咨询与建议

限定检索结果

文献类型

  • 70,044 篇 会议
  • 39,936 篇 期刊文献
  • 797 册 图书

馆藏范围

  • 110,777 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,288 篇 工学
    • 45,525 篇 计算机科学与技术...
    • 37,358 篇 软件工程
    • 16,961 篇 信息与通信工程
    • 11,178 篇 控制科学与工程
    • 8,776 篇 电气工程
    • 8,405 篇 电子科学与技术(可...
    • 7,895 篇 生物工程
    • 5,637 篇 光学工程
    • 5,504 篇 生物医学工程(可授...
    • 5,429 篇 机械工程
    • 3,878 篇 化学工程与技术
    • 3,808 篇 仪器科学与技术
    • 3,538 篇 动力工程及工程热...
    • 2,769 篇 网络空间安全
    • 2,708 篇 材料科学与工程(可...
    • 2,669 篇 交通运输工程
    • 2,544 篇 安全科学与工程
  • 37,689 篇 理学
    • 19,027 篇 数学
    • 11,685 篇 物理学
    • 8,850 篇 生物学
    • 6,395 篇 统计学(可授理学、...
    • 4,165 篇 化学
    • 4,014 篇 系统科学
  • 18,229 篇 管理学
    • 11,578 篇 管理科学与工程(可...
    • 7,387 篇 图书情报与档案管...
    • 4,716 篇 工商管理
  • 5,289 篇 医学
    • 4,316 篇 临床医学
    • 3,883 篇 基础医学(可授医学...
    • 2,366 篇 药学(可授医学、理...
  • 2,932 篇 法学
    • 2,395 篇 社会学
  • 1,846 篇 经济学
  • 1,423 篇 农学
  • 1,025 篇 教育学
  • 465 篇 文学
  • 255 篇 军事学
  • 215 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,204 篇 accuracy
  • 3,063 篇 feature extracti...
  • 2,829 篇 deep learning
  • 2,621 篇 training
  • 2,445 篇 computational mo...
  • 2,134 篇 computer science
  • 2,006 篇 machine learning
  • 1,677 篇 optimization
  • 1,572 篇 predictive model...
  • 1,405 篇 convolutional ne...
  • 1,393 篇 real-time system...
  • 1,388 篇 semantics
  • 1,363 篇 internet of thin...
  • 1,334 篇 data models
  • 1,312 篇 support vector m...
  • 1,201 篇 neural networks
  • 1,167 篇 data mining
  • 1,046 篇 image segmentati...
  • 1,010 篇 artificial intel...
  • 930 篇 security

机构

  • 2,471 篇 school of comput...
  • 1,548 篇 school of comput...
  • 1,367 篇 school of comput...
  • 1,087 篇 cavendish labora...
  • 1,023 篇 department of ph...
  • 989 篇 school of comput...
  • 943 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 824 篇 university of ch...
  • 687 篇 school of comput...
  • 579 篇 school of comput...
  • 547 篇 chitkara univers...
  • 540 篇 fakultät physik ...
  • 532 篇 school of physic...
  • 532 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 520 篇 department of ph...
  • 516 篇 imperial college...
  • 513 篇 school of comput...
  • 508 篇 h.h. wills physi...

作者

  • 273 篇 niyato dusit
  • 269 篇 a. gomes
  • 264 篇 barter w.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 245 篇 c. amelung
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 240 篇 beiter a.
  • 236 篇 blake t.
  • 233 篇 s. chen
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 94,384 篇 英文
  • 14,596 篇 其他
  • 1,854 篇 中文
  • 129 篇 日文
  • 20 篇 德文
  • 19 篇 法文
  • 11 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science Engineering Technology"
110777 条 记 录,以下是611-620 订阅
排序:
Tensor-Based Factorial Hidden Markov Model for Cyber-Physical-Social Services
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1825-1837页
作者: Lu, Zhixing Yang, Laurence T. Azman, Azreen Zhang, Shunli Zhou, Fang Hainan University School of Computer Science and Technology Hainan China Universiti Putra Malaysia Faculty of Computer Science and Information Technology Serdang Malaysia Zhengzhou University School of Computer and Artificial Intelligence School of Software Engineering Zhengzhou China Huazhong University of Science and Technology School of Computer Science and Technology Huazhong China St. Francis Xavier University Department of Computer Science Canada
With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige... 详细信息
来源: 评论
Identify information sources with different start times in complex networks based on sparse observers
收藏 引用
Chinese Physics B 2024年 第11期33卷 467-479页
作者: Yuan-Zhang Deng Zhao-Long Hu Feilong Lin Chang-Bing Tang Hui Wang Yi-Zhen Huang School of Computer Science and Technology Zhejiang Normal UniversityJinhua 321004China School of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua 321004China School of Information Engineering Jinhua PolytechnicJinhua 321016China
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio... 详细信息
来源: 评论
Trust management in online computing environment: a complete review
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 491-545页
作者: Singh, Ashish Chatterjee, Kakali School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneswar751024 India Department of Computer Science and Engineering National Institute of Technology Bihar Patna800005 India
Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based applications, social networking applications, cloud computing-based applicatio... 详细信息
来源: 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui Liu Weiling Li Xianhua Niu Lei Xu Yumin Dong College of Computer Science Chongqing UniversityChongqing400044China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100083China School of Computer Science and Technology Dongguan University of TechnologyDongguan523808China School of Emergency Management Xihua UniversityChengdu610039China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 评论
Text Representation Based on WT-GloVe Word Vector Weighting Model
Text Representation Based on WT-GloVe Word Vector Weighting ...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Xue, Cheng Fei, Rong Yao, Quanzhu School of Computer Science and Engineering Xi'An University of Technology Xi'an China School of Computer Science and Technology Xi'An University of Technology Xi'an China
The text representation issue in text classification is thoroughly examined in this paper, with a focus on handling massive volumes of text data. The paper suggests the word vector weighting model based on WT-GloVe in... 详细信息
来源: 评论
Res-SRNN: Residual Spiking Recurrent Neural Network for Efficient Video Recognition
Res-SRNN: Residual Spiking Recurrent Neural Network for Effi...
收藏 引用
2024 International Annual Conference on Complex Systems and Intelligent science, CSIS-IAC 2024
作者: Zhang, Ya Luo, Xiaoling Sun, Qian Qu, Hong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering Sichuan University of Science and Engineering Yibin China
Action recognition in videos is a critical task in computer vision, with a wide range of applications including security surveillance, behavior analysis, and cooperative control. Despite significant advancements in ac... 详细信息
来源: 评论
A two-dimensional MoS_(2) array based on artificial neural network learning for high-quality imaging
收藏 引用
Nano Research 2023年 第7期16卷 10139-10147页
作者: Long Chen Siyuan Chen Jinchao Wu Luhua Chen Shuai Yang Jian Chu Chengming Jiang Sheng Bi Jinhui Song School of Mechanical Engineering Dalian University of TechnologyDalian 116024China School of Computer Science Southwest Petroleum UniversityChengdu 610500China
As the basis of machine vision,the biomimetic image sensing devices are the eyes of artificial *** recent years,with the development of two-dimensional(2D)materials,many new optoelectronic devices are developed for th... 详细信息
来源: 评论
Intelligent Carpooling - Machine Learning Route and Pickup Optimisation  5
Intelligent Carpooling - Machine Learning Route and Pickup O...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Goojar, Arunya Verma, Parth Singh, Nitin Debnath, Shubhradeep Tyagi, Neha Computer Science and Engineering Amity School of Engineering and Technology UP India
In order to encourage carpooling between workplace personnel and college students, this research article gives a unique method that makes use of machine getting to know and synthetic intelligence (AI) algorithms. The ... 详细信息
来源: 评论
Review the Deep Learning Strategies for Enhancing the Security of Body Area Networks Against Adversarial Attack
Review the Deep Learning Strategies for Enhancing the Securi...
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and technology, ACROSET 2024
作者: Nagdiya, Jagrati Goyal, Rajeev Amity School of Engineering and Technology Computer Science and Engineering Gwalior India
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese... 详细信息
来源: 评论
Prevention of Attacks in Vehicular Adhoc Networks
Prevention of Attacks in Vehicular Adhoc Networks
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2024
作者: Anjali, Thuvva Goyal, Rajeev G.n, Balaji Amity University Computer Science and Engineering Amity School of Engineering and Technology Gwalior India Vellore Institute of Technology Computer Science and Engineering School of Cse Vellore India
Over the past years, numerous methods have been developed to identify anomalies in traditional VANETs networks. A survey of VANET anomaly detection and mitigation methods is presented in this analysis. This survey loo... 详细信息
来源: 评论