咨询与建议

限定检索结果

文献类型

  • 50,406 篇 会议
  • 31,700 篇 期刊文献
  • 771 册 图书

馆藏范围

  • 82,877 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 50,179 篇 工学
    • 33,601 篇 计算机科学与技术...
    • 27,548 篇 软件工程
    • 11,407 篇 信息与通信工程
    • 7,727 篇 控制科学与工程
    • 6,283 篇 电气工程
    • 6,042 篇 电子科学与技术(可...
    • 5,858 篇 生物工程
    • 4,483 篇 光学工程
    • 4,381 篇 生物医学工程(可授...
    • 3,482 篇 机械工程
    • 3,083 篇 化学工程与技术
    • 2,682 篇 仪器科学与技术
    • 2,417 篇 动力工程及工程热...
    • 2,265 篇 材料科学与工程(可...
    • 1,976 篇 网络空间安全
    • 1,879 篇 安全科学与工程
  • 28,999 篇 理学
    • 13,799 篇 数学
    • 9,911 篇 物理学
    • 6,745 篇 生物学
    • 4,617 篇 统计学(可授理学、...
    • 3,411 篇 化学
    • 2,892 篇 系统科学
  • 13,168 篇 管理学
    • 8,321 篇 管理科学与工程(可...
    • 5,353 篇 图书情报与档案管...
    • 3,635 篇 工商管理
  • 4,454 篇 医学
    • 3,630 篇 临床医学
    • 3,218 篇 基础医学(可授医学...
    • 1,923 篇 药学(可授医学、理...
    • 1,876 篇 公共卫生与预防医...
  • 2,269 篇 法学
    • 1,903 篇 社会学
  • 1,396 篇 经济学
  • 1,156 篇 农学
  • 847 篇 教育学
  • 319 篇 文学
  • 205 篇 军事学
  • 127 篇 艺术学
  • 18 篇 哲学
  • 8 篇 历史学

主题

  • 2,620 篇 accuracy
  • 2,154 篇 deep learning
  • 2,067 篇 feature extracti...
  • 1,835 篇 training
  • 1,798 篇 computer science
  • 1,738 篇 computational mo...
  • 1,687 篇 machine learning
  • 1,230 篇 predictive model...
  • 1,160 篇 real-time system...
  • 1,099 篇 convolutional ne...
  • 1,074 篇 optimization
  • 1,062 篇 semantics
  • 1,046 篇 internet of thin...
  • 1,005 篇 support vector m...
  • 965 篇 data models
  • 926 篇 artificial intel...
  • 828 篇 neural networks
  • 792 篇 data mining
  • 763 篇 security
  • 724 篇 software enginee...

机构

  • 1,097 篇 cavendish labora...
  • 1,035 篇 department of ph...
  • 1,007 篇 university of ch...
  • 987 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 586 篇 fakultät physik ...
  • 557 篇 school of physic...
  • 542 篇 chitkara univers...
  • 540 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 537 篇 school of physic...
  • 531 篇 school of comput...
  • 522 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 513 篇 school of comput...
  • 507 篇 stfc rutherford ...
  • 505 篇 nikhef national ...
  • 496 篇 school of physic...
  • 492 篇 physik-institut ...
  • 490 篇 iccub universita...

作者

  • 274 篇 barter w.
  • 268 篇 a. gomes
  • 251 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 247 篇 c. amelung
  • 246 篇 g. bella
  • 245 篇 j. strandberg
  • 245 篇 d. calvet
  • 238 篇 s. chen
  • 237 篇 blake t.
  • 235 篇 bellee v.
  • 231 篇 brundu d.
  • 227 篇 g. spigo
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 220 篇 f. siegert

语言

  • 70,426 篇 英文
  • 11,290 篇 其他
  • 1,165 篇 中文
  • 102 篇 日文
  • 22 篇 德文
  • 13 篇 法文
  • 12 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Science and the Software Engineering Institute"
82877 条 记 录,以下是321-330 订阅
排序:
Beamforming and Reflection Design for Short Packet ISAC With Non-Ideal RIS: An A3C-Based Approach
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8379-8384页
作者: Mahmoudi, Behrad Khonsari, Ahmad Zeinali, Farshad Mili, Mohammad Robat Mashhadi, Mahdi Boloursaz Xiao, Pei University of Tehran Department of Electrical and Computer Engineering Tehran Iran University of Tehran School of Electrical and Computer Engineering College of Engineering Tehran Iran School of Computer Science in the Institute for Research in Fundamental Sciences Tehran Iran United Kingdom Institute for Advanced Innovative Solutions Tehran Iran
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy... 详细信息
来源: 评论
Leveraging Network Slicing in SDNs for Handling Application Failures
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第4期51卷 409-421页
作者: Lokesh, Bommareddy Rajagopalan, Narendran School of Computer Science and Engineering VIT-AP University Andhra Pradesh Amaravati522237 India Department of Computer Science and Engineering National Institute of Technology Puducherry Karaikal609609 India
Unlike traditional networks, software-defined networks (SDNs) provide an overall view and centralized control of all the devices in the network. SDNs enable the network administrator to implement the network policy by... 详细信息
来源: 评论
Learner’s intention analysis to mitigate the cold start problem in personalized learning recommendation systems
收藏 引用
Multimedia Tools and Applications 2024年 1-55页
作者: Pal, Saurabh Pramanik, Pijush Kanti Dutta Choudhury, Prasenjit Department of Computer Science and Engineering School of Engineering Brainware University Kolkata India School of Computer Applications and Technology Galgotias University Uttar Pradesh Greater Noida India Department of Computer Science & amp Engineering National Institute of Technology Durgapur West Bengal India
Understanding the learner’s requirements and status is important for recommending relevant and appropriate learning materials to the learner in personalized learning. For this purpose, the learning recommendatio... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
OptiFog: A Framework for Acquiring State Information and Predicting Resource Availability for Task Offloading in Cooperative Fog-Networks
收藏 引用
IEEE Transactions on Services Computing 2024年 1-13页
作者: Alam, Mehbub Ahmed, Nurzaman Ghosh, Shyamal Matam, Rakesh Barbhuiya, Ferdous Ahmed Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India Department of Computer Science Dartmouth College Hanover USA School of Data Science Indian Institute of Science Education and Research Thiruvananthapuram India
The primary objective of fog computing is to minimize the reliance of IoT devices on the cloud by leveraging the resources of fog network. Typically, IoT devices offload computation tasks to fog to meet different task... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论
Analysis of software Trustworthiness Based on FAHP-CRITIC Method
收藏 引用
Journal of Shanghai Jiaotong university(science) 2024年 第3期29卷 588-600页
作者: 高晓彤 马艳芳 周伟 School of Computer Science and Technology Huaibei Normal UniversityHuaibei 235000AnhuiChina School of Computer Science and Information Engineering Changzhou Institute of TechnologyChangzhou 213000JiangsuChina
software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua... 详细信息
来源: 评论
Image Enhancement via Associated Perturbation Removal and Texture Reconstruction Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2253-2269页
作者: Kui Jiang Ruoxi Wang Yi Xiao Junjun Jiang Xin Xu Tao Lu IEEE the School of Computer Science and Technology Harbin Institute of Technology Zhengzhou Research Institute Harbin Institute of Technology the School of Artificial Intelligence Jianghan University the School of Geodesy and Geomatics Wuhan University the Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology the School of Computer Science and Engineering and also with the Hubei Province Key Laboratory of Intelligent Robot Wuhan Institute of Technology
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti... 详细信息
来源: 评论
Bias analysis of AI models for undergraduate student admissions
收藏 引用
Neural Computing and Applications 2025年 第12期37卷 7785-7795页
作者: Van Busum, Kelly Fang, Shiaofen Department of Computer Science and Software Engineering Butler University IndianapolisIN United States Computing and Engineering Indiana University Luddy School of Informatics Indiana University Indianapolis IndianapolisIN United States
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp... 详细信息
来源: 评论