咨询与建议

限定检索结果

文献类型

  • 60,366 篇 会议
  • 10,813 篇 期刊文献
  • 550 册 图书
  • 34 篇 科技报告

馆藏范围

  • 71,763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46,543 篇 工学
    • 35,846 篇 计算机科学与技术...
    • 29,894 篇 软件工程
    • 10,940 篇 信息与通信工程
    • 6,645 篇 控制科学与工程
    • 4,495 篇 电气工程
    • 4,395 篇 生物工程
    • 4,228 篇 电子科学与技术(可...
    • 3,449 篇 生物医学工程(可授...
    • 2,696 篇 光学工程
    • 2,454 篇 机械工程
    • 1,944 篇 仪器科学与技术
    • 1,833 篇 动力工程及工程热...
    • 1,779 篇 化学工程与技术
    • 1,468 篇 安全科学与工程
    • 1,341 篇 建筑学
    • 1,236 篇 交通运输工程
  • 24,284 篇 理学
    • 14,983 篇 数学
    • 5,489 篇 物理学
    • 4,918 篇 生物学
    • 4,507 篇 统计学(可授理学、...
    • 2,684 篇 系统科学
    • 1,906 篇 化学
  • 12,361 篇 管理学
    • 6,717 篇 管理科学与工程(可...
    • 6,281 篇 图书情报与档案管...
    • 3,903 篇 工商管理
  • 2,807 篇 医学
    • 2,464 篇 临床医学
    • 2,272 篇 基础医学(可授医学...
    • 1,463 篇 药学(可授医学、理...
  • 2,190 篇 法学
    • 1,832 篇 社会学
  • 1,280 篇 经济学
    • 1,278 篇 应用经济学
  • 1,169 篇 教育学
  • 916 篇 农学
  • 288 篇 文学
  • 152 篇 军事学
  • 85 篇 艺术学
  • 39 篇 哲学
  • 17 篇 历史学

主题

  • 1,772 篇 computer science
  • 1,697 篇 accuracy
  • 1,572 篇 computational mo...
  • 1,490 篇 feature extracti...
  • 1,228 篇 training
  • 1,057 篇 deep learning
  • 991 篇 machine learning
  • 841 篇 predictive model...
  • 835 篇 data mining
  • 779 篇 semantics
  • 769 篇 real-time system...
  • 734 篇 support vector m...
  • 722 篇 data models
  • 710 篇 artificial intel...
  • 675 篇 computer archite...
  • 600 篇 visualization
  • 585 篇 convolutional ne...
  • 580 篇 optimization
  • 557 篇 internet of thin...
  • 544 篇 neural networks

机构

  • 91 篇 institute of inf...
  • 84 篇 dept. of compute...
  • 83 篇 north-west unive...
  • 82 篇 dept. of compute...
  • 81 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 68 篇 institut univers...
  • 66 篇 università di ca...
  • 65 篇 dept. of compute...
  • 60 篇 dept. of compute...
  • 60 篇 national centre ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of informa...
  • 52 篇 school of automa...
  • 44 篇 dept. of compute...
  • 44 篇 leiden universit...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 37 篇 hokkaido univers...

作者

  • 97 篇 ferrara g.
  • 94 篇 ardid m.
  • 87 篇 calvo d.
  • 82 篇 chen a.
  • 75 篇 gal t.
  • 72 篇 bozza c.
  • 62 篇 ahmad jalal
  • 60 篇 kulikovskiy v.
  • 53 篇 kalekin o.
  • 41 篇 gagliardini s.
  • 40 篇 benoit d.m.
  • 40 篇 eddymaoui a.
  • 40 篇 labalme m.
  • 37 篇 díaz a.f.
  • 36 篇 androulakis g.
  • 34 篇 crawford h.j.
  • 34 篇 cafagna f.
  • 34 篇 de palma m.
  • 34 篇 huang f.
  • 33 篇 haungs a.

语言

  • 68,575 篇 英文
  • 2,470 篇 其他
  • 528 篇 中文
  • 108 篇 日文
  • 64 篇 朝鲜文
  • 11 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Data Science"
71763 条 记 录,以下是771-780 订阅
排序:
COMPOSITIONAL GENERATIVE INVERSE DESIGN  12
COMPOSITIONAL GENERATIVE INVERSE DESIGN
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Wu, Tailin Maruyama, Takashi Wei, Long Zhang, Tao Du, Yilun Iaccarino, Gianluca Leskovec, Jure Dept. of Engineering Westlake University China NEC Laboratories Europe Germany Dept. of Computer Science MIT United States Dept. of Mechanical Engineering Stanford University United States Dept. of Computer Science Stanford University United States
Inverse design, where we seek to design input variables in order to optimize an underlying objective function, is an important problem that arises across fields such as mechanical engineering to aerospace engineering.... 详细信息
来源: 评论
Formal Modeling and Verification of IoT-based Smart Transport System using SPIN Model Checker  1
Formal Modeling and Verification of IoT-based Smart Transpor...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Rashid, Muhammad Qadeer, Muhammad Raza, Husnain Shabbir, Ifra Rasool, Imran Zafar, Nazir Ahmad COMSATS University Islamabad Dept. of Computer Science Sahiwal Campus Pakistan
Transportation systems that are intelligent are developing for the benefit of travelers. The transportation business has suffered greatly as a result of advanced technology like the Internet of Things (IoT). Ensuring ... 详细信息
来源: 评论
Poster: Fuzzing for Command Injections in Medical Software with Large Language Models  2
Poster: Fuzzing for Command Injections in Medical Software w...
收藏 引用
2nd IEEE International Conference on Mobility, Operations, Services and Technologies, MOST 2024
作者: Wang, Yuxuan Guan, Qi Chen, Jingshu Oakland University Dept. of Computer Science RochesterMI United States
In the evolving landscape of medical software security, the threat of command injection looms large, with potential ramifications including compromised patient data and disrupted healthcare services. Addressing these ... 详细信息
来源: 评论
PassChain: A Blockchain-Based Decentralized Password Manager  3
PassChain: A Blockchain-Based Decentralized Password Manager
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Anik, Nur Adnan Chowdhury Hossain, Md. Sabbir Rahman, Habibur Rumpa, Ummay Khadiza Datta, Joy Nawaz, Rifat Karmoker, Sagar Khan, Md. Adib Hasan, Mahamudul East West University Dept. of Computer Science and Engineering Dhaka Bangladesh
A Nobel approach to the password management system is introduced in this paper, which is through a decentralized system named blockchain. Our goal is to secure people's passwords by providing them with a secure an... 详细信息
来源: 评论
Negation Handling and Domain Generalization in Sentiment Analysis using Machine Learning Models
Negation Handling and Domain Generalization in Sentiment Ana...
收藏 引用
2024 International Conference on Knowledge Engineering and Communication Systems, ICKECS 2024
作者: Biradar, Shrnivas Raju, G.T. Divakar, K.M. SJC Institute of Technology Dept. of Computer Science and Engineering Chikkaballapur India SJC Institute of Technology Dept. of Information Science and Engineering Chikkaballapur India
Conventional lexicon-based approaches to sentiment analysis typically lack the necessary methods to properly identify the negation window, making it impossible to model negation. An enormous increase in sentiment-rich... 详细信息
来源: 评论
Enhancing MQTT Fault Tolerance and Resilience Against Broker Failures and DoS Attacks with Decentralized Blockchain Architecture  4
Enhancing MQTT Fault Tolerance and Resilience Against Broker...
收藏 引用
4th Intelligent Cybersecurity Conference, ICSC 2024
作者: Toe, Elisee Jaafar, Fehmi University of Quebec at Chicoutimi Dept. of Math and Computer Science Quebec Canada
The MQTT (Message Queuing Telemetry Transport) protocol has become the standard for IoT (Internet of Things) communication due to its lightweight nature and efficiency. However, its centralized architecture, with a si... 详细信息
来源: 评论
Auction based Resource Allocation in Cloud Computing using Blockchain Techniques  14
Auction based Resource Allocation in Cloud Computing using B...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Kamaleshwar, T. Jayaraj, R. Vijayaraj, N. Sundaranarayana, D. Dr.Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Dept. of Computer Science & Engineering Chennai India SRM Institute of Science and technology Dept. of Data Science and Business systems Kattankulathur Chennai India
As the spine innovation of decentralized cryptocurrencies, blockchain has additionally proclaimed numerous applications in different fields, for example, resource allocation in cloud computing, Internet of Things (IoT... 详细信息
来源: 评论
Evaluating the Effectiveness of Anonymization Systems Against Website Fingerprinting Attacks Using Machine Learning Algorithms: Implementation and Countermeasures  1
Evaluating the Effectiveness of Anonymization Systems Agains...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al Azzani, Abdoulwase Shaawa, Abdulqader Dept. Computer Science and Information Technology Sana’a University Sana’a Yemen
Website Fingerprinting (WF) is a statistical traffic analysis attack, that allows a local, passive eavesdropper to determine a client’s web activity by leveraging features from her packet sequence. These attacks brea... 详细信息
来源: 评论
Financial Health Assessment for Households in Kenya
Financial Health Assessment for Households in Kenya
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Kinyanjui, Samson Lopuran, Felix Kimanga, Peter Mugoh, Edna Kiprotich, Dennis Gikunda, Patrick Dedan Kimathi University of Technology Dept. Computer Science Nyeri Kenya
The analysis of fiscal position represents significant in the encouragement of economic stability and development specifically to the country like Kenya. This work employs the clustering analysis technique in order to... 详细信息
来源: 评论
Image Captioning: Analyzing CNN-LSTM and Vision-GPT Models  9
Image Captioning: Analyzing CNN-LSTM and Vision-GPT Models
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Karthik, Abburi Sai Karthik, Maddala H. S. M. Krishna Yashwanth, Samudrala Anjali, T. Amrita Vishwa Vidyapeetham Dept. of Computer Science And Engineering Amritapuri India
Image captioning, which exists at the point of intersection of computer vision and natural language processing, is essential for enhancing image comprehension, allowing applications like content discovery, visual aid ... 详细信息
来源: 评论