咨询与建议

限定检索结果

文献类型

  • 9,292 篇 会议
  • 5,769 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,780 篇 工学
    • 6,051 篇 计算机科学与技术...
    • 4,943 篇 软件工程
    • 2,033 篇 信息与通信工程
    • 1,266 篇 控制科学与工程
    • 1,198 篇 生物工程
    • 1,191 篇 生物医学工程(可授...
    • 946 篇 电气工程
    • 853 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 564 篇 机械工程
    • 489 篇 仪器科学与技术
    • 385 篇 化学工程与技术
    • 359 篇 动力工程及工程热...
    • 308 篇 安全科学与工程
    • 266 篇 交通运输工程
    • 260 篇 建筑学
  • 5,588 篇 理学
    • 2,620 篇 数学
    • 1,898 篇 物理学
    • 1,385 篇 生物学
    • 866 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 434 篇 化学
  • 2,359 篇 管理学
    • 1,360 篇 管理科学与工程(可...
    • 1,100 篇 图书情报与档案管...
    • 745 篇 工商管理
  • 1,157 篇 医学
    • 993 篇 临床医学
    • 890 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 411 篇 公共卫生与预防医...
  • 408 篇 法学
    • 346 篇 社会学
  • 249 篇 经济学
  • 219 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 251 篇 computational mo...
  • 212 篇 computer archite...
  • 208 篇 deep learning
  • 196 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 162 篇 artificial intel...
  • 157 篇 image segmentati...
  • 156 篇 optimization
  • 151 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 126 篇 bandwidth
  • 125 篇 neural networks
  • 123 篇 monitoring
  • 121 篇 accuracy

机构

  • 412 篇 department for p...
  • 404 篇 faculty of scien...
  • 402 篇 department of ph...
  • 394 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 385 篇 department of ph...
  • 357 篇 fakultät für phy...
  • 338 篇 institute of phy...
  • 328 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 graduate school ...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 306 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 282 篇 j. schaarschmidt
  • 266 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,538 篇 英文
  • 713 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Informatics and Computer Engineering Department"
15357 条 记 录,以下是1071-1080 订阅
排序:
Carrying Out CNN Channel Pruning in a White Box
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2023年 第10期34卷 7946-7955页
作者: Zhang, Yuxin Lin, Mingbao Lin, Chia-Wen Chen, Jie Wu, Yongjian Tian, Yonghong Ji, Rongrong Xiamen University Media Analytics and Computing Laboratory Department of Artificial Intelligence School of Informatics Xiamen361005 China Youtu Laboratory Tencent Shanghai200233 China National Tsing Hua University Department of Electrical Engineering The Institute of Communications Engineering Hsinchu30013 Taiwan Peng Cheng Laboratory Shenzhen518000 China Peking University Department of Computer Science and Technology Beijing100871 China School of Informatics and the Institute of Artificial Intelligence Xiamen University Media Analytics and Computing Laboratory Department of Artificial Intelligence Xiamen361005 China
Channel pruning has been long studied to compress convolutional neural networks (CNNs), which significantly reduces the overall computation. Prior works implement channel pruning in an unexplainable manner, which tend... 详细信息
来源: 评论
Preliminary Study on the Reproducibility of Fix Templates in Static Analysis Tool  35
Preliminary Study on the Reproducibility of Fix Templates in...
收藏 引用
35th IEEE International Conference on Software engineering Education and Training, CSEE and T 2023
作者: Kim, Sohyun Kim, Youngkyoung Lee, Eunseok Sungkyunkwan University Department of Software Suwon Korea Republic of Sungkyunkwan University Department of Electrical and Computer Engineering Suwon Korea Republic of Sungkyunkwan University College of Computing and Informatics Suwon Korea Republic of
Automated Program Repair (APR) automatically generates patches for identified defects. As a result, APR can encourage novice students to learn coding by providing appropriate patches. Since students have their coding ... 详细信息
来源: 评论
Diffusion Model for Camouflaged Object Detection  26
Diffusion Model for Camouflaged Object Detection
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Chen, Zhennan Gao, Rongrong Xiang, Tian-Zhu Lin, Fan School of Informatics Xiamen University Xiamen China Department of Computer Science and Engineering Hkust Hong Kong G42 Abu Dhabi United Arab Emirates
Camouflaged object detection is a challenging task that aims to identify objects that are highly similar to their background. Due to the powerful noise-to-image denoising capability of denoising diffusion models, in t... 详细信息
来源: 评论
Password Manager with Multi-Factor Authentication  1
Password Manager with Multi-Factor Authentication
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Vijayaraghavan, N. Narasimhan, S. Basha, Saleem Vellore Institute of Technology School of Computer Science and Engineering Chennai India KCG College of Technology Department of Mathematics Chennai India Mazoon University College Computing and Informatics Department muscat Oman
Data breach is a serious issue as it leaks the personal information of more than billions of users and their privacy is compromised. More than 77% of organizations do not have a Cyber Security Incident Response plan. ... 详细信息
来源: 评论
Bibliometric and Content Analysis of Large Language Models Research in Software engineering: The Potential and Limitation in Software engineering
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 344-356页
作者: Damayanti, Annisa Dwi Gani, Hamdan Zhipeng, Feng Gani, Helmy Zuhriyah, Sitti Nurani Djabir, St. Nurhayati Wardani, Nur Ilmiyanti Department of Environmental Engineering Faculty of Engineering Hasanuddin University Makassar Indonesia Department of Machinery Automation System ATI Makassar Polytechnic Makassar Indonesia School of Culture Creativity and Media Hangzhou Normal University Zhejiang Hangzhou China Department of Industrial Hygiene Faculty of Public Health Occupational Health and Safety Makassar College of Health Sciences Indonesia Department of Computer System Universitas Handayani Makassar Makassar Indonesia Department of Information Systems and Technology Institut Teknologi dan Bisnis Nobel Indonesia Jl. Sultan Alauddin No.212 Makassar90221 Indonesia Department of Informatics Engineering Universitas Handayani Makassar Makassar Indonesia
Large Language Models (LLM) is a type of artificial neural network that excels at language-related tasks. The advantages and disadvantages of using LLM in software engineering are still being debated, but it is a tool... 详细信息
来源: 评论
A Review of the Method of Auxiliary Sources (MAS) in Applied Electromagnetics  25
A Review of the Method of Auxiliary Sources (MAS) in Applied...
收藏 引用
25th International Conference on Electromagnetics in Advanced Applications, ICEAA 2024
作者: Anastassiu, Hristos T. Papakanellos, Panagiotis J. Tsitsas, Nikolaos L. Department of Computer Informatics and Telecommunications Engineering International Hellenic University End of Magnisias Str. SerresGR-62124 Greece Department of Aeronautical Sciences Hellenic Air Force Academy Dekeleia Air Force Base Dekeleia AthensGR-13671 Greece School of Informatics Aristotle University of Thessaloniki ThessalonikiGR-54124 Greece
The Method of Auxiliary Sources (MAS) is a broadly used numerical technique, purposely designed for the solution of elliptic boundary value problems in Physics and engineering, including Electromagnetics (EM). Superfi... 详细信息
来源: 评论
Secure mmWave-NOMA Multi-BS Vehicular Communications Using Cooperative Jamming
Secure mmWave-NOMA Multi-BS Vehicular Communications Using C...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Yan, Yiting Ju, Ying Hu, Jiawei Liu, Lei Pei, Qingqi Yau, Kok-Lim Alvin Wu, Celimuge Zhang, Ning Xidian University School of Telecommunications Engineering Xi'an710071 China Universiti Tunku Abdul Rahman School of Internet Engineering and Computer Science Selangor 43200 Malaysia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan University of Windsor Department of Electrical and Computer Engineering WindsorN9B-3P4 Canada
The fronthaul network architecture is the key to dealing with the massive traffic effectively and providing high-quality service, and the multiple base stations (BSs) deployed by it face the gigantic data transmission... 详细信息
来源: 评论
Blockchain-based Security for Cloud Data Storage  9
Blockchain-based Security for Cloud Data Storage
收藏 引用
9th IEEE International Conference on Smart Instrumentation, Measurement and Applications, ICSIMA 2023
作者: Bin Idrus, Mohammad Ariff Zakwan Rahman, Farah Diyana Abdul Khalifa, Othman Omran Yusoff, Nelidya Md Islamic University Malaysia Department of Electrical and Computer Engineering International Kuala Lumpur Malaysia Universiti Teknologi Malaysia Razak Faculty of Technology and Informatics Kuala Lumpur Malaysia
Data Cloud Storage is a service that allows data to save data on offsite storage system and managed by third-party and is made accessible by a web services user. It has become one of the most convenient and efficient ... 详细信息
来源: 评论
An Efficient and Lightweight Commitment Scheme for IoT Data Streams  19
An Efficient and Lightweight Commitment Scheme for IoT Data ...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Plagianakos, Vassilis Spathoulas, Georgios University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece University of the Aegean Department of Information and Communication Systems Engineering Samos Greece Department of Information Security and Communication Technology Gjøvik Norway
Data integrity is a crucial property for offering Internet of Things (IoT) services. Usually, this is achieved by assuming a high level of trust in the service provider, a practice that induces negative implications. ... 详细信息
来源: 评论
A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm  1
A Logical Investigation of Stock Market Prediction and Analy...
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Kumar, V. Vasantha Basha, Saleem Vijayaraghavan, N. Vellore Institute of Technology School of Computer Science and Engineering Chennai India Mazoon University College Computing and Informatics Department Muscat Oman KCG College of Technology Department of CSE Chennai India
In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of human... 详细信息
来源: 评论