咨询与建议

限定检索结果

文献类型

  • 425,951 篇 会议
  • 158,069 篇 期刊文献
  • 3,596 册 图书
  • 16 篇 学位论文

馆藏范围

  • 587,630 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 341,986 篇 工学
    • 229,327 篇 计算机科学与技术...
    • 187,009 篇 软件工程
    • 82,075 篇 信息与通信工程
    • 53,288 篇 控制科学与工程
    • 45,061 篇 电气工程
    • 44,211 篇 电子科学与技术(可...
    • 38,818 篇 生物工程
    • 28,671 篇 生物医学工程(可授...
    • 25,611 篇 光学工程
    • 24,347 篇 机械工程
    • 19,040 篇 化学工程与技术
    • 18,452 篇 仪器科学与技术
    • 17,586 篇 动力工程及工程热...
    • 15,143 篇 材料科学与工程(可...
    • 12,170 篇 安全科学与工程
    • 11,323 篇 交通运输工程
    • 11,027 篇 网络空间安全
  • 186,136 篇 理学
    • 94,750 篇 数学
    • 58,027 篇 物理学
    • 43,298 篇 生物学
    • 30,765 篇 统计学(可授理学、...
    • 21,679 篇 系统科学
    • 19,982 篇 化学
  • 86,241 篇 管理学
    • 51,798 篇 管理科学与工程(可...
    • 38,030 篇 图书情报与档案管...
    • 24,609 篇 工商管理
  • 26,093 篇 医学
    • 22,023 篇 临床医学
    • 19,939 篇 基础医学(可授医学...
    • 12,686 篇 药学(可授医学、理...
  • 15,470 篇 法学
    • 12,645 篇 社会学
  • 9,464 篇 经济学
  • 7,460 篇 农学
  • 6,351 篇 教育学
  • 2,633 篇 文学
  • 1,324 篇 军事学
  • 841 篇 艺术学
  • 103 篇 哲学
  • 57 篇 历史学

主题

  • 26,563 篇 computer science
  • 14,207 篇 accuracy
  • 13,957 篇 computational mo...
  • 13,610 篇 feature extracti...
  • 11,734 篇 deep learning
  • 11,451 篇 training
  • 10,483 篇 machine learning
  • 8,021 篇 predictive model...
  • 7,970 篇 data mining
  • 7,602 篇 support vector m...
  • 7,424 篇 computer archite...
  • 7,318 篇 optimization
  • 6,870 篇 real-time system...
  • 6,809 篇 neural networks
  • 6,774 篇 wireless sensor ...
  • 6,677 篇 data models
  • 6,559 篇 convolutional ne...
  • 6,420 篇 costs
  • 6,356 篇 algorithm design...
  • 6,246 篇 protocols

机构

  • 2,465 篇 school of comput...
  • 2,203 篇 school of comput...
  • 2,132 篇 chitkara univers...
  • 2,078 篇 school of comput...
  • 1,777 篇 school of comput...
  • 1,682 篇 department of co...
  • 1,462 篇 school of comput...
  • 1,450 篇 school of comput...
  • 1,346 篇 department of co...
  • 1,339 篇 department of el...
  • 1,320 篇 school of electr...
  • 1,293 篇 school of comput...
  • 1,192 篇 school of comput...
  • 1,147 篇 college of compu...
  • 1,113 篇 department of el...
  • 1,013 篇 school of comput...
  • 995 篇 university of ch...
  • 967 篇 department of ph...
  • 939 篇 cavendish labora...
  • 938 篇 college of compu...

作者

  • 421 篇 niyato dusit
  • 315 篇 liu yang
  • 271 篇 yang yang
  • 249 篇 barter w.
  • 228 篇 j. wang
  • 227 篇 s. chen
  • 226 篇 blake t.
  • 225 篇 wang wei
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 bellee v.
  • 217 篇 borsato m.
  • 210 篇 amato s.
  • 209 篇 brundu d.
  • 209 篇 a. gomes
  • 208 篇 boettcher t.
  • 207 篇 beiter a.
  • 194 篇 c. alexa
  • 194 篇 kukreja vinay
  • 192 篇 j. m. izen

语言

  • 520,239 篇 英文
  • 60,674 篇 其他
  • 7,040 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 84 篇 德文
  • 55 篇 法文
  • 50 篇 斯洛文尼亚文
  • 15 篇 西班牙文
  • 12 篇 阿拉伯文
  • 11 篇 俄文
  • 7 篇 土耳其文
  • 6 篇 葡萄牙文
  • 5 篇 捷克文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Science and Engineering and Computer Engineering"
587632 条 记 录,以下是21-30 订阅
排序:
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 957-977页
作者: Peda Narayana Bathula M.Sreenivasulu Department of Computer Science Engineering Jawaharlal Nehru Technological UniversityAnanthapur 515002India Department of Computer Science Engineering Matrusri Engineering CollegeHyderabad 500059India
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ... 详细信息
来源: 评论
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 98-113页
作者: Hengmin Zhang Jian Yang Wenli Du Bob Zhang Zhiyuan Zha Bihan Wen School of Electrical and Electronic Engineering Nanyang Technological University School of Computer Science and Engineering Nanjing University of Science and Technology School of Information Science and Engineering East China University of Science and Technology Department of Electrical and Computer Engineering University of Macau
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher... 详细信息
来源: 评论
Pre-Conference Workshop: Decolonizing What? Limits and Opportunities for Developing Equitable Syllabi in computer science and engineering Education
Pre-Conference Workshop: Decolonizing What? Limits and Oppor...
收藏 引用
Frontiers in Education (FIE) Conference
作者: Chosang Tenzin Gabriel Medina-Kim An Huynh Jane L. Lehr Lynne Slivovsky Lizabeth Thompson Mechanical Engineering California Polytechnic State University San Luis Obispo CA Science and Technology Studies Rensselaer Polytechnic Institute Troy New York Psychology California Polytechnic State University San Luis Obispo CA Women's Gender & Queer Studies California Polytechnic State University San Luis Obispo CA Computer Engineering California Polytechnic State University San Luis Obispo CA Industrial & Manufacturing Engineering California Polytechnic State University San Luis Obispo CA
This research-to-practice pre-conference workshop brings insights and approaches to equitable syllabus development to college-level instructors. The organizers synthesize their experiences and research on the structur... 详细信息
来源: 评论
Role of network security management help in computer science engineering
收藏 引用
AIP Conference Proceedings 2024年 第1期2816卷
作者: K. R. Krishnareddy T. V. Aravinda Department of Computer science and Engineering SJM Institute of Technology Chitradurga Karnataka India
Cyber security is a subsection of computer science. Latest technologies used by “security network management system” for cyber security have enhanced the entire field of computer science and they are potential to ge...
来源: 评论
A Task Scheduling Algorithm Based on Clustering Pre-processing in Space-Based Information Network
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 217-230页
作者: Yufei WANG Jun LIU Shengnan ZHANG Sai XU Jingyi WANG School of Computer Science and Engineering Northeastern University
With the diversification of space-based information network task requirements and the dramatic increase in demand, the efficient scheduling of various tasks in space-based information network becomes a new challenge. ... 详细信息
来源: 评论
A Weakly-Supervised Crowd Density Estimation Method Based on Two-Stage Linear Feature Calibration
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 965-981页
作者: Yong-Chao Li Rui-Sheng Jia Ying-Xiang Hu Hong-Mei Sun the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590 the Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266000China the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590China the College of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210000China
In a crowd density estimation dataset,the annotation of crowd locations is an extremely laborious task,and they are not taken into the evaluation *** this paper,we aim to reduce the annotation cost of crowd datasets,a... 详细信息
来源: 评论
Practical cloud storage auditing using serverless computing
收藏 引用
science China(Information sciences) 2024年 第3期67卷 33-47页
作者: Fei CHEN Jianquan CAI Tao XIANG Xiaofeng LIAO College of Computer Science and Software Engineering Shenzhen University College of Computer Science Chongqing University
Cloud storage auditing research is dedicated to solving the data integrity problem of outsourced storage on the cloud. In recent years, researchers have proposed various cloud storage auditing schemes using different ... 详细信息
来源: 评论
Troy: Efficient Service Deployment for Windows Systems
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 313-322页
作者: Deyu ZHANG Yu XIE Mucong XU En CHENG Xiaoyan KUI Bangwen HE Yunhao LI School of Computer Science and Engineering Central South University
The modern university computer lab and kindergarden through 12th grade classrooms require a centralized solution to efficiently manage a large number of desktops. The existing solutions either bring virtualization ove... 详细信息
来源: 评论
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论