咨询与建议

限定检索结果

文献类型

  • 16,475 篇 会议
  • 8,697 篇 期刊文献
  • 292 册 图书

馆藏范围

  • 25,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,566 篇 工学
    • 11,828 篇 计算机科学与技术...
    • 9,806 篇 软件工程
    • 3,949 篇 信息与通信工程
    • 2,502 篇 控制科学与工程
    • 2,168 篇 生物工程
    • 1,865 篇 电气工程
    • 1,596 篇 生物医学工程(可授...
    • 1,450 篇 电子科学与技术(可...
    • 1,344 篇 光学工程
    • 964 篇 机械工程
    • 892 篇 网络空间安全
    • 758 篇 安全科学与工程
    • 754 篇 动力工程及工程热...
    • 723 篇 仪器科学与技术
    • 652 篇 交通运输工程
    • 641 篇 化学工程与技术
  • 7,934 篇 理学
    • 4,035 篇 数学
    • 2,382 篇 生物学
    • 2,151 篇 物理学
    • 1,396 篇 统计学(可授理学、...
    • 872 篇 系统科学
    • 737 篇 化学
  • 4,549 篇 管理学
    • 2,757 篇 管理科学与工程(可...
    • 1,991 篇 图书情报与档案管...
    • 1,232 篇 工商管理
  • 1,746 篇 医学
    • 1,374 篇 临床医学
    • 1,261 篇 基础医学(可授医学...
    • 880 篇 公共卫生与预防医...
    • 743 篇 药学(可授医学、理...
  • 971 篇 法学
    • 798 篇 社会学
  • 433 篇 经济学
  • 367 篇 农学
  • 282 篇 教育学
  • 192 篇 文学
  • 38 篇 艺术学
  • 37 篇 军事学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 971 篇 deep learning
  • 927 篇 accuracy
  • 659 篇 computational mo...
  • 564 篇 feature extracti...
  • 551 篇 machine learning
  • 539 篇 training
  • 406 篇 internet of thin...
  • 392 篇 predictive model...
  • 385 篇 real-time system...
  • 352 篇 support vector m...
  • 343 篇 convolutional ne...
  • 325 篇 data models
  • 301 篇 semantics
  • 288 篇 computer science
  • 283 篇 computer archite...
  • 260 篇 optimization
  • 238 篇 scalability
  • 237 篇 reliability
  • 233 篇 image segmentati...
  • 229 篇 neural networks

机构

  • 261 篇 school of comput...
  • 243 篇 department of co...
  • 166 篇 school of comput...
  • 149 篇 school of comput...
  • 135 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 115 篇 institute of com...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 100 篇 national enginee...
  • 98 篇 school of comput...
  • 96 篇 department of co...
  • 93 篇 north-west unive...
  • 91 篇 institut univers...
  • 89 篇 department of co...
  • 87 篇 infn sezione di ...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 87 篇 boumaaza j.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 82 篇 coleiro a.
  • 81 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 73 篇 kalekin o.
  • 61 篇 huang f.
  • 61 篇 anguita m.
  • 56 篇 kulikovskiy v.
  • 54 篇 singh kamred udh...
  • 53 篇 benoit d.m.

语言

  • 20,804 篇 英文
  • 4,511 篇 其他
  • 207 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Computer Engineering"
25464 条 记 录,以下是4911-4920 订阅
排序:
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论
FedSTGNN: A Federated Spatio-Temporal Graph Neural Network
FedSTGNN: A Federated Spatio-Temporal Graph Neural Network
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Heeyong Yoon Kang-Wook Chon Min-Soo Kim Department of Electrical Engineering and Computer Science DGIST Daegu Republic of Korea School of Computer Science and Engineering KOREATECH Cheonan Republic of Korea School of Computing KAIST Daejeon Republic of Korea
Owing to the explosive growth of the Internet of Things (IoT), there have been vast volumes of sensor-generated time series data in various locations. A lot of network usage occurs through these locations to process t... 详细信息
来源: 评论
Comparative Analysis of Bellman-Ford and Dijkstra Algorithms in Software Defined Networking
Comparative Analysis of Bellman-Ford and Dijkstra Algorithms...
收藏 引用
Data Intelligence and Cognitive Informatics (ICDICI), International Conference on
作者: Prabhav Ravi Tammanashastri Shinu M Rajagopal Sahen Shivadutt Bananjee Dept. of Computer Science Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetam India
One of the key functions of the internet is packet routing of data. A routing protocol outlines the channel of communication between routers that is utilized to connect networks. Numerous routing protocols, including ... 详细信息
来源: 评论
Comparative Analysis of Fake Account Detection Using Machine Learning Algorithms
Comparative Analysis of Fake Account Detection Using Machine...
收藏 引用
Artificial Intelligence and Signal Processing (AISP), INDIA, International Conference on
作者: A Padmavathi K.B. Vaisshnavi Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
With the rise of Social Media platforms and new applications, the Rapid Expansion of fake accounts has become an important concern, posing threats to security, privacy and trust-worthiness. In response, this research ... 详细信息
来源: 评论
Bi-directional GRU-Based Approach for Multi-Class Text Error Identification System
Bi-directional GRU-Based Approach for Multi-Class Text Error...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Shaik Reeha Boda Venkata Nikith G Mani Prakash Reddy Peeta Basa Pati Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In today's highly competitive academic and research landscape, the impression authors leave on readers is paramount to their reputation and success. Spelling errors can significantly undermine an author's cred... 详细信息
来源: 评论
Efficient Meeting Insights: NLP-Enhanced Summarization of Voice and Text
Efficient Meeting Insights: NLP-Enhanced Summarization of Vo...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: K. Sankar Brahmachari Mangaluru Hanumesh G. Anitha Balachandra Pattanaik Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai Tamil Nadu India School of Electrical Computer Engineering Wollega University Nekemte Ethiopia Africa
In order to improve meeting efficiency in the ever-changing workplace, research has mostly focused on sophisticated text summarization techniques such as machine learning, hybrid, semantic, and graph-based methods. Th... 详细信息
来源: 评论
Securing Images: Cryptographic Approach in Big Data Scenario
Securing Images: Cryptographic Approach in Big Data Scenario
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Kriti Priya Shah Subodh Narayan Sah Osho Kothari H.N. Vishwas Department. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Digital Image as a form of data is a critical component of the digital age. Therefore, Image Encryption and Decryption is one of the important aspect for modern communication. Image security for such digital images re... 详细信息
来源: 评论
Advancing Weed Detection in Agricultural Landscapes Using computer Vision  5
Advancing Weed Detection in Agricultural Landscapes Using Co...
收藏 引用
5th IEEE International Conference on Artificial Intelligence in engineering and Technology, IICAIET 2023
作者: Tan, Bei Ren Moung, Ervin Afnan Uda, Muhd. Nur Kin Teo, Kenneth Tze Angeline, Lorita School of Computer Science Taylor's University Subang Jaya Malaysia Universiti Malaysia Sabah Faculty of Computing and Informatics Kota Kinabalu Malaysia Universiti Malaysia Sabah Faculty of Engineering Kota Kinabalu Malaysia Universiti Malaysia Sabah Modelling Simulation & Computing Laboratory Faculty of Engineering Kota Kinabalu Malaysia
This paper explores the need for weed detection in agricultural landscapes, where weed infestations pose significant crop productivity challenges. To address this matter, computer vision techniques are utilised to cre... 详细信息
来源: 评论
Scaffolding Process-Aware Information Systems with the AKIP Platform  1
收藏 引用
18th International Conference on Web Information Systems and Technologies, WEBIST 2022
作者: Telemaco Neto, Ulisses Oliveira, Toacy Pillat, Raquel Alencar, Paulo Cowan, Don Melo, Glaucia David R. Cheriton School of Computer Science University of Waterloo Waterloo Canada System Engineering and Computing Program Federal University of Rio de Janeiro Rio de Janeiro Brazil
Business Process Automation (BPA) refers to the automation of business processes through technology, with the goal of improving efficiency, reducing errors, and increasing productivity by eliminating manual and repeti... 详细信息
来源: 评论
Safe and Secure Communication Using SSL/TLS
Safe and Secure Communication Using SSL/TLS
收藏 引用
Emerging Smart computing and Informatics (ESCI), Conference on
作者: Darapureddy Devendra Kumar Jerripothula Desai Mukharzee Chirla Vijay Durga Reddy Shinu M. Rajagopal Dept. of Computer Science and Engineering Amrita School Of Computing Bengaluru Amrita Vishwa Vidyapeetham India
In an ever-evolving digital environment, prioritizing user security and authentication processes is critical. It presents a comprehensive approach to creating a secure login page using SSL/TLS certificates. We focus o...
来源: 评论