咨询与建议

限定检索结果

文献类型

  • 3,233 篇 会议
  • 3,158 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 2,831 篇 计算机科学与技术...
    • 2,201 篇 软件工程
    • 788 篇 信息与通信工程
    • 532 篇 光学工程
    • 503 篇 生物工程
    • 460 篇 控制科学与工程
    • 441 篇 生物医学工程(可授...
    • 435 篇 电气工程
    • 403 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 169 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 134 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,555 篇 理学
    • 1,205 篇 数学
    • 1,083 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 287 篇 化学
    • 211 篇 系统科学
  • 946 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 472 篇 医学
    • 407 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 94 篇 经济学
  • 91 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 131 篇 machine learning
  • 120 篇 deep learning
  • 90 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 72 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 59 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,966 篇 英文
  • 473 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6475 条 记 录,以下是361-370 订阅
排序:
Winner Prediction Model for Basketball Matches Based on Statistical Data of Teams, Players, and Line-ups
Winner Prediction Model for Basketball Matches Based on Stat...
收藏 引用
Information Technology and Data science (CITDS), IEEE Conference on
作者: Chanin Witheesawas Suphakant Phimoltares Department of Mathematics and Computer Science Faculty of Science Advanced Virtual and Intelligent Computing (AVIC) Research Center Chulalongkorn University Bangkok Thailand
Winning the National Basketball Association (hereinafter referred to as “NBA”) championship is the ultimate goal for all NBA teams, as it represents the highest achievement in professional basketball player. This ac... 详细信息
来源: 评论
Learning to Parallelize in a Shared-Memory Environment with Transformers  23
Learning to Parallelize in a Shared-Memory Environment with ...
收藏 引用
Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming
作者: Re'em Harel Yuval Pinter Gal Oren Department of Computer Science Ben-Gurion University of the Negev Department of Physics Scientific Computing Center Nuclear Research Center - Negev Israel Department of Computer Science Ben-Gurion University of the Negev Israel Department of Computer Science Technion - Israel Institute of Technology Scientific Computing Center Nuclear Research Center - Negev Israel
In past years, the world has switched to multi and many core shared memory architectures. As a result, there is a growing need to utilize these architectures by introducing shared memory parallelization schemes, such ... 详细信息
来源: 评论
Metrocycle: Designing a Browser-Based Road Safety Education App for Motorcycle and Bicycle Riders in Metro Manila, Philippines  4th
Metrocycle: Designing a Browser-Based Road Safety Education ...
收藏 引用
4th International Conference on Novel and Intelligent Digital Systems, NiDS 2024
作者: Batrina, Jan Paul Gonzaga, Chase Rina, Brill Julian Juayong, Richelle Ann Gaspay, Sandy Mae Cabarle, Francis George Department of Computer Science University of the Philippines Diliman Quezon City Philippines Institute of Civil Engineering University of the Philippines Diliman Quezon City Philippines National Center of Transportation Studies University of the Philippines Diliman Quezon City Philippines Research Group on Natural Computing Department of Computer Science and Artificial Intelligence SCORE Lab I3US Universidad de Sevilla Seville Spain
With the recent increase in the use of bicycles and motorcycles as a main mode of transportation in the Philippines, there is also an increasing need to address the extremely high rate of fatalities and injuries from ... 详细信息
来源: 评论
A Platform for Automated Solar Data Analysis Using Machine Learning  9
A Platform for Automated Solar Data Analysis Using Machine L...
收藏 引用
9th International Conference on Social Networks Analysis, Management and Security, SNAMS 2022
作者: Younis, Ola Tashtoush, Yahya Alomari, Mohammad Darwish, Omar Department of Computer Science University of Liverpool Liverpool United Kingdom Computer Science Department Jordan University of Science and Technology Jordan Applied Science Research Center Applied Science Private University Jordan Information Security and Applied Computing Eastern Michigan University Ypsilanti United States
This paper presents a computer platform for the automated analysis of associations among different solar events and activities. This computer tool enables the advanced learning by implementing many associations' a... 详细信息
来源: 评论
Translation-Invariant Quantum Algorithms for Ordered Search are Optimal
arXiv
收藏 引用
arXiv 2025年
作者: Carolan, Joseph Childs, Andrew M. Kovacs-Deak, Matt Schaeffer, Luke Department of Computer Science Institute for Advanced Computer Studies Joint Center for Quantum Information and Computer Science University of Maryland United States David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo Canada
Ordered search is the task of finding an item in an ordered list using comparison queries. The best exact classical algorithm for this fundamental problem uses [log2 n] queries for a list of length n. Quantum computer... 详细信息
来源: 评论
Large Language Model Based Multi-Agent System Augmented Complex Event Processing Pipeline for Internet of Multimedia Things
arXiv
收藏 引用
arXiv 2025年
作者: Zeeshan, Talha Kumar, Abhishek Lovén, Lauri Pirttikangas, Susanna Tarkoma, Sasu Center for Ubiquitous Computing University of Oulu Oulu90570 Finland Department of Computer Science University of Helsinki Helsinki00560 Finland
This paper presents the development and evaluation of a Large Language Model (LLM), also known as foundation models, based multi-agent system framework for complex event processing (CEP) with a focus on video query pr... 详细信息
来源: 评论
On the Scalability of computing Genomic Diversity Using SparkLeBLAST: A Feasibility Study
On the Scalability of Computing Genomic Diversity Using Spar...
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Ritvik Prabhu Bernard Moussad Karim Youssef Emil Vatai Wu-Chun Feng Department of Computer Science Virginia Tech USA Center for Applied Scientific Computing Lawrence Livermore National Laboratory USA RIKEN Center for Computational Science Japan
Studying the genomic diversity of viruses can help us understand how viruses evolve and how that evolution can impact human health. Rather than use a laborious and tedious wet-lab approach to conduct a genomic diversi... 详细信息
来源: 评论
Segmenting Anything in the Dark via Depth Perception
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2975-2986页
作者: Liu, Peng Deng, Jinhong Duan, Lixin Li, Wen Lv, Fengmao University of Electronic Science and Technology of China Chengdu611731 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China UESTC Shenzhen Institute for Advanced Study Shenzhen518110 China University of Electronic Science and Technology of China Sichuan Provincial Key Laboratory for Human Disease Gene Study Center for Medical Genetics Department of Laboratory Medicine Sichuan Academy of Medical Sciences Sichuan Provincial People's Hospital Chengdu610032 China Southwest Jiaotong University Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education School of Computing and Artificial Intelligence Chengdu611756 China
Image segmentation under low-light conditions is essential in real-world applications, such as autonomous driving and video surveillance systems. The recent Segment Anything Model (SAM) exhibits strong segmentation ca... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Virtual Network Embedding: Literature Assessment, Recent Advancements, Opportunities, and Challenges
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Satpathy, Anurag Sahoo, Manmath Narayan Swain, Chittaranjan Bellavista, Paolo Guizani, Mohsen Muhammad, Khan Bakshi, Sambit Missouri University of Science and Technology Department of Computer Science RollaMO United States National Institute of Technology Visual Surveillance Laboratory Department of Computer Science and Engineering Odisha Rourkela769008 India Atal Bihari Vajpayee Indian Institute of Information Technology and Management Department of Computer Science and Engineering Gwalior India Department of Computer Science and Engineering Italy Machine Learning Department Abu Dhabi United Arab Emirates Department of Applied Artificial Intelligence School of Convergence College of Computing and Informatics Seoul03063 Korea Republic of
Network virtualization (NV) allows service providers (SPs) to instantiate logically isolated entities called virtual networks (VNs) on top of a substrate network (SN). Though VNs bring about multiple benefits, particu... 详细信息
来源: 评论