咨询与建议

限定检索结果

文献类型

  • 70,044 篇 会议
  • 39,936 篇 期刊文献
  • 797 册 图书

馆藏范围

  • 110,777 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,288 篇 工学
    • 45,525 篇 计算机科学与技术...
    • 37,358 篇 软件工程
    • 16,961 篇 信息与通信工程
    • 11,178 篇 控制科学与工程
    • 8,776 篇 电气工程
    • 8,405 篇 电子科学与技术(可...
    • 7,895 篇 生物工程
    • 5,637 篇 光学工程
    • 5,504 篇 生物医学工程(可授...
    • 5,429 篇 机械工程
    • 3,878 篇 化学工程与技术
    • 3,808 篇 仪器科学与技术
    • 3,538 篇 动力工程及工程热...
    • 2,769 篇 网络空间安全
    • 2,708 篇 材料科学与工程(可...
    • 2,669 篇 交通运输工程
    • 2,544 篇 安全科学与工程
  • 37,689 篇 理学
    • 19,027 篇 数学
    • 11,685 篇 物理学
    • 8,850 篇 生物学
    • 6,395 篇 统计学(可授理学、...
    • 4,165 篇 化学
    • 4,014 篇 系统科学
  • 18,229 篇 管理学
    • 11,578 篇 管理科学与工程(可...
    • 7,387 篇 图书情报与档案管...
    • 4,716 篇 工商管理
  • 5,289 篇 医学
    • 4,316 篇 临床医学
    • 3,883 篇 基础医学(可授医学...
    • 2,366 篇 药学(可授医学、理...
  • 2,932 篇 法学
    • 2,395 篇 社会学
  • 1,846 篇 经济学
  • 1,423 篇 农学
  • 1,025 篇 教育学
  • 465 篇 文学
  • 255 篇 军事学
  • 215 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,204 篇 accuracy
  • 3,063 篇 feature extracti...
  • 2,829 篇 deep learning
  • 2,621 篇 training
  • 2,445 篇 computational mo...
  • 2,134 篇 computer science
  • 2,006 篇 machine learning
  • 1,677 篇 optimization
  • 1,572 篇 predictive model...
  • 1,405 篇 convolutional ne...
  • 1,393 篇 real-time system...
  • 1,388 篇 semantics
  • 1,363 篇 internet of thin...
  • 1,334 篇 data models
  • 1,312 篇 support vector m...
  • 1,201 篇 neural networks
  • 1,167 篇 data mining
  • 1,046 篇 image segmentati...
  • 1,010 篇 artificial intel...
  • 930 篇 security

机构

  • 2,471 篇 school of comput...
  • 1,548 篇 school of comput...
  • 1,367 篇 school of comput...
  • 1,087 篇 cavendish labora...
  • 1,023 篇 department of ph...
  • 989 篇 school of comput...
  • 943 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 824 篇 university of ch...
  • 687 篇 school of comput...
  • 579 篇 school of comput...
  • 547 篇 chitkara univers...
  • 540 篇 fakultät physik ...
  • 532 篇 school of physic...
  • 532 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 520 篇 department of ph...
  • 516 篇 imperial college...
  • 513 篇 school of comput...
  • 508 篇 h.h. wills physi...

作者

  • 273 篇 niyato dusit
  • 269 篇 a. gomes
  • 264 篇 barter w.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 245 篇 c. amelung
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 240 篇 beiter a.
  • 236 篇 blake t.
  • 233 篇 s. chen
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 94,384 篇 英文
  • 14,596 篇 其他
  • 1,854 篇 中文
  • 129 篇 日文
  • 20 篇 德文
  • 19 篇 法文
  • 11 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Technology"
110777 条 记 录,以下是991-1000 订阅
排序:
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1024-1033页
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论
P3DC:Reducing DRAM Cache Hit Latency by Hybrid Mappings
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1341-1360页
作者: Ye Chi Ren-Tong Guo Xiao-Fei Liao Hai-Kun Liu Jianhui Yue National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Laboratory Wuhan 430074China Cluster and Grid Computing Laboratory Wuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Big Data and Internet Shenzhen Technology UniversityShenzhen 518118China Department of Computer Science Michigan Technological UniversityHoughton 49931-1295U.S.A.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca... 详细信息
来源: 评论
Performance Analysis of Existing SDN Load Balancing Controller Using Mininet  1
收藏 引用
International Conference on Advanced engineering, technology and Applications, ICAETA 2024
作者: Baniya, Pashupati Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Agrawal, Atul Department of Computer Science and Engineering School of Engineeringand Technology IEC College of Engineering and Technology Greater Noida India Department of Computer Science and Engineering School of Engineering and Technology ITS Engineering College Greater Noida India Department of Computer Science and Engineering School of Engineering and Technology Sharda University Greater Noida India Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University Istanbul34396 Turkey Department of Computer Science National University of Computer and Emerging Sciences Islamabad44000 Pakistan
Due to an increase in the load of network, load balancing service, i.e., a service that gives an equal volume of each task assignment to each of the servers in data centers, it is usually performed by the specialized ... 详细信息
来源: 评论
NICA at EXIST CLEF Tasks 2024  25
NICA at EXIST CLEF Tasks 2024
收藏 引用
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
作者: Naebzadeh, Aylin Nobakhtian, Melika Eetemadi, Sauleh School of Computer Engineering Iran University of Science and Technology Tehran Iran Khatam University Tehran Iran School of Computer Engineering Iran University of Science and Technology Tehran Iran
In this paper, we introduce the models developed by the NICA group for the sEXism Identification in Social neTworks (EXIST) Shared Task at CLEF 2024. Our participation spanned across five tasks: Sexism Identification ... 详细信息
来源: 评论
ReCSA:a dedicated sort accelerator using ReRAM-based content addressable memory
收藏 引用
Frontiers of computer science 2023年 第2期17卷 1-13页
作者: Huize LI Hai JIN Long ZHENG Yu HUANG Xiaofei LIAO National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the increasing amount of data,there is an urgent need for efficient sorting algorithms to process large data *** sorting algorithms have attracted much attention because they can take advantage of different hardw... 详细信息
来源: 评论
Efficient stochastic human motion prediction via consistency model  4
Efficient stochastic human motion prediction via consistency...
收藏 引用
4th International Conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Pan, Renhao School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China
Diffusion models have recently proven successful in stochastic human motion prediction. Despite their excellent generative performance, they are difficult to predict in real-time because the multi-step sampling mechan... 详细信息
来源: 评论
A Semantic and Robust Authentication Scheme for User-Based Access Control on Cloud Storage  6th
A Semantic and Robust Authentication Scheme for User-Based A...
收藏 引用
6th International Conference on Information Systems and Management science, ISMS 2023
作者: Agarwal, Saumye Vardhan, Harsha Kothapalle Prasanth, Narayanan Joshva Devadas, T. Naveenkumar, J. Sureshkumar, Williams School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India
Cloud computing and cloud related services are gaining ground in today’s technology driven world. It allows an individual to delegate their work and store it in the cloud. The cloud provides pay per usage kind of ser... 详细信息
来源: 评论
All-in-one Weather-degraded Image Restoration via Adaptive Degradation-aware Self-prompting Model
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3343-3355页
作者: Wen, Yuanbo Gao, Tao Li, Ziqi Zhang, Jing Zhang, Kaihao Chen, Ting Chang'an University School of Information Engineering Xi'an China Chang'an University School of Data Science and Artificial Intelligence Xi'an China Australian National University School of Computing CanberraACT Australia Harbin Institute of Technology School of Computer Science and Technology Shenzhen China
Existing approaches for all-in-one weather-degraded image restoration suffer from inefficiencies in leveraging degradation-aware priors, resulting in sub-optimal performance in adapting to different weather conditions... 详细信息
来源: 评论
GENOCARE PROGNOSTICATOR MODEL: HOST GENETICS PREDICT SEVERITY OF INFECTIOUS DISEASE
收藏 引用
Scalable Computing 2025年 第2期26卷 924-939页
作者: DUBEY, SHIVENDRA SINGH, SHWETA VERMA, DINESH KUMAR LODHI, SUDHEER KUMAR DUBEY, SAKSHI Department of Artificial Intelligence and Machine Learning Manipal University Rajasthan Jaipur303007 India School of Engineering and Technology Jagran Lakecity University Madhya Pradesh Bhopal462042 India Department of Computer Science and Engineering Jaypee University of Engineering and Technology Madhya Pradesh Guna473226 India Department of Computer Science and Engineering Parul Institute of Engineering and Technology Gujarat Vadodara391760 India
Scientific community understanding of the variance in severity of infectious disease like COVID-19 across patients is an important area of focus. The article presents an innovative voting ensemble GenoCare Prognostica... 详细信息
来源: 评论
FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
收藏 引用
science China(Information sciences) 2024年 第4期67卷 339-340页
作者: Xuan LI Naiyu WANG Liehuang ZHU Shuai YUAN Zhitao GUAN School of Control and Computer Engineering North China Electric Power University School of Cyberspace Science and Technology Beijing Institute of Technology Department of Finance Operationsand Information Systems(FOIS)Brock University
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ... 详细信息
来源: 评论