咨询与建议

限定检索结果

文献类型

  • 109,989 篇 会议
  • 52,599 篇 期刊文献
  • 1,499 册 图书

馆藏范围

  • 164,087 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,028 篇 工学
    • 62,790 篇 计算机科学与技术...
    • 51,088 篇 软件工程
    • 23,234 篇 信息与通信工程
    • 15,214 篇 控制科学与工程
    • 14,065 篇 电气工程
    • 13,520 篇 电子科学与技术(可...
    • 11,701 篇 生物工程
    • 9,489 篇 生物医学工程(可授...
    • 8,976 篇 光学工程
    • 6,595 篇 机械工程
    • 6,332 篇 化学工程与技术
    • 5,524 篇 仪器科学与技术
    • 5,487 篇 材料科学与工程(可...
    • 5,304 篇 动力工程及工程热...
    • 4,026 篇 网络空间安全
    • 3,850 篇 安全科学与工程
  • 57,753 篇 理学
    • 26,696 篇 数学
    • 21,088 篇 物理学
    • 13,434 篇 生物学
    • 8,944 篇 统计学(可授理学、...
    • 7,157 篇 化学
    • 5,973 篇 系统科学
  • 24,066 篇 管理学
    • 14,874 篇 管理科学与工程(可...
    • 10,247 篇 图书情报与档案管...
    • 7,012 篇 工商管理
  • 9,401 篇 医学
    • 7,793 篇 临床医学
    • 7,053 篇 基础医学(可授医学...
    • 4,408 篇 药学(可授医学、理...
    • 3,861 篇 公共卫生与预防医...
  • 4,488 篇 法学
    • 3,706 篇 社会学
  • 2,797 篇 经济学
  • 2,619 篇 农学
  • 1,460 篇 教育学
  • 677 篇 文学
  • 371 篇 军事学
  • 188 篇 艺术学
  • 23 篇 哲学
  • 14 篇 历史学

主题

  • 5,114 篇 accuracy
  • 4,883 篇 computer science
  • 4,207 篇 deep learning
  • 3,959 篇 feature extracti...
  • 3,640 篇 computational mo...
  • 3,628 篇 machine learning
  • 3,302 篇 training
  • 2,591 篇 convolutional ne...
  • 2,452 篇 support vector m...
  • 2,436 篇 predictive model...
  • 2,315 篇 real-time system...
  • 2,147 篇 internet of thin...
  • 1,936 篇 optimization
  • 1,881 篇 artificial intel...
  • 1,818 篇 neural networks
  • 1,760 篇 data models
  • 1,712 篇 data mining
  • 1,511 篇 computer archite...
  • 1,508 篇 security
  • 1,497 篇 wireless sensor ...

机构

  • 2,136 篇 chitkara univers...
  • 1,082 篇 cavendish labora...
  • 1,030 篇 university of ch...
  • 1,006 篇 department of ph...
  • 949 篇 physikalisches i...
  • 939 篇 oliver lodge lab...
  • 603 篇 infn sezione di ...
  • 585 篇 infn laboratori ...
  • 578 篇 infn sezione di ...
  • 553 篇 department of el...
  • 545 篇 infn sezione di ...
  • 533 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 526 篇 department of ph...
  • 524 篇 fakultät physik ...
  • 522 篇 school of physic...
  • 515 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 501 篇 stfc rutherford ...
  • 498 篇 institute of inf...

作者

  • 251 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 s. chen
  • 236 篇 j. wang
  • 231 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 c. amelung
  • 229 篇 blake t.
  • 228 篇 d. calvet
  • 227 篇 beiter a.
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 215 篇 brundu d.
  • 212 篇 g. spigo

语言

  • 155,975 篇 英文
  • 6,327 篇 其他
  • 1,783 篇 中文
  • 152 篇 日文
  • 23 篇 德文
  • 22 篇 朝鲜文
  • 18 篇 法文
  • 8 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=The Institute of Computer Science and Engineering"
164087 条 记 录,以下是91-100 订阅
排序:
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
A lightweight identity based mutual authenticated key agreement scheme for telecare medical information system
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Banerjee, Ananya Sahana, Subhas Chandra Department of Computer Science & Engineering National Institute of Technology West Bengal Durgapur713209 India
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ... 详细信息
来源: 评论
Automatic summarization of cooking videos using transfer learning and transformer-based models
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-20页
作者: Sadique, P. M. Alen Aswiga, R.V. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
The proliferation of cooking videos on the internet these days necessitates the conversion of these lengthy video contents into concise text recipes. Many online platforms now have a large number of cooking videos, in... 详细信息
来源: 评论
Brain tumor segmentation and classification using transfer learning based CNN model with model agnostic concept interpretation
收藏 引用
Multimedia Tools and Applications 2025年 第5期84卷 2509-2538页
作者: Nancy, A. Maria Maheswari, R. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai632014 India
In recent decades, brain tumors have been regarded as a severe illness that causes significant damage to the health of the individual, and finally it results to death. Hence, the Brain Tumor Segmentation and Classific... 详细信息
来源: 评论
Embeddings Between State and Action Based Probabilistic Logics
收藏 引用
Formal Aspects of Computing 2025年 第2期37卷 1-58页
作者: Das, Susmoy Sharma, Arpit Department of Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal Madhya Pradesh Bhopal India
This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter... 详细信息
来源: 评论
A Detailed Review for Predicting the Quantity of Sugar from Sugarcane Using Various Models
收藏 引用
IEEE Access 2025年 13卷 32122-32146页
作者: Narayanasamy, Kathirvel Venkatachalam, Ilayaraja Vellore Institute of Technology School of Computer Science and Engineering Tamil Nadu Vellore632014 India
The production of jaggery and white sugar is an essential aspect of the sugarcane industry. This review aims to assess a variety of techniques for estimating sugar content in sugarcane, including laboratory methods, f... 详细信息
来源: 评论
Imbalanced multilabel retinal disease classification using threshold moving and ensemble learning
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Pendharkar, Gaurav Balaji, Sudharshanan Kumar, B. Muhesh Malathi, G. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
Billions of people worldwide are affected by vision impairment majorly caused due to age-related degradation and refractive errors. Diabetic Retinopathy(DR) and Macular Hole(MH) are among the most prevalent senescent ... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
Exploration of alzheimer disease using design of experiments
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1079-1101页
作者: Gupta, Pranav Pandey, Kavita Gupta, Sanskar Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ... 详细信息
来源: 评论
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论