咨询与建议

限定检索结果

文献类型

  • 3,200 篇 会议
  • 3,128 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,962 篇 工学
    • 2,788 篇 计算机科学与技术...
    • 2,184 篇 软件工程
    • 772 篇 信息与通信工程
    • 526 篇 光学工程
    • 495 篇 生物工程
    • 437 篇 控制科学与工程
    • 432 篇 生物医学工程(可授...
    • 422 篇 电气工程
    • 396 篇 电子科学与技术(可...
    • 196 篇 机械工程
    • 168 篇 化学工程与技术
    • 157 篇 仪器科学与技术
    • 133 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 109 篇 力学(可授工学、理...
    • 105 篇 土木工程
  • 2,529 篇 理学
    • 1,199 篇 数学
    • 1,070 篇 物理学
    • 573 篇 生物学
    • 369 篇 统计学(可授理学、...
    • 279 篇 化学
    • 211 篇 系统科学
  • 934 篇 管理学
    • 517 篇 管理科学与工程(可...
    • 425 篇 图书情报与档案管...
    • 267 篇 工商管理
  • 467 篇 医学
    • 402 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 143 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 95 篇 经济学
  • 91 篇 农学
  • 68 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 126 篇 machine learning
  • 117 篇 deep learning
  • 88 篇 visualization
  • 87 篇 application soft...
  • 78 篇 semantics
  • 77 篇 artificial intel...
  • 76 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 71 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 57 篇 image segmentati...
  • 56 篇 algorithm design...
  • 54 篇 predictive model...

机构

  • 55 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 6,065 篇 英文
  • 311 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6412 条 记 录,以下是4991-5000 订阅
排序:
Perceptual influence of approximate visibility in indirect illumination
Perceptual influence of approximate visibility in indirect i...
收藏 引用
作者: Yu, Insu Cox, Andrew Kim, Min H. Ritschel, Tobias Grosch, Thorsten Dachsbacher, Carsten Kautz, Jan Department of Computer Science University College London Gower Street London WC1E 6BT United Kingdom Department of Computer Graphics MPI Informatik Campus E14 66123 Saarbrücken Germany Visual Computing Group Universität Stuttgart Germany
In this article we evaluate the use of approximate visibility for efficient global illumination. Traditionally, accurate visibility is used in light transport. However, the indirect illumination we perceive on a daily... 详细信息
来源: 评论
Critical perspectives on large-scale distributed applications and production grids
Critical perspectives on large-scale distributed application...
收藏 引用
2009 10th IEEE/ACM International Conference on Grid computing, Grid 2009
作者: Jha, Shantenu Katz, Daniel S. Parashar, Manish Rana, Omer Weissman, Jon Center for Computation and Technology Louisiana State University United States Department of Computer Science Louisiana State University United States e-Science Institute University of Edinburgh United Kingdom Computation Institute University of Chicago United States Department of Electrical and Computer Engineering Louisiana State University United States NSF Center for Autonomic Computing Rutgers University United States Department of Electrical and Computer Engineering Rutgers University United States Department of Computer Science Cardiff University United States Department of Computer Science University of Minnesota United States
It is generally accepted that the ability to develop large-scale distributed applications that are extensible and independent of infrastructure details has lagged seriously behind other developments in cyberinfrastruc...
来源: 评论
Public Infrastructure for Monte Carlo Simulation : publicMC@BATAN
收藏 引用
AIP Conference Proceedings 2010年 第1期1244卷 190-195页
作者: A. A. Waskita N. A. Prasetyo Z. Akbar L. T. Handoko aCenter for Development of Nuclear Informatics3 National Nuclear Energy Agency Kompleks Puspiptek Serpong Tangerang 15310 Indonesia bCenter for Applied Aerospace Technology National Space and Aviation Agency4 Jl. Raya LAPAN‐Rumpin Tromol Pos 7 Serpong Tangerang 15310 Indonesia cFaculty of Computing Science5 University of Indonesia Kampus UI Depok Depok 16424 Indonesia dGroup for Theoretical and Computational Physics Research Center for Physics6 Indonesian Institute of Sciences Kompleks Puspiptek Serpong Tangerang 15310 Indonesia eGroup for Bioinformatics and Information Mining7 Department of Computer and Information Science University of Konstanz Box D188 D‐78457 Konstanz Germany fDepartment of Physics8 University of Indonesia Kampus UI Depok Depok 16424 Indonesia
The first cluster‐based public computing for Monte Carlo simulation in Indonesia is introduced. The system has been developed to enable public to perform Monte Carlo simulation on a parallel computer through an integ...
来源: 评论
Steganalysis of synonym-substitution based natural language watermarking
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2009年 第2期4卷 21-34页
作者: Yu, Zhenshan Huang, Liusheng Chen, Zhili Li, Lingjun Zhao, Xinxin Zhu, Youwen National High Performance Computing Center Hefei Department of Computer Science and Technology USTC Hefei China
Natural language watermarking (NLW) is a kind of digital rights management (DRM) techniques specially designed for natural language documents. Watermarking algorithms based on synonym substitution are the most popular... 详细信息
来源: 评论
Specularity and shadow interpolation via robust polynomial texture maps
Specularity and shadow interpolation via robust polynomial t...
收藏 引用
2009 20th British Machine Vision Conference, BMVC 2009
作者: Drew, Mark S. Hajari, Nasim Hel-Or, Yacov Malzbender, Tom School of Computing Science Simon Fraser University Vancouver BC Canada Department of Computer Science Interdisciplinary Center Herzliya Israel Media and Mobile Systems Lab. Hewlett-Packard Laboratories Palo Alto CA United States
Polynomial Texture Maps (PTM) [SIGGRAPH 2001] form an alternative method for apprehending surface colour and albedo that extends a simple model of image formation from the Lambertian variant of Photometric Stereo (PST... 详细信息
来源: 评论
Linguistic Steganography Detection Algorithm Using Statistical Language Model
Linguistic Steganography Detection Algorithm Using Statistic...
收藏 引用
International Conference on Information Technology and computer science, ITCS
作者: Peng Meng Liusheng Hang Wei Yang Zhili Chen Hu Zheng Department of Computer Science and Technology National High Performance Computing Center Hefei Hefei China Department of Computer Science and Technology National High Performance Computing Center Hefei Xiaoxian Anhui China
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important r... 详细信息
来源: 评论
Applying feature extraction of speech recognition on VoIP auditing
Applying feature extraction of speech recognition on VoIP au...
收藏 引用
作者: Wang, Xuan Lin, Jiancheng Sun, Yong Gan, Haibo Yao, Lin Intelligence Computing Research Center Department of Computer Science Harbin Institute of Technology Shenzhen Graduate School Shenzhen 518055 China School of Electronics and Information Engineering Shenzhen Polytechnic Shenzhen 518055 China
This paper presents an approach that combines both VoIP auditing and speech recognition, and an application of using speech recognition on VoIP voice data is described. It also deals with how to obtain VoIP voice data... 详细信息
来源: 评论
Trouble Dashboard: A distributed failure monitoring system for high-end computing
Trouble Dashboard: A distributed failure monitoring system f...
收藏 引用
2009 IEEE-RIVF International Conference on computing and Communication Technologies: Research, Innovation and Vision for the Future, RIVF 2009
作者: Do, Thanh Nguyen, Thuy Nguyen, Dung T. Nguyen, Hiep C. Shi, Weisong Department of Information Systems Hanoi University of Technology Hanoi Viet Nam High Performance Computing Center Hanoi University of Technology Hanoi Viet Nam Department of Computer Science Wayne State University Detroit United States
Failure management is crucial for high performance computing systems, especially when the complexity of applications and underlying infrastructure has grown sharply in recent years. In this paper, we present the desig... 详细信息
来源: 评论
The Mastermind Attack on Genomic Data
The Mastermind Attack on Genomic Data
收藏 引用
IEEE Symposium on Security and Privacy
作者: Michael T. Goodrich Department of Computer Science Secure Computing and Networking Center University of California Irvine USA
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those protocols are cryptographically guaran... 详细信息
来源: 评论
Towards complete node enumeration in a peer-to-peer botnet  09
Towards complete node enumeration in a peer-to-peer botnet
收藏 引用
4th International Symposium on ACM Symposium on Information, computer and Communications Security, ASIACCS'09
作者: Kang, Brent Byunghoon Chan-Tin, Eric Lee, Christopher P. Tyra, James Kang, Hun Jeong Nunnery, Chris Wadler, Zachariah Sinclair, Greg Hopper, Nicholas Dagon, David Kim, Yongdae College of Computing and Informatics University of North Carolina Charlotte United States Computer Science Department University of Minnesota United States Georgia Tech Information Security Center Georgia Institute of Technology United States
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditional mitigation efforts such as server... 详细信息
来源: 评论