咨询与建议

限定检索结果

文献类型

  • 203,211 篇 会议
  • 98,712 篇 期刊文献
  • 2,379 册 图书

馆藏范围

  • 304,302 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 181,183 篇 工学
    • 117,774 篇 计算机科学与技术...
    • 94,561 篇 软件工程
    • 45,948 篇 信息与通信工程
    • 28,488 篇 控制科学与工程
    • 25,424 篇 电子科学与技术(可...
    • 25,122 篇 电气工程
    • 19,428 篇 生物工程
    • 15,187 篇 生物医学工程(可授...
    • 14,820 篇 光学工程
    • 13,249 篇 机械工程
    • 11,236 篇 化学工程与技术
    • 10,770 篇 仪器科学与技术
    • 9,810 篇 动力工程及工程热...
    • 9,044 篇 材料科学与工程(可...
    • 7,012 篇 网络空间安全
    • 6,625 篇 安全科学与工程
    • 6,258 篇 交通运输工程
  • 103,161 篇 理学
    • 49,779 篇 数学
    • 35,958 篇 物理学
    • 22,136 篇 生物学
    • 15,950 篇 统计学(可授理学、...
    • 11,763 篇 化学
    • 11,156 篇 系统科学
  • 46,563 篇 管理学
    • 28,753 篇 管理科学与工程(可...
    • 19,678 篇 图书情报与档案管...
    • 12,975 篇 工商管理
  • 15,058 篇 医学
    • 12,452 篇 临床医学
    • 10,914 篇 基础医学(可授医学...
    • 6,785 篇 药学(可授医学、理...
  • 8,130 篇 法学
    • 6,574 篇 社会学
  • 5,187 篇 经济学
  • 4,142 篇 农学
  • 3,317 篇 教育学
  • 1,454 篇 文学
  • 764 篇 军事学
  • 449 篇 艺术学
  • 51 篇 哲学
  • 30 篇 历史学

主题

  • 9,643 篇 computer science
  • 7,387 篇 accuracy
  • 6,892 篇 feature extracti...
  • 6,304 篇 deep learning
  • 5,976 篇 computational mo...
  • 5,476 篇 machine learning
  • 5,306 篇 training
  • 4,131 篇 data mining
  • 3,948 篇 support vector m...
  • 3,787 篇 optimization
  • 3,603 篇 predictive model...
  • 3,506 篇 internet of thin...
  • 3,463 篇 wireless sensor ...
  • 3,370 篇 real-time system...
  • 3,244 篇 convolutional ne...
  • 3,232 篇 artificial intel...
  • 3,066 篇 neural networks
  • 2,900 篇 bandwidth
  • 2,893 篇 computer archite...
  • 2,892 篇 protocols

机构

  • 1,705 篇 department of co...
  • 1,354 篇 department of co...
  • 1,179 篇 university of ch...
  • 1,055 篇 physikalisches i...
  • 1,044 篇 cavendish labora...
  • 976 篇 department of ph...
  • 874 篇 infn laboratori ...
  • 858 篇 oliver lodge lab...
  • 836 篇 department of el...
  • 802 篇 department of el...
  • 795 篇 infn sezione di ...
  • 723 篇 school of comput...
  • 631 篇 department of el...
  • 617 篇 infn sezione di ...
  • 615 篇 department of co...
  • 586 篇 chitkara univers...
  • 536 篇 nikhef national ...
  • 516 篇 infn sezione di ...
  • 510 篇 school of comput...
  • 493 篇 university of sc...

作者

  • 253 篇 niyato dusit
  • 247 篇 j. wang
  • 244 篇 barter w.
  • 229 篇 s. chen
  • 227 篇 a. gomes
  • 217 篇 blake t.
  • 212 篇 bellee v.
  • 210 篇 y. zhang
  • 205 篇 bowcock t.j.v.
  • 204 篇 borsato m.
  • 204 篇 betancourt c.
  • 200 篇 brundu d.
  • 199 篇 c. alexa
  • 197 篇 j. m. izen
  • 195 篇 amato s.
  • 193 篇 beiter a.
  • 187 篇 c. amelung
  • 185 篇 g. bella
  • 185 篇 j. strandberg
  • 185 篇 d. calvet

语言

  • 255,420 篇 英文
  • 44,346 篇 其他
  • 4,798 篇 中文
  • 358 篇 日文
  • 74 篇 德文
  • 65 篇 斯洛文尼亚文
  • 63 篇 法文
  • 55 篇 朝鲜文
  • 16 篇 俄文
  • 10 篇 阿拉伯文
  • 4 篇 土耳其文
  • 3 篇 捷克文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Information Technology and Computer Science and Engineering"
304302 条 记 录,以下是761-770 订阅
排序:
PULSE: Progressive Utilization of Log-Structured Techniques to Ease SSD Write Amplification in B-epsilon-tree  25
PULSE: Progressive Utilization of Log-Structured Techniques ...
收藏 引用
30th Asia and South Pacific Design Automation Conference, ASP-DAC 2025
作者: Peng, Huai-De Chen, Yi-Shen Chen, Tseng-Yi Chang, Yuan-Hao Department of Computer Science and Information Engineering National Central University Taiwan Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan Institute of Information Science Academia Sinica Taiwan
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec... 详细信息
来源: 评论
Adjustable Model Compression Using Multiple Genetic Algorithm
收藏 引用
IEEE Transactions on Multimedia 2023年 25卷 1125-1132页
作者: Ople, Jose Jaena Mari Huang, Tai-Ming Chiu, Ming-Chih Chen, Yi-Ling Hua, Kai-Lung National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Generative Adversarial Networks (GAN) is a popular machine learning method that possesses powerful image generation ability, which is useful for different multimedia applications (e.g., photographic filters, image edi... 详细信息
来源: 评论
Development of an On-device XR Workspace System Using Real-time Hand Gesture Recognition With a Mobile Two-dimensional Camera
收藏 引用
Journal of Institute of Control, Robotics and Systems 2025年 第5期31卷 573-579页
作者: Kim, Minho Kim, Hyeonseok Lee, Yeejin Department of Electrical and Information Engineering Seoul National University of Science and Technology Korea Republic of
This paper presents a mobile on-device extended reality workspace system. Unlike conventional augmented reality systems, which offer limited interaction capabilities, the proposed system enables users to intuitively i... 详细信息
来源: 评论
Robust Stability of Discrete-time Genetic Regulatory Networks with Reaction Diffusion
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第9期54卷 1756-1764页
作者: Zou, Chengye Yang, Yongwei Li, Haifeng Shang, Yubao Liu, Yunong Information Science and Engineering Yanshan University Qinhuangdao066004 China School of Mathematics and Computer Science Tongling University Anhui Tongling244000 China Computer and Information Science Qinghai Institute of Technology Xining810016 China Information Science and Engineering Yanshan University Qinhuangdao066004 China
In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ... 详细信息
来源: 评论
QR Code-Based Visual Secret Sharing Scheme: A Review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2642-2661页
作者: Chu, Shu-Chuan Liu, Tao Pan, Jeng-Shyang Information Engineering College Guangzhou City Construction College Guangzhou510925 China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Visual secret sharing (VSS) scheme is the technology that divides a secret into shares. The decoding operation on the share is performed to restore the secret image. The quick response (QR) code is an image carrying t... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
Predicting and Forecasting Metal Stock Prices Using Machine Learning  6
Predicting and Forecasting Metal Stock Prices Using Machine ...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Bhavana, Katakam Varma, Indukuri Raghu Rohitha, Kalluri Suryanarayana, G. Anvesh, Kachi Kruthika, Sama Department of Information Technology Hyderabad India Department of Computer Science and Engineering Hyderabad India
Machine Learning algorithms analyze past market data to forecast future trends in metal stock prices. Precise estimation of metal stock values is essential for industry stakeholders, policy makers, and investors. Corr... 详细信息
来源: 评论
Exploring the Potential of Deep Learning Algorithms in Medical Image Processing: A Comprehensive Analysis  5th
Exploring the Potential of Deep Learning Algorithms in Medic...
收藏 引用
5th International Conference on Communication and Intelligent Systems, ICCIS 2023
作者: Pal, Ganesh Prasad Pal, Raju Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering School of Information and Communication Technology Gautam Buddha University Greater Noida India
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo... 详细信息
来源: 评论
Recent Advancements in Cybersecurity: A Literature Review  7th
Recent Advancements in Cybersecurity: A Literature Review
收藏 引用
7th International Conference on Soft Computing and Signal Processing, ICSCSP 2024
作者: Lakshman Naik, R. Jain, Sourabh Department of Computer Science and Engineering Indian Institute of Information Technology Haryana Sonepat India
Smart energy systems are improving internet connectivity, enhancing cybersecurity concerns. Traditional systems use trust authentication and information security measures to protect against cyber threats. However, dis... 详细信息
来源: 评论
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 377-390页
作者: Honghao Zhu MengChu Zhou Yu Xie Aiiad Albeshri IEEE School of Computer and Information Engineering Bengbu UniversityBengbu 233030China School of Information and Electronic Engineering Zhejiang Gongshang UniversityHangzhou 310018China Helen and John C.Hartmann the Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewark NJ 07102 USA College of Information Engineering Shanghai Maritime UniversityShanghai 201306China Department of Computer Science King Abdulaziz UniversityJeddah 21481Saudi Arabia
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... 详细信息
来源: 评论