咨询与建议

限定检索结果

文献类型

  • 3,189 篇 会议
  • 3,167 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,440 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,995 篇 工学
    • 2,812 篇 计算机科学与技术...
    • 2,196 篇 软件工程
    • 793 篇 信息与通信工程
    • 529 篇 光学工程
    • 496 篇 生物工程
    • 447 篇 电气工程
    • 444 篇 控制科学与工程
    • 432 篇 生物医学工程(可授...
    • 405 篇 电子科学与技术(可...
    • 200 篇 机械工程
    • 169 篇 化学工程与技术
    • 156 篇 仪器科学与技术
    • 142 篇 材料科学与工程(可...
    • 130 篇 动力工程及工程热...
    • 109 篇 力学(可授工学、理...
  • 2,553 篇 理学
    • 1,206 篇 数学
    • 1,081 篇 物理学
    • 580 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 282 篇 化学
    • 212 篇 系统科学
  • 940 篇 管理学
    • 517 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 271 篇 工商管理
  • 471 篇 医学
    • 406 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 199 篇 药学(可授医学、理...
    • 145 篇 公共卫生与预防医...
  • 151 篇 法学
    • 132 篇 社会学
  • 95 篇 经济学
  • 93 篇 农学
  • 69 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 128 篇 machine learning
  • 124 篇 deep learning
  • 88 篇 visualization
  • 87 篇 application soft...
  • 81 篇 artificial intel...
  • 78 篇 semantics
  • 76 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 71 篇 accuracy
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 67 篇 training
  • 65 篇 data mining
  • 62 篇 costs
  • 57 篇 image segmentati...
  • 56 篇 algorithm design...
  • 54 篇 predictive model...

机构

  • 55 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 47 篇 chen a.
  • 47 篇 ferrara g.
  • 47 篇 ardid m.
  • 47 篇 calvo d.
  • 47 篇 eddymaoui a.
  • 46 篇 benoit d.m.
  • 44 篇 gagliardini s.
  • 42 篇 gal t.
  • 42 篇 bozza c.
  • 42 篇 boumaaza j.
  • 42 篇 coleiro a.
  • 41 篇 díaz a.f.
  • 41 篇 dallier r.
  • 41 篇 benhassi m.
  • 40 篇 gozzini s.r.
  • 40 篇 boettcher m.
  • 39 篇 kulikovskiy v.
  • 39 篇 enzenhöfer a.
  • 39 篇 celli s.
  • 39 篇 dornic d.

语言

  • 6,084 篇 英文
  • 320 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6440 条 记 录,以下是11-20 订阅
排序:
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
FedCSpc: A Cross-Silo Federated Learning System with Error-Bounded Lossy Parameter Compression
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2025年 第7期36卷 1372-1386页
作者: Zhang, Zhaorui Di, Sheng Zhao, Kai Jin, Sian Tao, Dingwen Ji, Zhuoran Liu, Benben Alharthi, Khalid Ayed Cao, Jiannong Cappello, Franck The Hong Kong Polytechnic University Department of Computing Hong Kong Florida State University Department of Computer Science United States Temple University Department of Computer and Information Sciences United States Indiana University Bloomington Luddy School of Informatics Computing and Engineering United States Shandong University School of Cyber Science and Technology China The University of Hong Kong LSCM R&D Center Hong Kong University of Bisha Department of Computer Science College Of Computing And Information Technology Saudi Arabia Argonne National Laboratory United States
Cross-Silo federated learning is widely used for scaling deep neural network (DNN) training over data silos from different locations worldwide while guaranteeing data privacy. Communication has been identified as the ... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India Amrita Vishwa Vidyapeetham Center for Cybersecurity Systems and Networks Amritapuri India Lehigh University Department of Electrical & Computer Engineering United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论
Seer: Accelerating Block chain Transaction Execution by Fine-Grained Branch Prediction  51st
Seer: Accelerating Block chain Transaction Execution by Fine...
收藏 引用
51st International Conference on Very Large Data Bases, VLDB 2025
作者: Zhang, Shijie Cheng, Ru Liu, Xinpeng Xiao, Jiang Jin, Hai Li, Bo National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
来源: 评论
PraK Tool V3: Enhancing Video Item Search Using Localized Text and Texture Queries  31st
PraK Tool V3: Enhancing Video Item Search Using Localized Te...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Stroh, Michael Kloda, Vojtěch Verner, Benjamin Vopálková, Zuzana Buchmüller, Raphael Jäckl, Bastian Hajko, Jakub Lokoč, Jakub Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
We present a third version of the PraK system designed around an effective text-image and image-image search model. The system integrates sub-image search options for localized context search for CLIP and image color/... 详细信息
来源: 评论
Advancing general robotic manipulation with multimodal foundation models: An embodied AI paradigm
收藏 引用
science China Technological sciences 2025年 第5期68卷 294-296页
作者: Shifeng HUANG He WANG Xing ZHOU Wenkai CHEN Haibin YANG Jianwei ZHANG Department of Mechanical and Aerospace Engineering Hong Kong University of Science and Technology Foshan Institute of Intelligent Equipment Technology Foshan Huashu Robot Co. Ltd. Center on Frontiers of Computing Studies (CFCS) School of Computer SciencePeking University Beijing Academy of Artificial Intelligence Department of Informatics Universit?t Hamburg
Can current robotic technologies truly replicate the full scope and intricacies of human labour? In practice, the adoption of robots remains limited, especially in open, unstructured environments commonly encountered ...
来源: 评论
High Spatio-Temporal Imaging Reconstruction for Hybrid Spike-RGB Cameras
IEEE Transactions on Computational Imaging
收藏 引用
IEEE Transactions on Computational Imaging 2025年 11卷 586-598页
作者: Xia, Lujie Xiong, Ruiqin Zhao, Jing Wang, Lizhi Zhu, Shuyuan Fan, Xiaopeng Huang, Tiejun Peking University National Engineering Research Center of Visual Technology School of Computer Science Beijing100871 China Beijing Normal University School of Artificial Intelligence Beijing100875 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Department of Computer Science and Technology Harbin150001 China Peng Cheng Laboratory Shenzhen518055 China
The acquisition of high-resolution image sequence for dynamic scenes of fast motion remains challenging due to motion blur caused by fast object movement. As a novel neuromorphic sensor, spike camera records the chang... 详细信息
来源: 评论
Hardware-Accelerated Detection of Unauthorized Mining Activities Using YOLOv11 and FPGA
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 967-979页
作者: Ghodhbani, Refka Saidani, Taoufik Kachoukh, Amani Elsayed, Mahmoud Salaheldin Said, Yahia Ahmed, Rabie Center for Scientific Research and Entrepreneurship Northern Border University Arar73213 Saudi Arabia Department of Information Systems-Faculty of Computing and Information Technology Northern Border University Saudi Arabia Department of Computer Sciences-Faculty of Computing and Information Technology Northern Border University Saudi Arabia DCenter for Scientific Research and Entrepreneurship Northern Border University Arar73213 Saudi Arabia Department of Computer Science-Faculty of Computing and Information Technology Northern Border University Rafha Saudi Arabia Mathematics and Computer Science Department-Faculty of Science Beni-Suef University Beni-Suef Egypt
Illegal mining activities present significant environmental, economic, and safety challenges, particularly in remote and under-monitored regions. Traditional surveillance methods are often inefficient, labor-intensive... 详细信息
来源: 评论
Making Large Language Models Better Reasoners with Orchestrated Streaming Experiences
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Xiangyang He, Junliang Qiu, Xipeng School of Computer Science Fudan University Shanghai Collaborative Innovation Center of Intelligent Visual Computing China
Large language models (LLMs) can perform complex reasoning by generating intermediate thoughts under zero-shot or few-shot settings. However, zero-shot prompting always encounters low performance, and the superior per... 详细信息
来源: 评论