咨询与建议

限定检索结果

文献类型

  • 3,230 篇 会议
  • 3,132 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,980 篇 工学
    • 2,803 篇 计算机科学与技术...
    • 2,188 篇 软件工程
    • 774 篇 信息与通信工程
    • 519 篇 光学工程
    • 496 篇 生物工程
    • 439 篇 生物医学工程(可授...
    • 438 篇 控制科学与工程
    • 426 篇 电气工程
    • 394 篇 电子科学与技术(可...
    • 195 篇 机械工程
    • 165 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 135 篇 材料科学与工程(可...
    • 129 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
    • 108 篇 土木工程
  • 2,529 篇 理学
    • 1,195 篇 数学
    • 1,078 篇 物理学
    • 574 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 276 篇 化学
    • 211 篇 系统科学
  • 930 篇 管理学
    • 514 篇 管理科学与工程(可...
    • 423 篇 图书情报与档案管...
    • 269 篇 工商管理
  • 471 篇 医学
    • 408 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 198 篇 药学(可授医学、理...
    • 146 篇 公共卫生与预防医...
  • 148 篇 法学
    • 129 篇 社会学
  • 95 篇 经济学
  • 89 篇 农学
  • 69 篇 教育学
  • 17 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 129 篇 machine learning
  • 119 篇 deep learning
  • 89 篇 visualization
  • 86 篇 application soft...
  • 80 篇 semantics
  • 77 篇 feature extracti...
  • 77 篇 artificial intel...
  • 75 篇 hardware
  • 75 篇 accuracy
  • 74 篇 high performance...
  • 72 篇 training
  • 71 篇 computer archite...
  • 67 篇 distributed comp...
  • 66 篇 data mining
  • 62 篇 costs
  • 56 篇 algorithm design...
  • 55 篇 image segmentati...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 45 篇 infn sezione di ...
  • 45 篇 north-west unive...
  • 45 篇 institut univers...
  • 43 篇 national centre ...
  • 43 篇 department of co...
  • 42 篇 tno technical sc...
  • 42 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 45 篇 chen a.
  • 45 篇 benoit d.m.
  • 45 篇 ferrara g.
  • 45 篇 ardid m.
  • 45 篇 calvo d.
  • 45 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,553 篇 英文
  • 864 篇 其他
  • 30 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6446 条 记 录,以下是1141-1150 订阅
排序:
Human activity recognition using attribute-based neural networks and context information
arXiv
收藏 引用
arXiv 2021年
作者: Lüdtke, Stefan Rueda, Fernando Moya Ahmed, Waqas Fink, Gernot A. Kirste, Thomas Institute of Visual & Analytic Computing University of Rostock Germany Department of Computer Science TU Dortmund University Germany
We consider human activity recognition (HAR) from wearable sensor data in manual-work processes, like warehouse order-picking. Such structured domains can often be partitioned into distinct process steps, e.g., packag... 详细信息
来源: 评论
Diff9D: Diffusion-Based Domain-Generalized Category-Level 9-DoF Object Pose Estimation
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Jian Sun, Wei Yang, Hui Deng, Pengchao Liu, Chongpei Sebe, Nicu Rahmani, Hossein Mian, Ajmal National Engineering Research Center for Robot Visual Perception and Control Technology College of Electrical and Information Engineering School of Robotics State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body Hunan University Changsha410082 China Institute of Artificial Intelligence and Robotics Xi’an Jiaotong University Xi’an710049 China Department of Information Engineering and Computer Science University of Trento Trento38123 Italy School of Computing and Communications Lancaster University LA1 4YW United Kingdom Department of Computer Science The University of Western Australia WA6009 Australia
Nine-degrees-of-freedom (9-DoF) object pose and size estimation is crucial for enabling augmented reality and robotic manipulation. Category-level methods have received extensive research attention due to their potent... 详细信息
来源: 评论
Exploring The Impact Of Artificial Intelligence On visual Communication In Unmasking Deep Fake And Ensuring Public Trust
Exploring The Impact Of Artificial Intelligence On Visual Co...
收藏 引用
Intelligent Systems and Machine Learning Conference (ISML)
作者: Jagendra Singh Neeraj Abbas Thajeel Rhaif Alsahlanee Abha Kiran Rajpoot Gaurav Agrawal Mohit Tiwari Computer Science Engineering Alliance School of Advanced Computing Alliance University Banglore India School of Computer Science Engineering and Technology Bennett University Greater Noida India Development and Continuous Education Center University of Thi-Qar Thi-Qar Iraq Department of CSE(AIML) KIET Group of Institution Ghaziabad India Department of CSE(AI) KIET Group of Institution Ghaziabad India Dept. of Computer Science & Engineering Bharati Vidyapeeth’s College of Engineering Delhi India
In this groundbreaking study, we delve into the pivotal role of the Vision Transformer (V-iT) in the realm of deepfake detection, seeking to unravel its effectiveness in navigating the intricate landscape of manipulat... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation
收藏 引用
Procedia computer science 2023年 220卷 339-347页
作者: Leila Ismail Muhammad Danish Waseem Clouds and Distributed Computing and Systems (CLOUDS) Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia. Intelligent Distributed Computing and Systems (INDUCE) Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University UAE. National Water and Energy Center United Arab Emirates University UAE.
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
MGSTCN: A multi-graph spatio-temporal convolutional network for metro passenger flow prediction  7
MGSTCN: A multi-graph spatio-temporal convolutional network ...
收藏 引用
7th International Conference on Big Data computing and Communications, BigCom 2021
作者: Yang, Jiahao Liu, Tong Li, Chengfan Tong, Weiqin Zhu, Yanmin Ai, Wenwei Shanghai University School of Computer Engineering and Science China Shanghai Engineering Research Center of Intelligent Computing System China Shanghai Jiao Tong University Department of Computer Science and Engineering China Shanghai Shentong Metro Co. Ltd. China
Short-term passenger flow forecasting is significantly important in the urban rail transit system. However, there are many factors that affect passenger flows, and traditional statistical prediction methods are unable... 详细信息
来源: 评论
HPC-Coder: Modeling Parallel Programs using Large Language Models
arXiv
收藏 引用
arXiv 2023年
作者: Nichols, Daniel Marathe, Aniruddha Menon, Harshitha Gamblin, Todd Bhatele, Abhinav Department of Computer Science University of Maryland College ParkMD United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory LivermoreCA United States Livermore Computing Lawrence Livermore National Laboratory LivermoreCA United States
Parallel programs in high performance computing (HPC) continue to grow in complexity and scale in the exascale era. The diversity in hardware and parallel programming models make developing, optimizing, and maintainin... 详细信息
来源: 评论
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
收藏 引用
computer Systems science & Engineering 2024年 第6期48卷 1437-1481页
作者: Muhammad Muntasir Yakubu Mohd Fadzil B Hassan Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam Department of Computer and Information Science Universiti Teknologi PETRONASPerak32610Malaysia Department of Information Technology Faculty of ComputingFederal University Dutsin-MaKatsina5001Nigeria Institute of Autonomous Systems Universiti Teknologi PETRONASPerak32610Malaysia Institut für Luftfahrtsysteme Universität StuttgartStuttgart70569Germany Department of Computer Science Academic City University CollegeAgbogbaAccra421Ghana Department of Mathematical Sciences National University of the Center of the Province of Buenos AiresPintoTandil399Argentina
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger *** aim is to compreh... 详细信息
来源: 评论
A Systematic Review of Machine Learning Approaches for Detecting Deceptive Activities on Social Media: Methods, Challenges, and Biases
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yunchong Shen, Xiaorui Zhang, Yeyubei Wang, Zhongyan Tian, Yexin Dai, Jianglai Cao, Yuchen School of Engineering and Applied Science University of Pennsylvania United States Khoury college of computer science Northeastern University United States Center for Data Science New York University United States Georgia Institute of Technology College of Computing United States Department of EECS University of California Berkeley United States
Social media platforms like Twitter, Facebook, and Instagram have facilitated the spread of misinformation, necessitating automated detection systems. This systematic review evaluates 36 studies that apply machine lea... 详细信息
来源: 评论
Multirate Time-Integration based on Dynamic ODE Partitioning through Adaptively Refined Meshes for Compressible Fluid Dynamics
arXiv
收藏 引用
arXiv 2024年
作者: Doehring, Daniel Schlottke-Lakemper, Michael Gassner, Gregor J. Torrilhon, Manuel Applied and Computational Mathematics RWTH Aachen University Schinkelstrasse 2 North Rhine-Westphalia Aachen52062 Germany University of Stuttgart Germany High-Performance Scientific Computing Center for Advanced Analytics and Predictive Sciences University of Augsburg Germany Department of Mathematics and Computer Science Center for Data and Simulation Science University of Cologne Germany
In this paper, we apply the Paired-Explicit Runge-Kutta (P-ERK) schemes by Vermeire et. al. [1, 2] to dynamically partitioned systems arising from adaptive mesh refinement. The PERK schemes enable multirate time-integ... 详细信息
来源: 评论