咨询与建议

限定检索结果

文献类型

  • 34,403 篇 会议
  • 5,316 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,669 篇 工学
    • 17,660 篇 计算机科学与技术...
    • 14,804 篇 软件工程
    • 6,542 篇 信息与通信工程
    • 3,979 篇 控制科学与工程
    • 3,048 篇 电子科学与技术(可...
    • 2,866 篇 电气工程
    • 2,641 篇 生物工程
    • 2,131 篇 生物医学工程(可授...
    • 1,694 篇 光学工程
    • 1,620 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,110 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 750 篇 网络空间安全
  • 12,355 篇 理学
    • 6,617 篇 数学
    • 3,357 篇 物理学
    • 2,898 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,190 篇 化学
  • 6,430 篇 管理学
    • 3,831 篇 管理科学与工程(可...
    • 2,915 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,481 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 801 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 497 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,290 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 871 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 641 篇 machine learning
  • 616 篇 support vector m...
  • 550 篇 predictive model...
  • 497 篇 internet of thin...
  • 470 篇 convolutional ne...
  • 434 篇 data models
  • 382 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 316 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 62 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 68 篇 huang f.
  • 68 篇 gozzini s.r.
  • 58 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,786 篇 英文
  • 1,737 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39991 条 记 录,以下是4941-4950 订阅
排序:
Cybersecurity for Industrial IoT: A Review on Vulnerabilities and Attacks
Cybersecurity for Industrial IoT: A Review on Vulnerabilitie...
收藏 引用
International Conference on Electronics, Materials engineering and Nano-Technology (IEMENTech)
作者: Reetu Kumari Sunil Kumar Amandeep Kamlesh Dutta Aparna Kumari Dept. of Computer Science & Engineering Guru Jambheshwar University of Science and Technology Hisar (Haryana) India Dept. of AI & Data Science Guru Jambheshwar University of Science and Technology Hisar Haryana India Dept. of Computer Science & Engineering National Institute of Technology Hamirpur Himachal Pardesh India Dept. of Computer Science & Engineering Institute of Technology Nirma University Ahmedabad Gujarat India
Internet has evolved from a network of connecting people to a network of connecting things, leading to a more complex and sophisticated network of Industrial Things, known as Industrial IoT (IIoT) today. This evolutio... 详细信息
来源: 评论
AutoFlows: Inferring Message Flows from System Communication Traces
AutoFlows: Inferring Message Flows from System Communication...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Bardia Nadimi Hao Zheng Dept. Computer Science and Engineering University of South Florida Tampa United States
This paper proposes a novel method for automatically inferring message flow specifications from the communication traces of a system-on-chip (SoC) design that captures messages exchanged among the components during a ... 详细信息
来源: 评论
A Design Framework for Preserving Cultural Heritage with AR Technology—An Innovative Exploration on Ethnic Motifs and Its Symbolism of the Naga Tribes  9th
A Design Framework for Preserving Cultural Heritage with AR ...
收藏 引用
9th International Conference on Research into Design, ICoRD 2023
作者: Roy, Susmita Singh, Pankaj Pratap Padun, Abhijit Dept. of Multimedia Communication and Design CIT Kokrajhar Assam BTAD Kokrajhar India Dept. of Computer Science and Engineering CIT Kokrajhar Assam BTAD Kokrajhar India
The strong sense of immersion and interaction of advanced technology have an immense contribution towards cultural preservation in this digital era. Presently, the augmented technology is preferable and very popular f... 详细信息
来源: 评论
Leveraging Artificial Intelligence for Colon Cancer: Trends, Challenges and Innovations
Leveraging Artificial Intelligence for Colon Cancer: Trends,...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Sakshi Takkar Manik Rakhra Dept. of Computer Science and Engineering Lovely Professional University Phagwara Punjab India
Artificial Intelligence (AI) has made huge enhancements in colon cancer research through its methods for diagnosis, treatment, and custom detection of one of the most common and fatal cancers suffered globally. Throug... 详细信息
来源: 评论
Unraveling Customer Sentiment in Indian Fashion E-Commerce: A BERT-Based Approach
Unraveling Customer Sentiment in Indian Fashion E-Commerce: ...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Oneeka Taneja Kuppili Raja Satya Alpana Deepa C Rathod Anaum Fathima M R Vishalakshi Prabhu H Computer Science (Data Science) R. V. College of Engineering Bangalore India Dept. of Computer Science R. V. College of Engineering Bangalore India
With the surge of e-commerce growth in India, it has become very necessary for brands to understand the sentiments of customers so that they can improve their offerings and remain in competition. In this study, the tr... 详细信息
来源: 评论
Advancing Phishing Detection with Random Forest: A Machine Learning Approach for Enhanced Cybersecurity
Advancing Phishing Detection with Random Forest: A Machine L...
收藏 引用
International Symposium on Advanced Computing and Communication (ISACC)
作者: Sucheta Chandra Priyanka Das Ankita Mandal Sriparno Chakroborty Ishika Chowdhury Kathamrita Ghosh Dept. of Computer Application and Science Institute of Engineering & Management University of Engineering & Management Kolkata India
Phishing attacks remain a critical threat to cybersecurity, leveraging deception to steal sensitive information from individuals and organizations. Traditional detection methods often fail to keep up with evolving phi... 详细信息
来源: 评论
Adaptive Privacy and Lightweight Security in Healthcare IoT: Challenges, Solutions and Future Directions
Adaptive Privacy and Lightweight Security in Healthcare IoT:...
收藏 引用
Innovation in Computing and engineering (ICE), International Conference on
作者: Mukul Chauhan Tayyab Khan Dept. of Computer Science & Engineering Indian Institute of Information Technology Sonepat India
IoT in healthcare has transformed patient care by enabling and implementing the real-time monitoring for the end patients or users. However, the development of connected devices introduces significant privacy and secu... 详细信息
来源: 评论
An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments  5
An Efficient Authenticated Group Key Agreement Protocol for ...
收藏 引用
5th IEEE International Conference on Networking and Advanced Systems, ICNAS 2021
作者: Ayad, Anfal Hammal, Youcef University of Sciences and Technology Houari Boumediene Lsi Dept.of Computer Science Bab Ezzouar Algeria
Unmanned aerial vehicle (UAV) fleets are the focus of various nations nowadays. Thus, it is expected to witness an explosion of reliability and safety critical UAV-based applications. Moreover, the recent surge of res... 详细信息
来源: 评论
A Synergistic Approach to Detect Malicious Behaviour through Correlation-Based Feature Selection with Deep Learning
A Synergistic Approach to Detect Malicious Behaviour through...
收藏 引用
International Conference on Electrical, computer and Communication engineering (ECCE)
作者: Fahad Hossain Mohammad Nafizul Islam Md. Ariful Islam Mohammed Mushfiq Ali Fahim Muntasir Md. Mahiuddin Dept. of Computer Science & Engineering International Islamic University Chittagong Chattogram Bangladesh
Malware presents a persistent cybersecurity threat by infiltrating systems to steal sensitive data. Detecting malware traffic is challenging due to its consistent asymmetry, distinguishing it from benign traffic. This... 详细信息
来源: 评论
Angle covers: Algorithms and complexity
收藏 引用
Journal of Graph Algorithms and Applications 2021年 第2期25卷 643-661页
作者: Evans, William Gethner, Ellen Spalding-Jamieson, Jack Wolff, Alexander Dept of Computer Science Univ of British Columbia VancouverBC Canada Dept of Computer Science and Engineering University of Colorado Denver United States Universität Würzburg Würzburg Germany
Consider a graph with a rotation system, namely, for every vertex, a circular ordering of the incident edges. Given such a graph, an angle cover maps every vertex to a pair of consecutive edges in the ordering - an an... 详细信息
来源: 评论