咨询与建议

限定检索结果

文献类型

  • 3,233 篇 会议
  • 3,158 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 2,831 篇 计算机科学与技术...
    • 2,201 篇 软件工程
    • 788 篇 信息与通信工程
    • 532 篇 光学工程
    • 503 篇 生物工程
    • 460 篇 控制科学与工程
    • 441 篇 生物医学工程(可授...
    • 435 篇 电气工程
    • 403 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 169 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 134 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,555 篇 理学
    • 1,205 篇 数学
    • 1,083 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 287 篇 化学
    • 211 篇 系统科学
  • 946 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 472 篇 医学
    • 407 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 94 篇 经济学
  • 91 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 131 篇 machine learning
  • 120 篇 deep learning
  • 90 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 72 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 59 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,966 篇 英文
  • 473 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6475 条 记 录,以下是371-380 订阅
排序:
Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System
收藏 引用
computer Systems science & Engineering 2023年 第11期47卷 2497-2512页
作者: Mahmoud Ragab Sultanah M.Alshammari Abdullah S.Al-Malaise Al-Ghamdi Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
The Internet of Things(IoT)system has confronted dramatic growth in high dimensionality and data *** system named intrusion detection systems(IDS)is broadly utilized for the enhancement of security posture in an IT **... 详细信息
来源: 评论
DE-ConvGraph 3D UNet: A Novel Deep Learning Model for Optimizing Radiotherapy Treatment Plans in Oropharyngeal Cancer
DE-ConvGraph 3D UNet: A Novel Deep Learning Model for Optimi...
收藏 引用
2023 IEEE Applied Imagery Pattern Recognition Workshop, AIPR 2023
作者: Murugadoss, Bhuvanashree Amudha, J. Sugumaran, Vijayan Amrita Vishwa Vidyapeetham School of Computing Department of Computer Science and Engineering Karnataka Bengaluru India Oakland University Center for Data Science and Big Data Analytics RochesterMI United States Oakland University Department of Decision and Information Sciences RochesterMI United States
Automated radiotherapy treatment planning aims to improve treatment accuracy and efficiency. However, the prevalent Knowledge-Based Planning (KBP) method faces issues like lengthy manual problem formulation and challe... 详细信息
来源: 评论
slackFS – resilient and persistent information hiding framework
收藏 引用
International Journal of Security and Networks 2024年 第2期19卷 77-91页
作者: Srinivasan, Avinash Rose, Christian Wu, Jie Department of Cyber Science United States Naval Academy 597 McNair Road Hopper Hall – Room 478 AnnapolisMD21402 United States Amber Orchard Ct. OdentonMD21113 United States Department of Computer and Information Sciences Center of Networked Computing Temple University SERC 362 1925 N. 12th Street PhiladelphiaPA19122 United States
The ever-expanding cyberspace, driven by digital convergence, inadvertently broadens the attack surface. Savvy modern cybercriminals have embraced steganography as a key weapon. This paper introduces slackFS, a novel ... 详细信息
来源: 评论
Cybersecurity in Universities: An Evaluation Model
收藏 引用
SN computer science 2023年 第5期4卷 569页
作者: Haque, Md Alimul Ahmad, Sultan John, Alok Mishra, Khushboo Mishra, Binay Kumar Kumar, Kailash Nazeer, Jabeen Department of Computer Science Veer Kunwar Singh University Ara 802301 India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Advertising and Marketing Management (AMM) Patna Women’s College Patna India Department of Physics Veer Kunwar Singh University Ara 802301 India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
Cybercriminals have been increasingly targeting higher education institutions during the COVID-19 pandemic. The shift to online learning and remote work has created new opportunities for cybercriminals to exploit vuln... 详细信息
来源: 评论
Assessing the Impact of IoT Enabled E-Learning System for Higher Education
收藏 引用
SN computer science 2023年 第5期4卷 459页
作者: Haque, Shameemul Haque, Md Alimul Kumar, Devanshu Mishra, Khushboo Islam, Farheen Ahmad, Sultan Kumar, Kailash Mishra, Binay Kumar Al-Hafeez College Ara India Department of Computer Science Veer Kunwar Singh University Ara 802301 India Department of Physics Veer Kunwar Singh University Ara 802301 India Department of Education Patna Women’s College Patna India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
In this paper, a hypothetical investigation alongside a genuine review is investigated. The theoretical and empirical results demonstrated the significant impact of IoT in the physical training system in terms of lear... 详细信息
来源: 评论
Granular Network Traffic Classification on Mobile Application Service for Better Parental Control
Granular Network Traffic Classification on Mobile Applicatio...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: Dhivvya J P Guru Aswini Dath Mahesh Kumar Chinta Ankit Karki Department of Computer Science and Engineering Amrita School of Computing Center for Wireless Networks and Applications Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kollam India
The widespread use of mobile applications among children had its limitations in excessive screen usage in entertainment. Traditional parental control techniques mostly depend on blocking applications based on their na...
来源: 评论
Verifying quantum phase estimation using an expressive theorem-proving assistant
收藏 引用
Physical Review A 2023年 第5期108卷 052609-052609页
作者: Wayne M. Witzel Warren D. Craft Robert Carr Deepak Kapur Center for Computing Research Quantum Computer Science Sandia National Laboratories Albuquerque New Mexico 87123 USA Department of Computer Science The University of New Mexico Albuquerque New Mexico 87131 USA
The general-purpose interactive theorem-proving assistant called prove-it was used to verify the quantum phase estimation (QPE) algorithm, specifically claims about its outcome probabilities. prove-it is unique in its... 详细信息
来源: 评论
Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3101-3115页
作者: Mohammed Maray Hamed Alqahtani Saud S.Alotaibi Fatma S.Alrayes Nuha Alshuqayran Mrim M.Alnfiai Amal S.Mehanna Mesfer Al Duhayyim Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of information systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic UniversitySaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam Bin Abdulaziz UniversitySaudi Arabia
Cloud computing(CC)is the most promising and advanced technology to store data and offer online services in an effective *** such fast evolving technologies are used in the protection of computerbased systems from cyb... 详细信息
来源: 评论
A Hierarchical Deep Learning Approach for Predicting Job Queue Times in HPC Systems
A Hierarchical Deep Learning Approach for Predicting Job Que...
收藏 引用
High Performance computing, Networking, Storage and Analysis, SC-W: Workshops of the International Conference for
作者: Austin Lovell Philip Wisniewski Sarah Rodenbeck Ashish Department of Computer Science Purdue University Indiana USA Rosen Center for Advanced Computing Purdue University Indiana USA
Accurate wait-time prediction for HPC jobs contributes to a positive user experience but has historically been a challenging task. Previous models lack the accuracy needed for confident predictions, and many were deve... 详细信息
来源: 评论
Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review
收藏 引用
International Journal of Information Technology and Decision Making 2023年 第1期22卷 589-636页
作者: Alamleh, Amneh Albahri, O.S. Zaidan, A.A. Alamoodi, A.H. Albahri, A.S. Zaidan, B.B. Qahtan, Sarah Binti Ismail, Amelia Ritahani Malik, R.Q. Baqer, M.J. Jasim, Ali Najm Al-Samarraay, Mohammed S. Department of Computing Faculty of Arts Computing and Creative Industry Universiti Pendidikan Sultan Idris Tanjung Malim35900 Malaysia Computer Techniques Engineering Department Mazaya University College Nasiriyah Iraq Faculty of Engineering and IT The British University in Dubai United Arab Emirates Baghdad Iraq Future Technology Research Center National Yunlin University of Science and Technology Douliou Taiwan Department of Computer Center Middle Technical University's Baghdad Iraq International Islamic University Malaysia Kuala Lumpur Malaysia Department of Artificial Intelligence Faculty of Information Technology Zarqa University Zarqa Jordan Department of Medical Instrumentation Techniques Engineering Al-Mustaqbal University College Hillah Iraq Foundation of Alshuhda Baghdad Iraq
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security of computer and network systems. Howe... 详细信息
来源: 评论