咨询与建议

限定检索结果

文献类型

  • 16,475 篇 会议
  • 8,697 篇 期刊文献
  • 292 册 图书

馆藏范围

  • 25,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,566 篇 工学
    • 11,828 篇 计算机科学与技术...
    • 9,806 篇 软件工程
    • 3,949 篇 信息与通信工程
    • 2,502 篇 控制科学与工程
    • 2,168 篇 生物工程
    • 1,865 篇 电气工程
    • 1,596 篇 生物医学工程(可授...
    • 1,450 篇 电子科学与技术(可...
    • 1,344 篇 光学工程
    • 964 篇 机械工程
    • 892 篇 网络空间安全
    • 758 篇 安全科学与工程
    • 754 篇 动力工程及工程热...
    • 723 篇 仪器科学与技术
    • 652 篇 交通运输工程
    • 641 篇 化学工程与技术
  • 7,934 篇 理学
    • 4,035 篇 数学
    • 2,382 篇 生物学
    • 2,151 篇 物理学
    • 1,396 篇 统计学(可授理学、...
    • 872 篇 系统科学
    • 737 篇 化学
  • 4,549 篇 管理学
    • 2,757 篇 管理科学与工程(可...
    • 1,991 篇 图书情报与档案管...
    • 1,232 篇 工商管理
  • 1,746 篇 医学
    • 1,374 篇 临床医学
    • 1,261 篇 基础医学(可授医学...
    • 880 篇 公共卫生与预防医...
    • 743 篇 药学(可授医学、理...
  • 971 篇 法学
    • 798 篇 社会学
  • 433 篇 经济学
  • 367 篇 农学
  • 282 篇 教育学
  • 192 篇 文学
  • 38 篇 艺术学
  • 37 篇 军事学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 971 篇 deep learning
  • 927 篇 accuracy
  • 659 篇 computational mo...
  • 564 篇 feature extracti...
  • 551 篇 machine learning
  • 539 篇 training
  • 406 篇 internet of thin...
  • 392 篇 predictive model...
  • 385 篇 real-time system...
  • 352 篇 support vector m...
  • 343 篇 convolutional ne...
  • 325 篇 data models
  • 301 篇 semantics
  • 288 篇 computer science
  • 283 篇 computer archite...
  • 260 篇 optimization
  • 238 篇 scalability
  • 237 篇 reliability
  • 233 篇 image segmentati...
  • 229 篇 neural networks

机构

  • 261 篇 school of comput...
  • 243 篇 department of co...
  • 166 篇 school of comput...
  • 149 篇 school of comput...
  • 135 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 115 篇 institute of com...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 100 篇 national enginee...
  • 98 篇 school of comput...
  • 96 篇 department of co...
  • 93 篇 north-west unive...
  • 91 篇 institut univers...
  • 89 篇 department of co...
  • 87 篇 infn sezione di ...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 87 篇 boumaaza j.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 82 篇 coleiro a.
  • 81 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 73 篇 kalekin o.
  • 61 篇 huang f.
  • 61 篇 anguita m.
  • 56 篇 kulikovskiy v.
  • 54 篇 singh kamred udh...
  • 53 篇 benoit d.m.

语言

  • 20,804 篇 英文
  • 4,511 篇 其他
  • 207 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Computer Engineering"
25464 条 记 录,以下是81-90 订阅
排序:
Dynamic Offloading and Scheduling Strategy for Telematics Tasks Based on Latency Minimization
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1809-1829页
作者: Yu Zhou Yun Zhang Guowei Li Hang Yang Wei Zhang Ting Lyu Yueqiang Xu North China Institute of Computing Technology Beijing Beijing100080China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ... 详细信息
来源: 评论
An EETR Approach for Therapeutic Response Prediction Using Gene Expression and Drug Properties  3rd
An EETR Approach for Therapeutic Response Prediction Using G...
收藏 引用
3rd International Conference on computing and Communication Networks, ICCCN 2023
作者: Selvi Rajendran, P. Jawahar, Janiel Computer Science and Engineering School of Computing Hindustan Institute of Technology and Science Chennai India
In recent years, the role of computational methods such as machine learning and deep learning has evolved to help better understand an individual’s response to drugs. Through advancements in the discipline of precisi... 详细信息
来源: 评论
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 61-103页
作者: Ahmed Khalid Rana Asif Rehman Byung-Seo Kim Department of Computer Science FAST School of ComputingNational University of Computer and Emerging SciencesLahore54000Pakistan Department of Software and Communications Engineering Hongik UniversitySejong City30016Republic of Korea
Wireless Ad Hoc Networks consist of devices that are wirelessly *** Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc *** is used in wireless ... 详细信息
来源: 评论
SmartEagleEye:A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
收藏 引用
Tsinghua Science and Technology 2024年 第3期29卷 766-783页
作者: Xin Liu Yingli Zhang Qingchen Yu Jiajun Min Jun Shen Rui Zhou Qingguo Zhou School of Information Science and Engineering Lanzhou UniversityLanzhou 730000China College of Computer Science and Technology Zhejiang UniversityHangzhou 310058China School of Computing and Information Technology University of WollongongWollongong 2500Australia
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin... 详细信息
来源: 评论
Seamless Service Evolution: Enhancing Customer Satisfaction Using AWS-Driven AI Chatbots for Restaurant Ordering  4
Seamless Service Evolution: Enhancing Customer Satisfaction ...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Ali, Mohammed Jaffer Vyshnavi, M.R.V. Kumar, Konda V.S. Harshith Vishnubhatla, Sravya Rajagopal, Shinu M. Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
In the current restaurant business environment, factors have emerged in the manner in which consumers are attended to and the ways orders are placed. As good as these traditional systems may be, they do not offer the ... 详细信息
来源: 评论
Enhanced Security Measures for Image Privacy: Encryption Perspectives  2
Enhanced Security Measures for Image Privacy: Encryption Per...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Omshith, R. Balaji, Vemisetti Pavan Rahul, Rayapudi Venkata Kumaran, U. Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
A key technology in information security, picture encryption is intended to safeguard the integrity and confidentiality of digital photographs. Using a variety of cryptographic techniques and algorithms, the original ... 详细信息
来源: 评论
Anomaly Detection in Classroom Using Convolutional Neural Networks  6th
Anomaly Detection in Classroom Using Convolutional Neural Ne...
收藏 引用
6th International Conference on Soft computing and Signal Processing, ICSCSP 2023
作者: Vidhyasagar, B.S. Doppalapudi, Harshith Chowdary, Sritej Dagumati, VishnuVardhan Charan Kumar Reddy, N. Department of Computer Science and Engineering Amrita School of Computing AmritaVishwaVidyapeetham Chennai India
Anomaly detection is a task that involves identifying patterns or events that deviate significantly from the expected or normal behavior. In the context of classroom settings, it is essential to identify mischievous b... 详细信息
来源: 评论
Advanced Multi-Task Reinforcement Learning Utilising Task-Adaptive Episodic Memory with Hypernetwork Integration  2
Advanced Multi-Task Reinforcement Learning Utilising Task-Ad...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Prasanna Kumar, R. Prasanna Kumar, B.G. Sri Ramakrishna Prabhu, A. Upadhyay, Yash Teja, Nunna Vishnu Swamy, Penta Aravinda Amrita Vishwa Vidyapeetham School of Computing Computer Science and Engineering Chennai India
In deep reinforcement learning, sampling ineffi-ciency is addressed by mimicking human learning which lever-Ages past experiences stored in the hippocampus. Integrating this idea, the proposed approach utilizes a task... 详细信息
来源: 评论
Performance Evaluation and Comparative Ranking of LLM Variants in Entity Relationship Prediction  15
Performance Evaluation and Comparative Ranking of LLM Varian...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Vardhni, Krisha Devaraja, G. Dharhshita, R. Chowdary, Ritesh Krishna Mahadevan, Anbazhagan Amrita School of Computing Department of Computer Science and Engineering Coimbatore641112 India
This paper presents a comprehensive evaluation and ranking of five Large Language Models - Mistral, Vicuna, Phi, Llama 2, and Zephyr - across five temperature variants. The focus is on their ability to predict the lik... 详细信息
来源: 评论
meMIA: Multilevel Ensemble Membership Inference Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 93-106页
作者: Ullah, Najeeb Aman, Muhammad Naveed Sikdar, Biplab National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore University of Nebraska-Lincoln School of Computing LincolnNE68588 United States
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n... 详细信息
来源: 评论