咨询与建议

限定检索结果

文献类型

  • 22,990 篇 会议
  • 12,311 篇 期刊文献
  • 448 册 图书

馆藏范围

  • 35,749 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,266 篇 工学
    • 17,535 篇 计算机科学与技术...
    • 14,487 篇 软件工程
    • 5,126 篇 信息与通信工程
    • 3,277 篇 控制科学与工程
    • 2,871 篇 生物工程
    • 2,205 篇 电气工程
    • 2,003 篇 生物医学工程(可授...
    • 1,704 篇 光学工程
    • 1,639 篇 电子科学与技术(可...
    • 1,251 篇 机械工程
    • 1,088 篇 网络空间安全
    • 917 篇 安全科学与工程
    • 869 篇 动力工程及工程热...
    • 859 篇 化学工程与技术
    • 828 篇 仪器科学与技术
    • 798 篇 交通运输工程
  • 11,395 篇 理学
    • 6,274 篇 数学
    • 3,169 篇 生物学
    • 2,745 篇 物理学
    • 1,980 篇 统计学(可授理学、...
    • 1,200 篇 系统科学
    • 1,000 篇 化学
  • 6,594 篇 管理学
    • 3,813 篇 管理科学与工程(可...
    • 3,074 篇 图书情报与档案管...
    • 1,750 篇 工商管理
  • 2,086 篇 医学
    • 1,667 篇 临床医学
    • 1,502 篇 基础医学(可授医学...
    • 1,034 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,336 篇 法学
    • 1,113 篇 社会学
  • 599 篇 经济学
  • 508 篇 农学
  • 469 篇 教育学
  • 231 篇 文学
  • 65 篇 艺术学
  • 57 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,158 篇 deep learning
  • 1,142 篇 accuracy
  • 882 篇 computer science
  • 842 篇 computational mo...
  • 790 篇 feature extracti...
  • 741 篇 training
  • 724 篇 machine learning
  • 559 篇 semantics
  • 536 篇 predictive model...
  • 470 篇 data models
  • 467 篇 internet of thin...
  • 454 篇 real-time system...
  • 439 篇 support vector m...
  • 418 篇 convolutional ne...
  • 345 篇 artificial intel...
  • 320 篇 optimization
  • 313 篇 scalability
  • 303 篇 computer archite...
  • 285 篇 reliability
  • 279 篇 cloud computing

机构

  • 590 篇 school of comput...
  • 229 篇 institute of com...
  • 190 篇 department of co...
  • 175 篇 school of comput...
  • 157 篇 department of co...
  • 145 篇 department of co...
  • 140 篇 school of comput...
  • 139 篇 department of co...
  • 132 篇 school of comput...
  • 131 篇 school of comput...
  • 130 篇 school of comput...
  • 127 篇 school of comput...
  • 125 篇 school of comput...
  • 121 篇 department of co...
  • 113 篇 college of intel...
  • 112 篇 school of comput...
  • 111 篇 school of comput...
  • 103 篇 school of comput...
  • 102 篇 key laboratory o...
  • 101 篇 college of compu...

作者

  • 136 篇 hai jin
  • 132 篇 niyato dusit
  • 117 篇 jin hai
  • 108 篇 zheng wei-shi
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 89 篇 gal t.
  • 89 篇 bozza c.
  • 88 篇 anjali t.
  • 85 篇 díaz a.f.
  • 71 篇 kalekin o.
  • 71 篇 boumaaza j.
  • 62 篇 huang f.
  • 61 篇 kulikovskiy v.
  • 57 篇 coleiro a.
  • 55 篇 zhang lei
  • 54 篇 benoit d.m.
  • 54 篇 eddymaoui a.

语言

  • 29,640 篇 英文
  • 5,897 篇 其他
  • 283 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Computing"
35749 条 记 录,以下是141-150 订阅
排序:
AST-Based and Token-Based Neural Networks for Source Code Classification: A Comparative Performance Analysis  15
AST-Based and Token-Based Neural Networks for Source Code Cl...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Parvathy, R. Thushara, Mg Amrita School of Computing Department of Computer Science & Engineering Amrita vishwa Vidyapeetham Amritapuri India Amrita School of Computing Department of Computer Science & Applications Amrita vishwa Vidyapeetham Amritapuri India
Programming languages function as a medium for expressing instructions in the context of computer program creation. A prevalent convention in programming is categorizing source code into fragments, a strategy that enh... 详细信息
来源: 评论
Adaptive network combination for single-image reflection removal:a domain generalization perspective
收藏 引用
Frontiers of computer science 2025年 第1期19卷 171-173页
作者: Ming LIU Jianan PAN Zifei YAN Wangmeng ZUO Lei ZHANG School of Computer Science and Technology Harbin Institute of TechnologyHarbin 150001China Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China
1 Introduction Recently,multiple synthetic and real-world datasets have been built to facilitate the training of deep single-image reflection removal(SIRR)***,diverse testing sets are also provided with different type... 详细信息
来源: 评论
A Novel Preprocessing Technique to Aid the Detection of Infected Areas of CT Images in COVID-19 Patients Artificial Intelligence (AI) for Communication Systems  2
A Novel Preprocessing Technique to Aid the Detection of Infe...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Kalaivani, J. Arunachalam, A.S. Gobinath, R. School of Computing Sciences Department of Computer Science Chennai India Christ University Department of Computer Science Bengaluru India
An innovative preprocessing method for discerning infected areas in CT images of COVID-19 is described in this abstract. The methodology being suggested exploits the capabilities of artificial intelligence (AI) to imp... 详细信息
来源: 评论
Hybrid Actor-Action Relation Extraction: A MachineLearning Approach  5
Hybrid Actor-Action Relation Extraction: A MachineLearning A...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Nair, Reshma P. Thushara, M.G. Department of Computer Science and Engineering Amrita Vishwa Vidhyapeetham Amrita School of Computing Amritapuri India Department of Computer Science and Applications Amrita Vishwa Vidhyapeetham Amrita School of Computing Amritapuri India
Software architects and developers face challenges while trying to explain the complex functional relationships between actors and systems in the process of system design. The field of natural language processing (NLP... 详细信息
来源: 评论
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 265-272页
作者: Yuling Chen Xiong Yang Tao Li Yi Ren Yangyang Long State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Computing Science University of East AngliaNorwichNR57TJUK
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa... 详细信息
来源: 评论
Breaking the Edge: Enabling Efficient Neural Network Inference on Integrated Edge Devices
收藏 引用
IEEE Transactions on Cloud computing 2025年 第2期13卷 694-710页
作者: Zhang, Feng Zhang, Chenyang Guan, Jiawei Zhou, Qiangjun Chen, Kuangyu Zhang, Xiao He, Bingsheng Zhai, Jidong Du, Xiaoyong School of Information Beijing100872 China Tsinghua University Department of Computer Science and Technology Beijing100084 China University of California Department of Computer Science and Engineering RiversideCA92507 United States National University of Singapore School of Computing 119077 Singapore
Edge computing has gained widespread attention in cloud computing due to the increasing demands of AIoT applications and the evolution of edge architectures. One prevalent application in this domain is neural network ... 详细信息
来源: 评论
Surveying Keyword Extractors: Classification, Applications, and Empirical Analysis  6
Surveying Keyword Extractors: Classification, Applications, ...
收藏 引用
6th Parul International Conference on Engineering and Technology, PICET 2024
作者: Musunuru, Varun Nagam, Sai Pavan Krishna Thushara, M.G. Villuri, Praneeth Vasantha, Gopikrishna Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Natural Language Processing (NLP) has seen some rapid developments. One of the areas is keyword Extraction which has seen rapid growth. Many varied and complex extractors have been brought to light recently, and sever... 详细信息
来源: 评论
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning
收藏 引用
Tsinghua science and Technology 2023年 第6期28卷 1009-1022页
作者: Yifei Zou Zongjing Jin Yanwei Zheng Dongxiao Yu Tian Lan Institute of Intelligent Computing School of Computer Science and TechnologyShandong UniversityQingdao 266237China Department of Electrical and Computer Engineering George Washington UniversityWashingtonDC 20052USA
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt... 详细信息
来源: 评论
Federated Ensemble for Lung Pneumonia Detection  15
Federated Ensemble for Lung Pneumonia Detection
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Sharma, Vishwash Challa, VenkataHemant Kumar Reddy Pranavi, Pasupuleti Singh, Tripty Nair, Rekha R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India Alliance University Alliance School of Advanced Computing Department of Computer Science and Enginnering Bengaluru India
In the realm of medical imaging, the detection of lung pneumonia through automated methods has garnered significant attention due to its potential to augment diagnostic processes. This study proposes a novel approach,... 详细信息
来源: 评论
BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase  5
BiT5: A Bidirectional NLP Approach for Advanced Vulnerabilit...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Prabith, G.S. Rohit Narayanan, M. Arya, A. Aneesh Nadh, R. Binu, P.K. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
In this research paper, a detailed investigation presents the utilization of the BiT5 Bidirectional NLP model for detecting vulnerabilities within codebases. The study addresses the pressing need for techniques enhanc... 详细信息
来源: 评论