咨询与建议

限定检索结果

文献类型

  • 30,898 篇 会议
  • 4,719 篇 期刊文献
  • 247 册 图书

馆藏范围

  • 35,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,226 篇 工学
    • 16,162 篇 计算机科学与技术...
    • 13,579 篇 软件工程
    • 5,873 篇 信息与通信工程
    • 3,524 篇 控制科学与工程
    • 2,708 篇 电子科学与技术(可...
    • 2,658 篇 电气工程
    • 2,356 篇 生物工程
    • 1,889 篇 生物医学工程(可授...
    • 1,536 篇 光学工程
    • 1,371 篇 机械工程
    • 1,229 篇 动力工程及工程热...
    • 1,205 篇 仪器科学与技术
    • 1,024 篇 化学工程与技术
    • 866 篇 安全科学与工程
    • 727 篇 交通运输工程
  • 11,359 篇 理学
    • 6,206 篇 数学
    • 3,065 篇 物理学
    • 2,581 篇 生物学
    • 2,049 篇 统计学(可授理学、...
    • 1,357 篇 系统科学
    • 1,092 篇 化学
  • 5,788 篇 管理学
    • 3,371 篇 管理科学与工程(可...
    • 2,701 篇 图书情报与档案管...
    • 1,876 篇 工商管理
  • 1,595 篇 医学
    • 1,387 篇 临床医学
    • 1,293 篇 基础医学(可授医学...
    • 850 篇 药学(可授医学、理...
    • 670 篇 公共卫生与预防医...
  • 1,064 篇 法学
    • 858 篇 社会学
  • 671 篇 经济学
    • 671 篇 应用经济学
  • 488 篇 农学
  • 443 篇 教育学
  • 160 篇 文学
  • 77 篇 军事学
  • 40 篇 艺术学
  • 1 篇 哲学

主题

  • 1,135 篇 accuracy
  • 870 篇 computational mo...
  • 854 篇 feature extracti...
  • 738 篇 deep learning
  • 717 篇 training
  • 687 篇 computer science
  • 555 篇 real-time system...
  • 542 篇 machine learning
  • 521 篇 support vector m...
  • 469 篇 predictive model...
  • 424 篇 internet of thin...
  • 367 篇 data models
  • 358 篇 convolutional ne...
  • 345 篇 computer archite...
  • 339 篇 reliability
  • 322 篇 optimization
  • 302 篇 data mining
  • 278 篇 routing
  • 260 篇 artificial intel...
  • 253 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 64 篇 dept. of informa...
  • 60 篇 dept. of informa...
  • 57 篇 nikhef national ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of compute...
  • 53 篇 dept. of compute...
  • 52 篇 school of automa...
  • 50 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 44 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 76 篇 boumaaza j.
  • 74 篇 coleiro a.
  • 74 篇 gozzini s.r.
  • 71 篇 huang f.
  • 68 篇 dallier r.
  • 61 篇 anguita m.
  • 54 篇 kulikovskiy v.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 41 篇 del burgo r.

语言

  • 32,095 篇 英文
  • 3,365 篇 其他
  • 300 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Software Engineering and Computer Science"
35864 条 记 录,以下是991-1000 订阅
排序:
software Effort Estimation using ANN (Back Propagation)  7
Software Effort Estimation using ANN (Back Propagation)
收藏 引用
7th International Conference on Computing Methodologies and Communication, ICCMC 2023
作者: Ravi Kumar, B.N. Suresh, Yeresime Dept. of Computer Science and Engineering BMS Institute of Technology and Management Bangalore India Dept. of Computer Science and Engineering Ballari Institute of Technology and Management Ballari India
Project managers often use Effort Estimating strategies to manage the human resources of current or upcoming software projects. Prior to project implementation, cost, time, and personnel estimation are basically neces... 详细信息
来源: 评论
Heuristic approaches for hiding sensitive frequent itemsets in uncertain databases  5
Heuristic approaches for hiding sensitive frequent itemsets ...
收藏 引用
5th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2023
作者: Lefkir, Mira Nouioua, Farid Fournier-Viger, Phillipe University Mohamed El Bachir El Ibrahimi of Bordj Bou Arreridj BBA Dept. of Computer Science Algeria Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto... 详细信息
来源: 评论
The Low-Complexity Timing Synchronization Circuits for IEEE 802.15.4a/z IR-UWB Systems  6
The Low-Complexity Timing Synchronization Circuits for IEEE ...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2024
作者: Wang, Kuan-Wei Shen, Chung-An Huang, Chin-Ya National Taiwan University of Science and Technology Electronic and Computer Engineering Dept. Taipei Taiwan
This paper presents the design and implementation of a low-complexity timing synchronization circuit for the IEEE 802.15.4a/z IR-UWB wireless communication standard. The circuit structure of a low-complexity correlato... 详细信息
来源: 评论
JARVIS - Smart AI Support System  3
JARVIS - Smart AI Support System
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Ramya Manaswi, V. Saketh, Meduri Ravi Tejha, Mandumula Sai Karthikeya, Atluri Sai Prakash, Dharani Chandra Alkhayyat, Ahmad Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science Engineering Hyderabad India Gitam University Dept. of Computer Science Engineering with Specialisation of Cybersecurity Hyderabad India K.G Reddy College of Engineering and Technology Dept. of Electronics & Communication Engineering Telangana Hyderabad India College of Technical Engineering The Islamic University Dept. of Computers Techniques Engineering Najaf Iraq
The JARVIS AI Support System represents a remarkable fusion of modern technology, blending a sophisticated GUI design, seamless voice control, and inventive features like the captivating 'Air Canvas' facilitat... 详细信息
来源: 评论
Federated Learning for Cybersecurity: A Promising Frontier  2
Federated Learning for Cybersecurity: A Promising Frontier
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Ananya, G. Bindu Madhavi, V. Murthy, Monisha Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India Buddha Institute of Technology Computer Science and Engineering Uttar Pradesh Gorakhpur India
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat... 详细信息
来源: 评论
Experimental Validation of Blockchain Based Triple Branch MRC for Secured Communication in Adverse Fading Conditions
Experimental Validation of Blockchain Based Triple Branch MR...
收藏 引用
2024 IEEE Region 10 Symposium, TENSYMP 2024
作者: Upadhyay, Deepak Upadhyay, Abhay Gupta, Mridul Sharma, Kunj Bihari Maindola, Meenakshi Garg, Shobhit Graphic Era Hill University Dept. of Computer Science and Engineering Dehradun India Graphic Era Deemed to be University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Electronics and Communication Engineering Dehradun India Graphic Era Deemed to be University Dept. of Management Studies Dehradun India
The investigation in this study entails integrating blockchain technology with maximal ratio combining in a triple branch configuration for secure communications under multipath fading conditions. The proposed combine... 详细信息
来源: 评论
Towards Robust mmWave-based Human Activity Recognition using Large Simulated Dataset for Model Pretraining
Towards Robust mmWave-based Human Activity Recognition using...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Joshi, Vinay Xu, Shengkai Cao, Qiming Zhu, Yi Wang, Pu Xue, Hongfei Unc Charlotte Dept. of Computer Science Charlotte United States Purdue University Electrical and Computer Engineering West Lafayette United States Wayne State University Dept. of Computer Science Detroit United States
Human activity recognition (HAR) is crucial for real-world applications such as healthcare, surveillance, and smart homes. Among sensing technologies, millimeter wave (mmWave) sensors stand out due to their contactles... 详细信息
来源: 评论
A New Proposed Hybrid Page Replacement Algorithm (HPRA) in Real Time Systems.  5
A New Proposed Hybrid Page Replacement Algorithm (HPRA) in R...
收藏 引用
5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Banerjee, Pallab Raj, Vivek Thakur, Kanika Kumar, Biresh Dehury, Mohan Kumar Amity University Jharkhand Dept. of Computer Science Engineering Ranchi India Amity University Jharkhand Dept. of Computer Science and It Ranchi India
Programming code is variable length. As code size grows larger than primary memory, virtual memory is a relevant concept. As the concept suggests, virtual memory allows to extend primary storage usage with storage dev... 详细信息
来源: 评论
Electronic health records protection strategy by using blockchain approach
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86883-86894页
作者: Kathole, Atul B. Patil, Sonali D. Kumbhare, Savita Vhatkar, Kapil Kshirsagar, Aniruddha P. Kimbahune, Vinod V. Computer Engineering Dr. D. Y. Patil Institute of Technology Pune India IT Dept. Pimpri Chinchwad College of Engineering Pune India Computer Science and Engineering Department K.B.P College of Engineering Satara Satara India
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen... 详细信息
来源: 评论