咨询与建议

限定检索结果

文献类型

  • 9,864 篇 会议
  • 299 篇 期刊文献
  • 94 册 图书

馆藏范围

  • 10,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,678 篇 工学
    • 6,189 篇 计算机科学与技术...
    • 4,314 篇 软件工程
    • 1,289 篇 信息与通信工程
    • 855 篇 控制科学与工程
    • 694 篇 生物工程
    • 589 篇 电气工程
    • 445 篇 生物医学工程(可授...
    • 427 篇 机械工程
    • 355 篇 电子科学与技术(可...
    • 350 篇 光学工程
    • 297 篇 化学工程与技术
    • 245 篇 仪器科学与技术
    • 231 篇 网络空间安全
    • 223 篇 动力工程及工程热...
    • 217 篇 安全科学与工程
    • 201 篇 建筑学
  • 2,822 篇 理学
    • 1,446 篇 数学
    • 772 篇 物理学
    • 726 篇 生物学
    • 454 篇 统计学(可授理学、...
    • 303 篇 化学
    • 230 篇 系统科学
  • 2,590 篇 教育学
    • 2,576 篇 教育学
  • 2,070 篇 管理学
    • 1,258 篇 管理科学与工程(可...
    • 911 篇 图书情报与档案管...
    • 781 篇 工商管理
  • 488 篇 法学
    • 441 篇 社会学
  • 480 篇 医学
    • 359 篇 临床医学
    • 313 篇 基础医学(可授医学...
    • 217 篇 公共卫生与预防医...
  • 210 篇 经济学
  • 136 篇 文学
  • 119 篇 农学
  • 40 篇 艺术学
  • 13 篇 军事学
  • 2 篇 哲学

主题

  • 514 篇 students
  • 473 篇 education
  • 315 篇 technological in...
  • 286 篇 computer science
  • 192 篇 computer science...
  • 162 篇 teaching
  • 153 篇 engineering educ...
  • 123 篇 artificial intel...
  • 106 篇 deep learning
  • 101 篇 computational mo...
  • 100 篇 software enginee...
  • 100 篇 machine learning
  • 98 篇 training
  • 97 篇 internet of thin...
  • 92 篇 computer aided i...
  • 91 篇 big data
  • 87 篇 accuracy
  • 86 篇 semantics
  • 83 篇 curricula
  • 80 篇 higher education

机构

  • 111 篇 yerevan physics ...
  • 78 篇 department of ph...
  • 78 篇 faculty of scien...
  • 77 篇 departamento de ...
  • 77 篇 department for p...
  • 77 篇 department of ph...
  • 76 篇 department of ph...
  • 76 篇 department of ph...
  • 76 篇 kirchhoff-instit...
  • 76 篇 fakultät für phy...
  • 75 篇 faculté des scie...
  • 75 篇 department of ph...
  • 74 篇 graduate school ...
  • 73 篇 institute of phy...
  • 70 篇 institut für ast...
  • 68 篇 department of ph...
  • 68 篇 department of ph...
  • 68 篇 department of ph...
  • 68 篇 tomsk state univ...
  • 67 篇 centre de calcul...

作者

  • 77 篇 c. alexa
  • 77 篇 j. m. izen
  • 77 篇 g. bella
  • 77 篇 j. strandberg
  • 76 篇 d. calvet
  • 76 篇 c. amelung
  • 70 篇 s. veneziano
  • 70 篇 h. a. gordon
  • 69 篇 g. spigo
  • 68 篇 f. siegert
  • 68 篇 a. c. könig
  • 68 篇 m. klein
  • 67 篇 n. orlando
  • 67 篇 r. ströhmer
  • 67 篇 h. sakamoto
  • 67 篇 m. rijssenbeek
  • 67 篇 s. jin
  • 67 篇 g. gaudio
  • 66 篇 s. nektarijevic
  • 66 篇 f. marroquim

语言

  • 9,933 篇 英文
  • 286 篇 其他
  • 72 篇 中文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=15th Innovation and Technology in Computer Science Education Conference"
10257 条 记 录,以下是131-140 订阅
排序:
SCCA-Net: A Novel Network for Image Manipulation Localization Using Split-Channel Contextual Attention  17th
SCCA-Net: A Novel Network for Image Manipulation Localizati...
收藏 引用
17th Asian conference on computer Vision, ACCV 2024
作者: Xiang, Yan Zhao, Kaiqi Yin, Haichang Guangdong Polytechnic of Science and Technology Guangdong Zhuhai519090 China School of Cyberspace Security Shandong University of Political Science and Law Shandong Jinan250014 China
this paper introduces SCCA-Net, an advanced end-to-end network designed specifically for Image Manipulation Localization (IML). SCCA-Net comprises four critical modules: Split-Channel Contextual Attention (SCCA), Extr... 详细信息
来源: 评论
Portability of Multiphysics Applications on Heterogeneous Modular Supercomputers  15th
Portability of Multiphysics Applications on Heterogeneous ...
收藏 引用
15th International conference on Parallel Processing and Applied Mathematics, PPAM 2024
作者: Caviedes-Voullième, Daniel Koh, Seong-Ryong Poll, Stefan Suarez, Estela Arakawa, Takashi Nakajima, Kengo Sumimoto, Shinji Jülich Supercomputing Centre Forschungszentrum Jülich Jülich Germany CliMTech Inc. Chiba Japan The University of Tokyo Kashiwa Chiba Japan Kobe Japan Department of Computer Science University of Bonn Bonn Germany
the Modular Supercomputer Architecture (MSA) integrates various processing units, with compute modules tailored for specific algorithms, forming a unified heterogeneous system. Modules operate as parallel clustered sy... 详细信息
来源: 评论
Manna Methodology: A Novel Approach to education 5.0 through Learning and Socio-Emotional Assessment in IoD Bootcamps
Manna Methodology: A Novel Approach to Education 5.0 Through...
收藏 引用
17th International conference on computer Supported education, CSEDU 2025
作者: Madrigar, T.T. Calvo, R. Ruiz Aylon, L.B. Manna Ecosystem State University of Maringá Brazil
this study explores the practical application of education 5.0 through a methodology that integrates exponential technologies, emphasizing the Internet of Drones (IoD) to enhance students' technical and socio-emot... 详细信息
来源: 评论
Unknown Category Malicious Traffic Detection Based on Contrastive Learning  6th
Unknown Category Malicious Traffic Detection Based on Contra...
收藏 引用
6th International conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yan, Leiming Zhou, Tao Chen, Xianyi Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
In response to the continuous emergence of novel unknown malicious traffic and the limitations of traditional detection methods, this paper presents an unknown-category malicious traffic detection approach based on co... 详细信息
来源: 评论
Optimizing Lane Configuration and ETC Adoption to Minimize Congestion and Costs at Toll Plazas  17th
Optimizing Lane Configuration and ETC Adoption to Minimize C...
收藏 引用
17th International conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2024
作者: Klaykul, Pattarapon Lee, Wilaiporn Prayote, Akara Department of Computer and Information Science King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand Department of Electrical and Computer Engineering King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand
At toll plazas, congestion frequently occurs during peak hours due to inadequate lane management and misalignment of toll payment lanes with traffic volume and payment patterns. this study proposes a model to determin... 详细信息
来源: 评论
Masking Cascaded Self-attentions for Few-Shot Font-Generation Transformer  17th
Masking Cascaded Self-attentions for Few-Shot Font-Generati...
收藏 引用
17th Asian conference on computer Vision, ACCV 2024
作者: Ma, Jing Xiang, Xiang He, Yan National Key Lab of Multi-Spectral Information Intelligent Processing Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Few-shot Font Generation (FFG) is a practical technology widely used in designing artistic characters, handwriting imitation, and identification, etc., which aims to generate realistic font images with a few reference... 详细信息
来源: 评论
Fuzzy-AttnNet: A Deep Learning Framework for Image Retrieval Using Fuzzy Feature Fusion  16
Fuzzy-AttnNet: A Deep Learning Framework for Image Retrieval...
收藏 引用
2024 16th International conference on Graphics and Image Processing, ICGIP 2024
作者: Liu, Shengyu Pan, Jingshan Li, Na Hu, Tao Tian, Tangbin Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Image retrieval is the process of searching for similar images based on their visual content, which has significant applications in the field of medical imaging. Quickly retrieving similar images from a medical image ... 详细信息
来源: 评论
E2CANet: An Efficient and Effective Convolutional Attention Network for Semantic Segmentation  17th
E2CANet: An Efficient and Effective Convolutional Attention...
收藏 引用
17th Asian conference on computer Vision, ACCV 2024
作者: Mu, Yuerong Guo, Qiang School of Computer Science and Technology Shandong University of Finance and Economics Jinan China
Many semantic segmentation methods employ various attention mechanisms to improve segmentation accuracy. However, as the accuracy of the model increases, the computational cost is relatively expensive, which is not fa... 详细信息
来源: 评论
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning  26th
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Base...
收藏 引用
26th International conference on Information and Communications Security, ICICS 2024
作者: Cui, Bo Liu, Shuai Engineering Research Center of Ecological Big Data Ministry of Education Beijing China College of Computer Science Inner Mongolia University Hohhot China
As the economic value of cryptocurrencies continues to ascend, an increasing number of cybercriminals exploit malicious browser scripts to commandeer the system and network resources of victims for unauthorized crypto... 详细信息
来源: 评论
Direction-Guided Sparse Representation Method for Finger Vein Recognition  18th
Direction-Guided Sparse Representation Method for Finger Vei...
收藏 引用
18th Chinese conference on Biometric Recognition, CCBR 2024
作者: Zhou, Lizhen Yang, Lu Meng, Qinggang Yang, Gongping Department of Information ZiBo Normal College Zibo255130 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China School of Software Shandong University Jinan250101 China
the extended sparse representation method is robust to image deformation and has shown promising performance in finger vein recognition. However, its large number of dictionary atoms results in high memory usage and l... 详细信息
来源: 评论