咨询与建议

限定检索结果

文献类型

  • 140,299 篇 会议
  • 69,346 篇 期刊文献
  • 1,412 册 图书

馆藏范围

  • 211,056 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,877 篇 工学
    • 84,941 篇 计算机科学与技术...
    • 69,640 篇 软件工程
    • 30,731 篇 信息与通信工程
    • 20,115 篇 控制科学与工程
    • 16,023 篇 电气工程
    • 15,932 篇 电子科学与技术(可...
    • 14,758 篇 生物工程
    • 10,351 篇 生物医学工程(可授...
    • 10,132 篇 光学工程
    • 9,603 篇 机械工程
    • 7,029 篇 化学工程与技术
    • 6,870 篇 仪器科学与技术
    • 6,355 篇 动力工程及工程热...
    • 5,097 篇 材料科学与工程(可...
    • 4,555 篇 交通运输工程
    • 4,482 篇 安全科学与工程
    • 4,318 篇 网络空间安全
  • 70,006 篇 理学
    • 35,619 篇 数学
    • 21,348 篇 物理学
    • 16,517 篇 生物学
    • 11,801 篇 统计学(可授理学、...
    • 7,729 篇 系统科学
    • 7,502 篇 化学
  • 33,001 篇 管理学
    • 20,525 篇 管理科学与工程(可...
    • 13,720 篇 图书情报与档案管...
    • 9,011 篇 工商管理
  • 9,757 篇 医学
    • 8,007 篇 临床医学
    • 7,173 篇 基础医学(可授医学...
    • 4,439 篇 药学(可授医学、理...
  • 5,614 篇 法学
    • 4,677 篇 社会学
  • 3,448 篇 经济学
  • 2,489 篇 农学
  • 2,177 篇 教育学
  • 948 篇 文学
  • 458 篇 军事学
  • 354 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,145 篇 computer science
  • 5,326 篇 accuracy
  • 5,174 篇 feature extracti...
  • 4,677 篇 computational mo...
  • 4,630 篇 deep learning
  • 4,626 篇 training
  • 3,738 篇 machine learning
  • 2,969 篇 optimization
  • 2,915 篇 predictive model...
  • 2,820 篇 semantics
  • 2,595 篇 data models
  • 2,456 篇 real-time system...
  • 2,331 篇 support vector m...
  • 2,315 篇 neural networks
  • 2,313 篇 data mining
  • 2,266 篇 convolutional ne...
  • 2,069 篇 internet of thin...
  • 1,955 篇 artificial intel...
  • 1,874 篇 image segmentati...
  • 1,871 篇 educational inst...

机构

  • 2,471 篇 school of comput...
  • 2,215 篇 school of comput...
  • 2,088 篇 school of comput...
  • 1,823 篇 school of comput...
  • 1,522 篇 school of comput...
  • 1,484 篇 school of comput...
  • 1,361 篇 school of electr...
  • 1,338 篇 school of comput...
  • 1,261 篇 school of comput...
  • 1,075 篇 cavendish labora...
  • 1,033 篇 school of comput...
  • 974 篇 school of comput...
  • 972 篇 department of ph...
  • 917 篇 school of comput...
  • 885 篇 physikalisches i...
  • 873 篇 university of ch...
  • 871 篇 oliver lodge lab...
  • 546 篇 school of comput...
  • 544 篇 school of comput...
  • 517 篇 chitkara univers...

作者

  • 393 篇 niyato dusit
  • 269 篇 a. gomes
  • 261 篇 barter w.
  • 245 篇 c. alexa
  • 237 篇 j. m. izen
  • 234 篇 s. chen
  • 232 篇 blake t.
  • 229 篇 bowcock t.j.v.
  • 224 篇 bellee v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 216 篇 beiter a.
  • 213 篇 g. bella
  • 212 篇 bencivenni g.
  • 210 篇 bay a.
  • 209 篇 j. strandberg
  • 208 篇 d. calvet

语言

  • 182,952 篇 英文
  • 25,051 篇 其他
  • 3,159 篇 中文
  • 181 篇 日文
  • 38 篇 朝鲜文
  • 29 篇 德文
  • 24 篇 法文
  • 12 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Engineering Engineering"
211057 条 记 录,以下是791-800 订阅
排序:
Interpreting Randomly Wired Graph Models for Chinese NER
收藏 引用
computer Modeling in engineering & sciences 2023年 第1期134卷 747-761页
作者: Jie Chen Jiabao Xu Xuefeng Xi Zhiming Cui Victor S.Sheng The School of Electronic and Information Engineering SuzhouUniversity of Science and TechnologySuzhouChina The School of Computer Science Texas Tech UniversityTexasUSA
Interpreting deep neural networks is of great importance to understand and verify deep models for natural language processing(NLP)***,most existing approaches only focus on improving the performance of models but igno... 详细信息
来源: 评论
Deep Learning and Signal Processing Integration in Automatic Speech Recognition Framework Using Hidden Markov Models  1
Deep Learning and Signal Processing Integration in Automatic...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Godvin Mani, S. Rajesh Kumar, T. Saveetha University Saveetha School of Engineering Dept of Computer Science and Engineering Chennai India
Automatic speech recognition is one of the technologies that change the game regarding the transcription of spoken language to text. A new methodology combining both feature extraction methods, including the Mel-Frequ... 详细信息
来源: 评论
Analysis of Blockchain Security Applications in Electronic Health Records Standardization
收藏 引用
Recent Advances in computer science and Communications 2023年 第5期16卷 19-30页
作者: Mishra, Princy Khandelwal, Brijesh Dewangan, Bhupesh Kumar Amity School of Engineering Amity University Raipur India Department of Computer Science and Engineering School of Engineering O.P. Jindal University Raigarh India
Healthcare data is most unorganized and decentralized in many countries, including India. EHR (Electronic Health Record) has increased its acceptability and importance as it assists in medical research and helps backt... 详细信息
来源: 评论
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Design of Anti-Theft Recognition System Using Kanade-Lucas-Tomasi based feature extraction method
Design of Anti-Theft Recognition System Using Kanade-Lucas-T...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Fernandes, Lymraina Oshin Veronica Das, Sunanda Vivek, V. Sarker, Rhythm Magizharasi, M. Computer Science & Engineering JAIN University Bangalore India School of Computer Science & Engineering JAIN University Bangalore India
The rampant issue of vehicle theft on a global scale demands more effective security solutions. Traditional methods like keys and alarms have shown limitations in deterring theft. This paper presents a novel approach ... 详细信息
来源: 评论
Pruning techniques for artificial intelligence networks: a deeper look at their engineering design and bias: the first review of its kind
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9591-9665页
作者: Mohanty, Lopamudra Kumar, Ashish Mehta, Vivek Agarwal, Mohit Suri, Jasjit S. School of Computer Science Engineering and Technology Bennett University Gr. Noida India Department of Computer Science ABES Engineering College UP Ghaziabad India Stroke Diagnostic and Monitoring Division AtheroPoint™ RosevilleCA United States
Trained Artificial Intelligence (AI) models are challenging to install on edge devices as they are low in memory and computational power. Pruned AI (PAI) models are therefore needed with minimal degradation in perform... 详细信息
来源: 评论
Classification of Request-Based Mobility Load Balancing in Fog Computing
收藏 引用
computer Systems science & engineering 2023年 第7期46卷 137-151页
作者: D.Deepa K.R.Jothi School of Computer Science and Engineering Vellore Institute of TechnologyVellore632014India
Every day,more and more data is being produced by the Internet of Things(IoT)*** data differ in amount,diversity,veracity,and *** of latency,various types of data handling in cloud computing are not suitable for many ... 详细信息
来源: 评论
Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning  24th
Multiple-Round Aggregation of Abstract Semantics for Secur...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Zhang, Jiao Li, Xiong Liang, Wei School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Federated Learning (FL) provides a valuable framework that allows for the collaborative training of models across distributed networks while maintaining the privacy of the data involved. The concept of secure aggregat... 详细信息
来源: 评论
Study of Electrical Characteristics for Dual-Gate TFTs With Asymmetric Defect Distributions and Gate Work Functions
收藏 引用
IEEE Transactions on Electron Devices 2023年 第6期70卷 3390-3393页
作者: Hsu, Chih-Chieh Li, Jin-Xian Huang, Po-Cheng Jhang, Wun-Ciang Joodaki, Mojtaba National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Graduate School of Electronic Engineering Yunlin640301 Taiwan Constructor University School of Computer Science and Engineering Bremen28759 Germany
Combined effects of asymmetric defect distributions and asymmetric gate work functions (WFs) on the performances of self-aligned dual-gate poly-Si TFTs are investigated. Normally, small grains with plentiful grain bou... 详细信息
来源: 评论
Event Management System Using Spatial and Event Attribute Information
收藏 引用
SN computer science 2025年 第3期6卷 1-9页
作者: Setia, Sonia Anjli, Km Bisht, Upasana Jyoti Raj, Dharm Department of Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Uttar Pradesh Greater Noida India Department of Computer Science Institute of Innovation in Technology & Management Delhi Janakpuri India Department of Computer Science and Engineering ITS Engineering College Greater Noida India
The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ... 详细信息
来源: 评论