咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 11 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 167 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 42 篇 信息与通信工程
    • 30 篇 电气工程
    • 21 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 5 篇 网络空间安全
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
  • 72 篇 理学
    • 47 篇 数学
    • 22 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 10 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 医学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 genetic algorith...
  • 8 篇 artificial intel...
  • 8 篇 constraint theor...
  • 6 篇 machine learning
  • 6 篇 game theory
  • 6 篇 clustering algor...
  • 5 篇 computer science
  • 5 篇 algorithm design...
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 4 篇 graph theory
  • 4 篇 computers
  • 4 篇 decision making
  • 4 篇 computer vision
  • 4 篇 computer network...
  • 3 篇 computer simulat...
  • 3 篇 object detection
  • 3 篇 systems engineer...
  • 3 篇 algorithms
  • 3 篇 logic gates

机构

  • 3 篇 univ penn dept c...
  • 3 篇 electronics and ...
  • 3 篇 division of comp...
  • 2 篇 ben-gurion unive...
  • 2 篇 univ cambridge 6...
  • 2 篇 duke univ dept e...
  • 2 篇 tu wien austria
  • 2 篇 institute of sys...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 dacya complutens...
  • 2 篇 med mobile 535 2...
  • 2 篇 college of compu...
  • 2 篇 deis universit d...
  • 2 篇 school of comput...
  • 1 篇 lahore pakistan
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 dept. of mechani...
  • 1 篇 key laboratory o...

作者

  • 3 篇 parlato gennaro
  • 3 篇 sokolsky oleg
  • 3 篇 park junkil
  • 3 篇 pajic miroslav
  • 3 篇 lee insup
  • 3 篇 la torre salvato...
  • 3 篇 fischer bernd
  • 2 篇 holeman isaac
  • 2 篇 mohd azlishah ot...
  • 2 篇 tomasco ermenegi...
  • 2 篇 inverso omar
  • 2 篇 segal michael
  • 2 篇 lengál ondřej
  • 2 篇 ross peter
  • 2 篇 hamzah asyrani s...
  • 2 篇 yahaya abd rahim
  • 2 篇 mohd fairuz iska...
  • 2 篇 marchetti-spacca...
  • 2 篇 corne david
  • 1 篇 roihan ahmad

语言

  • 275 篇 英文
  • 2 篇 中文
检索条件"任意字段=1st International ICST Conference on Theory and Practice of Algorithms in Computer Systems"
276 条 记 录,以下是251-260 订阅
排序:
Parallel Detection Architecture for long-tail Problem in Intelligent Transportation systems
Parallel Detection Architecture for long-tail Problem in Int...
收藏 引用
Digital Twins and Parallel Intelligence (DTPI), IEEE international conference on
作者: Jingyi Li Hui Zhang Yidong Li School of Computer and Information Technology Beijing Jiaotong University Beijing China
Object detection plays an important role in intelligent transportation systems, especially due to the rise of autonomous vehicles and smart traffic management. Although object detection techniques in traffic scenes ha... 详细信息
来源: 评论
Accelerating Convergence of Score-Based Diffusion Models, Provably  41
Accelerating Convergence of Score-Based Diffusion Models, Pr...
收藏 引用
41st international conference on Machine Learning, ICML 2024
作者: Li, Gen Huang, Yu Efimov, Timofey Wei, Yuting Chi, Yuejie Chen, Yuxin Department of Statistics The Chinese University of Hong Kong Hong Kong Department of Statistics and Data Science Wharton School University of Pennsylvania PhiladelphiaPA19104 United States Department of Electrical and Computer Engineering Carnegie Mellon University PittsburghPA15213 United States
Score-based diffusion models, while achieving remarkable empirical performance, often suffer from low sampling speed, due to extensive function evaluations needed during the sampling phase. Despite a flurry of recent ... 详细信息
来源: 评论
Rough Sets and Intelligent systems Paradigms: Second international conference, RSEISP 2014, Held as Part of JRS 2014, Granada and Madrid, Spain, July 9-13, 2014. Proceedings  1
收藏 引用
丛书名: Lecture Notes in computer Science 8537 Lecture Notes in Artificial Intelligence
2014年
作者: Marzena Kryszkiewicz, Chris Cornelis, Davide Ciucci, Jesús Medina-Moreno, Hiroshi Motoda, Zbigniew W. Raś (eds.)
This book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was h...
来源: 评论
Finding ethical principles and practical guidelines for the controlled flow of patient data
收藏 引用
METHODS OF INFORMATION IN MEDICINE 1999年 第4-5期38卷 345-349页
作者: Rigby, M Draper, R Hamilton, I Univ Keele Ctr Hlth Planning & Management Keele ST5 5BG Staffs England Hosp Order St John God Stillorgan County Dublin Ireland
The application of computing to health care, and particularly to electronic patient records, offers major benefits but raises issues of confidentiality and of potential misuse. Sound access control mechanisms are ther... 详细信息
来源: 评论
Blockchain - A Deployment Mechanism for IoT Based Security  1
Blockchain - A Deployment Mechanism for IoT Based Security
收藏 引用
1st international conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Kant, Ravi Sharma, Shashank Vikas, Vikas Chaudhary, Sachin Jain, Animesh Kumar Sharma, Kewal Krishan Iimt Engineering College Computer Science and Engineering Department Meerut India Iimt University School of Computer Science & Applications Meerut India
Implementation of IoT domain invites tremendous attacking opportunities which demands end to - end security mechanism. Applications related to the domain of IoT varies from critical applications to normal business-ori... 详细信息
来源: 评论
Towards a common benchmark in WiMAX environment
Towards a common benchmark in WiMAX environment
收藏 引用
international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology (Wireless VITAE)
作者: Lukasz Chrost Agnieszka Brachman Institute of Informatics Silesian University of Technology Gliwice Poland
Recently Andrew et al. proposed the TCP evaluation suite to provide a common test suite for researchers designing new TCP extensions and AQM mechanisms. It defines network topologies, simulation scenarios i.e. traffic... 详细信息
来源: 评论
New key tree management protocol for the efficiency of storage and computation time in secure multicast communication
New key tree management protocol for the efficiency of stora...
收藏 引用
international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology (Wireless VITAE)
作者: Dong-Hyun Je Seung-Woo Seo School of Electrical Engineering and Computer Science Seoul National University South Korea
A group key management is essential method guaranteeing of data confidentiality and integrity in secure multicast communication. For secure multicast, group key management schemes have focused on communication cost, i... 详细信息
来源: 评论
Multi-view discriminative manifold embedding for pattern classification
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent systems and Computing 2018年 613卷 167-174页
作者: Wang, Xuezhen Guo, Yunxia Wang, Ziqiang Department of Information People’s Hospital of Zhengzhou Zhenghzou450053 China Department of Digestive People’s Hospital of Zhengzhou Zhengzhou450053 China Department of Computer Science Henan University of Technology Zhengzhou450001 China
While many dimensionality reduction algorithms have been proposed in recent years, most of them are designed for single view data and cannot cope with multi-view data directly. Dimensionality reduction algorithms in r... 详细信息
来源: 评论
A Review Paper on Automatic Number Plate Recognition using Machine Learning : An In-Depth Analysis of Machine Learning Techniques in Automatic Number Plate Recognition: Opportunities and Limitations  1
A Review Paper on Automatic Number Plate Recognition using M...
收藏 引用
1st international conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Prajapati, Rajat Kumar Bhardwaj, Yatharth Jain, Ritesh Kumar Kamal Kant Hiran, Dr. Geetanjali Institute of Technical Studies Department of Computer Science & Engineering Rajasthan Udaipur India Geetanjali Institute of Technical Studies Cse Rajasthan Udaipur India Symbiosis University of Applied Sciences Cse Madhya Pradesh Indore India
The recognition of license plates, known as Automatic Number Plate Recognition (ANPR), is an important topic in the fields of smart transportation systems and image recognition. ANPR has the potential to significantly... 详细信息
来源: 评论
Coordinating randomized policies for increasing security of agent systems
收藏 引用
INFORMATION TECHNOLOGY & MANAGEMENT 2009年 第1期10卷 67-79页
作者: Paruchuri, Praveen Pearce, Jonathan P. Marecki, Janusz Tambe, Milind Ordonez, Fernando Kraus, Sarit Carnegie Mellon Univ Pittsburgh PA 15232 USA Knight Capital Grp Jersey City NJ USA IBM Res York NY USA Univ So Calif Los Angeles CA 90089 USA Bar Ilan Univ IL-52900 Ramat Gan Israel Univ Maryland College Pk MD 20742 USA
We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into a... 详细信息
来源: 评论