咨询与建议

限定检索结果

文献类型

  • 300,263 篇 会议
  • 126,457 篇 期刊文献
  • 3,076 册 图书
  • 7 篇 专利
  • 1 篇 学位论文

馆藏范围

  • 429,803 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 254,523 篇 工学
    • 178,419 篇 计算机科学与技术...
    • 144,612 篇 软件工程
    • 59,403 篇 信息与通信工程
    • 37,693 篇 控制科学与工程
    • 28,729 篇 电气工程
    • 27,954 篇 电子科学与技术(可...
    • 27,405 篇 生物工程
    • 19,346 篇 生物医学工程(可授...
    • 18,542 篇 机械工程
    • 17,488 篇 光学工程
    • 13,423 篇 化学工程与技术
    • 12,702 篇 仪器科学与技术
    • 11,520 篇 动力工程及工程热...
    • 9,606 篇 材料科学与工程(可...
    • 8,941 篇 网络空间安全
    • 8,680 篇 安全科学与工程
    • 8,235 篇 交通运输工程
  • 138,998 篇 理学
    • 73,889 篇 数学
    • 41,073 篇 物理学
    • 30,496 篇 生物学
    • 22,987 篇 统计学(可授理学、...
    • 14,950 篇 系统科学
    • 14,026 篇 化学
  • 70,078 篇 管理学
    • 41,875 篇 管理科学与工程(可...
    • 31,316 篇 图书情报与档案管...
    • 17,897 篇 工商管理
  • 17,550 篇 医学
    • 14,752 篇 临床医学
    • 13,266 篇 基础医学(可授医学...
    • 8,360 篇 药学(可授医学、理...
  • 11,275 篇 法学
    • 9,150 篇 社会学
  • 6,831 篇 经济学
  • 5,552 篇 农学
  • 4,890 篇 教育学
  • 2,123 篇 文学
  • 966 篇 军事学
  • 818 篇 艺术学
  • 113 篇 哲学
  • 72 篇 历史学

主题

  • 17,633 篇 computer science
  • 11,115 篇 feature extracti...
  • 10,526 篇 accuracy
  • 10,023 篇 computational mo...
  • 8,784 篇 training
  • 8,748 篇 deep learning
  • 7,395 篇 machine learning
  • 6,588 篇 data mining
  • 5,749 篇 semantics
  • 5,636 篇 predictive model...
  • 5,596 篇 support vector m...
  • 5,452 篇 optimization
  • 5,164 篇 data models
  • 4,920 篇 neural networks
  • 4,853 篇 algorithm design...
  • 4,810 篇 educational inst...
  • 4,731 篇 convolutional ne...
  • 4,629 篇 computer archite...
  • 4,608 篇 real-time system...
  • 4,570 篇 artificial intel...

机构

  • 4,993 篇 department of co...
  • 2,862 篇 school of comput...
  • 2,492 篇 college of compu...
  • 2,473 篇 school of comput...
  • 2,428 篇 college of compu...
  • 2,143 篇 chitkara univers...
  • 1,556 篇 school of comput...
  • 1,452 篇 school of comput...
  • 1,441 篇 university of ch...
  • 1,321 篇 school of comput...
  • 1,320 篇 school of comput...
  • 1,261 篇 school of comput...
  • 1,195 篇 school of comput...
  • 1,041 篇 school of comput...
  • 1,033 篇 college of compu...
  • 980 篇 department of ph...
  • 967 篇 cavendish labora...
  • 951 篇 college of compu...
  • 900 篇 school of comput...
  • 837 篇 oliver lodge lab...

作者

  • 336 篇 liu yang
  • 303 篇 wang wei
  • 280 篇 niyato dusit
  • 254 篇 barter w.
  • 229 篇 blake t.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 218 篇 bowcock t.j.v.
  • 217 篇 s. chen
  • 212 篇 brundu d.
  • 212 篇 amato s.
  • 210 篇 boettcher t.
  • 206 篇 a. gomes
  • 203 篇 j. wang
  • 199 篇 beiter a.
  • 196 篇 c. alexa
  • 192 篇 j. m. izen
  • 191 篇 c. amelung
  • 189 篇 g. bella

语言

  • 378,737 篇 英文
  • 44,331 篇 其他
  • 7,095 篇 中文
  • 303 篇 日文
  • 68 篇 斯洛文尼亚文
  • 65 篇 德文
  • 44 篇 法文
  • 37 篇 朝鲜文
  • 21 篇 俄文
  • 8 篇 西班牙文
  • 6 篇 阿拉伯文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 波兰文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 2 篇 土耳其文
检索条件"机构=Technology and Computer Science"
429804 条 记 录,以下是1-10 订阅
排序:
Embedded Responsible Computing: Mainstreaming Ethics into computer science Curriculum: A Case Study of Dedan Kimathi University of technology (DeKUT)
Embedded Responsible Computing: Mainstreaming Ethics into Co...
收藏 引用
2024 International Conference on Information and Communication technology for Development for Africa, ICT4DA 2024
作者: Musumba, George Kagiri, Michael Mwangi, Hellen Wachepele, David Miano, Dennis Dedan Kimathi University of Technology Dept. Computer Science Nyeri Kenya Dedan Kimathi University of Technology Institute of Criminology Forensics and Security Studies Nyeri Kenya
The rapid advancement of software solutions in the industry has brought significant ethical concerns, ranging from data privacy issues to algorithmic bias and cybersecurity threats. Addressing these concerns requires ... 详细信息
来源: 评论
Information technology and computer science programs: How do we relate?  15
Information technology and computer science programs: How do...
收藏 引用
16th Annual ACM Conference on Information technology Education, SIGITE 2015
作者: MacKellar, Bonnie Sabin, Mihaela Hislop, Gregory Settle, Amber Div. of Computer Science Math and Science St John's University QueensNY United States Computing Technology University of New Hampshire ManchesterNH03101 United States College of Computing and Informatics Drexel University PhiladelphiaPA United States School of Computing DePaul University ChicagoIL60604 United States
In this panel session, the relationship between computer science programs and information technology programs at universities that house both will be explored. People outside the computing disciplines often find the d... 详细信息
来源: 评论
Laboratory or Department?Exploration and Creation in computer science and technology
收藏 引用
计算机教育 2024年 第3期 13-16页
作者: Ann Copestake Department of Computer Science and Technology University of CambridgeWilliam Gates Building15 JJ Thomson AvenueCambridge CB30FDUK
In the very beginning,the computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the *** computer science developed as a discipline in its own righ... 详细信息
来源: 评论
Embedded Responsible Computing: Mainstreaming Ethics into computer science Curriculum: A Case Study of Dedan Kimathi University of technology (DeKUT)
Embedded Responsible Computing: Mainstreaming Ethics into Co...
收藏 引用
Information and Communication technology for Development for Africa (ICT4DA), International Conference on
作者: George Musumba Michael Kagiri Hellen Mwangi David Wachepele Dennis Miano Dept. Computer Science Dedan Kimathi University of Technology Nyeri Kenya Institute of Criminology Forensics and Security Studies Dedan Kimathi University of Technology Nyeri Kenya
The rapid advancement of software solutions in the industry has brought significant ethical concerns, ranging from data privacy issues to algorithmic bias and cybersecurity threats. Addressing these concerns requires ... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 128-138页
作者: Jinxue PENG Yong WANG Jingfeng XUE Zhenyan LIU School of Computer Science and Technology Beijing Institute of Technology
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of binary code are similar or not. Existing approaches that combine control flow graphs(CFGs)-based function representation ... 详细信息
来源: 评论
TPpred-SC: multi-functional therapeutic peptide prediction based on multi-label supervised contrastive learning
收藏 引用
science China(Information sciences) 2024年 第11期67卷 136-147页
作者: Ke YAN Hongwu LV Jiangyi SHAO Shutao CHEN Bin LIU School of Computer Science and Technology Beijing Institute of Technology
Therapeutic peptides contribute significantly to human health and have the potential for personalized medicine. The prediction for the therapeutic peptides is beneficial and emerging for the discovery of drugs. Althou... 详细信息
来源: 评论