咨询与建议

限定检索结果

文献类型

  • 273,345 篇 会议
  • 111,993 篇 期刊文献
  • 2,804 册 图书

馆藏范围

  • 388,141 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 224,037 篇 工学
    • 148,948 篇 计算机科学与技术...
    • 120,663 篇 软件工程
    • 54,160 篇 信息与通信工程
    • 35,483 篇 控制科学与工程
    • 31,399 篇 电气工程
    • 30,358 篇 电子科学与技术(可...
    • 25,956 篇 生物工程
    • 20,386 篇 生物医学工程(可授...
    • 17,751 篇 光学工程
    • 15,345 篇 机械工程
    • 12,974 篇 化学工程与技术
    • 12,146 篇 仪器科学与技术
    • 12,098 篇 动力工程及工程热...
    • 10,733 篇 材料科学与工程(可...
    • 8,280 篇 安全科学与工程
    • 7,670 篇 网络空间安全
  • 126,674 篇 理学
    • 62,964 篇 数学
    • 41,550 篇 物理学
    • 29,361 篇 生物学
    • 20,317 篇 统计学(可授理学、...
    • 14,868 篇 系统科学
    • 13,897 篇 化学
  • 55,790 篇 管理学
    • 33,608 篇 管理科学与工程(可...
    • 24,364 篇 图书情报与档案管...
    • 16,634 篇 工商管理
  • 19,250 篇 医学
    • 16,141 篇 临床医学
    • 14,501 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,681 篇 公共卫生与预防医...
  • 10,508 篇 法学
    • 8,599 篇 社会学
  • 6,434 篇 经济学
  • 5,081 篇 农学
  • 4,151 篇 教育学
  • 1,861 篇 文学
  • 871 篇 军事学
  • 506 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,988 篇 computer science
  • 8,855 篇 accuracy
  • 8,624 篇 computational mo...
  • 7,891 篇 feature extracti...
  • 7,409 篇 deep learning
  • 7,201 篇 machine learning
  • 6,467 篇 training
  • 5,256 篇 data mining
  • 5,119 篇 computer archite...
  • 5,022 篇 support vector m...
  • 4,926 篇 wireless sensor ...
  • 4,825 篇 predictive model...
  • 4,653 篇 costs
  • 4,535 篇 bandwidth
  • 4,489 篇 optimization
  • 4,478 篇 application soft...
  • 4,365 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,328 篇 testing
  • 4,245 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,362 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 891 篇 department of co...
  • 851 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 742 篇 university of ch...
  • 638 篇 department of co...
  • 548 篇 department of co...
  • 543 篇 infn sezione di ...
  • 515 篇 chitkara univers...
  • 513 篇 infn sezione di ...
  • 513 篇 infn laboratori ...
  • 501 篇 horia hulubei na...
  • 492 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 255 篇 j. wang
  • 255 篇 s. chen
  • 250 篇 barter w.
  • 240 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 190 篇 j. strandberg

语言

  • 372,071 篇 英文
  • 12,408 篇 其他
  • 3,669 篇 中文
  • 220 篇 日文
  • 48 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=the Department of Computer Science and Computer Engineering"
388142 条 记 录,以下是4921-4930 订阅
排序:
Deep Learning in Medical Imaging: A Comparative Review of Models for Ischemic and Hemorrhagic Stroke Lesion Segmentation
Deep Learning in Medical Imaging: A Comparative Review of Mo...
收藏 引用
International Health Informatics Conference, IHIC 2023
作者: Sulaiman, Sadiya Thanka, M. Roshni Edwina, E. Bijolin Salam, Nader Department of Computer Science and Engineering Karunya Institute of Technology and Science Tamil Nadu Coimbatore India
Stroke, primarily categorized as ischemic and hemorrhagic, stands among the top global causes of mortality and can lead to severe neurological conditions if left untreated. The emergence of machine intelligence, espec... 详细信息
来源: 评论
FLoomChecker: Repelling Free-riders in Federated Learning via Training Integrity Verification  30
FLoomChecker: Repelling Free-riders in Federated Learning vi...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Liang, Guanghao Chang, Shan Dai, Minghui Zhu, Hongzi Donghua University School of Computer Science and Technology Shanghai China Shanghai Jiaotong University Department of Computer Science and Engineering Shanghai China
Federated learning is a mechanism that allows participating clients to train locally with their own data in order to receive rewards, thus avoiding the transfer of data to a central server and protecting users' pr... 详细信息
来源: 评论
Dynamic Route Management for Secure Data Aggregation in Duty-Cycled Mobile Sink-Based WSNs
收藏 引用
SN computer science 2025年 第3期6卷 1-15页
作者: Sran, Sukhwinder Singh Sidhu, Sukhpreet Kaur Kumar, Manoj Sood, Preeti Department of Computer Science & Engineering Punjabi University Punjab Patiala 147002 India Department of Mathematics Akal University Talwandi Sabo Punjab Bathinda 151302 India Department of Computer Engineering Yadavindra Department of Engineering Talwandi Sabo Punjab Bathinda 151302 India Research Scholar Department of Computer Engineering Yadavindra Department of Engineering Talwandi Sabo Punjab Bathinda 151302 India
Secure data aggregation and effective data transmission are necessary to enhance sensor network durability and performance. Secure data collection from the duty-cycled sensor nodes using a moving sink and evenly distr... 详细信息
来源: 评论
Denoising Historical Text Documents Using Generative Adversarial Networks  8th
Denoising Historical Text Documents Using Generative Adversa...
收藏 引用
8th International Symposium on Intelligent Informatics, ISI 2023
作者: Preethi, P. Upadhya, Pradhyumna Likith, M.C. Meghana, N. Karande, Shruti Gunnan Ramkumar, Shreya Department of Computer Science and Engineering PES University Karnataka Bengaluru560085 India
The field of image-to-image translation, particularly in the context of denoising historical text documents, has witnessed significant advancements driven by the application of Generative Adversarial Networks (GANs). ... 详细信息
来源: 评论
Penetration Testing Operating Systems: Exploiting Vulnerabilities
Penetration Testing Operating Systems: Exploiting Vulnerabil...
收藏 引用
2024 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2024
作者: Gardner, Evan Singh, Gurmeet Qu, Weihao Software Engineering Monmouth University Department of Computer Science United States
The safeguarding of critical data stored on devices such as phones, computers, and tablets against unauthorized access has emerged as a central concern in modern society. Along with the increasing reliance on these de... 详细信息
来源: 评论
Precise Lung Disease Classification Through Bagging Ensemble Method  7
Precise Lung Disease Classification Through Bagging Ensemble...
收藏 引用
7th International Conference on Circuit Power and Computing Technologies, ICCPCT 2024
作者: Shimja, M. Kartheeban, K. Kalasalingam Academy of Research and Education Department of Computer Science and Engineering India
Lung disease pose a significant global health challenge, with their prevalence and impact on public well-being necessitating advanced diagnostic methods for timely and accurate identification. As a vital organ for res... 详细信息
来源: 评论
SCOUT+: Towards Practical Task-Driven Drivers' Gaze Prediction  35
SCOUT+: Towards Practical Task-Driven Drivers' Gaze Predicti...
收藏 引用
35th IEEE Intelligent Vehicles Symposium, IV 2024
作者: Kotseruba, Iuliia Tsotsos, John K. York University Department Of Electrical Engineering And Computer Science Toronto Canada
Accurate prediction of drivers' gaze is an important component of vision-based driver monitoring and assistive systems. Of particular interest are safety-critical episodes, such as performing maneuvers or crossing... 详细信息
来源: 评论
Unveiling the Power of Neural Program Synthesis in High Level Code Generation  15
Unveiling the Power of Neural Program Synthesis in High Leve...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sai, Gurram Kumar Harshith, Koganti Sri Sai Varma, Kucharlapati Akash Yashwanth Kiran, G. Swaminathan, J. Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
In this research, we delve into a transformative exploration of the realm of code generation, unveiling three fundamental modules that constitute the backbone of our study: the Text-to-Code Generation Model, Code Auto... 详细信息
来源: 评论
FLARE: Federated Learning And Resilient Encryption for Firewalls  7
FLARE: Federated Learning And Resilient Encryption for Firew...
收藏 引用
7th IEEE Pune Section International Conference, PuneCon 2024
作者: Senthilkumar, Lohith Rengarajan, Aaditya Psg College of Technology Department of Computer Science and Engineering Coimbatore India
Traditional firewalls rely on static rule-based mechanisms, where rules are manually defined and often written in specialized languages. While effective to a degree, these rules are inherently limited and can be easil... 详细信息
来源: 评论
Design of high output DC/DC boost circuit without boost transformer  8
Design of high output DC/DC boost circuit without boost tran...
收藏 引用
8th International Conference on Communication and Information Systems, ICCIS 2024
作者: Hong, Qin Zhou, Liang Jia, Zhongning Liu, Chun Liu, Jianbo Software Engineering Institute of Guangzhou Department of Computer Science Guangzhou China
The development of IOT smart devices has necessitated increasingly stringent requirements for DC power sources in terms of output voltage, size, and cost. For instance, Avalanche Photodiodes (APDs), utilized as photod... 详细信息
来源: 评论