咨询与建议

限定检索结果

文献类型

  • 69,864 篇 会议
  • 40,148 篇 期刊文献
  • 801 册 图书

馆藏范围

  • 110,813 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,312 篇 工学
    • 45,731 篇 计算机科学与技术...
    • 37,592 篇 软件工程
    • 17,042 篇 信息与通信工程
    • 11,243 篇 控制科学与工程
    • 8,821 篇 电气工程
    • 8,349 篇 电子科学与技术(可...
    • 7,911 篇 生物工程
    • 5,721 篇 光学工程
    • 5,524 篇 生物医学工程(可授...
    • 5,439 篇 机械工程
    • 3,877 篇 化学工程与技术
    • 3,823 篇 仪器科学与技术
    • 3,541 篇 动力工程及工程热...
    • 2,780 篇 网络空间安全
    • 2,685 篇 交通运输工程
    • 2,611 篇 材料科学与工程(可...
    • 2,559 篇 安全科学与工程
  • 37,875 篇 理学
    • 19,106 篇 数学
    • 11,734 篇 物理学
    • 8,870 篇 生物学
    • 6,391 篇 统计学(可授理学、...
    • 4,160 篇 化学
    • 4,023 篇 系统科学
  • 18,318 篇 管理学
    • 11,638 篇 管理科学与工程(可...
    • 7,414 篇 图书情报与档案管...
    • 4,743 篇 工商管理
  • 5,318 篇 医学
    • 4,343 篇 临床医学
    • 3,916 篇 基础医学(可授医学...
    • 2,363 篇 药学(可授医学、理...
  • 2,947 篇 法学
    • 2,401 篇 社会学
  • 1,855 篇 经济学
  • 1,430 篇 农学
  • 1,032 篇 教育学
  • 467 篇 文学
  • 255 篇 军事学
  • 211 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,143 篇 accuracy
  • 3,014 篇 feature extracti...
  • 2,796 篇 deep learning
  • 2,612 篇 training
  • 2,420 篇 computational mo...
  • 2,140 篇 computer science
  • 2,008 篇 machine learning
  • 1,644 篇 optimization
  • 1,553 篇 predictive model...
  • 1,409 篇 semantics
  • 1,372 篇 convolutional ne...
  • 1,344 篇 internet of thin...
  • 1,340 篇 real-time system...
  • 1,304 篇 support vector m...
  • 1,290 篇 data models
  • 1,186 篇 neural networks
  • 1,183 篇 data mining
  • 1,038 篇 image segmentati...
  • 999 篇 artificial intel...
  • 926 篇 security

机构

  • 2,477 篇 school of comput...
  • 1,556 篇 school of comput...
  • 1,391 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 983 篇 school of comput...
  • 944 篇 physikalisches i...
  • 942 篇 oliver lodge lab...
  • 822 篇 university of ch...
  • 693 篇 school of comput...
  • 572 篇 school of comput...
  • 536 篇 horia hulubei na...
  • 535 篇 fakultät physik ...
  • 534 篇 chitkara univers...
  • 529 篇 school of physic...
  • 528 篇 school of physic...
  • 522 篇 department of ph...
  • 516 篇 imperial college...
  • 515 篇 school of optica...
  • 514 篇 h.h. wills physi...

作者

  • 275 篇 niyato dusit
  • 268 篇 a. gomes
  • 260 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 j. strandberg
  • 244 篇 d. calvet
  • 243 篇 c. amelung
  • 238 篇 beiter a.
  • 233 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 g. spigo

语言

  • 101,561 篇 英文
  • 7,389 篇 其他
  • 1,834 篇 中文
  • 129 篇 日文
  • 13 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Technology"
110813 条 记 录,以下是1131-1140 订阅
排序:
Understanding Training Behaviour during Transfer Learning by drawing parallels to Grokking  4
Understanding Training Behaviour during Transfer Learning by...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Rath, Kanishk Gnanasigamani, Lydia J Vellore Institue of Technology School of Computer Science and Engineering Vellore India
In the realm of machine learning, understanding how models arrive at their predictions or decisions, known as mechanistic interpretability, is crucial for trust, transparency, and refinement. This involves unraveling ... 详细信息
来源: 评论
Crafting Trust with Convolutional Neural Networks and Hyperparameter Tuning for Precision Signature Verification in Insurance Claim
Crafting Trust with Convolutional Neural Networks and Hyperp...
收藏 引用
2024 International Conference on Advances in Data engineering and Intelligent Computing Systems, ADICS 2024
作者: Balaji, Yashwant Vikas Kedar, Rohit Virupakshi, Hrishikesh Anandan, P. School Of Computer Science And Engineering Vellore Institute Of Technology Chennai India
The prevention of signature forgery on physical documents is a critical concern in sectors like insurance, where the authenticity of claims documentation is pivotal. Handwritten signatures pose a challenge for verific... 详细信息
来源: 评论
STOE-YOLOv5s: A Hard Hat Wearing Detection Algorithm Based on Improved YOLOv5s  6
STOE-YOLOv5s: A Hard Hat Wearing Detection Algorithm Based o...
收藏 引用
6th International Conference on Robotics and computer Vision, ICRCV 2024
作者: Hu, Tao Huang, Wei Wei, Jianghao Liu, Qiang Huang, Jiahuan Yu, Jie School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China
To address the existing issues of missed detection and false detection of hard hats by mainstream detection models in complex environments, an improved hard hat detection algorithm, STOE-YOLOv5s based on YOLOv5s, has ... 详细信息
来源: 评论
PSR-Tree: A Novel Method for Personalized Trajectory Data Protection  22
PSR-Tree: A Novel Method for Personalized Trajectory Data Pr...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wang, Chundong Song, Yixuan Zhao, Yongxin Tian, Yuhan Fang, Shunyao Tianjin University of Technology School of Computer Science and Engineering Tianjin China
Privacy concerns related to location-based services are becoming increasingly critical. To address the limitations of previous research, which has often neglected the temporal attributes of trajectories and relied sol... 详细信息
来源: 评论
Low-Latency State Management for Real-Time Tasks in Edge Serverless  22
Low-Latency State Management for Real-Time Tasks in Edge Ser...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wen, Yanyan Xu, Guangping Wang, Jianshe Hao, Wei Tianjin University of Technology School of Computer Science and Engineering Tianjin China
Stateful serverless systems commonly adopt an architectural paradigm characterized by compute and storage separation within cloud data centers. Nevertheless, guaranteeing prompt response for real-time tasks at the edg... 详细信息
来源: 评论
Implementing OTP Verification and Zero Trust Security for Role-Based Access Control in Medical Records  3
Implementing OTP Verification and Zero Trust Security for Ro...
收藏 引用
3rd International Conference on Smart Technologies and Systems for Next Generation Computing, ICSTSN 2024
作者: Harshini, B.V. Ulagarchana, U. Mounika, Perla Mary Shamala, L. Vellore Institute of Technology School of Computer Science and Engineering Chennai India
This paper proposes a comprehensive approach for enhancing security in medical record systems by incorporating One-Time Password (OTP) verification and Zero Trust Security principles within a Role-Based Access Control... 详细信息
来源: 评论
Alzheimer's Disease Classification Using CUDA-Accelerated DenseNet201 and VGG16  5
Alzheimer's Disease Classification Using CUDA-Accelerated De...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Munugala, Shravya Marathe, Atharva Prashant Vijayakumar, Rahul Kumaran, K. School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Automated classification of Alzheimer's disease through MRI analysis presents significant computational challenges due to complex deep learning architectures and largescale image processing requirements. This pape... 详细信息
来源: 评论
An Integrated Framework for Real-Time Disaster Data Acquisition, Processing, and Resource Optimization in Crisis Management Systems  4
An Integrated Framework for Real-Time Disaster Data Acquisit...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Saranya, G. Atchaya, M. Harshini, R. Choudhary, Kartik School of Computer Science Engineering Vellore Institute of Technology Chennai India
The rapid onset and unpredictable nature of disasters necessitate a quick, organized, and efficient response. This paper proposes a comprehensive disaster management platform that integrates real-time disaster informa... 详细信息
来源: 评论
Optimising Makespan Minimization and Performance at the Same Time with a Dynamic Cloud Task Scheduling Comparative Study of MOSOS and PSO  5
Optimising Makespan Minimization and Performance at the Same...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Jain, Anegha Nath, Megha Rama Parvathy, L. Vellore Institute of Technology School of Computer Science and Engineering Chennai India
The practice of allocating available resources, such as personnel, money, time, or materials, to different tasks, projects, or activities is known as resource allocation. Effective resource allocation is crucial for o... 详细信息
来源: 评论
Attention-Enhanced Feature Extraction for Image Defogging Algorithms  6
Attention-Enhanced Feature Extraction for Image Defogging Al...
收藏 引用
6th International Conference on Robotics and computer Vision, ICRCV 2024
作者: Yang, Shuwei Xu, Junwu Deng, Zifan School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China
The AOD-Net suffers from issues such as low image quality and color distortion after defogging. An improved defogging algorithm is proposed, which applies pooling operations and dilated convolution to the convolutiona... 详细信息
来源: 评论