咨询与建议

限定检索结果

文献类型

  • 3,238 篇 会议
  • 3,171 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,018 篇 工学
    • 2,835 篇 计算机科学与技术...
    • 2,204 篇 软件工程
    • 789 篇 信息与通信工程
    • 537 篇 光学工程
    • 499 篇 生物工程
    • 449 篇 控制科学与工程
    • 444 篇 生物医学工程(可授...
    • 443 篇 电气工程
    • 397 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 166 篇 化学工程与技术
    • 161 篇 仪器科学与技术
    • 135 篇 材料科学与工程(可...
    • 130 篇 动力工程及工程热...
    • 110 篇 土木工程
    • 109 篇 力学(可授工学、理...
  • 2,551 篇 理学
    • 1,201 篇 数学
    • 1,084 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 278 篇 化学
    • 211 篇 系统科学
  • 939 篇 管理学
    • 522 篇 管理科学与工程(可...
    • 424 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 478 篇 医学
    • 413 篇 临床医学
    • 323 篇 基础医学(可授医学...
    • 198 篇 药学(可授医学、理...
    • 149 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 95 篇 经济学
  • 89 篇 农学
  • 71 篇 教育学
  • 17 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 277 篇 computer science
  • 134 篇 computational mo...
  • 130 篇 machine learning
  • 126 篇 deep learning
  • 89 篇 visualization
  • 86 篇 application soft...
  • 81 篇 semantics
  • 79 篇 artificial intel...
  • 78 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 computer archite...
  • 72 篇 accuracy
  • 71 篇 training
  • 67 篇 distributed comp...
  • 66 篇 data mining
  • 62 篇 costs
  • 56 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 48 篇 infn sezione di ...
  • 48 篇 north-west unive...
  • 47 篇 institut univers...
  • 45 篇 tno technical sc...
  • 45 篇 université de st...
  • 43 篇 national centre ...
  • 43 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 nikhef national ...
  • 40 篇 yerevan physics ...
  • 40 篇 university moham...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 39 篇 ncsr demokritos ...

作者

  • 48 篇 chen a.
  • 48 篇 benoit d.m.
  • 48 篇 ferrara g.
  • 48 篇 ardid m.
  • 48 篇 calvo d.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 44 篇 gal t.
  • 44 篇 bozza c.
  • 44 篇 díaz a.f.
  • 44 篇 boumaaza j.
  • 44 篇 coleiro a.
  • 43 篇 gozzini s.r.
  • 43 篇 dallier r.
  • 43 篇 benhassi m.
  • 42 篇 boettcher m.
  • 41 篇 kulikovskiy v.
  • 41 篇 enzenhöfer a.
  • 41 篇 celli s.
  • 41 篇 dornic d.

语言

  • 5,340 篇 英文
  • 1,127 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6493 条 记 录,以下是1201-1210 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
MGSTCN: A multi-graph spatio-temporal convolutional network for metro passenger flow prediction  7
MGSTCN: A multi-graph spatio-temporal convolutional network ...
收藏 引用
7th International Conference on Big Data computing and Communications, BigCom 2021
作者: Yang, Jiahao Liu, Tong Li, Chengfan Tong, Weiqin Zhu, Yanmin Ai, Wenwei Shanghai University School of Computer Engineering and Science China Shanghai Engineering Research Center of Intelligent Computing System China Shanghai Jiao Tong University Department of Computer Science and Engineering China Shanghai Shentong Metro Co. Ltd. China
Short-term passenger flow forecasting is significantly important in the urban rail transit system. However, there are many factors that affect passenger flows, and traditional statistical prediction methods are unable... 详细信息
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation
收藏 引用
Procedia computer science 2023年 220卷 339-347页
作者: Leila Ismail Muhammad Danish Waseem Clouds and Distributed Computing and Systems (CLOUDS) Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia. Intelligent Distributed Computing and Systems (INDUCE) Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University UAE. National Water and Energy Center United Arab Emirates University UAE.
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
HPC-Coder: Modeling Parallel Programs using Large Language Models
arXiv
收藏 引用
arXiv 2023年
作者: Nichols, Daniel Marathe, Aniruddha Menon, Harshitha Gamblin, Todd Bhatele, Abhinav Department of Computer Science University of Maryland College ParkMD United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory LivermoreCA United States Livermore Computing Lawrence Livermore National Laboratory LivermoreCA United States
Parallel programs in high performance computing (HPC) continue to grow in complexity and scale in the exascale era. The diversity in hardware and parallel programming models make developing, optimizing, and maintainin... 详细信息
来源: 评论
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
收藏 引用
computer Systems science & Engineering 2024年 第6期48卷 1437-1481页
作者: Muhammad Muntasir Yakubu Mohd Fadzil B Hassan Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam Department of Computer and Information Science Universiti Teknologi PETRONASPerak32610Malaysia Department of Information Technology Faculty of ComputingFederal University Dutsin-MaKatsina5001Nigeria Institute of Autonomous Systems Universiti Teknologi PETRONASPerak32610Malaysia Institut für Luftfahrtsysteme Universität StuttgartStuttgart70569Germany Department of Computer Science Academic City University CollegeAgbogbaAccra421Ghana Department of Mathematical Sciences National University of the Center of the Province of Buenos AiresPintoTandil399Argentina
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger *** aim is to compreh... 详细信息
来源: 评论
A Systematic Review of Machine Learning Approaches for Detecting Deceptive Activities on Social Media: Methods, Challenges, and Biases
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yunchong Shen, Xiaorui Zhang, Yeyubei Wang, Zhongyan Tian, Yexin Dai, Jianglai Cao, Yuchen School of Engineering and Applied Science University of Pennsylvania United States Khoury college of computer science Northeastern University United States Center for Data Science New York University United States Georgia Institute of Technology College of Computing United States Department of EECS University of California Berkeley United States
Social media platforms like Twitter, Facebook, and Instagram have facilitated the spread of misinformation, necessitating automated detection systems. This systematic review evaluates 36 studies that apply machine lea... 详细信息
来源: 评论
Multirate Time-Integration based on Dynamic ODE Partitioning through Adaptively Refined Meshes for Compressible Fluid Dynamics
arXiv
收藏 引用
arXiv 2024年
作者: Doehring, Daniel Schlottke-Lakemper, Michael Gassner, Gregor J. Torrilhon, Manuel Applied and Computational Mathematics RWTH Aachen University Schinkelstrasse 2 North Rhine-Westphalia Aachen52062 Germany University of Stuttgart Germany High-Performance Scientific Computing Center for Advanced Analytics and Predictive Sciences University of Augsburg Germany Department of Mathematics and Computer Science Center for Data and Simulation Science University of Cologne Germany
In this paper, we apply the Paired-Explicit Runge-Kutta (P-ERK) schemes by Vermeire et. al. [1, 2] to dynamically partitioned systems arising from adaptive mesh refinement. The PERK schemes enable multirate time-integ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
QFDNN: A Resource-Efficient Variational Quantum Feature Deep Neural Networks for Fraud Detection and Loan Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Das, Subham Meghanath, Ashtakala Behera, Bikash K. Mumtaz, Shahid Al-Kuwari, Saif Farouk, Ahmed Department of Physics Indian Institute of Science Education and Research Thiruvananthapuram India Pvt. Ltd. WB Mohanpur741246 India Nottingham Trent University Engineering Department United Kingdom Qatar Center for Quantum Computing College of Science and Engineering Hamad Bin Khalifa University Doha Qatar Department of Computer Science Faculty of Computers and Artificial Intelligence Hurghada University Hurghada Egypt
Social financial technology focuses on trust, sustainability, and social responsibility, which require advanced technologies to address complex financial tasks in the digital era. With the rapid growth in online trans... 详细信息
来源: 评论
Internal shortest absent word queries  32
Internal shortest absent word queries
收藏 引用
32nd Annual Symposium on Combinatorial Pattern Matching, CPM 2021
作者: Badkobeh, Golnaz Charalampopoulos, Panagiotis Pissis, Solon P. Department of Computing Goldsmiths University of London United Kingdom Efi Arazi School of Computer Science The Interdisciplinary Center Herzliya Israel CWI Amsterdam Netherlands Vrije Universiteit Amsterdam Netherlands
Given a string T of length n over an alphabet Σ ⊂ {1, 2, . . ., nO(1)} of size s, we are to preprocess T so that given a range [i, j], we can return a representation of a shortest string over Σ that is absent in the... 详细信息
来源: 评论