咨询与建议

限定检索结果

文献类型

  • 31,100 篇 会议
  • 23,995 篇 期刊文献
  • 429 册 图书

馆藏范围

  • 55,524 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,642 篇 工学
    • 19,947 篇 计算机科学与技术...
    • 16,039 篇 软件工程
    • 6,596 篇 信息与通信工程
    • 5,353 篇 电气工程
    • 5,193 篇 电子科学与技术(可...
    • 4,443 篇 控制科学与工程
    • 3,242 篇 生物工程
    • 3,236 篇 光学工程
    • 2,457 篇 生物医学工程(可授...
    • 2,242 篇 机械工程
    • 2,232 篇 化学工程与技术
    • 2,217 篇 材料科学与工程(可...
    • 1,827 篇 仪器科学与技术
    • 1,538 篇 动力工程及工程热...
    • 938 篇 力学(可授工学、理...
    • 878 篇 交通运输工程
    • 863 篇 安全科学与工程
  • 20,794 篇 理学
    • 8,824 篇 物理学
    • 8,785 篇 数学
    • 3,821 篇 生物学
    • 2,754 篇 统计学(可授理学、...
    • 2,505 篇 化学
    • 1,969 篇 系统科学
  • 7,464 篇 管理学
    • 4,669 篇 管理科学与工程(可...
    • 3,028 篇 图书情报与档案管...
    • 2,069 篇 工商管理
  • 2,268 篇 医学
    • 1,906 篇 临床医学
    • 1,557 篇 基础医学(可授医学...
    • 986 篇 药学(可授医学、理...
  • 1,090 篇 法学
    • 882 篇 社会学
  • 725 篇 经济学
  • 552 篇 教育学
  • 534 篇 农学
  • 189 篇 文学
  • 130 篇 军事学
  • 93 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,176 篇 computer science
  • 1,544 篇 laboratories
  • 1,138 篇 software enginee...
  • 933 篇 computational mo...
  • 665 篇 feature extracti...
  • 658 篇 machine learning
  • 628 篇 deep learning
  • 614 篇 application soft...
  • 603 篇 training
  • 534 篇 computer archite...
  • 529 篇 testing
  • 511 篇 semantics
  • 511 篇 accuracy
  • 488 篇 data mining
  • 473 篇 artificial intel...
  • 470 篇 costs
  • 427 篇 bandwidth
  • 400 篇 optimization
  • 374 篇 predictive model...
  • 373 篇 software

机构

  • 1,104 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 979 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 799 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 597 篇 fakultät physik ...
  • 587 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 525 篇 iccub universita...
  • 522 篇 department of ph...
  • 517 篇 h.h. wills physi...
  • 514 篇 imperial college...
  • 512 篇 nikhef national ...
  • 508 篇 stfc rutherford ...
  • 504 篇 physik-institut ...

作者

  • 267 篇 barter w.
  • 258 篇 a. gomes
  • 252 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 232 篇 g. spigo
  • 231 篇 blake t.
  • 229 篇 s. chen
  • 227 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 f. siegert
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.

语言

  • 52,096 篇 英文
  • 2,735 篇 其他
  • 696 篇 中文
  • 13 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Engineering"
55524 条 记 录,以下是471-480 订阅
排序:
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity  17
Combatting the TrickBot Threat: Analysis, Impact, and Defens...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Cao, Jintao Null, Allie Stewart, Marissa Bhunia, Suman Salman, Mohammad Miami University Department of Computer Science and Software Engineering OxfordOH United States University of Anbar College of Computer Anbar Iraq
The TrickBot Botnet, emerging in late 2016, has been a significant cybersecurity threat, leveraging sophisticated attack vectors such as phishing emails, network vulnerabilities, and secondary payloads. This paper pro... 详细信息
来源: 评论
Finite-difference time-domain methods
NATURE REVIEWS METHODS PRIMERS
收藏 引用
NATURE REVIEWS METHODS PRIMERS 2023年 第1期3卷 1-19页
作者: [Anonymous] Department of Electrical and Computer Engineering The Ohio State University Columbus OH USA Department of Electrical and Computer Engineering University of Toronto Toronto Ontario Canada Department of Electrical and Computer Engineering University of Utah Salt Lake City UT USA Department of Electrical Engineering Pohang University of Science and Technology Pohang Korea Department of Electrical and Electronic Engineering The University of Manchester Manchester UK Biomedical Engineering Department Northwestern University Evanston IL USA Department of Electrical and Software Engineering University of Calgary Calgary Canada Department of Electrical and Computer Engineering Purdue University West Lafayette IN USA
This PrimeView highlights how algorithm and hardware develops could expand the application range of finite-difference time-domain methods.
来源: 评论
Evolution of Research on Adaptive Gamification: A Bibliometric Study
Evolution of Research on Adaptive Gamification: A Bibliometr...
收藏 引用
2023 International Conference on Circuit Power and Computing Technologies, ICCPCT 2023
作者: Vijay, Margret Jayan, J.P. Department of Computer Science Tamil Nadu India Department of Software Engineering Tamil Nadu India
This study explores the evolving landscape of adaptive gamification-related research from 2014 to 2022. A comprehensive analysis of 1110 documents from journals and books was conducted to investigate publication trend... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
Continuous-Time Prediction of Industrial Paste Thickener System With Differential ODE-Net
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第4期9卷 686-698页
作者: Zhaolin Yuan Xiaorui Li Di Wu Xiaojuan Ban Nai-Qi Wu Hong-Ning Dai Hao Wang the Beijing Advanced Innovation Center for Materials Genome Engineering Institute of Artificial IntelligenceBeijing Key Laboratory of Knowledge Engineering for Materials ScienceSchool of Computer and Communication EngineeringUniversity of Science and Technology Beijing the Department of ICT and Natural Science Norwegian University of Science and Technology IEEE the Institute of Systems Engineering and Collaborative Laboratory for Intelligent Science and SystemsMacao University of Science and Technology the Department of Computing and Decision Sciences Lingnan University the Department of Computer Science Norwegian University of Science and Technology
It is crucial to predict the outputs of a thickening system,including the underflow concentration(UC)and mud pressure,for optimal control of the *** proliferation of industrial sensors and the availability of thickeni... 详细信息
来源: 评论
Development of a Soft Hand and Wrist Rehabilitation Robot Utilizing Lattice Structure Actuators
Development of a Soft Hand and Wrist Rehabilitation Robot Ut...
收藏 引用
2024 International Convention on Rehabilitation engineering and Assistive Technology and World Rehabilitation Robot Convention, i-CREATE and WRRC 2024
作者: Lai, Jianwei Song, Aiguo Zhang, Wenbin Lu, Ye Wang, Jiajin Li, Ye School of Instrument Science and Engineering Southeast University State Key Laboratory of Digital Medical Engineering Jiangsu Key Laboratory of Remote Measurement and Control Nanjing210096 China College of Computer Science and Software Engineering Hohai University Nanjing210024 China
Soft robots offer promising solutions for rehabilitation due to their inherent attributes such as suppleness, lightweight construction, and safety features. However, prevalent soft actuators face limitations in output... 详细信息
来源: 评论
Keyword extraction method based on complex network
收藏 引用
International Journal of Information and Communication Technology 2024年 第4期25卷 323-335页
作者: Yang, Zhen Gong, Huajian Ma, Weiyun Yin, Chunlin Li, Jie Liu, Siyang Zhu, Hua Zhao, Na Electric Power Research Institute of Yunnan Power Grid Kunming650217 China School of Computer Science and Technology Xidian University Xian710000 China Key Laboratory in Software Engineering of Yunnan Province School of Software Yunnan University Kunming650091 China
Keyword extraction has a wide range of applications in the field of natural language processing. Many research results on keyword extraction at present. Among them, keyword extraction methods are based on complex netw... 详细信息
来源: 评论
PAIR: Protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: Protein-aptamer interaction prediction based on langua...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhang, Jun Yan, Zhiqiang Zeng, Hao Zhu, Zexuan Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
ESL127: Emirate Sign Language Dataset(s) and e-Dictionary (Version 2.0) Utilizing Deep Learning Recognition Models  15
ESL127: Emirate Sign Language Dataset(s) and e-Dictionary (V...
收藏 引用
15th International Conference on Innovations in Information Technology, IIT 2023
作者: Ahmed, Ahmed Abdelhadi Gochoo, Munkhjargal Taghizadeh, Mohamad Otgonbold, Munkh-Erdene Batnasan, Ganzorig Department of Computer Science and Software Engineering Al Ain United Arab Emirates Iran University of Science and Technology Department of Electrical Engineering Iran
As stated by the United Arab Emirates's (UAE) Community Development Authority (CDA), there are around 3,065 individuals with hearing disabilities in the country. These individuals often struggle to communicate wit... 详细信息
来源: 评论