咨询与建议

限定检索结果

文献类型

  • 13,794 篇 会议
  • 7,684 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,436 篇 工学
    • 10,390 篇 计算机科学与技术...
    • 8,665 篇 软件工程
    • 3,411 篇 信息与通信工程
    • 2,162 篇 控制科学与工程
    • 1,904 篇 生物工程
    • 1,594 篇 电气工程
    • 1,407 篇 生物医学工程(可授...
    • 1,175 篇 光学工程
    • 1,170 篇 电子科学与技术(可...
    • 834 篇 网络空间安全
    • 791 篇 机械工程
    • 677 篇 安全科学与工程
    • 633 篇 动力工程及工程热...
    • 592 篇 交通运输工程
    • 584 篇 仪器科学与技术
    • 556 篇 化学工程与技术
  • 6,839 篇 理学
    • 3,489 篇 数学
    • 2,090 篇 生物学
    • 1,772 篇 物理学
    • 1,216 篇 统计学(可授理学、...
    • 742 篇 系统科学
    • 653 篇 化学
  • 4,015 篇 管理学
    • 2,427 篇 管理科学与工程(可...
    • 1,769 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 1,565 篇 医学
    • 1,223 篇 临床医学
    • 1,120 篇 基础医学(可授医学...
    • 820 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 849 篇 法学
    • 701 篇 社会学
  • 373 篇 经济学
  • 334 篇 农学
  • 236 篇 教育学
  • 183 篇 文学
  • 32 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 922 篇 deep learning
  • 848 篇 accuracy
  • 539 篇 computational mo...
  • 491 篇 machine learning
  • 459 篇 feature extracti...
  • 443 篇 training
  • 394 篇 real-time system...
  • 382 篇 predictive model...
  • 371 篇 internet of thin...
  • 321 篇 convolutional ne...
  • 316 篇 support vector m...
  • 285 篇 computer science
  • 269 篇 data models
  • 264 篇 semantics
  • 259 篇 optimization
  • 231 篇 neural networks
  • 220 篇 computer archite...
  • 214 篇 reliability
  • 214 篇 scalability
  • 204 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 166 篇 school of comput...
  • 138 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 105 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 101 篇 national enginee...
  • 99 篇 department of co...
  • 98 篇 school of comput...
  • 94 篇 department of co...
  • 93 篇 north-west unive...
  • 93 篇 institut univers...
  • 87 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 82 篇 tno technical sc...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 85 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 64 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 53 篇 benoit d.m.

语言

  • 17,458 篇 英文
  • 4,166 篇 其他
  • 168 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21735 条 记 录,以下是4381-4390 订阅
排序:
Bottom-Up Parsers: A Survey
Bottom-Up Parsers: A Survey
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Appala Hari Narayana Karthik B Venkat Vinod Kumar Bejji Bharadwaj Sree Sai Karthikeya Meena Belwal Department of Computer Science and Engineering Amrita School Of Computing Amrita Vishwa Vidyapeetham Bengaluru India
This study offers a thorough analysis of bottom-up parsing techniques, necessary for the creation and execution of compilers. Parsers such as SLR (Simple LR), LR (Canonical LR), LR(k) and LALR (Look-Ahead LR) are bott... 详细信息
来源: 评论
Smart Steps to Sporting Success: IoT-Driven Footwear Innovations
Smart Steps to Sporting Success: IoT-Driven Footwear Innovat...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: S Thangam Gadi Joshith S Santhosh V Harish J Jesy Janet Kumari Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Using the cloud platform Blynk IoT, smart sneakers with built-in step and calorie monitoring were created with athletes in mind. The primary characteristic of the smart shoe is its ability to detect early signals of c... 详细信息
来源: 评论
Can you pass that tool?: Implications of Indirect Speech in Physical Human-Robot Collaboration  25
Can you pass that tool?: Implications of Indirect Speech in ...
收藏 引用
2025 CHI Conference on Human Factors in computing Systems, CHI 2025
作者: Zhang, Yan Ratnayake, Tharaka Sachintha Sew, Cherie Knibbe, Jarrod Goncalves, Jorge Johal, Wafa School of Computing and Information Systems University of Melbourne MelbourneVIC Australia University of Melbourne Melbourne Australia School of Electrical Engineering and Computer Science The University of Queensland St LuciaQLD Australia
Indirect speech acts (ISAs) are a natural pragmatic feature of human communication, allowing requests to be conveyed implicitly while maintaining subtlety and flexibility. Although advancements in speech recognition h... 详细信息
来源: 评论
Combinatorial Incentive Mechanism for Bundling Spatial Crowdsourcing with Unknown Utilities
Combinatorial Incentive Mechanism for Bundling Spatial Crowd...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Hengzhi Wang Laizhong Cui Lei Zhang Linfeng Shen Long Chen College of Computer Science and Software Engineering Shenzhen University China School of Computing Science Simon Fraser University Canada
Incentive mechanisms in Spatial Crowdsourcing (SC) have been widely studied as they provide an effective way to motivate mobile workers to perform spatial tasks. Yet, most existing mechanisms only involve single tasks... 详细信息
来源: 评论
Automated Tooth Segmentation in X-ray Images using Attention Integrated U-Net++ Model
Automated Tooth Segmentation in X-ray Images using Attention...
收藏 引用
International Symposium on Advanced computing and Communication (ISACC)
作者: Julakanti Sai Yaswanth Kanderi Johith Kumar Rimjhim Padam Singh Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Oral functioning, the ability to perform various oral functions, pain-free and without being ill, is one of the indicators of overall well-being and life satisfaction. Even though these diseases are mostly preventable... 详细信息
来源: 评论
A Performance Study of Block Proposing Mechanism in Ethereum 2.0
A Performance Study of Block Proposing Mechanism in Ethereum...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zijie Liu Qinglin Zhao Shuhan Qi Li Feng Xiaofen Wang Sun Yi School of Computer Science and Engineering Macau University of Science and Technology Macau China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chinese Academy of Sciences Institute of Computing Technology Beijing China
Ethereum 2.0 (ETH2) marks a significant evolution from Ethereum 1.0 (ETHl), playing a central role in the Web3.0 infrastructure. At its core, the consensus protocol Gasper greatly affects system performance. Given tha... 详细信息
来源: 评论
Optimizing Drone Delivery Management: An Algorithmic Framework for Collision Detection and Avoidance with Resource Management
Optimizing Drone Delivery Management: An Algorithmic Framewo...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Paramkusam Sriharsha Yelipe Gowtham Geda Tejesh Chowdary Sreebha Bhaskaran Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
The revolutionary impact of drones on delivery services encounters major challenges, such as collision with other obstacles and other drones when operating inside crowded areas. This research introduces a Collision De... 详细信息
来源: 评论
Unmasking Digital Deceptions: A Comprehensive Survey of Synthetic Reality Analysis Across Multimedia Domains
Unmasking Digital Deceptions: A Comprehensive Survey of Synt...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent computing, ICESIC 2024
作者: Chaudhary, Sneha Chaurasiya, Komal Sriram, Suthir Ravikumar, S. Nivethitha, V. Thangavel, M. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr. Sagunthala R and D Institute of Science and Technology India United Arab Emirates University College of Information and Technology United Arab Emirates
The general accessibility of social networking sites like Facebook, Myspace and TikTok has transformed the way information is communicated, but it has also made it simpler to spread misleading information, thanks to c... 详细信息
来源: 评论
Securing Networks: Advanced Detection and Prevention of Address Resolution Protocol Cache Spoofing Attack  3
Securing Networks: Advanced Detection and Prevention of Addr...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Sriharsha, V.V.S. Daule, Viraj Kisan Surya, R. Thangam, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
As the technology advances, an increase in the attacks to manipulate or extract data illegally has also risen. This also includes one such attack known as Address Resolution protocol cache spoofing attack. The Address... 详细信息
来源: 评论
Multilingual Synopses of Movie Narratives: A Dataset for Vision-Language Story Understanding
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Yidan Yu, Jianfei Li, Boyang College of Computing and Data Science Nanyang Technological University Singapore School of Computer Science and Engineering Nanjing University of Science and Technology China
Story video-text alignment, a core task in computational story understanding, aims to align video clips with corresponding sentences in their descriptions. However, progress on the task has been held back by the scarc... 详细信息
来源: 评论