咨询与建议

限定检索结果

文献类型

  • 109,989 篇 会议
  • 52,599 篇 期刊文献
  • 1,499 册 图书

馆藏范围

  • 164,087 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,028 篇 工学
    • 62,790 篇 计算机科学与技术...
    • 51,088 篇 软件工程
    • 23,234 篇 信息与通信工程
    • 15,214 篇 控制科学与工程
    • 14,065 篇 电气工程
    • 13,520 篇 电子科学与技术(可...
    • 11,701 篇 生物工程
    • 9,489 篇 生物医学工程(可授...
    • 8,976 篇 光学工程
    • 6,595 篇 机械工程
    • 6,332 篇 化学工程与技术
    • 5,524 篇 仪器科学与技术
    • 5,487 篇 材料科学与工程(可...
    • 5,304 篇 动力工程及工程热...
    • 4,026 篇 网络空间安全
    • 3,850 篇 安全科学与工程
  • 57,753 篇 理学
    • 26,696 篇 数学
    • 21,088 篇 物理学
    • 13,434 篇 生物学
    • 8,944 篇 统计学(可授理学、...
    • 7,157 篇 化学
    • 5,973 篇 系统科学
  • 24,066 篇 管理学
    • 14,874 篇 管理科学与工程(可...
    • 10,247 篇 图书情报与档案管...
    • 7,012 篇 工商管理
  • 9,401 篇 医学
    • 7,793 篇 临床医学
    • 7,053 篇 基础医学(可授医学...
    • 4,408 篇 药学(可授医学、理...
    • 3,861 篇 公共卫生与预防医...
  • 4,488 篇 法学
    • 3,706 篇 社会学
  • 2,797 篇 经济学
  • 2,619 篇 农学
  • 1,460 篇 教育学
  • 677 篇 文学
  • 371 篇 军事学
  • 188 篇 艺术学
  • 23 篇 哲学
  • 14 篇 历史学

主题

  • 5,114 篇 accuracy
  • 4,883 篇 computer science
  • 4,207 篇 deep learning
  • 3,959 篇 feature extracti...
  • 3,640 篇 computational mo...
  • 3,628 篇 machine learning
  • 3,302 篇 training
  • 2,591 篇 convolutional ne...
  • 2,452 篇 support vector m...
  • 2,436 篇 predictive model...
  • 2,315 篇 real-time system...
  • 2,147 篇 internet of thin...
  • 1,936 篇 optimization
  • 1,881 篇 artificial intel...
  • 1,818 篇 neural networks
  • 1,760 篇 data models
  • 1,712 篇 data mining
  • 1,511 篇 computer archite...
  • 1,508 篇 security
  • 1,497 篇 wireless sensor ...

机构

  • 2,136 篇 chitkara univers...
  • 1,082 篇 cavendish labora...
  • 1,030 篇 university of ch...
  • 1,006 篇 department of ph...
  • 949 篇 physikalisches i...
  • 939 篇 oliver lodge lab...
  • 603 篇 infn sezione di ...
  • 585 篇 infn laboratori ...
  • 578 篇 infn sezione di ...
  • 553 篇 department of el...
  • 545 篇 infn sezione di ...
  • 533 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 526 篇 department of ph...
  • 524 篇 fakultät physik ...
  • 522 篇 school of physic...
  • 515 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 501 篇 stfc rutherford ...
  • 498 篇 institute of inf...

作者

  • 251 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 s. chen
  • 236 篇 j. wang
  • 231 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 c. amelung
  • 229 篇 blake t.
  • 228 篇 d. calvet
  • 227 篇 beiter a.
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 215 篇 brundu d.
  • 212 篇 g. spigo

语言

  • 155,975 篇 英文
  • 6,327 篇 其他
  • 1,783 篇 中文
  • 152 篇 日文
  • 23 篇 德文
  • 22 篇 朝鲜文
  • 18 篇 法文
  • 8 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=The Institute of Computer Science and Engineering"
164087 条 记 录,以下是121-130 订阅
排序:
Domain generalization with semi-supervised learning for people-centric activity recognition
收藏 引用
science China(Information sciences) 2025年 第1期68卷 171-188页
作者: Jing LIU Wei ZHU Di LI Xing HU Liang SONG Academy for Engineering & Technology Fudan University Shanghai East-bund Research Institute on Networking Systems of AI School of Optoelectronic Information and Computer Engineering University of Shanghai for Science & Technology
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces.... 详细信息
来源: 评论
A lightweight approach for intrusion detection in WSNs based on DCGAN
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 951-957页
作者: Devi, Manu Nandal, Priyanka Sehrawat, Harkesh Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Haryana India Department of Computer Science and Engineering Maharaja Surajmal Institute of Technology New Delhi India
Ensuring strong security procedures is crucial in the rapidly advancing realm of wireless sensor networks (WSNs) in order to protect sensitive data and preserve network integrity. The resource limitations and unpredic... 详细信息
来源: 评论
BGRU-MTRA: bilinear GRU networks with multi-path temporal residual attention for suspicious activity recognition
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 185-212页
作者: Pandey, Ajeet Kumar, Piyush Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Suspicious activity recognition (SAR) is an active research field in computer vision and image processing due to the rapid demand for intelligent video surveillance systems. However, current automated systems focus to... 详细信息
来源: 评论
Dynamic-EC:an efficient dynamic erasure coding method for permissioned blockchain systems
收藏 引用
Frontiers of computer science 2025年 第1期19卷 15-28页
作者: Mizhipeng ZHANG Chentao WU Jie LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200200China Yancheng Blockchain Research Institute Hengyang 421200China
Blockchain as a decentralized storage technology is widely used in many *** has extremely strict requirements for reliability because there are many potentially malicious ***,blockchain is a chain storage structure fo... 详细信息
来源: 评论
REGAC: Multi-Class Offensive Content Identification Using Graphical Approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 931-952页
作者: Chinivar, Sneha Roopa, M.S. Arunalatha, J.S. Venugopal, K.R. Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Karnataka Bengaluru India
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i... 详细信息
来源: 评论
Halo reduction multi-exposure image fusion technique
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 12347-12370页
作者: Sharif, Rizwan Amin, Benish Sukhia, Komal Nain Department of Electrical Engineering Institute of Space Technology Islamabad Pakistan Department of Computer Science Institute of Space Technology Islamabad Pakistan
Multi-exposure image fusion (MEF) involves combining images captured at different exposure levels to create a single, well-exposed fused image. MEF has a wide range of applications, including low light, low contrast, ... 详细信息
来源: 评论
Function Scheduling with Data Security in Serverless Computing Systems  17
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Saha, Srestha Pandey, Arvind Addya, Sourav Kanti Brata Nath, Shubha Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India SRM Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India National Institute of Technology Karnataka Department of Computer Science and Engineering Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
Adaptive Attention Mechanisms Based Multicriteria Recommender Systems for Improved User Preference Discovery
收藏 引用
SN computer science 2025年 第4期6卷 1-16页
作者: Rajput, Ishwari Singh Tewari, Anand Shanker Tiwari, Arvind Kumar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna India Department of Computer Science & Engineering Kamla Nehru Institute of Technology Sultanpur (UP) India
Personalized recommender systems are becoming more popular to reduce the issue of information overload. It is also observed that the recommendations provided by multi-criteria recommender system (MCRS) are more accura... 详细信息
来源: 评论
HViTML: Hybrid vision transformer with machine learning-based classification model for glaucomatous eye
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Singh, Piyush Bhushan Singh, Pawan Dev, Harsh Batra, Devanshu Chaurasia, Brijesh Kumar Department of Information Technology Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Babu Banarasi Das University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India
Glaucoma is currently one of the most significant causes of permanent blindness. Fundus imaging is the most popular glaucoma screening method because of the compromises it has to make in terms of portability, size, an... 详细信息
来源: 评论