咨询与建议

限定检索结果

文献类型

  • 733,139 篇 会议
  • 395,000 篇 期刊文献
  • 10,560 册 图书
  • 10,303 篇 学位论文
  • 872 篇 专利
  • 1 件 标准

馆藏范围

  • 1,149,859 篇 电子文献
  • 102 种 纸本馆藏

日期分布

学科分类号

  • 732,492 篇 工学
    • 426,185 篇 计算机科学与技术...
    • 333,169 篇 软件工程
    • 133,854 篇 信息与通信工程
    • 93,895 篇 控制科学与工程
    • 89,432 篇 电气工程
    • 82,971 篇 电子科学与技术(可...
    • 69,146 篇 化学工程与技术
    • 66,798 篇 材料科学与工程(可...
    • 61,882 篇 生物工程
    • 60,060 篇 机械工程
    • 49,494 篇 光学工程
    • 47,701 篇 生物医学工程(可授...
    • 38,867 篇 仪器科学与技术
    • 38,280 篇 动力工程及工程热...
    • 24,968 篇 环境科学与工程(可...
    • 23,685 篇 土木工程
    • 22,546 篇 建筑学
  • 413,501 篇 理学
    • 171,945 篇 数学
    • 137,829 篇 物理学
    • 83,263 篇 生物学
    • 66,307 篇 化学
    • 49,194 篇 统计学(可授理学、...
    • 32,156 篇 系统科学
  • 167,526 篇 管理学
    • 103,761 篇 管理科学与工程(可...
    • 68,707 篇 图书情报与档案管...
    • 47,146 篇 工商管理
  • 63,295 篇 医学
    • 45,855 篇 临床医学
    • 36,915 篇 基础医学(可授医学...
    • 22,729 篇 药学(可授医学、理...
  • 28,278 篇 法学
    • 23,228 篇 社会学
  • 27,113 篇 农学
  • 24,476 篇 教育学
  • 20,088 篇 经济学
  • 5,814 篇 文学
  • 2,925 篇 军事学
  • 2,350 篇 艺术学
  • 602 篇 哲学
  • 458 篇 历史学

主题

  • 31,677 篇 computer science
  • 19,177 篇 computational mo...
  • 18,097 篇 feature extracti...
  • 17,023 篇 accuracy
  • 15,944 篇 deep learning
  • 15,094 篇 training
  • 13,728 篇 machine learning
  • 12,377 篇 computer archite...
  • 11,643 篇 data mining
  • 11,552 篇 artificial intel...
  • 10,645 篇 semantics
  • 9,848 篇 optimization
  • 9,401 篇 educational inst...
  • 9,285 篇 predictive model...
  • 9,144 篇 neural networks
  • 9,077 篇 support vector m...
  • 8,738 篇 data models
  • 8,437 篇 real-time system...
  • 8,413 篇 visualization
  • 8,287 篇 convolutional ne...

机构

  • 7,315 篇 university of ch...
  • 6,513 篇 massachusetts in...
  • 4,987 篇 department of co...
  • 3,170 篇 university of sc...
  • 2,863 篇 school of comput...
  • 2,482 篇 school of comput...
  • 2,470 篇 college of compu...
  • 2,437 篇 college of compu...
  • 2,310 篇 chitkara univers...
  • 1,682 篇 university of el...
  • 1,505 篇 school of comput...
  • 1,425 篇 school of comput...
  • 1,252 篇 school of comput...
  • 1,228 篇 school of comput...
  • 1,194 篇 school of comput...
  • 1,159 篇 huazhong univers...
  • 1,120 篇 school of comput...
  • 1,083 篇 harbin institute...
  • 1,058 篇 state key labora...
  • 1,030 篇 peng cheng labor...

作者

  • 1,182 篇 liu yang
  • 1,108 篇 wang wei
  • 994 篇 yang yang
  • 887 篇 li li
  • 866 篇 wei wang
  • 847 篇 yang liu
  • 717 篇 wei zhang
  • 655 篇 lei zhang
  • 631 篇 wang lei
  • 628 篇 li wei
  • 604 篇 zhang wei
  • 593 篇 wei li
  • 580 篇 li yang
  • 578 篇 lei wang
  • 565 篇 zhang lei
  • 538 篇 yu zhang
  • 517 篇 liu wei
  • 511 篇 y. zhang
  • 499 篇 zhang yu
  • 462 篇 wei liu

语言

  • 1,047,317 篇 英文
  • 77,156 篇 其他
  • 27,269 篇 中文
  • 1,055 篇 德文
  • 1,001 篇 日文
  • 879 篇 法文
  • 223 篇 朝鲜文
  • 139 篇 俄文
  • 134 篇 荷兰文
  • 130 篇 斯洛文尼亚文
  • 78 篇 罗马尼亚文
  • 41 篇 西班牙文
  • 35 篇 阿拉伯文
  • 28 篇 葡萄牙文
  • 14 篇 土耳其文
  • 10 篇 意大利文
  • 9 篇 波兰文
  • 8 篇 捷克文
  • 2 篇 加泰罗尼亚文
  • 2 篇 泰文
检索条件"机构=Program in Computer Science & Technology"
1149875 条 记 录,以下是751-760 订阅
排序:
Aberration-Aware Depth-From-Focus
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2023年 PP卷 1-11页
作者: Yang, Xinge Fu, Qiang Elhoseiny, Mohamed Heidrich, Wolfgang King Abdullah University of Science and Technology Saudi Arabia Department of Computer Science and Electrical and Computer Engineering King Abdullah University of Science and Technology Saudi Arabia
computer vision methods for depth estimation usually use simple camera models with idealized optics. For modern machine learning approaches, this creates an issue when attempting to train deep networks with simulated ... 详细信息
来源: 评论
Research on Image Defogging Algorithm Based on Improved FFA-Net
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第6期51卷 634-641页
作者: Qinrong, Li Chi, Ma Qiang, Guo Hui, Hu School of Computer Science and Software Engineering University of Science and Technology LiaoNing AnShan114051 China School of Computer Science and Engineering Huizhou University Huizhou516007 China
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ... 详细信息
来源: 评论
Addressing Scalability Issues of Blockchains With Hypergraph Payment Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2427-2440页
作者: Kotzer, Arad Ladóczki, Bence Tapolcai, János Rottenstreich, Ori Technion—Israel Institute of Technology Department of Computer Science Haifa3200003 Israel Budapest University of Technology and Economics Department of Telecommunications and Artificial Intelligence Budapest1111 Hungary Technion—Israel Institute of Technology Department of Electrical and Computer Engineering Department of Computer Science Haifa3200003 Israel
Payment channels are auspicious candidates in layer-2 solutions to reduce the number of on-chain transactions on traditional blockchains and increase transaction throughput. To construct payment channels, peers lock f... 详细信息
来源: 评论
An Apricot Detection Algorithm in Complex Environments Based on Improved YOLOv7
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第12期51卷 2135-2144页
作者: Guo, Qiang Ma, Chi Hu, Hui School of Computer Science and Software Engineering University of Science and Technology LiaoNing AnShan114051 China School of Computer Science and Engineering Huizhou University Huizhou516007 China
Apricot detection is a prerequisite for counting and harvesting tasks. Existing algorithms face challenges in adapting to the impacts of complex environmental factors such as lighting variations, shadows, dense foliag... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
Effective Identity Authentication Based on Multiattribute Centers for Secure Government Data Sharing
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 736-752页
作者: Meiquan Wang Junhua Wu Tongdui Zhang Junhao Wu Guangshun Li School of Computer Science Qufu Normal UniversityRizhao 276800China Science and Technology Innovation Service Institution of Rizhao Rizhao 276800China
As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large ***,the centralized IA scheme based on a trusted third party presents problems o... 详细信息
来源: 评论
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA
收藏 引用
Digital Communications and Networks 2023年 第3期9卷 613-627页
作者: Guang Chen Yueyun Chen Zhiyuan Mai Conghui Hao Meijie Yang Shuangshuang Han Liping Du School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Shunde Innovition School of Unversity of Science and Technology Beijing
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirem... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
A Lyapunov Optimization Approach for Long-Term Task Assignment in Vehicular Crowdsensing
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 2107-2117页
作者: Guo, Xuhui Wang, Xiumin Pan, Weijian Wu, Weiwei Liu, Kai South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Southeast University School of Computer Science and Engineering Nanjing210000 China Chongqing University College of Computer Science Chongqing400030 China
Vehicular crowdsensing has recently received considerable attention, due to its promising capability of collecting useful information for the Internet of Vehicles. However, existing researches in crowdsensing mainly f... 详细信息
来源: 评论