咨询与建议

限定检索结果

文献类型

  • 3,230 篇 会议
  • 3,132 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,980 篇 工学
    • 2,803 篇 计算机科学与技术...
    • 2,188 篇 软件工程
    • 774 篇 信息与通信工程
    • 519 篇 光学工程
    • 496 篇 生物工程
    • 439 篇 生物医学工程(可授...
    • 438 篇 控制科学与工程
    • 426 篇 电气工程
    • 394 篇 电子科学与技术(可...
    • 195 篇 机械工程
    • 165 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 135 篇 材料科学与工程(可...
    • 129 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
    • 108 篇 土木工程
  • 2,529 篇 理学
    • 1,195 篇 数学
    • 1,078 篇 物理学
    • 574 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 276 篇 化学
    • 211 篇 系统科学
  • 930 篇 管理学
    • 514 篇 管理科学与工程(可...
    • 423 篇 图书情报与档案管...
    • 269 篇 工商管理
  • 471 篇 医学
    • 408 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 198 篇 药学(可授医学、理...
    • 146 篇 公共卫生与预防医...
  • 148 篇 法学
    • 129 篇 社会学
  • 95 篇 经济学
  • 89 篇 农学
  • 69 篇 教育学
  • 17 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 129 篇 machine learning
  • 119 篇 deep learning
  • 89 篇 visualization
  • 86 篇 application soft...
  • 80 篇 semantics
  • 77 篇 feature extracti...
  • 77 篇 artificial intel...
  • 75 篇 hardware
  • 75 篇 accuracy
  • 74 篇 high performance...
  • 72 篇 training
  • 71 篇 computer archite...
  • 67 篇 distributed comp...
  • 66 篇 data mining
  • 62 篇 costs
  • 56 篇 algorithm design...
  • 55 篇 image segmentati...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 45 篇 infn sezione di ...
  • 45 篇 north-west unive...
  • 45 篇 institut univers...
  • 43 篇 national centre ...
  • 43 篇 department of co...
  • 42 篇 tno technical sc...
  • 42 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 45 篇 chen a.
  • 45 篇 benoit d.m.
  • 45 篇 ferrara g.
  • 45 篇 ardid m.
  • 45 篇 calvo d.
  • 45 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,553 篇 英文
  • 864 篇 其他
  • 30 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center For Visual Computing and Department of Computer Science"
6446 条 记 录,以下是4781-4790 订阅
排序:
Applying FML and Fuzzy Ontologies to malware behavioural analysis
Applying FML and Fuzzy Ontologies to malware behavioural ana...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Hsien-De Huang Giovanni Acampora Vincenzo Loia Chang-Shing Lee Hung-Yu Kao National Center of High Performance Computing NARL Tainan Taiwan Department Computer Science University of Salerno Italy Department Computer Science and Information Engineering NUTN Tainan Taiwan Department Computer Science and Information Engineering NCKU Tainan Taiwan
Antimalware applications represent one of the most important research topic in the area of information security threat. Indeed, most computer network issues have malwares as their underlying cause. As a consequence, e... 详细信息
来源: 评论
Energy-efficient mobile video management using smartphones
Energy-efficient mobile video management using smartphones
收藏 引用
2nd Annual ACM Multimedia Systems Conference, MMSys'11
作者: Hao, Jia Kim, Seon Ho Ay, Sakire Arslan Zimmermann, Roger School of Computing National University of Singapore Singapore Singapore Integrated Media Systems Center University of Southern California Los Angeles CA 90089 United States Department of Computer Science University of Southern California Los Angeles CA 90089 United States
Mobile devices are increasingly popular for the versatile capture and delivery of video content. However, the acquisition and transmission of large amounts of video data on mobile devices face fundamental challenges s... 详细信息
来源: 评论
Performance Optimization of Data Structures Using Memory Access Characterization
Performance Optimization of Data Structures Using Memory Acc...
收藏 引用
IEEE International Conference on Cluster computing
作者: Ashay Rane James Browne Texas Advanced Computing Center University of Texas at Austin USA Department of Computer Science University of Texas at Austin USA
Program performance optimization is generally based on measurements of execution behavior of code segments. However, an equally important task for performance optimizations is understanding memory access behaviors and... 详细信息
来源: 评论
Bridging vehicle sensor networks with social networks: Applications and challenges
Bridging vehicle sensor networks with social networks: Appli...
收藏 引用
IET International Conference on Communication Technology and Application (ICCTA 2011)
作者: Rita Tan Sim Tse Dawei Liu Fen Hou Giovanni Pau Joint Research Center in Ubiquitous Computing Macao Polytechnic Institute Macao China Computing/Computer Studies Programme Macao Polytechnic Institute China Computer Science Department UCLA CA USA
More and more serious global warming boosters the research on environmental protection from both the industries and academia. The collection of environmental data is a basic block for the environmental protection. Due...
来源: 评论
Enhance Top-down method with Meta-Classification for Very Large-scale Hierarchical Classification  5
Enhance Top-down method with Meta-Classification for Very La...
收藏 引用
5th International Joint Conference on Natural Language Processing, IJCNLP 2011
作者: Wang, Xiao-Lin Zhao, Hai Lu, Bao-Liang Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dong Chuan Rd. Shanghai 200240 China MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dong Chuan Rd. Shanghai 200240 China
Recent large-scale hierarchical classification tasks typically have tens of thousands of classes as well as a large number of samples, for which the dominant solution is the top-down method due to computational comple... 详细信息
来源: 评论
Experimental methodology to measure the veiling glare limit for detection tasks in high-dynamic-range displays
Experimental methodology to measure the veiling glare limit ...
收藏 引用
49th Annual SID Symposium, Seminar, and Exhibition 2011, Display Week 2011
作者: Choi, Mina Sharma, Diksha Zafar, Fahad Cheng, Wei-Chung Albani, Luigi Zderic, Vesna Badano, Aldo Center for Devices and Radiological Health FDA Silver Spring MD United States Department of Electrical and Computing Engineering George Washington University Washington DC United States Department of Computer Science and Engineering University of Maryland Baltimore County Baltimore MD United States BARCO Saronno Italy
We describe an experimental methodology for quantifying the effect of veiling glare in high-dynamic-range displays for simple detection tasks using a sensitivity experiment. A Gaussian spot was located on white noise ... 详细信息
来源: 评论
31.3: Experimental methodology to measure the veiling glare limit for detection tasks in high-dynamic-range displays
31.3: Experimental methodology to measure the veiling glare ...
收藏 引用
作者: Choi, Mina Sharma, Diksha Zafar, Fahad Cheng, Wei-Chung Albani, Luigi Zderic, Vesna Badano, Aldo Center for Devices and Radiological Health FDA Silver Spring MD United States Department of Electrical and Computing Engineering George Washington University Washington DC United States Department of Computer Science and Engineering University of Maryland Baltimore County Baltimore MD United States BARCO Saronno Italy
We describe an experimental methodology for quantifying the effect of veiling glare in high-dynamic-range displays for simple detection tasks using a sensitivity experiment. A Gaussian spot was located on white noise ... 详细信息
来源: 评论
A Framework for the Assessment of the Trustworthiness of Digital Records over Time
A Framework for the Assessment of the Trustworthiness of Dig...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jianqiang Ma Habtamu Abie Torbjorn Skramstad Mads Nygard Department of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Norwegian Computing Center Oslo Norway Statoil Stavanger Norway
Digital documents are prone to be compromised, especially the archival records which are intended to be stored for a very long period (say 30+ years). Many modern security mechanisms, such as cryptography, are poorly ... 详细信息
来源: 评论
Partial product generation utilizing the sum of operands for reduced area parallel multipliers
收藏 引用
IPSJ Transactions on System LSI Design Methodology 2011年 4卷 131-139页
作者: Kawashima, Hirotaka Takagi, Naofumi Center for Embedded Computing Systems School of Information Science Nagoya University Japan Department of Communications and Computer Engineering School of Informatics Kyoto University Japan
We propose a novel method to generate partial products for reduced area parallel multipliers. Our method reduces the total number of partial product bits of parallel multiplication by about half. We call partial produ...
来源: 评论
An Empirical Comparative Study on Two Large-Scale Hierarchical Text Classification Approaches
收藏 引用
International Journal of computer Processing of Languages 2011年 第4期23卷 309-325页
作者: JIAN ZHANG HAI ZHAO LIQING ZHANG BAO-LIANG LU Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai Jiaotong University 800 Dongchuan Rd. Shanghai 200240 China Department of Computer Science Virginia Tech Blacksburg VA 24061 USA
Patent classification is a large scale hierarchical text classification (LSHTC) task. Though comprehensive comparisons, either learning algorithms or feature selection strategies, have been fully made in the text cate... 详细信息
来源: 评论