咨询与建议

限定检索结果

文献类型

  • 51,299 篇 会议
  • 32,480 篇 期刊文献
  • 900 册 图书
  • 10 篇 学位论文

馆藏范围

  • 84,689 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,221 篇 工学
    • 35,829 篇 计算机科学与技术...
    • 28,854 篇 软件工程
    • 13,258 篇 信息与通信工程
    • 8,899 篇 控制科学与工程
    • 6,485 篇 电气工程
    • 6,281 篇 电子科学与技术(可...
    • 5,724 篇 生物工程
    • 4,189 篇 机械工程
    • 3,914 篇 光学工程
    • 3,896 篇 生物医学工程(可授...
    • 2,969 篇 仪器科学与技术
    • 2,515 篇 化学工程与技术
    • 2,466 篇 动力工程及工程热...
    • 2,003 篇 交通运输工程
    • 1,889 篇 安全科学与工程
    • 1,786 篇 网络空间安全
    • 1,674 篇 材料科学与工程(可...
  • 28,595 篇 理学
    • 15,216 篇 数学
    • 7,971 篇 物理学
    • 6,456 篇 生物学
    • 4,910 篇 统计学(可授理学、...
    • 3,438 篇 系统科学
    • 2,695 篇 化学
  • 14,534 篇 管理学
    • 9,076 篇 管理科学与工程(可...
    • 6,021 篇 图书情报与档案管...
    • 3,981 篇 工商管理
  • 3,877 篇 医学
    • 3,186 篇 临床医学
    • 2,775 篇 基础医学(可授医学...
    • 1,652 篇 药学(可授医学、理...
  • 2,321 篇 法学
    • 1,908 篇 社会学
  • 1,512 篇 经济学
  • 994 篇 教育学
  • 950 篇 农学
  • 325 篇 文学
  • 234 篇 军事学
  • 183 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,945 篇 computer science
  • 1,870 篇 feature extracti...
  • 1,562 篇 deep learning
  • 1,496 篇 computational mo...
  • 1,469 篇 accuracy
  • 1,424 篇 training
  • 1,323 篇 machine learning
  • 1,113 篇 data mining
  • 1,097 篇 optimization
  • 995 篇 semantics
  • 929 篇 artificial intel...
  • 909 篇 educational inst...
  • 870 篇 predictive model...
  • 785 篇 neural networks
  • 765 篇 internet of thin...
  • 704 篇 support vector m...
  • 676 篇 wireless sensor ...
  • 661 篇 data models
  • 618 篇 security
  • 617 篇 real-time system...

机构

  • 695 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 476 篇 school of inform...
  • 399 篇 school of comput...
  • 275 篇 department of ph...
  • 275 篇 school of comput...
  • 258 篇 faculté des scie...
  • 245 篇 department of ph...
  • 242 篇 school of comput...
  • 229 篇 school of comput...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 214 篇 school of comput...
  • 197 篇 department of ph...
  • 185 篇 departamento de ...
  • 181 篇 department of ph...
  • 167 篇 school of comput...
  • 166 篇 school of comput...

作者

  • 290 篇 niyato dusit
  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 259 篇 g. spigo
  • 257 篇 h. a. gordon
  • 253 篇 f. siegert
  • 253 篇 a. c. könig
  • 248 篇 m. klein
  • 245 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 235 篇 h. sakamoto
  • 213 篇 m. rijssenbeek
  • 200 篇 f. pastore
  • 200 篇 n. orlando
  • 191 篇 d. guest
  • 191 篇 s. jin

语言

  • 78,328 篇 英文
  • 4,891 篇 其他
  • 1,347 篇 中文
  • 169 篇 日文
  • 17 篇 德文
  • 8 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering and Information Systems"
84689 条 记 录,以下是4611-4620 订阅
排序:
MSKI-Net: Towards modality-specific knowledge interaction for glioma survival prediction
MSKI-Net: Towards modality-specific knowledge interaction fo...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Su, Ran Xiao, Jin Cui, Hui Xuan, Ping Feng, Xikang Wei, Leyi Jin, Qiangguo Tianjin University School of Computer Software College of Intelligence and Computing Tianjin China La Trobe University Department of Computer Science and Information Technology Melbourne Australia Shantou University School of Engineering Department of Computer Science China Northwestern Polytechnical University School of Software China Macao Polytechnic University AIDD Faculty of Applied Science China Xiamen University School of Information Xiamen China Yangtze River Delta Research Institute Northwestern Polytechnical University Taicang China
Gliomas hold a prominent position in neurooncology due to their high malignancy and poor survival rates. Accurately predicting the prognosis and survival risk of glioma patients is crucial for clinical treatment. Rece... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 6011-6037页
作者: Ahmed Saeed Alfakeeh Abdulmohsen Almalawi Fawaz Jaber Alsolami Yoosef B.Abushark Asif Irshad Khan Adel Aboud SBahaddad Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow-226025Uttar PradeshIndia Department of Computer Science and Engineering Babu Banarasi Das UniversityLucknow-226028Uttar PradeshIndia
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti... 详细信息
来源: 评论
Category-Prompt Refined Feature Learning for Long-Tailed Multi-Label Image Classification  24
Category-Prompt Refined Feature Learning for Long-Tailed Mul...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Yan, Jiexuan Huang, Sheng Mu, Nankun Huangfu, Luwen Liu, Bo School of Big Data & Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China Fowler College of Business San Diego State University San DiegoCA United States School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Real-world data consistently exhibits a long-tailed distribution, often spanning multiple categories. This complexity underscores the challenge of content comprehension, particularly in scenarios requiring Long-Tailed... 详细信息
来源: 评论
Predictive Active Disturbance Rejection Control with Matched Delay for 2-DOF Helicopter Under Disturbances
Predictive Active Disturbance Rejection Control with Matched...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Yang, Jinwei Xiong, Chenxi School of Electronic Information Engineering China West Normal University Nanchong China School of Computer Science China West Normal University Nanchong China
This paper investigates the control problem of 2-DOF helicopter with different input delays and disturbances. To handle the different delays in the dynamics of pitch and yaw angles, a new predictive active disturbance... 详细信息
来源: 评论
Leveraging Neural Radiance Field and Semantic Communication for Robust 3D Reconstruction  100
Leveraging Neural Radiance Field and Semantic Communication ...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Xu, Rui Li, Gaolei Lin, Xi Liu, Yuchen Chen, Mingzhe Li, Jianhua Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai China North Carolina State University Department of Computer Science Raleigh United States University of Miami Electrical and Computer Engineering Department United States
By leveraging multi-view inputs to synthesize novel-view images, Neural Radiance Fields (NeRF) have emerged as a prominent technique in the realm of 3D object reconstruction. However, the input images of NeRF transmit... 详细信息
来源: 评论
Efficient Communication-Assisted Sensing based on Federated Transfer Learning
Efficient Communication-Assisted Sensing based on Federated ...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Ouyang, Wenjiang Mu, Junsheng Wu, Jingyan Li, Bohan Jing, Xiaojun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China School of Electronics and Computer Science University of Southampton Southampton United Kingdom
Integrated sensing and communication (ISAC) has been an attractive solution to address the issues of spectrum shortage and hardware overhead through the coexistence of sensing and communication function. In ISAC, one ... 详细信息
来源: 评论
Dagang Yuk Yuk As Smartphone Application for MSME Product Sales  2
Dagang Yuk Yuk As Smartphone Application for MSME Product Sa...
收藏 引用
2nd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2022
作者: Erinda, Muhammad Fandi Warnars, Harco Leslie Hendric Spits Sumardin, Winters Arianto, Jimmy Vinarycha, Devi Wahyu Bina Nusantara University School of Information Systems Information Systems Department Jakarta11480 Indonesia Bina Nusantara Univesity Binus Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia
Many MSMEs manually close their businesses in today's competition, especially those caused by the COVID19 pandemic, and besides that, the lack of technology implementation is even more aggravating. Like it or not,... 详细信息
来源: 评论
A Hierarchical-Based Sequential Caching Scheme in Named Data Networking
收藏 引用
China Communications 2025年 第5期22卷 48-60页
作者: Zhang Junmin Jin Jihuan Hou Rui Dong Mianxiong Kaoru Ota Zeng Deze College of Computer Science South-Central Minzu UniversityWuhan 430074China Department of Information and Electronic Engineering Muroran Institute of TechnologyMuroranHokkaido 050-8585Japan School of Computer Science China University of GeosciencesWuhan 430074China
Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently r... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol  5
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Hariharasudhan, S. Varghese, Vineetha Malarvizhi, K. Santhoshkumar, S.P. Nalini, T. Vikram, D. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai Avadi India Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India Jct College of Engineering and Technology Department of Computer Science Al Business Systems Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai Avadi India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Saveetha University Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence Data Science Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论