咨询与建议

限定检索结果

文献类型

  • 1,331 篇 期刊文献
  • 1,087 篇 会议
  • 54 册 图书

馆藏范围

  • 2,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,399 篇 工学
    • 902 篇 计算机科学与技术...
    • 720 篇 软件工程
    • 206 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 154 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 140 篇 核科学与技术
    • 129 篇 生物工程
    • 110 篇 生物医学工程(可授...
    • 94 篇 光学工程
    • 84 篇 材料科学与工程(可...
    • 84 篇 化学工程与技术
    • 73 篇 机械工程
    • 63 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
    • 46 篇 安全科学与工程
    • 43 篇 土木工程
  • 1,124 篇 理学
    • 686 篇 物理学
    • 273 篇 数学
    • 164 篇 生物学
    • 103 篇 化学
    • 77 篇 统计学(可授理学、...
    • 53 篇 系统科学
  • 333 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 143 篇 医学
    • 118 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 51 篇 药学(可授医学、理...
  • 54 篇 法学
  • 37 篇 经济学
  • 32 篇 教育学
  • 22 篇 农学
  • 8 篇 军事学
  • 6 篇 艺术学
  • 5 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 95 篇 software enginee...
  • 77 篇 computer science
  • 69 篇 hadron colliders
  • 61 篇 higgs bosons
  • 58 篇 machine learning
  • 52 篇 deep learning
  • 47 篇 proton-proton in...
  • 39 篇 artificial intel...
  • 38 篇 accuracy
  • 37 篇 standard model (...
  • 35 篇 large hadron col...
  • 33 篇 hadron-hadron sc...
  • 33 篇 software
  • 31 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 27 篇 computational mo...
  • 27 篇 relativistic hea...
  • 26 篇 software systems
  • 26 篇 supersymmetric m...
  • 26 篇 quarks

机构

  • 407 篇 department for p...
  • 405 篇 faculty of scien...
  • 402 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 394 篇 department of ph...
  • 390 篇 institute of phy...
  • 386 篇 department of ph...
  • 372 篇 fakultät für phy...
  • 367 篇 institute of phy...
  • 365 篇 instituto de fís...
  • 311 篇 dipartimento di ...
  • 309 篇 department of ph...
  • 307 篇 department of ph...
  • 305 篇 nikhef national ...
  • 297 篇 department of ph...
  • 284 篇 graduate school ...
  • 280 篇 department of ph...
  • 276 篇 department of ph...
  • 272 篇 universidade fed...
  • 268 篇 ictp trieste

作者

  • 336 篇 c. alexa
  • 336 篇 g. bella
  • 336 篇 d. calvet
  • 336 篇 c. amelung
  • 334 篇 j. m. izen
  • 334 篇 j. strandberg
  • 334 篇 g. spigo
  • 333 篇 f. siegert
  • 323 篇 r. ströhmer
  • 323 篇 m. rijssenbeek
  • 323 篇 s. jin
  • 323 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 313 篇 s. guindon
  • 309 篇 a. kaczmarska
  • 307 篇 j. schaarschmidt
  • 306 篇 y. tayalati
  • 300 篇 a. d. pilkington
  • 297 篇 l. chevalier
  • 292 篇 m. klein

语言

  • 2,346 篇 英文
  • 114 篇 其他
  • 9 篇 中文
  • 6 篇 德文
  • 1 篇 法文
检索条件"机构=Applied Software Engineering Group Department of Computer Science"
2472 条 记 录,以下是301-310 订阅
排序:
RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Application  16
RSA-1024 Cryptography on Artix-7 FPGA: Medical Imaging Appli...
收藏 引用
16th International Conference on Electronics, computers and Artificial Intelligence, ECAI 2024
作者: Ghayoula, Ridha Amara, Wided Smida, Amor Fattahi, Jaouhar Waly, Mohamed I. Bahroun, Sahbi Gmati, Issam El University of Moncton Faculty of Engineering New Brunswick Canada Enit University of Tunis El Manar SysCom Laboratory Tunis Tunisia Majmaah University College of Applied Medical Sciences Majmaah Saudi Arabia Laval University Department of Computer Science && Software Engineering Quebec Canada Institut Superieur d'Informatique University of Tunis El Manar Tunis Tunisia Umm Al Qura University College of Engineering Umm Al Qura Saudi Arabia
In the domain of medical imaging, ensuring the security of confidential patient data stands as a paramount concern. The imperative for robust encryption to safeguard medical images against unauthorized access has driv... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
science China(Information sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
Femtosecond Laser based Post-Processing Free True Random Number Generator
Femtosecond Laser based Post-Processing Free True Random Num...
收藏 引用
Frontiers in Optics + Laser science 2023, FiO, LS 203: Part of Frontiers in Optics + Laser science 2023
作者: Sharma, Amritash Paithankar, Prasanna Varshney, Shailendra K. Group Advanced Photonics Laboratory Department of Electronics and Electrical Communication Engineering Indian Institute of Technology West Bengal Kharagpur721302 India Department of Applied Optics and Photonics University of Calcutta Technology Campus JD 2 Salt Lake Kolkata700098 India Department of Computer Science and Engineering Indian Institute of Technology West Bengal Kharagpur721302 India Authors contributed equally
We experimentally demonstrate a high-entropy source based on the intensity fluctuation in a femtosecond laser. The setup successfully passes statistical tests without any post-processing. The generator can be potentia... 详细信息
来源: 评论
3D Head Pose Estimation through Facial Features and Deep Convolutional Neural Networks
收藏 引用
computers, Materials & Continua 2021年 第2期66卷 1757-1770页
作者: Khalil Khan Jehad Ali Kashif Ahmad Asma Gul Ghulam Sarwar Sahib Khan Qui Thanh Hoai Ta Tae-Sun Chung Muhammad Attique Department of Computer Science and Software Engineering Pak-Austria Fachhochschule:Institute of Applied Sciences and TechnologyHaripur-KPKPakistan Department of Computer Engineering and Department of AI Convergence Network Ajou UniversitySuwon16499South Korea Hamad Bin Khalifa University DohaQatar Department of Statistics Shaheed Benazir Bhutto Women UniversityPeshawarPakistan Department of Software Engineering University of Azad Jammu and KashmirPakistan Department of Electronics and Telecommunications Politecnico di TorinoTorino10129Italy Institute of Research and Development Duy Tan UniversityDanang550000Vietnam Department of Computer Engineering Ajou UniversitySuwon16499Korea Department of Software Sejong UniversitySeoul05006South Korea
Face image analysis is one among several important cues in computer *** the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis *** pars... 详细信息
来源: 评论
A Hybrid Approach Using Survey and Ism Analysis for Security Coding Risks and Best Practices for Gsd Enterprises
SSRN
收藏 引用
SSRN 2023年
作者: Khan, Rafiq Ahmad Akbar, Muhammad Azeem Alzahrani, Abdulrahman Habibullah, Safa Alwageed, Hathal Salamah Alzahrani, Musaad School of Software Northwestern Polytechnical University Shaanxi Xian710129 China Software Engineering Research Group Department of Computer Science & IT University of Malakand Pakistan Software engineering LUT University Finland Information Systems and Technology Department College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia College of Computer and Information Sciences Jouf University Sakaka42421 Saudi Arabia Department of Computer Science Al-Baha University Al-Baha65799 Saudi Arabia
Context: Global software development (GSD) offers quality results, cost-effectiveness, and uninterrupted project delivery. However, integrating security into GSD remains a ***: This study aims to enhance security in G... 详细信息
来源: 评论
A Decision Model for Selecting Serverless Platforms
SSRN
收藏 引用
SSRN 2025年
作者: Hamza, Muhammad Farshidi, Siamak Akbar, Muhammad Azeem Capilla, Rafael Jansen, Slinger Smolander, Kari Department of Software Engineering LUT University Lahti15210 Finland Information Technology Group Wageningen University & Research Wageningen6700 Netherlands Department of Computer Science and Statistics Rey Juan Carlos University Madrid28933 Spain Department of Information and Computer Science Utrecht University Utrecht3584 Netherlands
Context: Serverless computing has revolutionized cloud computing by enabling developers to concentrate on developing the application logic without managing the underlying infrastructure. Organizations need to select a... 详细信息
来源: 评论
Detection and Replay of Distributed Denial of Service Attacks In Smart Cities Using a Hybrid Deep Learning Approach
Detection and Replay of Distributed Denial of Service Attack...
收藏 引用
Business Analytics for Technology and Security (ICBATS), International Conference on
作者: Muhammad Waseem Iqbal Ghassan F. Issa Muhammad Yousif Muhammad Atif Department of Software Engineering Superior University Lahore Pakistan School of Information Technology Skyline University College Sharjah UAE Department of Computer Science NCBAE Lahore. Pakistan Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science NCBAE Lahore Pakistan
Infrastructure for smart cities is presently being built, mostly because of the (IoT) platform, which connects a wide variety of things by using the website's underlying infrastructure. As a result, it is possible... 详细信息
来源: 评论
Evaluating the Inclusiveness of Artificial Intelligence software in Enhancing Project Management Efficiency – A review and examples of quantitative measurement methods
Evaluating the Inclusiveness of Artificial Intelligence Soft...
收藏 引用
Artificial Intelligence, computer, Data sciences and Applications (ACDSA), International Conference on
作者: Vasileios Alevizos Ilias Georgousis Akebu Simasiku Antonis Messinis Sotiria Karypidou Dimitra Malliarou Department of Learning Informatics Managament and Ethics Karolinska Institute Stockholm Sweden Department of Computer Science MLV Research Group International Hellenic University Kavala Greece Department Of Computer Software Engineering Zambia University Ndola Zambia HEDNO SA (Hellenic Electricity Distribution Network Operator) Department of Computer Science MLV Research Group International Hellenic University IntelliSolutions Athens Greece
The escalating integration of Artificial Intelligence (AI) in various domains, especially Project Management (PM), has brought to light the imperative need for inclusivity in AI systems. This paper investigates the ro...
来源: 评论
Malware Attacks Detection in IoT Using Recurrent Neural Network(RNN)
收藏 引用
Intelligent Automation & Soft Computing 2024年 第2期39卷 135-155页
作者: Abeer Abdullah Alsadhan Abdullah A.Al-Atawi Hanen karamti Abid Jameel Islam Zada Tan N.Nguyen Computer Science Department Imam Abdulrahman Bin Faisal UniversityDamam32232Saudi Arabia Department of Computer Science Applied CollegeUniversity of TabukTabuk47512Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences and Information Technology Hazara UniversityMansehraPakistan Faculty of Computing Department of Software EngineeringInternational Islamic UniversityIslamabadPakistan Department of Architectural Engineering Sejong UniversitySeoul05006Korea
IoT(Internet of Things)devices are being used more and more in a variety of businesses and for a variety of tasks,such as environmental data collection in both civilian and military *** are a desirable attack target f... 详细信息
来源: 评论
FAMOS: robust privacy-preserving authentication on payment apps via federated multi-modal contrastive learning  24
FAMOS: robust privacy-preserving authentication on payment a...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Yifeng Cai Ziqi Zhang Jiaping Gui Bingyan Liu Xiaoke Zhao Ruoyu Li Zhe Li Ding Li Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education and School of Computer Science Peking University Department of Computer Science University of Illinois Urbana-Champaign School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University School of Computer Science Beijing University of Posts and Telecommunications Ant Group
The rise of mobile payment apps necessitates robust user authentication to ensure legitimate user access. Traditional methods, like passwords and biometrics, are vulnerable once a device is compromised. To overcome th...
来源: 评论