咨询与建议

限定检索结果

文献类型

  • 3,187 篇 会议
  • 3,114 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,953 篇 工学
    • 2,784 篇 计算机科学与技术...
    • 2,184 篇 软件工程
    • 771 篇 信息与通信工程
    • 526 篇 光学工程
    • 495 篇 生物工程
    • 436 篇 控制科学与工程
    • 432 篇 生物医学工程(可授...
    • 420 篇 电气工程
    • 396 篇 电子科学与技术(可...
    • 196 篇 机械工程
    • 168 篇 化学工程与技术
    • 157 篇 仪器科学与技术
    • 133 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,529 篇 理学
    • 1,198 篇 数学
    • 1,070 篇 物理学
    • 573 篇 生物学
    • 369 篇 统计学(可授理学、...
    • 279 篇 化学
    • 211 篇 系统科学
  • 928 篇 管理学
    • 513 篇 管理科学与工程(可...
    • 425 篇 图书情报与档案管...
    • 267 篇 工商管理
  • 463 篇 医学
    • 401 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 142 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 95 篇 经济学
  • 91 篇 农学
  • 68 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 134 篇 computational mo...
  • 126 篇 machine learning
  • 115 篇 deep learning
  • 88 篇 visualization
  • 87 篇 application soft...
  • 78 篇 semantics
  • 77 篇 artificial intel...
  • 76 篇 feature extracti...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 71 篇 accuracy
  • 70 篇 computer archite...
  • 69 篇 training
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 56 篇 image segmentati...
  • 56 篇 algorithm design...
  • 54 篇 predictive model...

机构

  • 55 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 6,038 篇 英文
  • 311 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Computer Science Department"
6385 条 记 录,以下是71-80 订阅
排序:
Prior Lessons of Incremental Dialogue and Robot Action Management for the Age of Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Kennington, Casey Lison, Pierre Schlangen, David DEPARTMENT OF COMPUTER SCIENCE BOISE STATE UNIVERSITY United States NORWEGIAN COMPUTING CENTER Norway COMPUTATIONAL LINGUISTICS UNIVERSITY OF POTSDAM Germany
Efforts towards endowing robots with the ability to speak have benefited from recent advancements in natural language processing, in particular large language models. However, current language models are not fully inc... 详细信息
来源: 评论
End-to-end Optimized Lossy Compression for Neural-morphic Spiking Camera Captured Data
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Feng, Kexiang Jia, Chuanmin Pan, Jingshan Ma, Siwei Gao, Wen Chinese Academy of Sciences Institute of Computing Technology Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Peking University National Engineering Research Center of Visual Technology Beijing100871 China Peking University Wangxuan Institute of Computer Technology Beijing100080 China Shandong Computer Science Center National Supercomputer in Jinan Jinan250014 China Peking University National Engineering Research Center of Visual Technology School of Computer Science Beijing100871 China Peng Cheng Laboratory Shenzhen518055 China
Recently, the bio-inspired spike camera with continuous motion recording capability has attracted tremendous attention due to its ultra high temporal resolution imaging characteristic. Such imaging feature results in ... 详细信息
来源: 评论
AutoQ 2.0: From Verification of Quantum Circuits to Verification of Quantum Programs  31th
AutoQ 2.0: From Verification of Quantum Circuits to Verific...
收藏 引用
31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2025, which was held as part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025
作者: Chen, Yu-Fang Chung, Kai-Min Hsieh, Min-Hsiu Huang, Wei-Jia Lengál, Ondřej Lin, Jyun-Ao Tsai, Wei-Lun Institute of Information Science Academia Sinica Taipei Taiwan Hon Hai Quantum Computing Research Center Taipei Taiwan Faculty of Information Technology Brno University of Technology Brno Czech Republic Innovation Frontier Institute of Research for Science and Technology & Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
We present a verifier of quantum programs called AutoQ 2.0. Quantum programs extend quantum circuits (the domain of AutoQ 1.0) by classical control flow constructs, which enable users to describe advanc... 详细信息
来源: 评论
Testing GPU Numerics: Finding Numerical Differences Between NVIDIA and AMD GPUs  24
Testing GPU Numerics: Finding Numerical Differences Between ...
收藏 引用
Proceedings of the SC '24 Workshops of the International Conference on High Performance computing, Network, Storage, and Analysis
作者: Anwar Hossain Zahid Ignacio Laguna Wei Le Department of Computer Science Iowa State University Ames IA Center for Applied Scientific Computing Lawrence Livermore National Laboratory Livermore CA
As scientific codes are ported between GPU platforms, continuous testing is required to ensure numerical robustness and identify potential numerical differences between platforms. Compiler-induced numerical difference... 详细信息
来源: 评论
The Minimal Search Space for Conditional Causal Bandits
arXiv
收藏 引用
arXiv 2025年
作者: Simoes, Francisco N.F.Q. Feigenbaum, Itai Dastani, Mehdi van Omen, Thijs Department of Information and Computing Sciences Utrecht University Netherlands Department of Computer Science Lehman College Graduate Center City University of New York United States
Causal knowledge can be used to support decision-making problems. This has been recognized in the causal bandits literature, where a causal (multi-armed) bandit is characterized by a causal graphical model and a targe... 详细信息
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining  23
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 281-308页
作者: Mathew Nicho Oluwasegun Adelaiye Christopher D.McDermott Shini Girija Research and Innovation Center Rabdan AcademyAbudhabiP.O.Box 114646United Arab Emirates UQ Cyber Research Centre The University of QueenslandBrisbaneQLD 4027Australia Department of Computer Science Bingham UniversityAbuja961105Nigeria School of Computing Robert Gordon UniversityAberdeenAB107QBUK College of Technological Innovation Zayed UniversityDubaiP.O.Box 144534United Arab Emirates
The successful penetration of government,corporate,and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming *** Persistent Threat(APT)attacks continue to pose signific... 详细信息
来源: 评论
Accurately Estimating Unreported Infections using Information Theory
arXiv
收藏 引用
arXiv 2025年
作者: Cui, Jiaming Adhikari, Bijaya Haddadan, Arash Ul Haque, A.S.M. Ahsan Vreeken, Jilles Vullikanti, Anil Prakash, B. Aditya College of Computing Georgia Institute of Technology United States Department of Computer Science University of Virginia United States Department of Computer Science Virginia Tech United States Department of Computer Science The University of Iowa United States Amazon United States CISPA Helmholtz Center for Information Security Germany
One of the most significant challenges in combating against the spread of infectious diseases was the difficulty in estimating the true magnitude of infections. Unreported infections could drive up disease spread, mak...
来源: 评论
APP: Enabling Soft Real-Time Execution on Densely-Populated Hybrid Memory System  23
APP: Enabling Soft Real-Time Execution on Densely-Populated ...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Zheng-Wei Wu Yun-Chih Chen Yuan-Hao Chang Tei-Wei Kuo Department of Computer Science and Information Engineering National Taiwan University Institute of Information Science Academia Sinica Taiwan Department of Computer Science and Information Engineering National Taiwan University and Mohamed bin Zayed University of Artificial Intelligence Department of Computer Science and NTU High Performance and Scientific Computing Center National Taiwan University
Memory swapping was considered slow and evil, but swapping to Ultra Low-Latency storage like Optane has become a promising solution to save power and cost, helping densely-populated edge server to overcome its DRAM ca...
来源: 评论
The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields
arXiv
收藏 引用
arXiv 2025年
作者: Luo, Ziyuan Rocha, Anderson Shi, Boxin Guo, Qing Li, Haoliang Wan, Renjie Department of Computer Science Hong Kong Baptist University Hong Kong Institute of Computing University of Campinas Brazil State Key Laboratory of Multimedia Information Processing and National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing100871 China A*STAR Singapore Department of Electrical Engineering City University of Hong Kong Hong Kong
Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation of NeRF-based creations, the need for copyright protection has emerged as a critical... 详细信息
来源: 评论