咨询与建议

限定检索结果

文献类型

  • 57,582 篇 会议
  • 8,965 篇 期刊文献
  • 396 册 图书

馆藏范围

  • 66,943 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41,810 篇 工学
    • 26,778 篇 计算机科学与技术...
    • 22,148 篇 软件工程
    • 11,667 篇 信息与通信工程
    • 7,216 篇 电子科学与技术(可...
    • 7,107 篇 控制科学与工程
    • 7,032 篇 电气工程
    • 3,751 篇 生物工程
    • 3,164 篇 生物医学工程(可授...
    • 3,070 篇 光学工程
    • 2,763 篇 机械工程
    • 2,675 篇 动力工程及工程热...
    • 2,492 篇 仪器科学与技术
    • 1,991 篇 化学工程与技术
    • 1,475 篇 安全科学与工程
    • 1,451 篇 材料科学与工程(可...
    • 1,382 篇 交通运输工程
    • 1,170 篇 建筑学
  • 21,481 篇 理学
    • 11,465 篇 数学
    • 6,851 篇 物理学
    • 4,086 篇 生物学
    • 3,658 篇 统计学(可授理学、...
    • 2,598 篇 系统科学
    • 2,093 篇 化学
  • 9,459 篇 管理学
    • 5,763 篇 管理科学与工程(可...
    • 4,180 篇 图书情报与档案管...
    • 3,130 篇 工商管理
  • 2,587 篇 医学
    • 2,196 篇 临床医学
    • 2,054 篇 基础医学(可授医学...
    • 1,364 篇 药学(可授医学、理...
  • 1,715 篇 法学
    • 1,413 篇 社会学
  • 1,129 篇 经济学
  • 773 篇 教育学
  • 741 篇 农学
  • 313 篇 文学
  • 177 篇 军事学
  • 66 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 1,675 篇 accuracy
  • 1,466 篇 computational mo...
  • 1,304 篇 feature extracti...
  • 1,151 篇 training
  • 976 篇 deep learning
  • 908 篇 real-time system...
  • 880 篇 machine learning
  • 781 篇 predictive model...
  • 718 篇 computer science
  • 706 篇 optimization
  • 675 篇 computer archite...
  • 649 篇 support vector m...
  • 624 篇 data models
  • 586 篇 internet of thin...
  • 576 篇 neural networks
  • 552 篇 wireless sensor ...
  • 529 篇 convolutional ne...
  • 522 篇 monitoring
  • 519 篇 data mining
  • 468 篇 artificial intel...

机构

  • 166 篇 dept. of electri...
  • 82 篇 north-west unive...
  • 81 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 national centre ...
  • 66 篇 università di ca...
  • 61 篇 dept. of electr....
  • 58 篇 dept. of electri...
  • 56 篇 dept. of compute...
  • 56 篇 dept. of informa...
  • 52 篇 dept. of electri...
  • 52 篇 school of automa...
  • 49 篇 leiden universit...
  • 44 篇 dept. of compute...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 36 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 81 篇 chen a.
  • 81 篇 gal t.
  • 80 篇 bozza c.
  • 60 篇 kalekin o.
  • 52 篇 kulikovskiy v.
  • 44 篇 huang f.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.
  • 40 篇 díaz a.f.
  • 37 篇 androulakis g.
  • 34 篇 de palma m.
  • 34 篇 khatun a.
  • 32 篇 eirini eleni tsi...
  • 27 篇 kougianos elias
  • 27 篇 david reigosa

语言

  • 58,447 篇 英文
  • 7,487 篇 其他
  • 732 篇 中文
  • 249 篇 朝鲜文
  • 68 篇 日文
  • 8 篇 土耳其文
  • 5 篇 德文
  • 4 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=dept. of Computer Computer Systems Engineering"
66943 条 记 录,以下是711-720 订阅
排序:
Empowering Low-Resource Language Translation: Methodologies for Bhojpuri-Hindi and Marathi-Hindi ASR and MT  21
Empowering Low-Resource Language Translation: Methodologies ...
收藏 引用
21st International Conference on Spoken Language Translation, IWSLT 2024
作者: Anand, Harpreet Singh Dash, Amulya Ratna Sharma, Yashvardhan Dept. of Computer Science and Information Systems Birla Institute of Technology and Science Pilani India
This paper presents the methodologies implemented for the Automatic Speech Recognition and Machine Translation for the language pairs Bhojpuri-Hindi and Marathi-Hindi for the Dialectal and Low-Resource shared task pro... 详细信息
来源: 评论
A Systematic Literature Review of the Application of Agile Applied to Large-Scale, Safety-Critical, Cyber-Physical systems
A Systematic Literature Review of the Application of Agile A...
收藏 引用
2024 IEEE International Conference on Data and Software engineering, ICoDSE 2024
作者: Yeman, Robin J. Malaiya, Yashwant K. Dept. Systems Engineering Colorado State University Fort Collins United States Dept. Computer Science Colorado State University Fort Collins United States
The application of Agile methodologies to large-scale, safety-critical cyber-physical systems (LS/SC/CPS) has shown significant interest over the last 5 years. Although there has been limited research into each of the... 详细信息
来源: 评论
Enhanced Realtime Sign Language Detection and Multilingual Translation System
Enhanced Realtime Sign Language Detection and Multilingual T...
收藏 引用
2025 International Conference on Computing for Sustainability and Intelligent Future, COMP-SIF 2025
作者: Kakkar, Madhur Daniel, John Sudha, D. Sathyabama Institute of Science and Technology Dept. of Computer Science and Engineering Chennai India
Sign language is the communication medium that is utilized by the hearing-impaired community. The medium is visual and it uses hand signs and symbols for communication. Over 300 different types of sign languages prese... 详细信息
来源: 评论
Intelligent Anomaly Detection System Based on Ensemble and Deep Learning  26
Intelligent Anomaly Detection System Based on Ensemble and D...
收藏 引用
26th International Conference on Advanced Communications Technology, ICACT 2024
作者: Baniya, Babu Kaji Rush, Thomas Bradley University Dept. of Computer Science and Information Systems PeoriaIL United States
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approxim... 详细信息
来源: 评论
Fake Job Post Detection Using Machine Learning
Fake Job Post Detection Using Machine Learning
收藏 引用
2025 International Conference on Computing for Sustainability and Intelligent Future, COMP-SIF 2025
作者: Pradeep Kumar, B.P. Bhagya, D.J. Gagana, G. Mani, N. Dept. of Computer Science and Engineering Atria Institute of Technology Karnataka Bangalore India
By examining patterns in the text data and metadata linked to job adverts, The use of learning algorithms has grown in popularity in the detection of fraudulent job postings. For this, Research Machine emphasises the ... 详细信息
来源: 评论
MOSA: Matrix Optimized Self-Attention Hardware Accelerator for Mobile Device
MOSA: Matrix Optimized Self-Attention Hardware Accelerator f...
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Chang, Yang-Rwei Chen, Hsuan-Fu Shih, Horng-Yuan Tamkang University Dept. Electrical and Computer Engineering New Taipei City Taiwan
The Self-Attention mechanism, which lies at the core of Transformer architectures, plays a vital role in capturing long-range dependencies. However, its high computational complexity and significant memory requirement... 详细信息
来源: 评论
Advancing Phishing Detection with Random Forest: A Machine Learning Approach for Enhanced Cybersecurity  3
Advancing Phishing Detection with Random Forest: A Machine L...
收藏 引用
3rd International Conference on Intelligent systems, Advanced Computing, and Communication, ISACC 2025
作者: Chandra, Sucheta Das, Priyanka Mandal, Ankita Chakroborty, Sriparno Chowdhury, Ishika Ghosh, Kathamrita University of Engineering & Management Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Phishing attacks remain a critical threat to cybersecurity, leveraging deception to steal sensitive information from individuals and organizations. Traditional detection methods often fail to keep up with evolving phi... 详细信息
来源: 评论
A Base Algorithm for Intelligent Traffic Management System for Urban Transportation using 6G Network  18
A Base Algorithm for Intelligent Traffic Management System f...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications systems, ANTS 2024
作者: Salam, Sameera M. Mitra, Abhinivesh Bits Pilani Hyderabad Campus Dept. of Computer Science and Information Systems Secunderabad India
Efficient traffic management in urban environments is essential for minimizing congestion and ensuring smooth transportation flow. 6G network is expected to offer faster data speeds, lower latency, and enhanced connec... 详细信息
来源: 评论
CAS-PUF: Current-Mode Array-Type Strong PUF for Secure Computing in Area Constrained SoCs
CAS-PUF: Current-Mode Array-Type Strong PUF for Secure Compu...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Georgoulas, Dimosthenis Tsiatouhas, Yiorgos Tenentes, Vasileios University of Ioannina Vcas Lab Dept. of Computer Science and Engineering Ioannina Greece
Secure computing necessitates the integration in systems-on-Chips (SoCs) of strong Physical Unclonable Functions (PUFs) that can generate a vast amount of Challenge Response Pairs (CRPs) for cryptographic keys generat... 详细信息
来源: 评论
A Multi-Model Rouge Nodes Detection System for Fog Computing
A Multi-Model Rouge Nodes Detection System for Fog Computing
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Bui, Thanh Duc Panda, Brajendra University of Arkansas Dept. of Computer Science and Computer Engineering Fayetteville United States
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution.... 详细信息
来源: 评论