咨询与建议

限定检索结果

文献类型

  • 60,366 篇 会议
  • 10,819 篇 期刊文献
  • 550 册 图书
  • 34 篇 科技报告

馆藏范围

  • 71,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46,552 篇 工学
    • 35,856 篇 计算机科学与技术...
    • 29,889 篇 软件工程
    • 10,951 篇 信息与通信工程
    • 6,658 篇 控制科学与工程
    • 4,503 篇 电气工程
    • 4,397 篇 生物工程
    • 4,236 篇 电子科学与技术(可...
    • 3,454 篇 生物医学工程(可授...
    • 2,692 篇 光学工程
    • 2,452 篇 机械工程
    • 1,944 篇 仪器科学与技术
    • 1,832 篇 动力工程及工程热...
    • 1,779 篇 化学工程与技术
    • 1,470 篇 安全科学与工程
    • 1,339 篇 建筑学
    • 1,237 篇 交通运输工程
  • 24,292 篇 理学
    • 14,985 篇 数学
    • 5,496 篇 物理学
    • 4,916 篇 生物学
    • 4,508 篇 统计学(可授理学、...
    • 2,684 篇 系统科学
    • 1,918 篇 化学
  • 12,363 篇 管理学
    • 6,717 篇 管理科学与工程(可...
    • 6,284 篇 图书情报与档案管...
    • 3,901 篇 工商管理
  • 2,812 篇 医学
    • 2,469 篇 临床医学
    • 2,268 篇 基础医学(可授医学...
    • 1,463 篇 药学(可授医学、理...
  • 2,188 篇 法学
    • 1,830 篇 社会学
  • 1,281 篇 经济学
    • 1,278 篇 应用经济学
  • 1,168 篇 教育学
  • 917 篇 农学
  • 288 篇 文学
  • 152 篇 军事学
  • 85 篇 艺术学
  • 39 篇 哲学
  • 17 篇 历史学

主题

  • 1,772 篇 computer science
  • 1,697 篇 accuracy
  • 1,572 篇 computational mo...
  • 1,490 篇 feature extracti...
  • 1,230 篇 training
  • 1,061 篇 deep learning
  • 999 篇 machine learning
  • 841 篇 predictive model...
  • 835 篇 data mining
  • 779 篇 semantics
  • 769 篇 real-time system...
  • 736 篇 support vector m...
  • 722 篇 data models
  • 711 篇 artificial intel...
  • 675 篇 computer archite...
  • 600 篇 visualization
  • 582 篇 convolutional ne...
  • 580 篇 optimization
  • 558 篇 internet of thin...
  • 544 篇 neural networks

机构

  • 91 篇 institute of inf...
  • 84 篇 dept. of compute...
  • 83 篇 north-west unive...
  • 82 篇 dept. of compute...
  • 81 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 68 篇 institut univers...
  • 66 篇 università di ca...
  • 65 篇 dept. of compute...
  • 60 篇 dept. of compute...
  • 60 篇 national centre ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of informa...
  • 52 篇 school of automa...
  • 44 篇 dept. of compute...
  • 44 篇 leiden universit...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 37 篇 hokkaido univers...

作者

  • 97 篇 ferrara g.
  • 94 篇 ardid m.
  • 87 篇 calvo d.
  • 82 篇 chen a.
  • 75 篇 gal t.
  • 72 篇 bozza c.
  • 62 篇 ahmad jalal
  • 60 篇 kulikovskiy v.
  • 53 篇 kalekin o.
  • 41 篇 gagliardini s.
  • 40 篇 benoit d.m.
  • 40 篇 eddymaoui a.
  • 40 篇 labalme m.
  • 37 篇 díaz a.f.
  • 36 篇 androulakis g.
  • 34 篇 crawford h.j.
  • 34 篇 cafagna f.
  • 34 篇 de palma m.
  • 34 篇 huang f.
  • 33 篇 haungs a.

语言

  • 68,584 篇 英文
  • 2,468 篇 其他
  • 528 篇 中文
  • 108 篇 日文
  • 64 篇 朝鲜文
  • 11 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Data Science"
71769 条 记 录,以下是481-490 订阅
排序:
Proposal for a Virtual Reality System to Practice Knife Handling in Cooking  13
Proposal for a Virtual Reality System to Practice Knife Hand...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Nakazato, Yukitoshi Kano, Toru Ibaraki Univercity Dept. Computer Science and Engineering Ibaraki Japan
Knife handling is one of the most important skills in cooking. However, it is difficult to practice the handling of a kitchen knife repeatedly owing to limitations in resources. To address this, we propose a highly re... 详细信息
来源: 评论
Revealing Modern Stream Ciphers Security: A Comprehensive Review
Revealing Modern Stream Ciphers Security: A Comprehensive Re...
收藏 引用
2023 International Conference on Engineering, Applied and Nano sciences, ICEANS 2023
作者: Albawi, Mohammed Hashim, Asaad N. Hussein, Khalid A. College of Education Technical Mustansiriyah University Dept. Computer Science Baghdad Iraq College of Computer Science and Math University of Kufa Dept. Computer Science Najaf Iraq College of Education Mustansiriyah University Dept. Computer Science Baghdad Iraq
Stream ciphers are essential cryptographic primitives widely employed in various applications for efficient data protection. This paper presents a comprehensive review of attacks on the Grain, Trivium, and SNOW stream... 详细信息
来源: 评论
Automail AI: Intelligent Voice-Controlled Email Generator  3
Automail AI: Intelligent Voice-Controlled Email Generator
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Jayaram, Kavitha Mandagere, Samarth Gopisetti, Sampriti Sahit, S. Bnm Institute of Technology Dept. of Computer Science and Engineering Bengaluru India
The complexity of contemporary communication further emphasizes the need to automate monotonous work to increase efficiency and effectiveness. This paper introduces a new advance, voice-controlled Automail AI, in the ... 详细信息
来源: 评论
Blockchain in Supply Chains: A Dual Perspective on Transparency and Efficiency
Blockchain in Supply Chains: A Dual Perspective on Transpare...
收藏 引用
2024 International Conference on science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Emmanuel, Igbekele Abiodun, Moses Olowe, Oluwambo Tolulope Oghenegueke Fortune, Amrevuawho Oluwabunmi, Oluwanfifehanmi Bishop, Akin-Thomas Landmark University Dept. of Computer Science Omu Aran Nigeria
Transparency in a Supply chain is the availability of relevant information as it relates to all participants of the Supply Chain. Every stakeholder in the Agricultural and Pharmaceutical Supply Chain specifically the ... 详细信息
来源: 评论
Cyberbullying Detection and Severity Classification Using Bi-LSTM  9
Cyberbullying Detection and Severity Classification Using Bi...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Devi, K. Nirmala Rajasekar, Vani Jayanthi, P. Balasubramani, Kavin Kandasamy, Kaviya Gowrisankar, Keerthana Kongu Engineering College Dept. of Computer Science Erode India
Cyberbullying has grown to be a significant issue in the internet age, affecting individuals of all ages, particularly teens. It involves using internet channels to harass, threaten, or disparage people, often with li... 详细信息
来源: 评论
Leveraging Name Entity Recognition and Text Classification for Talent Mapping  2
Leveraging Name Entity Recognition and Text Classification f...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Charan, Annepu Sai Moirangthem, Dennis Singh Iiit Manipur Dept. of Computer Science and Engineering Imphal India
The paper presents a dual-model approach that can be used for categorizing the work experience data from resumes or other textual copra. The application tracking system (ATS), which is the main tool used to screen res... 详细信息
来源: 评论
Lung Cancer Disease Prediction using Hybrid Subtractive Clustering Method  2
Lung Cancer Disease Prediction using Hybrid Subtractive Clus...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Paul, Banibrata Mir, Mahmood Hussain Murugan, Stalin Kurian, Asha Alliance University Dept. of Computer Science & Engineering Bangalore India
As of right now, lung cancer is the primary cause of cancer-related deaths worldwide for both men and women. One possible explanation for lung cancer's main cause is smoking. 86% to 96% of instances of lung cancer... 详细信息
来源: 评论
Extraction of Conditional Belief Bases and the System Z Ranking Model From Multilayer Perceptrons for Binary Classification  22
Extraction of Conditional Belief Bases and the System Z Rank...
收藏 引用
22nd International Workshop on Nonmonotonic Reasoning, NMR 2024
作者: Wilhelm, Marco Hahn, Alexander Kern-Isberner, Gabriele Dept. of Computer Science TU Dortmund University Dortmund Germany
We extract propositional conditional belief bases from multilayer perceptrons, a basic type of feedforward neural networks, and investigate the relation between these two prevalent formalisms from knowledge representa... 详细信息
来源: 评论
SobelMNet: A Lightweight CNN based Approach for Median Filtering Detection in compressed images  27
SobelMNet: A Lightweight CNN based Approach for Median Filte...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Kaushal, Anukriti Kumar, Rajeev Kumar, Sanjay Dept. of Computer Science & Engineering Delhi Technological University Delhi India
Digital image forgery is the process of manipulating an image to deceive or mislead observers with real or manipulated content. Median filtering is widely used to smooth images and obscure traces of tampering, making ... 详细信息
来源: 评论
Performance evaluation and modelling of single-precision matrix multiplication on Cerebras CS-2
Performance evaluation and modelling of single-precision mat...
收藏 引用
2024 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, SC Workshops 2024
作者: Matsuzaki, Ryunosuke Mukunoki, Daichi Miyajima, Takaaki Meiji University Dept. of Computer Science Kanagawa Kawasaki Japan
Although recent supercomputers have been improving their computational performance, achieving performance scaling with respect to the number of nodes is not easy due to long inter-node communication latency. Many atte... 详细信息
来源: 评论