咨询与建议

限定检索结果

文献类型

  • 274,856 篇 会议
  • 112,639 篇 期刊文献
  • 2,812 册 图书

馆藏范围

  • 390,306 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,694 篇 工学
    • 150,016 篇 计算机科学与技术...
    • 121,279 篇 软件工程
    • 54,556 篇 信息与通信工程
    • 36,037 篇 控制科学与工程
    • 31,625 篇 电气工程
    • 30,537 篇 电子科学与技术(可...
    • 26,051 篇 生物工程
    • 20,531 篇 生物医学工程(可授...
    • 17,875 篇 光学工程
    • 15,408 篇 机械工程
    • 13,043 篇 化学工程与技术
    • 12,219 篇 仪器科学与技术
    • 12,164 篇 动力工程及工程热...
    • 10,889 篇 材料科学与工程(可...
    • 8,337 篇 安全科学与工程
    • 7,801 篇 网络空间安全
  • 127,344 篇 理学
    • 63,208 篇 数学
    • 41,811 篇 物理学
    • 29,429 篇 生物学
    • 20,424 篇 统计学(可授理学、...
    • 14,885 篇 系统科学
    • 14,054 篇 化学
  • 56,054 篇 管理学
    • 33,765 篇 管理科学与工程(可...
    • 24,475 篇 图书情报与档案管...
    • 16,730 篇 工商管理
  • 19,441 篇 医学
    • 16,317 篇 临床医学
    • 14,614 篇 基础医学(可授医学...
    • 9,151 篇 药学(可授医学、理...
    • 7,793 篇 公共卫生与预防医...
  • 10,547 篇 法学
    • 8,627 篇 社会学
  • 6,457 篇 经济学
  • 5,123 篇 农学
  • 4,188 篇 教育学
  • 1,859 篇 文学
  • 873 篇 军事学
  • 507 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 19,991 篇 computer science
  • 9,084 篇 accuracy
  • 8,741 篇 computational mo...
  • 7,962 篇 feature extracti...
  • 7,622 篇 deep learning
  • 7,259 篇 machine learning
  • 6,522 篇 training
  • 5,268 篇 data mining
  • 5,155 篇 computer archite...
  • 5,066 篇 support vector m...
  • 4,923 篇 wireless sensor ...
  • 4,908 篇 predictive model...
  • 4,659 篇 costs
  • 4,535 篇 bandwidth
  • 4,522 篇 optimization
  • 4,478 篇 application soft...
  • 4,374 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,348 篇 testing
  • 4,258 篇 neural networks

机构

  • 1,707 篇 department of co...
  • 1,360 篇 department of co...
  • 1,346 篇 department of el...
  • 1,169 篇 department of el...
  • 1,062 篇 cavendish labora...
  • 972 篇 department of ph...
  • 895 篇 department of co...
  • 845 篇 physikalisches i...
  • 843 篇 oliver lodge lab...
  • 824 篇 department of el...
  • 750 篇 university of ch...
  • 644 篇 department of co...
  • 559 篇 department of co...
  • 543 篇 infn sezione di ...
  • 521 篇 chitkara univers...
  • 513 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 499 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 488 篇 department of co...

作者

  • 255 篇 j. wang
  • 253 篇 s. chen
  • 250 篇 barter w.
  • 240 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 niyato dusit
  • 192 篇 c. amelung
  • 191 篇 g. bella

语言

  • 366,706 篇 英文
  • 19,894 篇 其他
  • 3,749 篇 中文
  • 220 篇 日文
  • 55 篇 德文
  • 35 篇 朝鲜文
  • 34 篇 法文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 7 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=the Department of Computer Science and Computer Engineering"
390307 条 记 录,以下是431-440 订阅
排序:
Advancing Activity Recognition with Multimodal Fusion and Transformer Techniques
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 19632-19649页
作者: Aidarova, Saltanat Nurmakhan, Temirlan Myrzakhan, Rakhat Fazli, Siamac Yazici, Adnan Nazarbayev University School of Engineering and Digital Sciences Department of Computer Science Astana Kazakhstan
In the field of Human Activity Recognition (HAR), the precise identification of human activities from time-series sensor data is a complex yet vital task, given its extensive applications across various industries. Th... 详细信息
来源: 评论
Hybrid ECD model for firewall tuning and attack detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第1期28卷 86-102页
作者: Thyagarajan, C. Vijay Bhanu S., S.V. Suthir, S. Department of Computer Science and Engineering Annamalai University Tamil Nadu Annamalai Nagar India
The rigorous security requirements and domain experts are necessary for the tuning of firewalls and for the detection of attacks. Those firewalls may create an incorrect sense or state of protection if they are improp... 详细信息
来源: 评论
Underwater object detection based on enhanced YOLOv4 architecture
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 53759-53783页
作者: Liu, Ching-Hua Lin, Chang Hong Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan
Object detection and image restoration pose significant challenges in deep learning and computer vision. These tasks are widely employed in various applications, and there is an increasing demand for specialized envir... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
VoteDroid: a new ensemble voting classifier for malware detection based on fine-tuned deep learning models
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10923-10944页
作者: Bakır, Halit Faculty of Engineering and Natural Sciences Department of Computer Engineering Sivas University of Science and Technology Sivas Turkey
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random... 详细信息
来源: 评论
Attention enabled viewport selection with graph convolution for omnidirectional visual quality assessment
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 12925-12948页
作者: C, Nandhini M, Brindha Department of Computer Science and Engineering National Institute of Technology TamilNadu Tiruchirappalli620015 India
Omnidirectional images provide an immersive viewing experience in a Virtual Reality (VR) environment, surpassing the limitations of traditional 2D media beyond the conventional screen. This VR technology allows users ... 详细信息
来源: 评论
A Huffman-based short message service compression technique using adjacent distance array
收藏 引用
International Journal of Information and Communication Technology 2024年 第2期25卷 118-136页
作者: Sarker, Pranta Rahman, Mir Lutfur Department of Computer Science and Engineering North East University Bangladesh Telihaor Sheikhghat Sylhet3100 Bangladesh Department of Computer Science University of Hertfordshire Hertfordshire United Kingdom
The short message service (SMS) is a wireless medium of transmission that allows you to send brief text messages. Cell phone devices have an uttermost SMS capacity of 1,120 bits in the traditional system. Moreover, th... 详细信息
来源: 评论
Analyzing Hierarchical Relationships and Quality of Embedding in Latent Space
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 843-858页
作者: Chatterjee, Ankita Mukherjee, Jayanta Das, Partha Pratim Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Kharagpur721302 India
Existing learning models partition the generated representations using hyperplanes which form well defined groups of similar embeddings that is uniquely mapped to a particular class. However, in practical applications... 详细信息
来源: 评论
RTSA: A Run-Through Sparse Attention Framework for Video Transformer
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1949-1962页
作者: Wang, Xuhang Song, Zhuoran Qi, Chunyu Liu, Fangxin Jiang, Li Liang, Xiaoyao Naifeng, Jing Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China
In the realm of video understanding tasks, Video Transformer models (VidT) have recently exhibited impressive accuracy improvements in numerous edge devices. However, their deployment poses significant computational c... 详细信息
来源: 评论
Network Security and Cryptography: Threats, Obstacles and Solutions-A Bibliometric Analysis
Recent Advances in Computer Science and Communications
收藏 引用
Recent Advances in computer science and Communications 2025年 第2期18卷 83-101页
作者: Singh, Purushottam Dutta, Sandip Pranav, Prashant Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi835215 India
Background: In the wake of escalating cyber threats and the indispensability of ro-bust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the s... 详细信息
来源: 评论