咨询与建议

限定检索结果

文献类型

  • 2,831 篇 期刊文献
  • 1,181 篇 会议
  • 64 册 图书

馆藏范围

  • 4,076 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,840 篇 理学
    • 1,639 篇 数学
    • 1,206 篇 物理学
    • 397 篇 统计学(可授理学、...
    • 309 篇 系统科学
    • 250 篇 生物学
    • 240 篇 化学
    • 138 篇 地球物理学
    • 127 篇 天文学
  • 2,319 篇 工学
    • 1,121 篇 计算机科学与技术...
    • 817 篇 软件工程
    • 318 篇 控制科学与工程
    • 275 篇 力学(可授工学、理...
    • 251 篇 电气工程
    • 246 篇 信息与通信工程
    • 229 篇 电子科学与技术(可...
    • 201 篇 材料科学与工程(可...
    • 186 篇 生物工程
    • 183 篇 动力工程及工程热...
    • 176 篇 光学工程
    • 157 篇 化学工程与技术
    • 154 篇 生物医学工程(可授...
    • 150 篇 机械工程
    • 139 篇 仪器科学与技术
    • 114 篇 核科学与技术
    • 90 篇 航空宇航科学与技...
  • 350 篇 管理学
    • 228 篇 管理科学与工程(可...
    • 122 篇 图书情报与档案管...
    • 113 篇 工商管理
  • 136 篇 医学
    • 116 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 49 篇 法学
  • 47 篇 农学
  • 29 篇 教育学
  • 9 篇 文学
  • 8 篇 军事学
  • 4 篇 哲学
  • 1 篇 艺术学

主题

  • 62 篇 mathematics
  • 52 篇 quantum field th...
  • 49 篇 quantum entangle...
  • 45 篇 computational mo...
  • 43 篇 finite element m...
  • 43 篇 quantum optics
  • 42 篇 machine learning
  • 38 篇 mathematical mod...
  • 31 篇 optimization
  • 31 篇 quantum fields i...
  • 31 篇 artificial intel...
  • 28 篇 computer science
  • 27 篇 inverse problems
  • 26 篇 entanglement in ...
  • 25 篇 eigenvalues and ...
  • 24 篇 covid-19
  • 24 篇 software enginee...
  • 23 篇 partial differen...
  • 23 篇 visualization
  • 23 篇 numerical method...

机构

  • 130 篇 institute for qu...
  • 96 篇 department of ap...
  • 95 篇 institute for qu...
  • 87 篇 perimeter instit...
  • 71 篇 department of ap...
  • 58 篇 perimeter instit...
  • 58 篇 université de st...
  • 57 篇 infn sezione di ...
  • 57 篇 north-west unive...
  • 57 篇 institut univers...
  • 56 篇 tno technical sc...
  • 54 篇 national centre ...
  • 50 篇 nikhef national ...
  • 50 篇 university of jo...
  • 48 篇 ncsr demokritos ...
  • 48 篇 infn sezione di ...
  • 47 篇 infn sezione di ...
  • 46 篇 university moham...
  • 46 篇 comenius univers...
  • 45 篇 université de ha...

作者

  • 76 篇 eduardo martín-m...
  • 59 篇 chen a.
  • 58 篇 ferrara g.
  • 57 篇 ardid m.
  • 57 篇 calvo d.
  • 55 篇 benoit d.m.
  • 55 篇 eddymaoui a.
  • 55 篇 martín-martínez ...
  • 52 篇 gagliardini s.
  • 52 篇 gal t.
  • 52 篇 bozza c.
  • 52 篇 díaz a.f.
  • 52 篇 boumaaza j.
  • 51 篇 boettcher m.
  • 51 篇 enzenhöfer a.
  • 51 篇 celli s.
  • 50 篇 coleiro a.
  • 50 篇 gozzini s.r.
  • 50 篇 dallier r.
  • 50 篇 benhassi m.

语言

  • 3,506 篇 英文
  • 547 篇 其他
  • 16 篇 中文
  • 8 篇 俄文
  • 5 篇 西班牙文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 意大利文
  • 2 篇 葡萄牙文
检索条件"机构=†Applied Mathematics and Computing"
4076 条 记 录,以下是81-90 订阅
排序:
Integration of Metaverse Recordings in Multimedia Information Retrieval  24
Integration of Metaverse Recordings in Multimedia Informatio...
收藏 引用
13th International Conference on Software and Computer Applications, ICSCA 2024
作者: Steinert, Patrick Wagenpfeil, Stefan Frommholz, Ingo Hemmje, Matthias L. University Of Hagen Faculty Of Mathematics And Computer Science Hagen Germany Pfh Private University Of Applied Sciences Faculty Of Business Computing And Software Engineering Göttingen Germany University Of Wolverhampton School Of Mathematics And Computer Science Wolverhampton United Kingdom
This paper addresses the challenges in integrating Metaverse Recordings in Multimedia Information Retrieval as a new type of multimedia. Specifically, we describe the characteristics of video content and explain the k... 详细信息
来源: 评论
Fog computing in Optical Access Networks: An Energy-efficient and Deadline-aware Task Scheduling Mechanism  13
Fog Computing in Optical Access Networks: An Energy-efficien...
收藏 引用
13th International Conference on Information Technology in Asia, CITA 2023
作者: Ahmad, Fathiyah Haji Shah Newaz, S.H. Sankar, D.S. Ramlie, Rudy Nafi, Nazmus Shaker School of Computing and Informatics GadongBE1410 Brunei Kaist Institute for Information Technology Convergence Daejeon34141 Korea Republic of School of Applied Sciences and Mathematics GadongBE1410 Brunei Boeing Defence Australia AdelaideSA5111 Australia
Fog computing is paving the way for catering latency stringent applications (e.g., augmented reality and virtual reality) at the customer premises. Fog computing nodes are located between the end user devices and remo... 详细信息
来源: 评论
Modified fuzzy clustering algorithm based on non-negative matrix factorization locally constrained
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第8期14卷 11373-11383页
作者: Li, Xiangli Fan, Xuezhen Lu, Xiyan School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation Guilin University of Electronic Technology Guilin541004 China Guangxi Applied Mathematics Center Guilin University of Electronic Technology Guilin541004 China
The fuzzy C-means (FCM) algorithm is a classical clustering algorithm which is widely used. However, especially for high-dimensional data sets with complex structures, the large-scale calculation of FCM suffers from d... 详细信息
来源: 评论
Improving MQTT Security Through the Generation of Malicious Test Cases
Improving MQTT Security Through the Generation of Malicious ...
收藏 引用
2025 Joint National Conference on Cybersecurity, ITASEC and SERICS 2025
作者: Polisiani, Camilla Cespi Calzarossa, Maria Carla Zuppelli, Marco Caviglione, Luca Guarascio, Massimo University of Pavia Pavia Italy Institute of Applied Mathematics and Information Technologies Genova Italy Institute for High Performance Computing and Networking Rende Italy
The pervasive deployment of IoT technologies accounts for a variety of hazards often requiring a cross-layer approach. For example, the security posture of brokers responsible for handling the Message Queuing Telemetr... 详细信息
来源: 评论
Multi-source data fusion evaluation method based on Uncertainty Quantification and Bayes method for success-failure type test  5
Multi-source data fusion evaluation method based on Uncertai...
收藏 引用
5th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2022
作者: Wang, Jiajia He, Jingyuan Ma, Jing Beijing Jinghang Research Institute of Computing and Communication Beijing China Applied Mathematics Research Center of China Aerospace Science and Industry Group Beijing China
In this paper, we use Uncertainty Quantification method to analyse the data from three types of success-failure type test sources: physical test, semi-physical test and computer simulation test. Bayes method is used t... 详细信息
来源: 评论
Simple Deterministic Approximation for Submodular Multiple Knapsack Problem  31
Simple Deterministic Approximation for Submodular Multiple K...
收藏 引用
31st Annual European Symposium on Algorithms, ESA 2023
作者: Sun, Xiaoming Zhang, Jialin Zhang, Zhijie Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Center for Applied Mathematics of Fujian Province School of Mathematics and Statistics Fuzhou University China
Submodular maximization has been a central topic in theoretical computer science and combinatorial optimization over the last decades. Plenty of well-performed approximation algorithms have been designed for the probl... 详细信息
来源: 评论
Research on Fusion evaluation of numerical and real tests based on prior information reliability
Research on Fusion evaluation of numerical and real tests ba...
收藏 引用
2023 International Conference on Electronic Information Engineering and Data Processing, EIEDP 2023
作者: Ma, Jing Wang, Jiajia Hou, Jian Liang, Hange Beijing Jinghang Research Institute of Computing and Communication Beijing China Applied Mathematics Research Center of China Aerospace Science and Industry Group Beijing China
In view of the characteristics of multiple test types and evaluation indexes of information equipment performance, this paper studies the reliability measurement of prior information from different sources of test inf... 详细信息
来源: 评论
Single-step Retrosynthesis via Reaction Center and Leaving Groups Prediction  16
Single-step Retrosynthesis via Reaction Center and Leaving G...
收藏 引用
16th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2023
作者: Zhu, Jiajun Hong, Binjie Lan, Zixun Ma, Fei Xi'an Jiaotong-Liverpool University Department of Information and Computing Science Suzhou China Xi'an Jiaotong-Liverpool University Department of Applied Mathematics Suzhou China
Retrosynthesis aims to break down desired molecules into accessible building blocks in a systematic manner. However, current template-based retrosynthesis approaches face limitations due to a fixed set of training tem... 详细信息
来源: 评论
Social Engineering in Social Network: A Systematic Literature Review
Social Engineering in Social Network: A Systematic Literatur...
收藏 引用
2023 International Symposium on Networks, Computers and Communications, ISNCC 2023
作者: Abubaker, Ali Adnan Eleyan, Derar Eleyan, Amna Bejaoui, Tarek Katuk, Norliza Al-Khalidi, Mohammed Palestine Technical University Kadoorie Applied Computing Department Palestine Manchester Metropolitan University Department of Computing and Mathematics Manchester United Kingdom University of Carthage Computer Engineering Department Tunisia School of Computing University Utara Malaysia Kedah Sintok06010 Malaysia
Social engineering is hacking and manipulating people's minds to obtain access to networks and systems in order to acquire sensitive data. A social engineering attack happens when victims are unaware of the strate... 详细信息
来源: 评论
The positive mass theorem for asymptotically flat manifolds with isolated conical singularities
收藏 引用
Science China mathematics 2024年
作者: Xianzhe Dai Yukai Sun Changliang Wang Department of Mathematics University of California Santa Barbara Key Laboratory of Pure and Applied Mathematics School of Mathematical SciencesPeking University School of Mathematical Sciences and Institute for Advanced Study Key Laboratory of Intelligent Computing and Applications (Ministry of Education)Tongji University
We prove the positive mass theorem for asymptotically flat(AF for short) manifolds with finitely many isolated conical singularities. We do not impose the spin condition. Instead, we use the conformal blow-up techniqu...
来源: 评论