咨询与建议

限定检索结果

文献类型

  • 275,253 篇 会议
  • 112,053 篇 期刊文献
  • 2,800 册 图书

馆藏范围

  • 390,105 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 225,786 篇 工学
    • 149,551 篇 计算机科学与技术...
    • 120,972 篇 软件工程
    • 54,329 篇 信息与通信工程
    • 35,692 篇 控制科学与工程
    • 31,996 篇 电气工程
    • 30,817 篇 电子科学与技术(可...
    • 25,988 篇 生物工程
    • 20,462 篇 生物医学工程(可授...
    • 17,610 篇 光学工程
    • 15,391 篇 机械工程
    • 13,031 篇 化学工程与技术
    • 12,143 篇 仪器科学与技术
    • 12,132 篇 动力工程及工程热...
    • 11,494 篇 材料科学与工程(可...
    • 8,307 篇 安全科学与工程
    • 7,739 篇 网络空间安全
  • 126,891 篇 理学
    • 63,198 篇 数学
    • 41,661 篇 物理学
    • 29,375 篇 生物学
    • 20,581 篇 统计学(可授理学、...
    • 14,864 篇 系统科学
    • 13,950 篇 化学
  • 55,929 篇 管理学
    • 33,708 篇 管理科学与工程(可...
    • 24,433 篇 图书情报与档案管...
    • 16,701 篇 工商管理
  • 19,285 篇 医学
    • 16,198 篇 临床医学
    • 14,571 篇 基础医学(可授医学...
    • 9,154 篇 药学(可授医学、理...
    • 7,765 篇 公共卫生与预防医...
  • 10,560 篇 法学
    • 8,646 篇 社会学
  • 6,442 篇 经济学
  • 5,075 篇 农学
  • 4,194 篇 教育学
  • 1,852 篇 文学
  • 874 篇 军事学
  • 508 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 20,000 篇 computer science
  • 9,234 篇 accuracy
  • 8,812 篇 computational mo...
  • 8,012 篇 feature extracti...
  • 7,644 篇 deep learning
  • 7,231 篇 machine learning
  • 6,558 篇 training
  • 5,293 篇 data mining
  • 5,182 篇 computer archite...
  • 5,108 篇 support vector m...
  • 4,953 篇 predictive model...
  • 4,923 篇 wireless sensor ...
  • 4,693 篇 costs
  • 4,565 篇 optimization
  • 4,559 篇 bandwidth
  • 4,492 篇 application soft...
  • 4,424 篇 testing
  • 4,404 篇 protocols
  • 4,389 篇 algorithm design...
  • 4,367 篇 real-time system...

机构

  • 1,730 篇 department of co...
  • 1,391 篇 department of el...
  • 1,383 篇 department of co...
  • 1,174 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 973 篇 department of ph...
  • 866 篇 department of co...
  • 852 篇 physikalisches i...
  • 842 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 748 篇 university of ch...
  • 659 篇 department of co...
  • 556 篇 department of co...
  • 537 篇 infn sezione di ...
  • 522 篇 chitkara univers...
  • 519 篇 infn laboratori ...
  • 510 篇 infn sezione di ...
  • 505 篇 horia hulubei na...
  • 502 篇 department of co...
  • 488 篇 infn sezione di ...

作者

  • 255 篇 barter w.
  • 253 篇 j. wang
  • 252 篇 s. chen
  • 241 篇 a. gomes
  • 230 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 c. alexa
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 214 篇 j. m. izen
  • 214 篇 boettcher t.
  • 209 篇 beiter a.
  • 208 篇 bencivenni g.
  • 199 篇 bay a.
  • 195 篇 g. bella
  • 194 篇 j. strandberg
  • 193 篇 c. amelung

语言

  • 344,835 篇 英文
  • 41,677 篇 其他
  • 3,819 篇 中文
  • 220 篇 日文
  • 70 篇 德文
  • 48 篇 法文
  • 42 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=The Department of Computer Science and Computer Engineering"
390106 条 记 录,以下是4751-4760 订阅
排序:
Hybrid Cryptography in Cloud Computing  11
Hybrid Cryptography in Cloud Computing
收藏 引用
11th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2024
作者: Rakhra, Manik Singh, Arun Singh, Dalwinder Kaur, Baljinder Shruti Lovely Professional University Department of Computer Science & Engineering Phagwara India
Cloud computing has completely changed how people and organizations access and manage data and services. However, the centralized nature of the cloud storage and processing introduces significant security concerns, es... 详细信息
来源: 评论
Analyzing False Positives in Bankruptcy Prediction with Explainable AI
Analyzing False Positives in Bankruptcy Prediction with Expl...
收藏 引用
2023 International Conference on Artificial Intelligence and Applications, ICAIA 2023 and Alliance Technology Conference, ATCON-1 2023
作者: Mahajan, Akshat Shukla, Kaushal Kumar Department of Computer Science and Engineering Varanasi India
With the rise of powerful machine learning solutions, it has become easy to create highly accurate solutions for financial services, yet they fail to comply with financial regulations as they lack transparency and exp... 详细信息
来源: 评论
A comprehensive analysis of threat vectors in software-defined networking
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86791-86832页
作者: Dahiya, Seema Sehrawat, Harkesh Kharb, Seema Siwach, Vikas University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Rohtak India Department of Computer Science and Engineering SRM University Sonepat Sonipat India
In recent years, cyber-attacks have become more frequent and advanced, targeting critical infrastructure, businesses, homes, and government agencies. Detecting and preventing these attacks at the earliest stage possib... 详细信息
来源: 评论
Analytical Results of Heart Attack Prediction Using Data Mining Techniques  1
Analytical Results of Heart Attack Prediction Using Data Min...
收藏 引用
1st IEEE International Conference on Contemporary Computing and Communications, InC4 2023
作者: Abhijith, S. Mishra, Shaleen Prathap, Boppuru Department of Computer Science and Engineering Bangalore India
In the modern era of living a fast lifestyle, people are not more conscious of their food eating and lifestyle. Due to these reasons, the chances of having a cardiac-related disease have risen drastically. This paper ... 详细信息
来源: 评论
Reliable Network Performance for Edge Networks with QoS-Aware Adaptive Routing  8
Reliable Network Performance for Edge Networks with QoS-Awar...
收藏 引用
8th IEEE International Conference on Edge Computing and Communications, EDGE 2024
作者: Hamdan, Osama Abu Arslan, Engin University of Texas at Arlington Department of Computer Science and Engineering United States
Edge networks are commonly used to collect data from remote areas with limited accessibility such as deserts and mountaintops. They rely on wireless communication to stream the collected data to data centers, which ma... 详细信息
来源: 评论
Yoga Pose Estimation using PoseNet Model  1
Yoga Pose Estimation using PoseNet Model
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Sharan, Karanam Sai Sumathi, R. Anvitha, Karnatakam Sai Kishan, Kolaparthi Venkata Satya Naga Bathineedi, Dhathri Department of Computer Science and Engineering Kalasalingam Academy of Research and Education India
Yoga has become an integral part of exercise practice in the holistic health regimen, greatly impacting on the physical, mental, and emotional well-being. It enhances flexibility, strength, and balance while promoting... 详细信息
来源: 评论
Revolutionizing Supply Chain Management: The Role of Blockchain and Explainable AI  5th
Revolutionizing Supply Chain Management: The Role of Blockch...
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Sharma, Sonika Sharma, Ajay Kumar Patel, Mayank Rathore, Narendra Singh Department of Computer Science Engineering GITS Udaipur India GITS Udaipur India
Security of food is necessary as a nation should have no scarcity of food and its people should be able to obtain, access, and consume an adequate amount of food. Ensuring and maintaining high-quality, safe products i... 详细信息
来源: 评论
COVID19 Outbreak:A Hierarchical Framework for User Sentiment Analysis
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2507-2524页
作者: Ahmed F.Ibrahim M.Hassaballah Abdelmgeid A.Ali Yunyoung Nam Ibrahim A.Ibrahim Department of Computer Science Faculty of Computer ScienceNahda UniversityBanisuefEgypt Department of Computer Science Faculty of Computers and InformationSouth Valley UniversityQenaEgypt Faculty of Computers and Information Minia UniversityAlMiniaEgypt Department of Computer Science and Engineering Soonchunhyang UniversityAsanKorea
Social networking sites in the most modernized world are flooded with large data *** the sentiment polarity of important aspects is necessary;as it helps to determine people’s opinions through what they *** Coronavir... 详细信息
来源: 评论
Near Optimal Locality Sensitive Orderings in Euclidean Space  40
Near Optimal Locality Sensitive Orderings in Euclidean Space
收藏 引用
40th International Symposium on Computational Geometry, SoCG 2024
作者: Gao, Zhimeng Har-Peled, Sariel Department of Computer Science and Engineering Hong Kong University of Science and Technology Kowloon Hong Kong Department of Computer Science University of Illinois UrbanaIL United States
For a parameter Ε ∈ (0, 1), a set of Ε-locality-sensitive orderings (LSOs) has the property that for any two points, p, q ∈ [0, 1)d, there exist an order in the set such that all the points between p and q (in the... 详细信息
来源: 评论
Classifying Enzymatic Functions Using Graph Neural Networks: Insights from the ENZYMES Dataset  22
Classifying Enzymatic Functions Using Graph Neural Networks:...
收藏 引用
22nd International Learning and Technology Conference, L and T 2025
作者: Attiah, Ameera Alagha, Mawaddah Sharab, Leen Effat University College of Engineering Computer Science Department Jeddah Saudi Arabia
This study explores the use of Graph Neural Networks (GNNs) to classify enzyme functions using the ENZYMES dataset, which represents proteins and their interactions as graphs. The literature review highlights the evol... 详细信息
来源: 评论