咨询与建议

限定检索结果

文献类型

  • 66,478 篇 会议
  • 42,857 篇 期刊文献
  • 1,071 册 图书

馆藏范围

  • 110,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66,769 篇 工学
    • 42,331 篇 计算机科学与技术...
    • 34,364 篇 软件工程
    • 15,897 篇 信息与通信工程
    • 11,202 篇 控制科学与工程
    • 9,651 篇 电气工程
    • 9,163 篇 电子科学与技术(可...
    • 8,085 篇 生物工程
    • 6,659 篇 生物医学工程(可授...
    • 5,914 篇 光学工程
    • 4,833 篇 机械工程
    • 4,385 篇 化学工程与技术
    • 3,991 篇 动力工程及工程热...
    • 3,813 篇 仪器科学与技术
    • 3,587 篇 材料科学与工程(可...
    • 2,699 篇 网络空间安全
    • 2,634 篇 安全科学与工程
  • 40,308 篇 理学
    • 19,080 篇 数学
    • 13,571 篇 物理学
    • 9,381 篇 生物学
    • 6,433 篇 统计学(可授理学、...
    • 4,827 篇 化学
    • 4,387 篇 系统科学
  • 16,990 篇 管理学
    • 10,962 篇 管理科学与工程(可...
    • 6,543 篇 图书情报与档案管...
    • 5,130 篇 工商管理
  • 7,035 篇 医学
    • 5,638 篇 临床医学
    • 4,960 篇 基础医学(可授医学...
    • 3,000 篇 药学(可授医学、理...
    • 2,905 篇 公共卫生与预防医...
  • 3,181 篇 法学
    • 2,698 篇 社会学
  • 2,017 篇 经济学
  • 1,531 篇 农学
  • 1,148 篇 教育学
  • 562 篇 文学
  • 234 篇 军事学
  • 135 篇 艺术学
  • 19 篇 哲学
  • 16 篇 历史学

主题

  • 3,019 篇 accuracy
  • 2,742 篇 computer science
  • 2,599 篇 deep learning
  • 2,253 篇 machine learning
  • 2,070 篇 feature extracti...
  • 2,066 篇 computational mo...
  • 1,932 篇 training
  • 1,429 篇 optimization
  • 1,378 篇 predictive model...
  • 1,377 篇 internet of thin...
  • 1,324 篇 real-time system...
  • 1,302 篇 support vector m...
  • 1,286 篇 artificial intel...
  • 1,235 篇 convolutional ne...
  • 1,033 篇 neural networks
  • 999 篇 data models
  • 957 篇 data mining
  • 886 篇 wireless sensor ...
  • 831 篇 image segmentati...
  • 802 篇 security

机构

  • 1,094 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 979 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 702 篇 university of ch...
  • 578 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 539 篇 department of ph...
  • 537 篇 school of physic...
  • 530 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 515 篇 stfc rutherford ...
  • 503 篇 school of physic...
  • 502 篇 physik-institut ...
  • 493 篇 henryk niewodnic...
  • 484 篇 center for high ...
  • 483 篇 department of el...
  • 479 篇 van swinderen in...

作者

  • 270 篇 a. gomes
  • 258 篇 barter w.
  • 250 篇 c. alexa
  • 248 篇 j. m. izen
  • 244 篇 c. amelung
  • 243 篇 g. bella
  • 243 篇 j. strandberg
  • 243 篇 d. calvet
  • 237 篇 beiter a.
  • 235 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 g. spigo
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 104,119 篇 英文
  • 4,851 篇 其他
  • 1,285 篇 中文
  • 200 篇 日文
  • 17 篇 德文
  • 16 篇 法文
  • 13 篇 朝鲜文
  • 7 篇 荷兰文
  • 4 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and System Engineering Department"
110406 条 记 录,以下是11-20 订阅
排序:
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
A Novel Certificateless Signature-based Access Control Scheme for Named In-network Computing Service
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 38-45页
作者: Li, Wanji Liu, Qiangbin Zhu, Yi School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p... 详细信息
来源: 评论
An infrastructure software perspective toward computation offloading between executable specifications and foundation models
收藏 引用
science China(Information sciences) 2025年 第4期68卷 380-382页
作者: Dezhi RAN Mengzhou WU Yuan CAO Assaf MARRON David HAREL Tao XIE Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education School of Computer SciencePeking University School of Electronics Engineering and Computer Science Peking University Department of Computer Science and Applied Mathematics Weizmann Institute of Science
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
来源: 评论
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 245-266页
作者: 廖小飞 赵文举 金海 姚鹏程 黄禹 王庆刚 赵进 郑龙 张宇 邵志远 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Zhejiang Lab Hangzhou 311121China
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
An Encoding-Decoding Framework Based on CNN for circ RNA-RBP Binding Sites Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 256-263页
作者: Yajing GUO Xiujuan LEI Yi PAN School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Department of Computer Science Georgia State University
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th... 详细信息
来源: 评论
NeurDB: an AI-powered autonomous data system
收藏 引用
science China(Information sciences) 2024年 第10期67卷 129-150页
作者: Beng Chin OOI Shaofeng CAI Gang CHEN Yanyan SHEN Kian-Lee TAN Yuncheng WU Xiaokui XIAO Naili XING Cong YUE Lingze ZENG Meihui ZHANG Zhanhao ZHAO School of Computing National University of Singapore College of Computer Science and Technology Zhejiang University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Information Renmin University of China School of Computer Science and Technology Beijing Institute of Technology
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(Information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论