咨询与建议

限定检索结果

文献类型

  • 1,194 篇 会议
  • 945 篇 期刊文献

馆藏范围

  • 2,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 614 篇 计算机科学与技术...
    • 492 篇 软件工程
    • 247 篇 信息与通信工程
    • 232 篇 电子科学与技术(可...
    • 203 篇 电气工程
    • 168 篇 控制科学与工程
    • 150 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 110 篇 生物工程
    • 96 篇 机械工程
    • 91 篇 化学工程与技术
    • 84 篇 材料科学与工程(可...
    • 83 篇 仪器科学与技术
    • 52 篇 土木工程
    • 49 篇 动力工程及工程热...
    • 39 篇 航空宇航科学与技...
    • 38 篇 船舶与海洋工程
  • 784 篇 理学
    • 323 篇 物理学
    • 279 篇 数学
    • 135 篇 生物学
    • 105 篇 统计学(可授理学、...
    • 99 篇 化学
    • 72 篇 系统科学
  • 250 篇 管理学
    • 175 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 70 篇 图书情报与档案管...
  • 115 篇 医学
    • 98 篇 临床医学
    • 83 篇 基础医学(可授医学...
    • 57 篇 药学(可授医学、理...
  • 39 篇 法学
  • 38 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 教育学
  • 19 篇 农学
  • 7 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 39 篇 robotics and aut...
  • 38 篇 control systems
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 34 篇 deep learning
  • 32 篇 bandwidth
  • 31 篇 systems engineer...
  • 28 篇 robot sensing sy...
  • 28 篇 kinematics
  • 27 篇 humans
  • 25 篇 optimization
  • 25 篇 machine learning
  • 25 篇 accuracy
  • 24 篇 robots
  • 23 篇 laboratories
  • 21 篇 application soft...
  • 21 篇 image segmentati...
  • 21 篇 visualization
  • 20 篇 computer archite...
  • 20 篇 semantics

机构

  • 40 篇 hubei key labora...
  • 36 篇 state key labora...
  • 33 篇 school of automa...
  • 25 篇 state key labora...
  • 24 篇 university of ch...
  • 19 篇 department of el...
  • 19 篇 shenzhen institu...
  • 18 篇 engineering rese...
  • 17 篇 key laboratory o...
  • 16 篇 state key labora...
  • 14 篇 jet propulsion l...
  • 13 篇 school of electr...
  • 13 篇 ieee
  • 13 篇 advanced computi...
  • 12 篇 shenzhen institu...
  • 12 篇 state key labora...
  • 12 篇 advanced institu...
  • 11 篇 school of comput...
  • 11 篇 peng cheng labor...
  • 11 篇 state key labora...

作者

  • 39 篇 guo hong
  • 18 篇 malin premaratne
  • 17 篇 hamid d. taghira...
  • 17 篇 zhang yichen
  • 15 篇 gaol ford lumban
  • 15 篇 yu song
  • 15 篇 min wu
  • 14 篇 witold pedrycz
  • 14 篇 sarath d. gunapa...
  • 13 篇 wu guohua
  • 13 篇 a.c. sanderson
  • 12 篇 wu min
  • 12 篇 gao wanling
  • 12 篇 pedrycz witold
  • 12 篇 hosoda takaaki
  • 12 篇 cheng xiang
  • 12 篇 oktavia tanty
  • 12 篇 zhan jianfeng
  • 12 篇 luefeng chen
  • 11 篇 yin longfei

语言

  • 2,046 篇 英文
  • 57 篇 其他
  • 32 篇 中文
  • 5 篇 日文
检索条件"机构=Advanced Computer Systems and Technology"
2139 条 记 录,以下是31-40 订阅
排序:
Multi-objective Feature Attribution Explanation for Explainable Machine Learning
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第1期4卷 1-32页
作者: Wang, Ziming Huang, Changwu Li, Yun Yao, Xin Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Departmentof Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The Advanced Cognitive Technology Lab Huawei Technologies Co. Ltd Shanghai201206 China School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom
The feature attribution-based explanation (FAE) methods, which indicate how much each input feature contributes to the model's output for a given data point, are one of the most popular categories of explainable m... 详细信息
来源: 评论
CNN-LSTM: Development of Offline Signature Authentication  1
CNN-LSTM: Development of Offline Signature Authentication
收藏 引用
1st IEEE International Conference on Emerging Research in Computational Science, ICERCS 2023
作者: Ganapathy, Revathy Lingeshwaran, D. Suthanthiradevi, P. Harish Kumar, M.V. Vels Insitute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai India
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre... 详细信息
来源: 评论
CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme  26th
CoDPoC IP: A Configurable Data Protection Circuit to Suppor...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Peng, Yijing Wang, Junhui Wang, Zhenyu Guo, Zhenbin Wang, Yaohua Deng, Ding Li, Shaoqing Guo, Yang Key Laboratory of Advanced Microprocessor Chips and Systems National University of Defense Technology Changsha China School of Computer National University of Defense Technology Changsha China College of Electronic Science and Technology National University of Defense Technology Changsha China College of Semiconductors Hunan University Changsha China
Physical Unclonable Function(PUF)-based security protocols are effective in mitigating various security threats, including eavesdropping, interception, and cloning. Nevertheless, most existing protocols are implemente... 详细信息
来源: 评论
An Empirical Comparison of Machine and Deep Learning Algorithms for Predicting Maternal Health Risk  5th
An Empirical Comparison of Machine and Deep Learning Algorit...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical systems, IC4S 2024
作者: N, Srinivasa Gupta Valarmathi, B. Kavitha, A. Gopini, Sai Bhuvan Seela, Hari Kumar Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Mathematics School of Advanced of Sciences Vellore Institute of Technology Tamil Nadu Vellore India
Maternal health is among the greatest challenges in the world, especially in rural areas as there lack medical practitioners, they do not have easily accessible publics clinics and transport is difficult. Therefore, h... 详细信息
来源: 评论
Anthropomorphism for improving user tolerance to system errors in environmental behavior change  12
Anthropomorphism for improving user tolerance to system erro...
收藏 引用
12th IEEE Global Conference on Consumer Electronics, GCCE 2023
作者: Hu, Yiduan Tsuji, Airi Fujinami, Kaori Tokyo University of Agriculture and Technology Grad. School of Bio-Functions and Systems Science Tokyo Japan Tokyo University of Agriculture and Technology Div. of Advanced Information Technology and Computer Science Tokyo Japan
Technologies that support behavior change are often implemented in systems such as health advice and social support in daily life. However, users might distrust the systems and eventually cease using them if there is ... 详细信息
来源: 评论
Investigating the Determinants of Compliance Intention in Behavior Change Support systems  29
Investigating the Determinants of Compliance Intention in Be...
收藏 引用
29th Annual Americas Conference on Information systems: Diving into Uncharted Waters, AMCIS 2023
作者: Ekpezu, Akon Obu Oinas-Kukkonen, Harri Wiafe, Isaac Faculty of Information Technology and Electrical Engineering Oulu Advanced Research on Service and Information Systems University of Oulu Finland Department of Computer Science University of Ghana Ghana
The effectiveness of behavior change support systems (BCSS) in promoting health and well-being is unflinching. However, its long-term effectiveness is hindered by non-compliance. Research in BCSS that focuses on compl... 详细信息
来源: 评论
Study on Landslide Susceptibility Evaluation Based on Improved Multivariable Weighted Model: A Case Study of Lushan County, China  3
Study on Landslide Susceptibility Evaluation Based on Improv...
收藏 引用
3rd IEEE International Conference on Software Engineering and Artificial Intelligence, SEAI 2023
作者: Zhao, Li Duan, Gonghao Wuhan Institute of Technology School of Computer Science and Engineering Wuhan China Automation for Complex Systems Hubei Key Laboratory of Advanced Control and Intelligent Wuhan China
The evaluation of regional geological hazard susceptibility is of great significance to the prevention and control of geological hazard. In this paper, the "4-20"Lushan earthquake disaster area as the resear... 详细信息
来源: 评论
An Empirical Study on Edge-to-Cloud Continuum for Smart Applications: Performance, Design Patterns, and Key Factors  8
An Empirical Study on Edge-to-Cloud Continuum for Smart Appl...
收藏 引用
8th IEEE International Conference on Edge Computing and Communications, EDGE 2024
作者: Chen, Norman Toosi, Adel N. Javadi, Bahman Alqahtani, Daghash Aslanpour, Mohammad S. Xu, Minxian Monash University Department of Software Systems and Cybersecurity Clayton Australia Western Sydney University School of Computer Data and Mathematical Sciences Australia Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China
The rapid evolution of cloud-native technologies has facilitated seamless application deployment and execution across the entire edge-to-cloud continuum. This continuum offers a myriad of benefits, including reduced l... 详细信息
来源: 评论
Cabin: A Compressed Adaptive Binned Scan Index
收藏 引用
Proceedings of the ACM on Management of Data 2024年 第1期2卷 1-26页
作者: Yiyuan Chen Shimin Chen SKLP and Center for Advanced Computer Systems Institute of Computing Technology CAS & University of Chinese Academy of Sciences Beijing China
Scan is a fundamental operation widely used in main-memory analytical database systems. To accelerate scans, previous studies build either record-order or sort-order structures known as scan indices. While achieving g... 详细信息
来源: 评论
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论