咨询与建议

限定检索结果

文献类型

  • 34,781 篇 会议
  • 5,320 篇 期刊文献
  • 275 册 图书

馆藏范围

  • 40,376 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,889 篇 工学
    • 17,858 篇 计算机科学与技术...
    • 14,903 篇 软件工程
    • 6,644 篇 信息与通信工程
    • 4,125 篇 控制科学与工程
    • 3,080 篇 电子科学与技术(可...
    • 2,915 篇 电气工程
    • 2,647 篇 生物工程
    • 2,149 篇 生物医学工程(可授...
    • 1,710 篇 光学工程
    • 1,656 篇 机械工程
    • 1,519 篇 仪器科学与技术
    • 1,406 篇 动力工程及工程热...
    • 1,130 篇 化学工程与技术
    • 1,020 篇 安全科学与工程
    • 848 篇 交通运输工程
    • 795 篇 网络空间安全
  • 12,448 篇 理学
    • 6,670 篇 数学
    • 3,378 篇 物理学
    • 2,902 篇 生物学
    • 2,229 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,214 篇 化学
  • 6,560 篇 管理学
    • 3,932 篇 管理科学与工程(可...
    • 2,966 篇 图书情报与档案管...
    • 2,022 篇 工商管理
  • 1,919 篇 医学
    • 1,608 篇 临床医学
    • 1,494 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 857 篇 公共卫生与预防医...
  • 1,243 篇 法学
    • 1,014 篇 社会学
  • 743 篇 经济学
  • 572 篇 农学
  • 504 篇 教育学
  • 214 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,346 篇 accuracy
  • 1,023 篇 feature extracti...
  • 986 篇 computational mo...
  • 930 篇 deep learning
  • 823 篇 training
  • 783 篇 computer science
  • 707 篇 real-time system...
  • 682 篇 machine learning
  • 633 篇 support vector m...
  • 571 篇 predictive model...
  • 508 篇 internet of thin...
  • 495 篇 convolutional ne...
  • 451 篇 data models
  • 401 篇 reliability
  • 358 篇 data mining
  • 351 篇 computer archite...
  • 348 篇 optimization
  • 337 篇 artificial intel...
  • 312 篇 routing
  • 312 篇 wireless sensor ...

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 68 篇 tno technical sc...
  • 66 篇 università di ca...
  • 60 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 50 篇 nikhef national ...
  • 47 篇 dept. of compute...
  • 47 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 79 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 76 篇 boumaaza j.
  • 74 篇 coleiro a.
  • 68 篇 gozzini s.r.
  • 67 篇 huang f.
  • 57 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 50 篇 anguita m.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,295 篇 英文
  • 5,627 篇 其他
  • 360 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
40376 条 记 录,以下是1261-1270 订阅
排序:
Modular Deep Reinforcement Learning: Enhancing Flexibility through Agent Splitting
Modular Deep Reinforcement Learning: Enhancing Flexibility t...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Tian, Chong Rawat, Danda B. Howard University Dept. of Electrical Engineering & Computer Science WashingtonDC United States
Deep reinforcement learning (DRL) has shown remarkable success in tackling complex tasks by learning representations directly from raw data. However, as DRL agents become increasingly sophisticated, they often face ch... 详细信息
来源: 评论
Flex Sensor Data Analysis for Hand Rehabilitation using Wearable Glove  3
Flex Sensor Data Analysis for Hand Rehabilitation using Wear...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Thangam, S. Reddy, Anusha C. Varun, Ginnaram Hemasri, M. Virupaxappa Kumari, J. Jesy Janet Amrita Vishwa Vidyapeetham Amrita School of Computing Dept of Computer Science and Engineering Bengaluru India
Every day we encounter many people with unexpected situations where they suffer from many neuropathological diseases that cause a severe impact on the daily lives of individuals, especially about hand movements, there... 详细信息
来源: 评论
Reverse Video Search Engine Using Audio Fingerprint & Convolutional Neural Networks  22
Reverse Video Search Engine Using Audio Fingerprint & Convol...
收藏 引用
22nd OITS International Conference on Information Technology, OCIT 2024
作者: Traore, Adama Seydou Dept. of Computer science & engineering SRM University AP Andhra Pradesh Amaravati India
Nowadays, at the time of social networks such as Facebook, Instagram, TikTok, Twitter (X), and so on, people are uploading hundreds of thousands of data, including images and videos, every single day. This volume crea... 详细信息
来源: 评论
Secure Fuzzy Keyword Search in Cloud Computing using Levenshtein Distance and Cryptographic Indexing  5
Secure Fuzzy Keyword Search in Cloud Computing using Levensh...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Jahnavi, M. Haritha, K. Gowtham, R.S.V. Rajgopal, Shinu M. Amrita Vishwa Vidyapeetham Amrita School of Computing Dept of Computer Science and Engineering Bengaluru India
Growing usage of the cloud for computing, the necessity for safe and security storage and retrieval of information procedures has become important. This study provides a novel way to tackle the difficulty of searching... 详细信息
来源: 评论
Advancing Image Forgery Detection: A CNN-Based Approach  8
Advancing Image Forgery Detection: A CNN-Based Approach
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Nalini, N. Rakshitha, Sai Nithyashree, H.V. Rakshitha, S.L. Shravan, Motamarri Sai Uttej, K Sai Nitte Meenakshi Institute of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India
In the digital age, image forgery is a significant concern due to advanced editing tools. This study addresses the need for reliable forgery detection, focusing on copy-move, splicing, and retouching techniques. Using... 详细信息
来源: 评论
SafeSync: A Comprehensive Safety and Monitoring System for Two-Wheeler Users Using Machine Learning, ESP32, GPS, and GSM  6
SafeSync: A Comprehensive Safety and Monitoring System for T...
收藏 引用
6th IEEE International Conference on Recent Advances in Intelligent Computational Systems, RAICS 2024
作者: Sunil, K.S. Adithyan, P. Krishnan, Anjana Hashim Sharaf, C.P. Paul, Jerin John, Salvi Hanna Government Engineering College Dept. of Computer Science & Engg. Kerala Idukki India
Our work, 'SafeSync' proposes a complete safety and monitoring system aimed to address the considerable hazards encountered by two-wheeler users, such as accidents and rash driving scenarios. Unlike other syst... 详细信息
来源: 评论
Reference-based Burst Super-resolution  24
Reference-based Burst Super-resolution
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ko, Seonggwan Koh, Yeong Jun Cho, Donghyeon Dept. of Electronics Engineering Chungnam National University Daejeon Korea Republic of Dept. of Computer Science & Engineering Chungnam National University Daejeon Korea Republic of Dept. of Computer Science Hanyang University Seoul Korea Republic of
Burst super-resolution (BurstSR) utilizes signal information from multiple adjacent frames successively taken to restore rich textures. However, due to hand tremors and other image degradation factors, even recent Bur... 详细信息
来源: 评论
Using Blockchain for Incentive-Driven FHIR-based Health Record Exchange  24
Using Blockchain for Incentive-Driven FHIR-based Health Reco...
收藏 引用
39th Annual ACM Symposium on Applied Computing, SAC 2024
作者: Rosar, Moritz Chuang, Kun-Ta Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan
Medical data is highly sensitive data, and patients are particularly concerned about the exposure of their identities [1]. A study found that 64% of participants were agreeable to sharing their health data when anonym... 详细信息
来源: 评论
Deep Learning based approach for detection of Resource Depletion Attacks in 5G Networks  5
Deep Learning based approach for detection of Resource Deple...
收藏 引用
5th IEEE India Council International Subsections Conference, INDISCON 2024
作者: Sharma, M V Sri Shiva Shourya Tilak Venkata Sai, M. Sankaran, Sriram Amrita Vishwa Vidyapeetham Electronics and Computer Engineering Dept.of Electronics and Communications Kollam India Amrita Vishwa Vidyapeetham Center for Cybersecurity Systems and Networks Kollam India
Resource Depletion Attacks pose significant challenges to the stability and efficiency of 5G networks, with potential repercussions on service availability, network performance, and user experience. This problem is mo... 详细信息
来源: 评论
Multi-Trajectory Drone Surveillance: Amplifying Monitoring Capabilities in Disaster Management
Multi-Trajectory Drone Surveillance: Amplifying Monitoring C...
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2024
作者: Mourya, Gojja Sree Jami, Abhinav Ajith, Abhinav Seikh, Ayan Habib Kumar, J. Sathish Motilal Nehru National Institute of Technology Dept. of Computer Science and Engineering Allahabad India
In the disaster-affected area, whether it's a search and rescue operation, mock drill, managing food distribution, issuing warnings or anything else, the key to successfully carrying out these activities is prepar... 详细信息
来源: 评论