咨询与建议

限定检索结果

文献类型

  • 109,196 篇 会议
  • 53,819 篇 期刊文献
  • 1,573 册 图书

馆藏范围

  • 164,587 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 95,683 篇 工学
    • 59,889 篇 计算机科学与技术...
    • 48,371 篇 软件工程
    • 22,569 篇 信息与通信工程
    • 16,761 篇 控制科学与工程
    • 14,179 篇 电气工程
    • 13,115 篇 电子科学与技术(可...
    • 10,966 篇 生物工程
    • 8,780 篇 生物医学工程(可授...
    • 8,391 篇 光学工程
    • 7,476 篇 机械工程
    • 7,140 篇 化学工程与技术
    • 5,844 篇 动力工程及工程热...
    • 5,803 篇 仪器科学与技术
    • 5,781 篇 材料科学与工程(可...
    • 4,319 篇 网络空间安全
    • 3,972 篇 安全科学与工程
  • 57,278 篇 理学
    • 25,612 篇 数学
    • 20,750 篇 物理学
    • 12,709 篇 生物学
    • 8,505 篇 统计学(可授理学、...
    • 7,526 篇 化学
    • 6,272 篇 系统科学
  • 23,775 篇 管理学
    • 15,292 篇 管理科学与工程(可...
    • 9,554 篇 图书情报与档案管...
    • 7,029 篇 工商管理
  • 8,966 篇 医学
    • 7,281 篇 临床医学
    • 6,495 篇 基础医学(可授医学...
    • 3,993 篇 药学(可授医学、理...
    • 3,850 篇 公共卫生与预防医...
  • 4,466 篇 法学
    • 3,688 篇 社会学
  • 2,906 篇 经济学
  • 2,644 篇 农学
  • 1,435 篇 教育学
  • 688 篇 文学
  • 398 篇 军事学
  • 182 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,274 篇 accuracy
  • 4,423 篇 deep learning
  • 3,946 篇 computer science
  • 3,934 篇 feature extracti...
  • 3,597 篇 computational mo...
  • 3,548 篇 machine learning
  • 3,255 篇 training
  • 2,661 篇 convolutional ne...
  • 2,595 篇 real-time system...
  • 2,477 篇 predictive model...
  • 2,345 篇 support vector m...
  • 2,168 篇 internet of thin...
  • 2,050 篇 artificial intel...
  • 2,008 篇 optimization
  • 1,802 篇 neural networks
  • 1,799 篇 data models
  • 1,559 篇 security
  • 1,495 篇 data mining
  • 1,445 篇 computer archite...
  • 1,386 篇 wireless sensor ...

机构

  • 2,255 篇 chitkara univers...
  • 1,109 篇 university of ch...
  • 1,088 篇 cavendish labora...
  • 1,006 篇 department of ph...
  • 956 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 610 篇 infn laboratori ...
  • 608 篇 infn sezione di ...
  • 581 篇 infn sezione di ...
  • 553 篇 infn sezione di ...
  • 541 篇 school of physic...
  • 537 篇 fakultät physik ...
  • 534 篇 horia hulubei na...
  • 533 篇 school of comput...
  • 522 篇 department of ph...
  • 520 篇 school of physic...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 495 篇 stfc rutherford ...
  • 479 篇 nikhef national ...

作者

  • 260 篇 j. wang
  • 258 篇 barter w.
  • 250 篇 a. gomes
  • 240 篇 c. alexa
  • 237 篇 j. m. izen
  • 233 篇 blake t.
  • 229 篇 s. chen
  • 226 篇 c. amelung
  • 225 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 216 篇 beiter a.
  • 211 篇 bencivenni g.

语言

  • 133,516 篇 英文
  • 28,957 篇 其他
  • 2,218 篇 中文
  • 320 篇 日文
  • 44 篇 德文
  • 37 篇 法文
  • 27 篇 斯洛文尼亚文
  • 20 篇 朝鲜文
  • 8 篇 俄文
  • 5 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute for Systems and Computer Engineering Technology and Science"
164588 条 记 录,以下是641-650 订阅
排序:
Leveraging Network Slicing in SDNs for Handling Application Failures
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第4期51卷 409-421页
作者: Lokesh, Bommareddy Rajagopalan, Narendran School of Computer Science and Engineering VIT-AP University Andhra Pradesh Amaravati522237 India Department of Computer Science and Engineering National Institute of Technology Puducherry Karaikal609609 India
Unlike traditional networks, Software-defined networks (SDNs) provide an overall view and centralized control of all the devices in the network. SDNs enable the network administrator to implement the network policy by... 详细信息
来源: 评论
TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing  24
TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Wu, Jinting Zheng, Haodong Wang, Yu Yue, Tai Zhang, Fengwei Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology China Department of Computer Science and Engineering Southern University of Science and Technology China
Hardware-based tracing, being efficient, can be a good alternative to the computationally-expensive software-based instrumentation in binary-only greybox fuzzing. However, it only records all branches within a specifi... 详细信息
来源: 评论
Analysis of Software Trustworthiness Based on FAHP-CRITIC Method
收藏 引用
Journal of Shanghai Jiaotong university(science) 2024年 第3期29卷 588-600页
作者: 高晓彤 马艳芳 周伟 School of Computer Science and Technology Huaibei Normal UniversityHuaibei 235000AnhuiChina School of Computer Science and Information Engineering Changzhou Institute of TechnologyChangzhou 213000JiangsuChina
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua... 详细信息
来源: 评论
Autonomous embodied navigation task generation from natural language dialogues
收藏 引用
science China(Information sciences) 2025年 第5期68卷 119-132页
作者: Haifeng XU Yongchang LI Lumeng MA Chunwen LI Yanzhi DONG Xiaohu YUAN Huaping LIU Department of Automation Tsinghua University School of Physics and Electronic Information Yantai University School of Electrical and Electronic Engineering Shanghai Institute of Technology Department of Computer Science and Technology Tsinghua University
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte... 详细信息
来源: 评论
Deep learning based predicting urban traffic congestion with RGB-coded images using GRU-CNN and LSTM
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86261-86280页
作者: P, Rajesh Azhagiri, M. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Campus Tamil Nadu Chennai600 089 India
Road traffic management requires the ability to foresee geographical congestion conditions in an urban road traffic network. The proposed investigation is aimed to envisage the presence of blockage in a specific regio... 详细信息
来源: 评论
District-Level Rainfall and Cloudburst Prediction Using XGBoost: A Machine Learning Approach for Early Warning systems
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第2期49卷 375-396页
作者: Kumar, Guru Dayal Tyagi, Shekhar Pradhan, Kalandi Charan Shah, Akshat Migration and Development Research Group School of Humanities and Social Sciences Indian Institute of Technology Indore452020 India Department of Computer Science and Engineering Indian Institute of Technology Indore452020 India Department of Computer Science and Engineering Shri Ramdeobaba College of Engineering and Management Nagpur440001 India
This research presents a novel methodology for cloudburst forecasting using the XGBoost (Extreme Gradient Boosting) machine learning algorithm. With the escalating impact of climate change, accurately predicting extre... 详细信息
来源: 评论
Scheduling a Single-Arm Multi-Cluster Tool With a Condition-Based Cleaning Operation
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 1965-1983页
作者: Qinghua Zhu Hongpeng Li Cong Wang Yan Hou School of Computer Science and Technology Guangdong University of TechnologyGuangzhou 510006China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102-1982 USA
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i... 详细信息
来源: 评论
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论
Unveiling factuality and injecting knowledge for LLMs via reinforcement learning and data proportion
收藏 引用
science China(Information sciences) 2024年 第10期67卷 389-390页
作者: Wenjun KE Ziyu SHANG Zhizhao LUO Peng WANG Yikai GUO Qi LIU Yuxuan CHEN School of Computer Science and Engineering Southeast University Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications(Southeast University) Beijing Institute of Technology Zhuhai Beijing Institute of Computer Technology and Application
Large language models(LLMs) have demonstrated remarkable effectiveness across various natural language processing(NLP) tasks, as evidenced by recent studies [1, 2]. However, these models often produce responses that c...
来源: 评论
Compression-Encryption Based Efficient Dual Image Watermarking for e-Healthcare Applications  1
Compression-Encryption Based Efficient Dual Image Watermarki...
收藏 引用
1st International Conference on Electronics, Communication and Signal Processing, ICECSP 2024
作者: Malhotra, Gautam Atri, Abhimanyu Rani, Jyoti Anand, Ashima Thapar Institute of Engineering and Technology Computer Science and Engineering India
The requirement to protect the authenticity and accuracy of images motivates the implementation of water-marking on these images. Any alteration or interference with medical images might lead to erroneous diagnosis or... 详细信息
来源: 评论