咨询与建议

限定检索结果

文献类型

  • 1,119 篇 期刊文献
  • 847 篇 会议
  • 23 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,152 篇 工学
    • 784 篇 计算机科学与技术...
    • 666 篇 软件工程
    • 174 篇 信息与通信工程
    • 117 篇 核科学与技术
    • 108 篇 控制科学与工程
    • 92 篇 生物工程
    • 88 篇 电气工程
    • 81 篇 电子科学与技术(可...
    • 71 篇 光学工程
    • 66 篇 机械工程
    • 65 篇 仪器科学与技术
    • 64 篇 生物医学工程(可授...
    • 51 篇 化学工程与技术
    • 37 篇 航空宇航科学与技...
    • 35 篇 网络空间安全
    • 32 篇 安全科学与工程
    • 27 篇 交通运输工程
  • 920 篇 理学
    • 562 篇 物理学
    • 268 篇 数学
    • 111 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 75 篇 化学
    • 45 篇 系统科学
    • 39 篇 地球物理学
  • 279 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 60 篇 医学
    • 55 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 37 篇 法学
    • 34 篇 社会学
  • 25 篇 经济学
  • 13 篇 教育学
  • 13 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 哲学

主题

  • 69 篇 hadron colliders
  • 61 篇 higgs bosons
  • 47 篇 proton-proton in...
  • 39 篇 machine learning
  • 38 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 31 篇 semantics
  • 29 篇 collisions (nucl...
  • 29 篇 computational mo...
  • 29 篇 nuclear counters
  • 29 篇 training
  • 28 篇 software enginee...
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 26 篇 data mining
  • 26 篇 feature extracti...
  • 24 篇 deep learning
  • 24 篇 top quark
  • 24 篇 quarks

机构

  • 411 篇 department for p...
  • 405 篇 kirchhoff-instit...
  • 404 篇 faculty of scien...
  • 403 篇 institute of phy...
  • 394 篇 department of ph...
  • 390 篇 instituto de fís...
  • 388 篇 department of ph...
  • 382 篇 department of ph...
  • 379 篇 institute of phy...
  • 371 篇 fakultät für phy...
  • 338 篇 dipartimento di ...
  • 334 篇 nikhef national ...
  • 324 篇 department of ph...
  • 313 篇 department of ph...
  • 303 篇 department of ph...
  • 292 篇 graduate school ...
  • 291 篇 department of ph...
  • 278 篇 department of ph...
  • 277 篇 department of ph...
  • 277 篇 high energy phys...

作者

  • 339 篇 c. alexa
  • 339 篇 g. bella
  • 339 篇 d. calvet
  • 339 篇 c. amelung
  • 338 篇 g. spigo
  • 337 篇 j. m. izen
  • 337 篇 j. strandberg
  • 337 篇 f. siegert
  • 329 篇 r. ströhmer
  • 329 篇 m. rijssenbeek
  • 329 篇 s. jin
  • 329 篇 g. gaudio
  • 328 篇 s. mohapatra
  • 322 篇 s. guindon
  • 319 篇 a. kaczmarska
  • 316 篇 j. schaarschmidt
  • 311 篇 y. tayalati
  • 308 篇 a. d. pilkington
  • 306 篇 l. chevalier
  • 303 篇 m. kocian

语言

  • 1,877 篇 英文
  • 69 篇 其他
  • 44 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering and University of Johannesburg"
1989 条 记 录,以下是11-20 订阅
排序:
A Design Framework for a Blockchain-Based Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking
A Design Framework for a Blockchain-Based Open Market Platfo...
收藏 引用
12th International Conference on Data science, Technology and Applications, DATA 2023
作者: Toy, Trevor Langerman, Josef Academy of Computer Science and Software Engineering University of Johannesburg Auckland Park Johannesburg South Africa
Around a quarter of the world’s data is generated by financial institutions. The Capgemini 2022 World Payments Report predicts a 28% increase in transaction volumes from 2021 to 2026, to an estimated total of 2.122 t... 详细信息
来源: 评论
A Data Management Model for Malaria Control: A Case of Rwanda  16
A Data Management Model for Malaria Control: A Case of Rwand...
收藏 引用
16th IEEE AFRICON, AFRICON 2023
作者: Mary, Happiness Rose Mukamakuza, Carine Pierrette Tuyishimire, Emmanuel College of Engineering Carnegie Mellon University Africa Kigali Rwanda Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
We are in an era when the diagnosis of diseases benefits greatly from digitizing their control. On the other hand, malaria is a long-standing yet one of the deadliest diseases. Its diagnosis processes still use old me... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
science China(Information sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Face Anti-spoofing based on Convolutional Neural Networks  3
Face Anti-spoofing based on Convolutional Neural Networks
收藏 引用
3rd International Conference on Intelligent Data science Technologies and Applications, IDSTA 2022
作者: Maphisa, Siyamdumisa Coulter, Duncan University of Johannesburg Academy of Computer Science and Software Engineering Johannesburg South Africa
Biometrics technologies have gained increasing attention across different sectors in the past decade. Face recognition has proven to be one of these successful biometric technologies. For example, law enforcement uses... 详细信息
来源: 评论
The Alignment between DevOps and Business Outcomes  8
The Alignment between DevOps and Business Outcomes
收藏 引用
8th International Conference on engineering and Emerging Technologies, ICEET 2022
作者: Mukange, Tsumbedzo Langerman, Josef University of Johannesburg Academy of Computer Science and Software Engineering Johannesburg South Africa
The use of software products to achieve business outcomes increases as demand for reliable and quality services increases. DevOps enables organizations to meet market demands and changing environments through much fas... 详细信息
来源: 评论
OCRBench: on the hidden mystery of OCR in large multimodal models
收藏 引用
science China(Information sciences) 2024年 第12期67卷 23-35页
作者: Yuliang LIU Zhang LI Mingxin HUANG Biao YANG Wenwen YU Chunyuan LI Xu-Cheng YIN Cheng-Lin LIU Lianwen JIN Xiang BAI School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Electronic and Information Engineering South China University of Technology Microsoft Research School of Computer & Communication Engineering University of Science and Technology Beijing Institute of Automation Chinese Academy of Sciences School of Software Engineering Huazhong University of Science and Technology
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In thi... 详细信息
来源: 评论
Offensive Play Recognition of Basketball Video Footage Using ActionFormer  1
收藏 引用
25th International Conference on Human-computer Interaction , HCII 2023
作者: Chiura, Tafadzwa Blessing van der Haar, Dustin Academy of Computer Science and Software Engineering University of Johannesburg Corner of Kingsway Avenue and University Road Auckland Park Gauteng Johannesburg South Africa
This paper will aim to conduct 3 experiments to determine the best-performing action recognition approach on the SpaceJam dataset. The 3 experiments are Temporal Segment Network (TSN), Inflated 3D-CNN (I3D) and Pose-e... 详细信息
来源: 评论
A Cyber Counterintelligence Competence Framework  21
A Cyber Counterintelligence Competence Framework
收藏 引用
21st European Conference on Cyber Warfare and Security, ECCWS 2022
作者: Sithole, Thenjiwe Du Toit, Jaco Academy of Computer Science and Software Engineering University of Johannesburg South Africa
The increased use of cyberspace and technological advancement are fundamentally changing the cyber threat landscape. Cyberattacks are becoming more sophisticated, frequent, and destructive. Internationally, there is a... 详细信息
来源: 评论
Route Optimization for Sailing Vessels using Artificial Intelligence Techniques  5
Route Optimization for Sailing Vessels using Artificial Inte...
收藏 引用
5th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2022
作者: Anderson, John M. Sithungu, Siphesihle P. Ehlers, Elizabeth M. Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Sailing is not a new concept. The use of artificial intelligence (AI) within the field of sailing however is a relatively new concept. AI is being applied to a variety of different aspects within the field of sailing ... 详细信息
来源: 评论
Effective Cyber Threat Hunting: Where and how does it fit?  21
Effective Cyber Threat Hunting: Where and how does it fit?
收藏 引用
21st European Conference on Cyber Warfare and Security, ECCWS 2022
作者: Ntingi, Nombeko Duvenage, Petrus du Toit, Jaco von Solms, Sebastian Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Traditionally threat detection in organisations is reactive through pre-defined and preconfigured rules that are embedded in automated tools such as firewalls, anti-virus software, security information and event manag... 详细信息
来源: 评论