咨询与建议

限定检索结果

文献类型

  • 188 篇 会议
  • 15 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 209 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 135 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 21 篇 信息与通信工程
    • 15 篇 电气工程
    • 9 篇 控制科学与工程
    • 6 篇 网络空间安全
    • 4 篇 化学工程与技术
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 测绘科学与技术
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 光学工程
  • 56 篇 理学
    • 44 篇 数学
    • 9 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 18 篇 管理学
    • 16 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 3 篇 法学
    • 3 篇 社会学
    • 1 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 药学(可授医学、理...
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 13 篇 graph theory
  • 9 篇 artificial intel...
  • 8 篇 automata theory
  • 7 篇 discrete mathema...
  • 6 篇 theory of comput...
  • 6 篇 computers
  • 5 篇 computer communi...
  • 4 篇 software enginee...
  • 4 篇 software enginee...
  • 4 篇 algorithm analys...
  • 4 篇 information stor...
  • 3 篇 turing machines
  • 3 篇 database managem...
  • 3 篇 game theory
  • 3 篇 complexity theor...
  • 3 篇 software
  • 3 篇 computer program...
  • 3 篇 information retr...
  • 2 篇 data storage rep...
  • 2 篇 computer science

机构

  • 3 篇 university of be...
  • 2 篇 department of co...
  • 2 篇 charles universi...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 warsaw universit...
  • 2 篇 dept. of compute...
  • 2 篇 school of comput...
  • 2 篇 university of li...
  • 2 篇 institute of com...
  • 2 篇 the institute of...
  • 2 篇 university of am...
  • 2 篇 department of in...
  • 2 篇 central universi...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 1 篇 university of ca...
  • 1 篇 faculty of elect...
  • 1 篇 cern 1 esplanade...
  • 1 篇 ist austria klos...

作者

  • 3 篇 van leeuwen jan
  • 3 篇 šíma jiří
  • 3 篇 saurabh saket
  • 2 篇 peleg david
  • 2 篇 zhaoquan gu
  • 2 篇 bieliková mária
  • 2 篇 žák stanislav
  • 2 篇 ono hirotaka
  • 2 篇 mária bieliková
  • 2 篇 leszek pacholski
  • 2 篇 freivalds rūsiņš
  • 2 篇 shaohua wang
  • 2 篇 paulusma daniel
  • 2 篇 inenaga shunsuke
  • 2 篇 xinchen wang
  • 2 篇 kiya hironori
  • 2 篇 rossmanith peter
  • 2 篇 wiedermann jiri
  • 2 篇 pokorný jaroslav
  • 2 篇 iliopoulos costa...

语言

  • 206 篇 英文
  • 4 篇 中文
检索条件"任意字段=38th Conference on Current Trends in Theory and Practice of Computer Science"
210 条 记 录,以下是201-210 订阅
排序:
Optimisation of artificial neural network topology applied in the prosody control in text-to-speech synthesis  27th
收藏 引用
27th conference on current trends in theory and practice of Informatics, SOFSEM 2000
作者: Šebesta, Václav Tučková, Jana Institute of Computer Science Academy of Sciences of the Czech Republic Czech Technical University Czech Republic Czech Technical University Institute of Radioengineering and Electronics Academy of Sciences Czech Republic
Multilayer artificial neural networks (ANN) are often used for the solution of classification problems or for the time series forecasting. An appropriate number of learning and testing patterns must be available for t... 详细信息
来源: 评论
QuPAA: Exploiting Parallel and Adaptive Architecture to Scale up Quantum Computing
QuPAA: Exploiting Parallel and Adaptive Architecture to Scal...
收藏 引用
IEEE International conference on computer Design: VLSI in computers and Processors, (ICCD)
作者: Yingxun Fu Yao Sun Tao Li University of Florida Gainesville USA College of Information Science North China University of Technology Beijing China
Quantum computing has been gradually developed from a theory to practice in recent years. the desire for more powerful computational capability keeps promoting the scaling up of quantum computers. For quantum machines... 详细信息
来源: 评论
4th International workshop on Emerging trends in Software Metrics (WETSoM 2013)
4th International workshop on Emerging Trends in Software Me...
收藏 引用
International conference on Software Engineering (ICSE)
作者: Steven Counsell Ewan Tempero Michele L. Marchesi Aaron Visaggio Department of Information Systems and Computing Brunel University London UK Department of Electrical and Electronic Engineering University of Cagliari Cagliari Italy Department of Computer Science University of Auckland Auckland New Zealand Department of Engineering University of Sannio Benevento Italy
the International Workshop on Emerging trends in Software Metrics aims at gathering together researchers and practitioners to discuss the progress of software metrics. the motivation for this workshop is the low impac... 详细信息
来源: 评论
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
When Less is Enough: Positive and Unlabeled Learning Model f...
收藏 引用
IEEE International conference on Automated Software Engineering (ASE)
作者: Xin-Cheng Wen Xinchen Wang Cuiyun Gao Shaohua Wang Yang Liu Zhaoquan Gu School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Central University of Finance and Economics China School of Computer Science and Engineering Nanyang Technological University China
Automated code vulnerability detection has gained increasing attention in recent years. the deep learning (DL)-based methods, which implicitly learn vulnerable code patterns, have proven effective in vulnerability det...
来源: 评论
Harnessing small projectors and multiple views for efficient vision pretraining  38
Harnessing small projectors and multiple views for efficient...
收藏 引用
38th conference on Neural Information Processing Systems, NeurIPS 2024
作者: Ghosh, Arna Agrawal, Kumar Krishna Sodhani, Shagun Oberman, Adam M. Richards, Blake A. Mila - Quebec AI Institute & Computer Science McGill University MontréalQC Canada UC Berkeley CA United States Meta FAIR TorontoON Canada Mila - Quebec AI Institute & Mathematics and Statistics McGill University MontréalQC Canada Neurology & Neurosurgery and Montreal Neurological Institute McGill University MontréalQC Canada CIFAR Learning in Machines & Brains Program TorontoON Canada
Recent progress in self-supervised (SSL) visual representation learning has led to the development of several different proposed frameworks that rely on augmentations of images but use different loss functions. Howeve...
来源: 评论
Rough Sets and Intelligent Systems Paradigms: Second International conference, RSEISP 2014, Held as Part of JRS 2014, Granada and Madrid, Spain, July 9-13, 2014. Proceedings  1
收藏 引用
丛书名: Lecture Notes in computer science 8537 Lecture Notes in Artificial Intelligence
2014年
作者: Marzena Kryszkiewicz, Chris Cornelis, Davide Ciucci, Jesús Medina-Moreno, Hiroshi Motoda, Zbigniew W. Raś (eds.)
this book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent Systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was h...
来源: 评论
DF40: Toward Next-Generation Deepfake Detection  38
DF40: Toward Next-Generation Deepfake Detection
收藏 引用
38th conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yan, Zhiyuan Yao, Taiping Chen, Shen Zhao, Yandan Fu, Xinghe Zhu, Junwei Luo, Donghao Wang, Chengjie Ding, Shouhong Wu, Yunsheng Yuan, Li School of Electronic and Computer Engineering Peking University China Tencent Youtu Lab China
We propose a new comprehensive benchmark to revolutionize the current deepfake detection field to the next generation. Predominantly, existing works identify top-notch detection algorithms and models by adhering to th...
来源: 评论
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection  23
When Less is Enough: Positive and Unlabeled Learning Model f...
收藏 引用
Proceedings of the 38th IEEE/ACM International conference on Automated Software Engineering
作者: Xin-Cheng Wen Xinchen Wang Cuiyun Gao Shaohua Wang Yang Liu Zhaoquan Gu School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Central University of Finance and Economics China School of Computer Science and Engineering Nanyang Technological University China
Automated code vulnerability detection has gained increasing attention in recent years. the deep learning (DL)-based methods, which implicitly learn vulnerable code patterns, have proven effective in vulnerability det... 详细信息
来源: 评论
Preface
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 2932卷 V-VI页
作者: Van Emde Boas, Peter Pokorný, Jaroslav Bieliková, Mária University of Amsterdam ILLC - Department of Mathematics and Computer Science Plantage Muidergracht 24 Amsterdam Netherlands Charles University Malostranské nám. 25 Prague 1 Czech Republic Slovak University of Technology Ilkoviova 3 Bratislava Slovakia Academy of Sciences of the Czech Republic Institute of Computer Science Pod Vodárenskou ví 2 Prague 8 Czech Republic
来源: 评论
Preface
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2000年 1963卷 V-VI页
作者: Hlavá, Václav Jeffery, Keith G. Wiedermann, Jií Czech Technical University Department of Cybernetics Karlovo nám. 13 Prague Czech Republic CLRC RAL Information Technology Department Chilton DidcotOxfordshire United Kingdom Academy of Sciences of the Czech Republic Insitute of Computer Science Pod vodárenskou ví 2 Prague Czech Republic
来源: 评论