咨询与建议

限定检索结果

文献类型

  • 1,346 篇 期刊文献
  • 1,196 篇 会议
  • 36 册 图书

馆藏范围

  • 2,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,483 篇 工学
    • 1,004 篇 计算机科学与技术...
    • 784 篇 软件工程
    • 259 篇 信息与通信工程
    • 235 篇 生物医学工程(可授...
    • 218 篇 生物工程
    • 196 篇 光学工程
    • 173 篇 控制科学与工程
    • 130 篇 电气工程
    • 123 篇 电子科学与技术(可...
    • 90 篇 机械工程
    • 77 篇 材料科学与工程(可...
    • 72 篇 化学工程与技术
    • 52 篇 仪器科学与技术
    • 43 篇 动力工程及工程热...
  • 1,055 篇 理学
    • 463 篇 数学
    • 402 篇 物理学
    • 284 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 100 篇 化学
    • 75 篇 系统科学
  • 393 篇 管理学
    • 201 篇 图书情报与档案管...
    • 189 篇 管理科学与工程(可...
    • 110 篇 工商管理
  • 303 篇 医学
    • 244 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 116 篇 药学(可授医学、理...
    • 99 篇 公共卫生与预防医...
  • 87 篇 法学
    • 78 篇 社会学
  • 56 篇 教育学
    • 46 篇 教育学
  • 42 篇 农学
  • 38 篇 经济学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 65 篇 machine learning
  • 50 篇 informatics
  • 35 篇 data models
  • 34 篇 training
  • 33 篇 visualization
  • 30 篇 computational mo...
  • 30 篇 internet
  • 29 篇 image segmentati...
  • 28 篇 feature extracti...
  • 26 篇 deep learning
  • 26 篇 forecasting
  • 25 篇 artificial intel...
  • 24 篇 students
  • 24 篇 software
  • 24 篇 diseases
  • 24 篇 accuracy
  • 23 篇 cameras
  • 23 篇 educational inst...
  • 23 篇 quality of servi...
  • 22 篇 computer archite...

机构

  • 57 篇 academic center ...
  • 48 篇 graduate school ...
  • 44 篇 academic center ...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...

作者

  • 45 篇 yamamoto naoki
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 2,426 篇 英文
  • 138 篇 其他
  • 12 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Informatics and Computing"
2578 条 记 录,以下是151-160 订阅
排序:
SMOTE Oversampling and Near Miss Undersampling Based Diabetes Diagnosis from Imbalanced Dataset with XAI Visualization  28
SMOTE Oversampling and Near Miss Undersampling Based Diabete...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Nayan, Nasim Mahmud Islam, Ashraful Islam, Muhammad Usama Ahmed, Eshtiak Hossain, Mohammad Mobarak Alam, Md Zahangir University of Information Technology and Sciences Department of Computer Science and Engineering Bangladesh Independent University Center for Computational and Data Sciences Bangladesh School of Computing and Informatics University of Louisiana at Lafayette United States Independent University Department of Computer Science and Engineering Bangladesh
This study investigated the predictive ability of ten different machine learning (ML) models for diabetes using a dataset that was not evenly distributed. Additionally, the study evaluated the effectiveness of two ove... 详细信息
来源: 评论
Hamiltonian simulation for hyperbolic partial differential equations by scalable quantum circuits
收藏 引用
Physical Review Research 2024年 第3期6卷 033246页
作者: Yuki Sato Ruho Kondo Ikko Hamamura Tamiya Onodera Naoki Yamamoto Inc. 1-4-14 Koraku Bunkyo-ku Tokyo 112-0004 Japan Quantum Computing Center IBM Quantum Department of Applied Physics and Physico-Informatics
Solving partial differential equations for extremely large-scale systems within a feasible computation time serves in accelerating engineering developments. Quantum computing algorithms, particularly the Hamiltonian s... 详细信息
来源: 评论
Universal Spam Detection using Transfer Learning of BERT Model
arXiv
收藏 引用
arXiv 2022年
作者: Tida, Vijay Srinivas Hsu, Sonya Center of Advanced Computer Studies School of Computing and Informatics University of Louisiana Lafayette United States Informatics Program School of Computing and Informatics University of Louisiana Lafayette United States
Deep learning transformer models become important by training on text data based on self-attention mechanisms. This manuscript demonstrated a novel universal spam detection model using pre-trained Google's Bidirec... 详细信息
来源: 评论
Revocable Quantum Digital Signatures  19
Revocable Quantum Digital Signatures
收藏 引用
19th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2024
作者: Morimae, Tomoyuki Poremba, Alexander Yamakawa, Takashi Yukawa Institute for Theoretical Physics Kyoto University Japan Computing and Mathematical Sciences Caltech PasadenaCA United States CSAIL Department of Mathematics MIT CambridgeMA United States NTT Social Informatics Laboratories Tokyo Japan NTT Research Center for Theoretical Quantum Information Atsugi Japan
We study digital signatures with revocation capabilities and show two results. First, we define and construct digital signatures with revocable signing keys from the LWE assumption. In this primitive, the signing key ... 详细信息
来源: 评论
DELIFFAS: deformable light fields for fast avatar synthesis  23
DELIFFAS: deformable light fields for fast avatar synthesis
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Youngjoong Kwon Lingjie Liu Henry Fuchs Marc Habermann Christian Theobalt University of North Carolina at Chapel Hill University of Pennsylvania and Max Planck Institute for Informatics Saarland Informatics Campus Max Planck Institute for Informatics Saarland Informatics Campus and Saarbrücken Research Center for Visual Computing Interaction and AI
Generating controllable and photorealistic digital human avatars is a long-standing and important problem in Vision and Graphics. Recent methods have shown great progress in terms of either photorealism or inference s...
来源: 评论
Broadening Student Engagement To Build the Next Generation of Cyberinfrastructure Professionals  23
Broadening Student Engagement To Build the Next Generation o...
收藏 引用
2023 Practice and Experience in Advanced Research computing, PEARC 2023
作者: Murillo, Angela Brower, Don Hossain, Sarowar Kee, Kerk Mandal, Anirban Nabrzyski, Jarek Scott, Erik Virdone, Nicole Ewing, Rodney Deelman, Ewa Indiana University-Indianapolis Luddy School of Informatics Computing and Engineering United States University of Notre Dame Center for Research Computing United States Texas Tech University United States University of North Carolina RENCI United States University of Southern California Information Science Institute United States University of Southern California Information Science Institutes United States
The CI Compass Fellowship Program (CICF) was developed to broaden undergraduate student participation in cyberinfrastructure (CI) research, development, and operations. CICF is a distinctive program for undergraduate ... 详细信息
来源: 评论
Electricity Anomaly Point Detection using Unsupervised Technique Based on Electricity Load Prediction Derived from Long Short-Term Memory  2
Electricity Anomaly Point Detection using Unsupervised Techn...
收藏 引用
2nd International Conference on Artificial Intelligence and Data Sciences, AiDAS 2021
作者: Salleh, Nur Shakirah Md Saripuddin, Mulyana Suliman, Azizah Jorgensen, Bo Norregaard College of Computing and Informatics Universiti Tenaga Nasional Kajang Malaysia Center for Energy Informatics Mærsk Mc-Kinney Moller Institutte Odense Denmark
Electricity theft caused a major loss for electricity power provider. The anomaly detection helps to predict the abnormal load usage of a consumer. Usually, the classification method used in anomaly detection. This re... 详细信息
来源: 评论
Improving Multilingual Sign Language Translation with Automatically Clustered Language Family Information  31
Improving Multilingual Sign Language Translation with Automa...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Ruiquan Hu, Cong Yu, Pei Chen, Yidong Department of Artificial Intelligence School of Informatics Xiamen University 361005 China Ministry of Culture and Tourism 361005 China National Language Resources Monitoring and Research Center for Education and Teaching Media Xiamen University 361005 China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University 361005 China
Sign Language Translation (SLT) bridges the communication gap between deaf and hearing individuals by converting sign language videos into spoken language texts. While most SLT research has focused on bilingual transl... 详细信息
来源: 评论
LP-Gaussians: Learnable Parametric Gaussian Splatting for Efficient Dynamic Reconstruction of Single-View Scenes
LP-Gaussians: Learnable Parametric Gaussian Splatting for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wu, Shaoqi Xie, Weixing Peng, Youhong Li, Jinwen Yao, Jiawei Yao, Junfeng Center for Digital Media Computing School of Film School of Informatics Xiamen University China National Institute for Data Science in Health and Medicine Xiamen University China Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and Tourism Taiwan
With the popularity of short video platforms, the number of single-view videos has increased significantly. Existing NeRF-based methods can reconstruct dynamic scenes in a single-view setting, but slow rendering speed... 详细信息
来源: 评论
Is COVID-19 Being Used to Spread Malware
收藏 引用
SN Computer Science 2023年 第4期4卷 398页
作者: Ahmed, Ruqayah N. Javed, Amir Bedewi, Wafi Computer Center University of Samarra Salah Aldin Samarra 34010 Iraq School of Computer Science and Informatics Cardiff University Cathays Cardiff CF24 4AG United Kingdom Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Saudi Arabia
With the rising number of people using social networks after the pandemic of COVID-19, cybercriminals took the advantage of (i) the increased base of possible victims and (ii) the use of a trending topic as the pandem... 详细信息
来源: 评论