咨询与建议

限定检索结果

文献类型

  • 19,765 篇 会议
  • 12,860 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 32,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,375 篇 工学
    • 14,238 篇 计算机科学与技术...
    • 11,829 篇 软件工程
    • 4,760 篇 信息与通信工程
    • 3,186 篇 控制科学与工程
    • 2,689 篇 生物工程
    • 2,645 篇 电气工程
    • 2,129 篇 电子科学与技术(可...
    • 2,024 篇 生物医学工程(可授...
    • 1,744 篇 光学工程
    • 1,350 篇 机械工程
    • 1,240 篇 化学工程与技术
    • 1,181 篇 动力工程及工程热...
    • 1,023 篇 网络空间安全
    • 1,012 篇 仪器科学与技术
    • 934 篇 安全科学与工程
    • 903 篇 材料科学与工程(可...
  • 11,808 篇 理学
    • 5,800 篇 数学
    • 3,806 篇 物理学
    • 2,983 篇 生物学
    • 1,970 篇 统计学(可授理学、...
    • 1,356 篇 化学
    • 1,243 篇 系统科学
  • 5,540 篇 管理学
    • 3,386 篇 管理科学与工程(可...
    • 2,378 篇 图书情报与档案管...
    • 1,498 篇 工商管理
  • 2,175 篇 医学
    • 1,739 篇 临床医学
    • 1,568 篇 基础医学(可授医学...
    • 1,041 篇 公共卫生与预防医...
    • 953 篇 药学(可授医学、理...
  • 1,155 篇 法学
    • 954 篇 社会学
  • 597 篇 经济学
  • 508 篇 农学
  • 363 篇 教育学
  • 207 篇 文学
  • 64 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 1,104 篇 accuracy
  • 1,084 篇 deep learning
  • 724 篇 machine learning
  • 710 篇 computational mo...
  • 674 篇 training
  • 653 篇 feature extracti...
  • 504 篇 predictive model...
  • 483 篇 real-time system...
  • 463 篇 internet of thin...
  • 436 篇 convolutional ne...
  • 430 篇 support vector m...
  • 396 篇 data models
  • 330 篇 semantics
  • 294 篇 computer science
  • 269 篇 reliability
  • 267 篇 optimization
  • 263 篇 artificial intel...
  • 259 篇 computer archite...
  • 256 篇 scalability
  • 255 篇 neural networks

机构

  • 229 篇 school of comput...
  • 189 篇 department of co...
  • 152 篇 key laboratory o...
  • 143 篇 university of ch...
  • 124 篇 university of sc...
  • 119 篇 school of comput...
  • 113 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 department of co...
  • 108 篇 school of comput...
  • 108 篇 department of co...
  • 107 篇 institute of com...
  • 100 篇 school of comput...
  • 99 篇 department of co...
  • 98 篇 college of compu...
  • 95 篇 school of comput...
  • 94 篇 north-west unive...
  • 91 篇 school of comput...
  • 91 篇 national enginee...
  • 89 篇 department of co...

作者

  • 159 篇 niyato dusit
  • 103 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 80 篇 zheng wei-shi
  • 79 篇 anjali t.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 71 篇 li xin
  • 68 篇 li cheng
  • 67 篇 jiang k.
  • 66 篇 kuleshov d.
  • 65 篇 kalekin o.
  • 64 篇 liu d.
  • 64 篇 díaz a.f.
  • 63 篇 chen m.j.

语言

  • 30,858 篇 英文
  • 1,836 篇 其他
  • 283 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Engineering and Computing Science"
32939 条 记 录,以下是51-60 订阅
排序:
Automated Pizza Ordering System  1
Automated Pizza Ordering System
收藏 引用
1st IEEE International Conference on Advances in computing, Communication and Networking, ICAC2N 2024
作者: Pandey, Pragati Shrivastava, Ankit Chandra Singh, Ajay Shanker Sharma, Nisha Galgotias University School of Computing Science & Engineering India
The rapid proliferation of unwired techniques and mobile instruments had profound effect on daily basis. To leverage the potential of these technologies in the hospitality industry, there have been early attempts to m... 详细信息
来源: 评论
Inductive Lottery Ticket Learning for Graph Neural Networks
收藏 引用
Journal of Computer science & Technology 2024年 第6期39卷 1223-1237页
作者: Yong-Duo Sui Xiang Wang Tianlong Chen Meng Wang Xiang-Nan He Tat-Seng Chua School of Data Science University of Science and Technology of ChinaHefei 230027China Department of Electrical and Computer Engineering The University of Texas at AustinAustin 78712U.S.A School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Computing National University of SingaporeSingapore
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor... 详细信息
来源: 评论
SmartEagleEye:A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 766-783页
作者: Xin Liu Yingli Zhang Qingchen Yu Jiajun Min Jun Shen Rui Zhou Qingguo Zhou School of Information Science and Engineering Lanzhou UniversityLanzhou 730000China College of Computer Science and Technology Zhejiang UniversityHangzhou 310058China School of Computing and Information Technology University of WollongongWollongong 2500Australia
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin... 详细信息
来源: 评论
A new perspective exploration of machine learning algorithms for defending Side-Channel attacks
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Ramakrishnan, Vedhavathy Thoguluva Seethapathy, Murugaanandam Sundar, Ramesh Dhandapani, Saveetha Munusamy, Sundarrajan Balasubrahmaniam, Lakshmi Dhevi Department of Networking and Communications School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India
Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various aspects of the application in cloud computing. One of the security is... 详细信息
来源: 评论
Research on traffic sign detection method based on FLB-YOLOv8  5
Research on traffic sign detection method based on FLB-YOLOv...
收藏 引用
5th International Conference on Computer Communication and Network Security, CCNS 2024
作者: Cai, Yichong Min, Rui Huang, Jinyu School of Computing Science and Engineering Sichuan University of Science & Engineering Yibin644000 China
In this paper, the proposed FLB-YOLOv8 model address issues in current traffic sign recognition, such as leakage, false detection, low accuracy, and excessive model parameters. Firstly, a small target detection layer ... 详细信息
来源: 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Hierarchical detection of unsafe conditions in banks based on YOLOv8  5
Hierarchical detection of unsafe conditions in banks based o...
收藏 引用
5th International Conference on Computer Communication and Network Security, CCNS 2024
作者: Jiang, Shuping Li, Yuansong School of Computing Science and Engineering Sichuan University of Science & Engineering Yibin644000 China
This study proposes an improved YOLOv8 algorithm based on the network model framework in response to issues in grading accuracy, slow speed, high false alarm rate, and the excessive workload of monitoring staff encoun... 详细信息
来源: 评论
Lightweight YOLOv8 for grape leaf lesion detection  3
Lightweight YOLOv8 for grape leaf lesion detection
收藏 引用
2024 3rd International Conference on Image Processing, Object Detection, and Tracking, IPODT 2024
作者: Ren, Yuhao Huang, Jinyu School of Computing Science and Engineering Sichuan University of Science & Engineering Yibin644000 China
In the field of smart agriculture, the rapid and accurate detection of grape leaf diseases is crucial, especially for early-stage small lesions. To enhance the efficiency of detecting grape leaf diseases in resource-l... 详细信息
来源: 评论
PECMS: modeling a personalized energy and comfort management system based on residents’ behavior anticipation in smart home
收藏 引用
Journal of Reliable Intelligent Environments 2024年 第2期10卷 123-136页
作者: Raeiszadeh, Mahsa Tahayori, Hooman Bahadori-jahromi, Ali Department of Computer Science and Engineering and IT Shiraz University Shiraz Iran School of Computing and Engineering University of West London London United Kingdom
Indoor electrical systems are aimed to provide comfort to the occupants. However, their operation is contingent on the presence or needs of the residents. Hence, to optimize energy consumption and guarantee the desire... 详细信息
来源: 评论
Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 1895-1907页
作者: S.Priya R.S.Ponmagal Department of Computer Science and Engineering School of ComputingSRM Institute of Science and TechnologyChengapattu603203Tamil NaduIndia Department of Computing Technologies School of ComputingSRM Institute of Science and TechnologyChengapattu603203Tamil NaduIndia
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion *** address such threats towards cloud services,numerous t... 详细信息
来源: 评论