鲜文
  • 56 篇 德文
  • 42 篇 法文
  • 30 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 12 篇 西班牙文
  • 11 篇 葡萄牙文
  • 9 篇 荷兰文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Electrical and Computer Engineering and Department of Computer Science"
652733 条 记 录,以下是51-60 订阅
排序:
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and Technology Department of Electrical and Computer Engineering University of Alberta Systems Research Institute Polish Academy of Sciences Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ... 详细信息
来源: 评论
Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares
收藏 引用
Cluster Computing 2025年 第5期28卷 1-28页
作者: Rawat, Arjun Singh Deshmukh, Maroti Singh, Maheep Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar Garhwal India Department of Computer Science Doon University Dehradun India Department of Computer Science and Engineering National Institute of Technology Delhi India
Traditional multi-secret sharing (MSS) schemes generate random shares to secure secrets, but their noisy appearance can raise suspicion. To address this, we present an advanced (n+1,n+1) MSS scheme that generates mean... 详细信息
来源: 评论
A Survey for Blockchain-Enabled Resource Management in Edge Networks
收藏 引用
IEEE Access 2025年 13卷 77252-77277页
作者: Boamah, Sharon A. Louis, Jean D. McNair, Janise Gilbert, Juan E. University of Florida Department of Electrical and Computer Engineering GainesvilleFL32611 United States University of Florida Department of Computer and Information Science and Engineering GainesvilleFL32611 United States
As more people and devices come online with the rapid growth of the internet, the need for secure and efficient network resource management becomes increasingly important. The boom of these connections on Next Generat... 详细信息
来源: 评论
Intelligent integrated sensing and communication:a survey
收藏 引用
science China(Information sciences) 2025年 第3期68卷 5-46页
作者: Jifa ZHANG Weidang LU Chengwen XING Nan ZHAO Naofal AL-DHAHIR George K.KARAGIANNIDIS Xiaoniu YANG School of Information and Communication Engineering Dalian University of Technology College of Information Engineering Zhejiang University of Technology School of Information and Electronics Beijing Institute of Technology Department of Electrical and Computer Engineering The University of Texas at Dallas Department of Electrical and Computer Engineering Aristotle University of Thessaloniki
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve... 详细信息
来源: 评论
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2943-2958页
作者: Li, Jiachun Meng, Yan Zhang, Le Chen, Guoxing Tian, Yuan Zhu, Haojin Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China Electrical and Computer Engineering Department Institute for Technology Los AngelesCA90095 United States
Wireless charging is widely used to charge smart devices with limited battery capacity. However, it is susceptible to the identity spoofing attack, where adversaries can impersonate malicious devices as legitimate one... 详细信息
来源: 评论
Drug–target interactions prediction based on similarity graph features extraction and deep learning
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4303-4322页
作者: Torkey, Hanaa El-Behery, Heba Attia, Abdel-Fattah El-Fishawy, Nawal Computer Science and Engineering Department Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Computer Science and Engineering Faculty of Engineering Kafrelsheikh University Kafrelsheikh Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici... 详细信息
来源: 评论
Peripheral Teleportation: A Rest Frame Design to Mitigate Cybersickness during Virtual Locomotion
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 2891-2900页
作者: Nie, Tongyu Pospick, Courtney Hutton Cantory, Ville Zhang, Danhua Deguzman, Jasmine Joyce Interrante, Victoria Adhanom, Isayas Berhe Rosenberg, Evan Suma University of Minnesota Department of Computer Science & Engineering United States University of Central Florida Department of Computer Science United States Texas State University Department of Computer Science United States
Mitigating cybersickness can improve the usability of virtual reality (VR) and increase its adoption. The most widely used technique, dynamic field-of-view (FOV) restriction, mitigates cybersickness by blacking out th... 详细信息
来源: 评论
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2659-2669页
作者: Ye, Peng Jiang, Zhifeng Wang, Wei Li, Bo Li, Baochun Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong University of Toronto Department of Electrical and Computer Engineering TorontoM5S 1A1 Canada
Federated learning (FL) has increasingly been deployed, in its vertical form, among organizations to facilitate secure collaborative training. In vertical FL (VFL), participants hold disjoint features of the same set ... 详细信息
来源: 评论
CPT:A Configurable Predictability Testbed for DNN Inference in AVs
收藏 引用
Tsinghua science and Technology 2025年 第1期30卷 87-99页
作者: Liangkai Liu Yanzhi Wang Weisong Shi Department of Computer and Information Science University of DelawareNewarkDE 19713USA Department of Electrical&Computer Engineering Northeastern UniversityBostonMA 02115USA
Predictability is an essential challenge for autonomous vehicles(AVs)’*** neural networks have been widely deployed in the AV’s perception ***,it is still an open question on how to guarantee the perception predicta... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论