咨询与建议

限定检索结果

文献类型

  • 20,073 篇 会议
  • 12,988 篇 期刊文献
  • 315 册 图书

馆藏范围

  • 33,376 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,688 篇 工学
    • 14,439 篇 计算机科学与技术...
    • 11,977 篇 软件工程
    • 4,805 篇 信息与通信工程
    • 3,247 篇 控制科学与工程
    • 2,693 篇 生物工程
    • 2,674 篇 电气工程
    • 2,153 篇 电子科学与技术(可...
    • 2,049 篇 生物医学工程(可授...
    • 1,783 篇 光学工程
    • 1,362 篇 机械工程
    • 1,255 篇 化学工程与技术
    • 1,188 篇 动力工程及工程热...
    • 1,032 篇 网络空间安全
    • 1,022 篇 仪器科学与技术
    • 951 篇 安全科学与工程
    • 916 篇 材料科学与工程(可...
  • 11,918 篇 理学
    • 5,843 篇 数学
    • 3,856 篇 物理学
    • 2,994 篇 生物学
    • 1,986 篇 统计学(可授理学、...
    • 1,371 篇 化学
    • 1,247 篇 系统科学
  • 5,596 篇 管理学
    • 3,420 篇 管理科学与工程(可...
    • 2,398 篇 图书情报与档案管...
    • 1,514 篇 工商管理
  • 2,206 篇 医学
    • 1,768 篇 临床医学
    • 1,591 篇 基础医学(可授医学...
    • 1,066 篇 公共卫生与预防医...
    • 953 篇 药学(可授医学、理...
  • 1,168 篇 法学
    • 959 篇 社会学
  • 601 篇 经济学
  • 513 篇 农学
  • 372 篇 教育学
  • 206 篇 文学
  • 65 篇 军事学
  • 43 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 1,123 篇 accuracy
  • 1,099 篇 deep learning
  • 727 篇 computational mo...
  • 722 篇 machine learning
  • 687 篇 training
  • 664 篇 feature extracti...
  • 516 篇 predictive model...
  • 493 篇 real-time system...
  • 463 篇 internet of thin...
  • 458 篇 convolutional ne...
  • 433 篇 support vector m...
  • 404 篇 data models
  • 334 篇 semantics
  • 297 篇 computer science
  • 275 篇 reliability
  • 268 篇 optimization
  • 266 篇 artificial intel...
  • 261 篇 neural networks
  • 260 篇 computer archite...
  • 256 篇 scalability

机构

  • 232 篇 school of comput...
  • 190 篇 department of co...
  • 151 篇 key laboratory o...
  • 150 篇 university of ch...
  • 125 篇 university of sc...
  • 121 篇 school of comput...
  • 120 篇 department of co...
  • 116 篇 school of comput...
  • 115 篇 school of comput...
  • 112 篇 school of comput...
  • 111 篇 department of co...
  • 111 篇 institute of com...
  • 105 篇 department of co...
  • 103 篇 college of compu...
  • 100 篇 school of comput...
  • 99 篇 school of comput...
  • 97 篇 school of comput...
  • 93 篇 north-west unive...
  • 91 篇 national enginee...
  • 90 篇 department of co...

作者

  • 171 篇 niyato dusit
  • 104 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 83 篇 zheng wei-shi
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 81 篇 anjali t.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 72 篇 li xin
  • 69 篇 li cheng
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 64 篇 liu d.
  • 64 篇 kalekin o.
  • 62 篇 chen m.j.
  • 61 篇 díaz a.f.

语言

  • 30,082 篇 英文
  • 3,033 篇 其他
  • 293 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33376 条 记 录,以下是4371-4380 订阅
排序:
Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT
Security Analysis and Improvement of Authenticated Key Agree...
收藏 引用
2024 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2024
作者: Gautam, Deepika Thakur, Garima Obaidat, Mohammad S. Hsiao, Kuei-Fang Kumar, Pankaj Central University of Himachal Pradesh Srinivasa Ramanujan Department of Mathematics HP Dharamshala176215 India School of Computer and Communication Engineering University of Science and Technology Beijing China School of Computing SRM University Department of Computational Intelligence TN Kattankulathur India School of Engineering The Amity University UP 201301 India
The Internet of Medical Things (IoMT) is a network of medical devices, hardware infrastructure, and software that accumulates real-Time data through remote monitoring and minimizes doctor-patient interaction, enhancin... 详细信息
来源: 评论
Not All Pairs are Equal: Hierarchical Learning for Average-Precision-Oriented Video Retrieval  24
Not All Pairs are Equal: Hierarchical Learning for Average-P...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Yang Xu, Qianqian Wen, Peisong Dai, Siran Huang, Qingming School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences BDKM University of Chinese Academy of Sciences Beijing China
The rapid growth of online video resources has significantly promoted the development of video retrieval methods. As a standard evaluation metric for video retrieval, Average Precision (AP) assesses the overall rankin... 详细信息
来源: 评论
"Socially Assistive Robot Privacy Model": A Multi-model Approach to Evaluating Socially Assistive Robot Privacy Concerns  16th
"Socially Assistive Robot Privacy Model": A Multi-model Appr...
收藏 引用
16th International Conference on Social Robotics, ICSR + AI 2024
作者: Collins, Sawyer Stanojević, Čedomir Bennett, Casey Henkel, Zachary Henkel, Kenna Baugus Abbott, Nikki M. Bethel, Cindy L. Śabanović, Selma Luddy School of Informatics Computing and Engineering Indiana University Bloomington BloomingtonIN United States College of Behavioral Social and Health Sciences Clemson University ClemsonSC United States College of Computing and Digital Media DePaul University ChicagoIL United States Department of Computer Science and Engineering Mississippi State University StarkvilleMS United States
As socially assistive robots (SARs) enter more diverse care settings, including users’ homes, it is critical to identify the shifting privacy risks and dimensions of privacy this technology and its data collection ca... 详细信息
来源: 评论
An Enhanced Convolutional Neural Network Based on L1 Regularization for Segmentation of Coronary Arteries in X-Ray Angiograms  5
An Enhanced Convolutional Neural Network Based on L1 Regular...
收藏 引用
5th International Conference on Advancements in Computational sciences, ICACS 2024
作者: Wahid, Fazli Ma, Yingliang Sheikh, Ramla Aamir, Muhammad University of East Anglia School of Computing Sciences Norwich United Kingdom University of Haripur Department of Information Technology Khyber Pakhtunkhwa Pakistan University of Derby Data Science Research Centre Colloge of Science and Engineering Derby United Kingdom
The automatic segmentation of coronary arteries in X-Ray angiograms has a significant role in identification and detection of various abnormalities in vessels which can be adequately helpful in computer aided diagnosi... 详细信息
来源: 评论
Sensor-Based Authentication on Smartphones via Integrating Auxiliary Information
Sensor-Based Authentication on Smartphones via Integrating A...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Yingjie Hu, Ruimin Wuhan University National Engineering Research Center for Multimedia Software Whuhan430072 China School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Whuhan430072 China
With the widespread use of smartphones, more and more private information is stored on the phone, and the loss or theft of the phone can lead to data leakage, theft of property, and other problems. Traditional active ... 详细信息
来源: 评论
Brain Tumor detection Using Machine Learning and Deep Learning Approaches
Brain Tumor detection Using Machine Learning and Deep Learni...
收藏 引用
2022 IEEE International Conference on Advances in computing, Communication and Applied Informatics, ACCAI 2022
作者: Khan, Oneza Tehreem Rajeswari, D. School of Computing College of Engineering and Technology Department of Data Science and Business Systems Kattankulathur603203 India
Recent years has provided extremely interesting and exciting developments and applications of Machine Learning (ML) and Deep Learning (DL) to automize healthcare delivery. ML techniques are surpassing human performanc... 详细信息
来源: 评论
Chronic Kidney Disease Analysis using Various Biological Parameters under Machine Learning Techniques
Chronic Kidney Disease Analysis using Various Biological Par...
收藏 引用
Automation, computing and Renewable Systems (ICACRS), International Conference on
作者: M. Suresh E. Nirmala M. Maragatharajan Manish Yadav School of Computing Science and Engineering VIT Bhopal University Kotri Kalan Madhya Pradesh School of Computing Science Engineering and Artificial Intelligence VIT Bhopal University Kotri Kalan Madhya Pradesh
Kidney chronic disease (KCD) has become one of the most critical illnesses which should be diagnosed properly within a certain limit of time for better treatment. Nowadays different algorithms being used for treatment... 详细信息
来源: 评论
Phase-field-based lattice Boltzmann method for containerless freezing
收藏 引用
Physical Review E 2024年 第3期110卷 035301页
作者: Jiangxu Huang Lei Wang Zhenhua Chai Baochang Shi School of Mathematics and Statistics School of Mathematics and Physics Institute of Interdisciplinary Research for Mathematics and Applied Science Hubei Key Laboratory of Engineering Modeling and Scientific Computing
In this paper we first propose a phase-field model for the containerless freezing problems, in which the volume expansion or shrinkage of the liquid caused by the density change during the phase change process is cons... 详细信息
来源: 评论
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论
Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
Poster: Zero Trust Driven Architecture for Blockchain-Based ...
收藏 引用
2024 SIGCOMM Poster and Demo Sessions, SIGCOMM Posters and Demos 2024
作者: Mukta, Rahma Pal, Shantanu Hitchens, Michael Paik, Hye-Young Kanhere, Salil S Department of CSE Chittagong University of Engineering and Technology Chittagong4349 Bangladesh School of Information Technology Deakin University MelbourneVIC3125 Australia School of Computing Macquarie University SydneyNSW2109 Australia School of Computer Science and Engineering University of New South Wales SydneyNSW2052 Australia
Granting access and controlling access rights for online services is challenging in a highly dynamic and large-scale systems. In particular, the secure propagation of access right delegation is a major issue. Many pro... 详细信息
来源: 评论