咨询与建议

限定检索结果

文献类型

  • 70,750 篇 会议
  • 40,681 篇 期刊文献
  • 797 册 图书

馆藏范围

  • 112,228 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 69,178 篇 工学
    • 46,380 篇 计算机科学与技术...
    • 37,811 篇 软件工程
    • 17,502 篇 信息与通信工程
    • 11,730 篇 控制科学与工程
    • 9,224 篇 电气工程
    • 8,545 篇 电子科学与技术(可...
    • 7,925 篇 生物工程
    • 5,745 篇 光学工程
    • 5,567 篇 机械工程
    • 5,558 篇 生物医学工程(可授...
    • 3,938 篇 化学工程与技术
    • 3,908 篇 仪器科学与技术
    • 3,640 篇 动力工程及工程热...
    • 3,057 篇 网络空间安全
    • 2,804 篇 交通运输工程
    • 2,683 篇 材料科学与工程(可...
    • 2,670 篇 安全科学与工程
  • 38,213 篇 理学
    • 19,207 篇 数学
    • 11,893 篇 物理学
    • 8,909 篇 生物学
    • 6,413 篇 统计学(可授理学、...
    • 4,300 篇 化学
    • 4,023 篇 系统科学
  • 18,639 篇 管理学
    • 11,872 篇 管理科学与工程(可...
    • 7,550 篇 图书情报与档案管...
    • 4,761 篇 工商管理
  • 5,509 篇 医学
    • 4,417 篇 临床医学
    • 3,928 篇 基础医学(可授医学...
    • 2,373 篇 药学(可授医学、理...
  • 3,003 篇 法学
    • 2,458 篇 社会学
  • 1,878 篇 经济学
  • 1,445 篇 农学
  • 1,047 篇 教育学
  • 503 篇 文学
  • 257 篇 军事学
  • 215 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,264 篇 accuracy
  • 3,089 篇 feature extracti...
  • 2,941 篇 deep learning
  • 2,643 篇 training
  • 2,470 篇 computational mo...
  • 2,136 篇 computer science
  • 2,096 篇 machine learning
  • 1,710 篇 optimization
  • 1,596 篇 predictive model...
  • 1,432 篇 convolutional ne...
  • 1,426 篇 real-time system...
  • 1,407 篇 semantics
  • 1,391 篇 internet of thin...
  • 1,337 篇 data models
  • 1,319 篇 support vector m...
  • 1,200 篇 neural networks
  • 1,188 篇 data mining
  • 1,056 篇 artificial intel...
  • 1,054 篇 image segmentati...
  • 969 篇 security

机构

  • 2,488 篇 school of comput...
  • 1,552 篇 school of comput...
  • 1,390 篇 school of comput...
  • 1,089 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 1,002 篇 school of comput...
  • 953 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 828 篇 university of ch...
  • 692 篇 school of comput...
  • 607 篇 chitkara univers...
  • 580 篇 school of comput...
  • 547 篇 fakultät physik ...
  • 531 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 529 篇 school of physic...
  • 528 篇 school of comput...
  • 520 篇 department of ph...
  • 513 篇 h.h. wills physi...
  • 513 篇 imperial college...

作者

  • 276 篇 niyato dusit
  • 268 篇 a. gomes
  • 267 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 244 篇 c. amelung
  • 243 篇 d. calvet
  • 237 篇 blake t.
  • 235 篇 beiter a.
  • 233 篇 s. chen
  • 230 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 218 篇 g. spigo

语言

  • 89,992 篇 英文
  • 20,471 篇 其他
  • 1,923 篇 中文
  • 130 篇 日文
  • 23 篇 德文
  • 21 篇 法文
  • 14 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 3 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=School of Computer Science Engineering Technology"
112228 条 记 录,以下是781-790 订阅
排序:
A Novel and Optimized Collaborative Diversity-Driven Routing Mechanism in MANETs
收藏 引用
SN computer science 2024年 第1期5卷 22页
作者: Malyadri, Neelam Ramakrishna, M. Department of Computer Science and Engineering Vemana Institute of Technology VTU Belagavi India School of Computer Science and Engineering REVA University Karnataka Bengaluru India Department of Computer Science and Engineering Vemana Institute of Technology Karnataka Bengaluru India
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ... 详细信息
来源: 评论
Natural language requirements testability measurement based on requirement smells
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 13051-13085页
作者: Zakeri-Nasrabadi, Morteza Parsa, Saeed School of Computer Engineering Iran University of Science and Technology Hengam St. Resalat Square Tehran Tehran Iran
Requirements form the basis for defining software systems’ obligations and tasks. Testable requirements help prevent failures, reduce maintenance costs, and make it easier to perform acceptance tests. However, despit... 详细信息
来源: 评论
Harnessing Light Field Angular Cues and Spatial Geometries for Semantic Segmentation
Harnessing Light Field Angular Cues and Spatial Geometries f...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jia, Chen Shi, Fan Cheng, Xu School of Computer Science and Engineering Tianjin University of Technology Tianjin China
4D light field imaging captures rich spatial-angular information, providing essential geometric cues for semantic segmentation tasks. In this paper, we introduce a novel backbone network called the Light Field Extract... 详细信息
来源: 评论
A Stacked Ensemble Learning Model for Enhanced Network Intrusion Detection  7th
A Stacked Ensemble Learning Model for Enhanced Network Intru...
收藏 引用
7th International Conference on Soft Computing and Signal Processing, ICSCSP 2024
作者: Menon, Vishnu Palivela, Lakshmi Harika School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Network intrusion detection plays an important role in protecting computers and networks against unauthorized access, attacks, and malicious activities. As the effectiveness of cyber threats continues to evolve, the n... 详细信息
来源: 评论
A Hybrid Model Combining Vision Transformer and Generative Pre-trained Transformer for Image Captioning
A Hybrid Model Combining Vision Transformer and Generative P...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Gupta, Hina Vishwesh, Jatangi Y D M V Prasada Jagadeesh, M. Sucharitha, M. Pradyothan, Vitta Sai Bennett University School of Computer Science Engineering & Technology Noida India
Creating descriptive captions for images is now becoming a mission-critical application area in the intersection of natural language processing and computer vision. This work provides the hybrid model VisionGPT2, comb... 详细信息
来源: 评论
Developing Scalable and Fault Tolerant Distributed Architecture for Big Unstructured Data Systems  6
Developing Scalable and Fault Tolerant Distributed Architect...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Saranya, G. Kumaran, K. Pratheep, V. Dhanush, S.R. School of Computer Science and Engineering Vellore Institue of Technology Chennai India
In the era of big data, efficiently processing and retrieving insights from unstructured data presents a critical challenge. This paper introduces a scalable leader-worker distributed data pipeline designed to handle ... 详细信息
来源: 评论
Promising Multi-Granularity Linguistic Steganography by Jointing Syntactic and Lexical Manipulations  39
Promising Multi-Granularity Linguistic Steganography by Join...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ou, Chengfu Xiang, Lingyun Liu, Yangfan School of Computer and Communication Engineering Changsha University of Science and Technology China
Existing modification-based linguistic steganography methods primarily perform linguistic manipulations within a single embedding space to conceal secret information. However, these methods are stringently constrained... 详细信息
来源: 评论
Personalized Mental Health Assistance: Integrating Emotion Prediction with GPT-Based Chatbot
Personalized Mental Health Assistance: Integrating Emotion P...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Kifayathullah, Muhammad Sekar, Rajeev Abinaya, R. Vijayaprabakaran, K. Vellore Institute of Technology School of Computer Science and Engineering Chennai India
Mental health is a fundamental aspect of overall wellbeing, despite its importance, it remains one of the most neglected issues. By integrating Artificial Intelligence with Natural Language Processing into this domain... 详细信息
来源: 评论
Optimized-Memory and Enhanced-Security Approaches to RSA and ElGamal
Optimized-Memory and Enhanced-Security Approaches to RSA and...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Kumar, Maheswer Sunil Balaji, Vinithra Sakkarapani, Sandosh School of computer Science and Engineering Vellore Institute of Technology Chennai India
This paper demonstrates 2 methods, a reduced memory technique, and a reduced memory along with more security techniques in RSA (Rivest-Shamir-Adleman) and ElGamal which are both asymmetric cryptographic algorithms. Re... 详细信息
来源: 评论
Deep Learning-Based Helmet Detection for In-Vehicle Compliance Monitoring on Low-Cost Edge Devices
Deep Learning-Based Helmet Detection for In-Vehicle Complian...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Abinaya, R. Sekar, Rajeev Pai, Tarun Vinod Thippa, Subhash Praveen Joe, I.R. School of Computer Science and Engineering Vellore Institute of Technology Chennai India
This study presents a highly efficient helmet detection system designed for real-time operation on low-cost edge devices, targeting helmet compliance monitoring in vehicular environments. A novel dataset was created b... 详细信息
来源: 评论