咨询与建议

限定检索结果

文献类型

  • 92,655 篇 会议
  • 46,660 篇 期刊文献
  • 934 册 图书

馆藏范围

  • 140,249 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,067 篇 工学
    • 53,376 篇 计算机科学与技术...
    • 43,671 篇 软件工程
    • 20,971 篇 信息与通信工程
    • 13,905 篇 控制科学与工程
    • 12,020 篇 电子科学与技术(可...
    • 11,942 篇 电气工程
    • 9,214 篇 生物工程
    • 7,025 篇 光学工程
    • 6,829 篇 机械工程
    • 6,547 篇 生物医学工程(可授...
    • 5,013 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,677 篇 材料科学与工程(可...
    • 3,159 篇 交通运输工程
    • 3,065 篇 网络空间安全
    • 2,992 篇 安全科学与工程
  • 46,529 篇 理学
    • 23,091 篇 数学
    • 15,175 篇 物理学
    • 10,302 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,225 篇 系统科学
    • 5,194 篇 化学
  • 21,358 篇 管理学
    • 13,679 篇 管理科学与工程(可...
    • 8,554 篇 图书情报与档案管...
    • 5,693 篇 工商管理
  • 6,215 篇 医学
    • 5,080 篇 临床医学
    • 4,545 篇 基础医学(可授医学...
    • 2,794 篇 药学(可授医学、理...
  • 3,425 篇 法学
    • 2,810 篇 社会学
  • 2,307 篇 经济学
  • 1,666 篇 农学
  • 1,298 篇 教育学
  • 588 篇 文学
  • 329 篇 军事学
  • 248 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,635 篇 accuracy
  • 3,572 篇 feature extracti...
  • 3,130 篇 deep learning
  • 3,060 篇 computational mo...
  • 3,023 篇 training
  • 2,367 篇 machine learning
  • 2,155 篇 computer science
  • 2,090 篇 optimization
  • 1,935 篇 predictive model...
  • 1,617 篇 real-time system...
  • 1,578 篇 neural networks
  • 1,573 篇 semantics
  • 1,542 篇 internet of thin...
  • 1,539 篇 data models
  • 1,495 篇 support vector m...
  • 1,472 篇 convolutional ne...
  • 1,462 篇 data mining
  • 1,238 篇 artificial intel...
  • 1,225 篇 wireless sensor ...
  • 1,191 篇 robustness

机构

  • 3,282 篇 school of electr...
  • 2,473 篇 school of comput...
  • 1,531 篇 school of comput...
  • 1,370 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,000 篇 department of ph...
  • 985 篇 school of comput...
  • 948 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 856 篇 university of ch...
  • 683 篇 school of comput...
  • 621 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 531 篇 horia hulubei na...
  • 530 篇 school of comput...
  • 527 篇 fakultät physik ...
  • 521 篇 school of physic...
  • 520 篇 school of physic...
  • 514 篇 department of ph...

作者

  • 278 篇 niyato dusit
  • 268 篇 a. gomes
  • 264 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 c. amelung
  • 237 篇 blake t.
  • 236 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 228 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 215 篇 bencivenni g.

语言

  • 121,379 篇 英文
  • 16,502 篇 其他
  • 2,427 篇 中文
  • 138 篇 日文
  • 25 篇 德文
  • 22 篇 法文
  • 13 篇 斯洛文尼亚文
  • 11 篇 朝鲜文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer Engineering and Technology"
140249 条 记 录,以下是1891-1900 订阅
排序:
Secure Batch Deduplication without Dual Servers in Backup System
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-13页
作者: Zheng, Haoyu Zeng, Shengke Li, Hongwei Li, Zhijun Xihua College Xihua University Chengdu China school of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China MIG Group Cisco Systems Canada Co. Ottawa ON Canada
Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a hot and challenging ... 详细信息
来源: 评论
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2923-2943页
作者: Muhammad Zaman Ali Omer Riaz Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi Department of Information Technology The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Computer Science The Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science and Engineering Yeungnam UniversityGyeongbuk38541Korea
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m... 详细信息
来源: 评论
Deep Learning Based Digital Image Encryption  1
Deep Learning Based Digital Image Encryption
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Faisal, Shah Agrawal, Amrit Kumar Verma, Abhishek Singh Sharda School of Engineering and Technology Sharda University Department of Computer Science and Engineering Utter Pradesh Greater Noida India Sharda School of Engineering and Technology Sharda University Department of Computer Science and Engineering Utter Pradesh Greater Noida India
As technology has evolved, digital images have become increasingly popular. However, these images often exhibit a high degree of correlation and redundancy among pixels, which creates specific requirements for applica... 详细信息
来源: 评论
Meta-Mechanisms for Combinatorial Auctions over Social Networks  27
Meta-Mechanisms for Combinatorial Auctions over Social Netwo...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Fang, Yuan Zhang, Mengxiao Liu, Jiamou Khoussainov, Bakh School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Computer Science The University of Auckland New Zealand
Recently there has been a large amount of research designing mechanisms for auction scenarios where the bidders are connected in a social network. Different from the existing studies in this field that focus on specif... 详细信息
来源: 评论
Evaluating the Performance of Clinical data using Machine learning Approach- An Ensemble Model  2
Evaluating the Performance of Clinical data using Machine le...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and Information technology, NMITCON 2024
作者: Abdullah, A. Sheik Vinod, A Aashish Pranav, A G Vishal Govindarajan, Yeshwanth Selvakumar, Subramanian Vellore Institute of Technology School of Computer Science and Engineering Chennai India Bahir Dar University Faculty of Electrical and Computer Engineering Ethiopia
In the rapidly evolving field of healthcare, accurate clinical predictions are paramount for effective disease management and treatment planning. This paper introduces a novel ensemble machine learning model that util... 详细信息
来源: 评论
RADTO: A Resource-Aware and Dynamic Task Offloading Strategy for Mobile Edge Computing  29
RADTO: A Resource-Aware and Dynamic Task Offloading Strategy...
收藏 引用
29th International computer Conference, computer Society of Iran, CSICC 2025
作者: Darchini-Tabrizi, Mohsen Hemati, Erfan Entezari-Maleki, Reza School of Computer Engineering Iran University of Science and Technology Tehran Iran
With the rapid evolution of technology, the demand for mobile devices capable of executing computationally intensive and time-sensitive applications has surged. However, these devices are often constrained by limited ... 详细信息
来源: 评论
New Systematic MDS Array Codes with Two Parities
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 6329-6342页
作者: Ma, Lan Zhou, Liyang Liu, Shaoteng Chen, Xiangyu Sun, Qifu University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Huawei Technologies Company Ltd. Network Technology Lab Shenzhen518000 China
Row-diagonal parity (RDP) code is a classical (k + 2, k) systematic maximum distance separable (MDS) array code with k ≤ L - 1 under sub-packetization level l = L - 1, where L is a prime integer. When k = L-1, its en... 详细信息
来源: 评论
M-Door: Joint Attack of Backdoor Injection and Membership Inference in Federated Learning
M-Door: Joint Attack of Backdoor Injection and Membership In...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Liu, Ye Chang, Shan Li, Denghui Dai, Minghui Donghua University School of Computer Science and Technology Shanghai China Jiangxi Normal University School of Computer and Information Engineering Nanchang China
Federated learning (FL) collaboratively trains global models while preserving private data locally, making it an ideal privacy-preserving learning technique. However, recent studies have shown that FL poses risks of s... 详细信息
来源: 评论
Enhancing Cancer Prediction: Investigating ACO-Based Feature Selection with Logistic Regression, XGBoost, and LightGBM  2
Enhancing Cancer Prediction: Investigating ACO-Based Feature...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Chidurala, Ashwini Basani, Shashanka Mulastam, Pranavi Nerella, Sanjay Srivastav, Shashank Dwivedi, Anshu Kumar SR University School of Computer Science and Artificial Intelligence Warangal India Buddha Institute of Technology Gida Department of Computer Science and Engineering Gorakhpur India Bennett University School of Computer Science Engineering and Technology Greater Noida India
This report mainly concentrates on cancer prediction, particularly focusing on breast cancer prediction, which remains a significant challenge in healthcare. Improving patient outcomes requires early identification an... 详细信息
来源: 评论
ONLINE PRIMAL DUAL MEETS ONLINE MATCHING WITH STOCHASTIC REWARDS: CONFIGURATION LP TO THE RESCUE
收藏 引用
SIAM Journal on Computing 2024年 第5期53卷 1217-1256页
作者: Huang, Zhiyi Zhang, Qiankun Department of Computer Science The University of Hong Kong Hong Kong School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Mehta and Panigrahi (FOCS 2012, IEEE, Piscataway, NJ, 2012, pp. 728-737) introduce the problem of online matching with stochastic rewards, where edges are associated with success probabilities and a match succeeds wit... 详细信息
来源: 评论