咨询与建议

限定检索结果

文献类型

  • 3,187 篇 会议
  • 3,114 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,953 篇 工学
    • 2,784 篇 计算机科学与技术...
    • 2,184 篇 软件工程
    • 771 篇 信息与通信工程
    • 526 篇 光学工程
    • 495 篇 生物工程
    • 436 篇 控制科学与工程
    • 432 篇 生物医学工程(可授...
    • 420 篇 电气工程
    • 396 篇 电子科学与技术(可...
    • 196 篇 机械工程
    • 168 篇 化学工程与技术
    • 157 篇 仪器科学与技术
    • 133 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,529 篇 理学
    • 1,198 篇 数学
    • 1,070 篇 物理学
    • 573 篇 生物学
    • 369 篇 统计学(可授理学、...
    • 279 篇 化学
    • 211 篇 系统科学
  • 928 篇 管理学
    • 513 篇 管理科学与工程(可...
    • 425 篇 图书情报与档案管...
    • 267 篇 工商管理
  • 463 篇 医学
    • 401 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 142 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 95 篇 经济学
  • 91 篇 农学
  • 68 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 126 篇 machine learning
  • 115 篇 deep learning
  • 88 篇 visualization
  • 87 篇 application soft...
  • 78 篇 semantics
  • 77 篇 artificial intel...
  • 76 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 71 篇 accuracy
  • 70 篇 computer archite...
  • 69 篇 training
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 56 篇 image segmentati...
  • 56 篇 algorithm design...
  • 54 篇 predictive model...

机构

  • 55 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 6,038 篇 英文
  • 311 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center For Visual Computing and Department of Computer Science"
6385 条 记 录,以下是61-70 订阅
排序:
A Blockchain based Framework for Verifying Drug Authenticity  24
A Blockchain based Framework for Verifying Drug Authenticity
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Hamid, Soomaiya Bawany, Narmeen Zakaria Fatima, Kiran Jinnah University for Women Center for Computing Research Department of Computer Science and Software Engineering Karachi Pakistan
Counterfeit drugs are fake medicines that are potentially harmful for health. Safeguarding the integrity of pharmaceutical distribution plays a crucial role in preventing the circulation of counterfeit drugs. Traditio... 详细信息
来源: 评论
Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models  24
Deep Learning for Violence Detection in Surveillance: The Ro...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Ilyas, Anum Obaid, Surayya Bawany, Narmeen Zakaria Center for Computing Research Jinah University for Women Department of Computer Science and Software Engineering Karachi Pakistan
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Efficient CNN-based disaster events classification using UAV-aided images for emergency response application
收藏 引用
Neural computing and Applications 2024年 第18期36卷 10599-10612页
作者: Bashir, Munzir Hubiba Ahmad, Musheer Rizvi, Danish Raza El-Latif, Ahmed A. Abd Department of Computer Engineering Jamia Millia Islamia New Delhi110025 India EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Kom32511 Egypt
Natural disasters can be unpredictable and catastrophic. Even after the event, the repercussions are prolonged due to the incompetence of disaster management strategies. To mitigate the effects of a natural hazard, di... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India Amrita Vishwa Vidyapeetham Center for Cybersecurity Systems and Networks Amritapuri India Lehigh University Department of Electrical & Computer Engineering United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
Seer: Accelerating Block chain Transaction Execution by Fine-Grained Branch Prediction  51st
Seer: Accelerating Block chain Transaction Execution by Fine...
收藏 引用
51st International Conference on Very Large Data Bases, VLDB 2025
作者: Zhang, Shijie Cheng, Ru Liu, Xinpeng Xiao, Jiang Jin, Hai Li, Bo National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
来源: 评论
PraK Tool V3: Enhancing Video Item Search Using Localized Text and Texture Queries  31st
PraK Tool V3: Enhancing Video Item Search Using Localized Te...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Stroh, Michael Kloda, Vojtěch Verner, Benjamin Vopálková, Zuzana Buchmüller, Raphael Jäckl, Bastian Hajko, Jakub Lokoč, Jakub Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
We present a third version of the PraK system designed around an effective text-image and image-image search model. The system integrates sub-image search options for localized context search for CLIP and image color/... 详细信息
来源: 评论
Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment
收藏 引用
computer Systems science & Engineering 2023年 第11期47卷 1793-1817页
作者: Saeed M.Alshahrani Jameel Almalki Waleed Alshehri Rashid Mehmood Marwan Albahar Najlaa Jannah Nayyar Ahmed Khan Department of Computer Science College Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Computer Science College of Computer in Al-LithUmm Al-Qura UniversityMakkahSaudi Arabia High-Performance Computing Center King Abdulaziz UniversityJeddahSaudi Arabia
Artificial Intelligence(AI)has gained popularity for the containment of COVID-19 pandemic *** AI techniques provide efficient mechanisms for handling pandemic *** methods,protocols,data sets,and various validation mec... 详细信息
来源: 评论
Electroencephalogram (EEG) Brain Signals to Detect Alcoholism Based on Deep Learning
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3329-3348页
作者: Emad-ul-Haq Qazi Muhammad Hussain Hatim A.AboAlsamh Visual Computing Lab Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The detection of alcoholism is of great importance due to its effects on individuals and *** alcoholism detection system(AADS)based on electroencephalogram(EEG)signals is effective,but the design of a robust AADS is a... 详细信息
来源: 评论