咨询与建议

限定检索结果

文献类型

  • 3,233 篇 会议
  • 3,158 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 2,831 篇 计算机科学与技术...
    • 2,201 篇 软件工程
    • 788 篇 信息与通信工程
    • 532 篇 光学工程
    • 503 篇 生物工程
    • 460 篇 控制科学与工程
    • 441 篇 生物医学工程(可授...
    • 435 篇 电气工程
    • 403 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 169 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 134 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,555 篇 理学
    • 1,205 篇 数学
    • 1,083 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 287 篇 化学
    • 211 篇 系统科学
  • 946 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 472 篇 医学
    • 407 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 94 篇 经济学
  • 91 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 131 篇 machine learning
  • 120 篇 deep learning
  • 90 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 72 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 59 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,966 篇 英文
  • 473 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Department of Computer Science"
6475 条 记 录,以下是281-290 订阅
排序:
A flexible capacitive photoreceptor for the biomimetic retina
收藏 引用
Light(science & Applications) 2022年 第1期11卷 38-49页
作者: Mani Teja Vijjapu Mohammed E.Fouda Agamyrat Agambayev Chun Hong Kang Chun-Ho Lin Boon S.Ooi Jr-Hau He Ahmed M.Eltawil Khaled N.Salama Sensors lab Advanced Membranes and Porous Materials CenterComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Communication and Computing Systems Lab ComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Electrical Engineering and Computer Science University of California-IrvineIrvineCA 92612USA Department of Electrical Computer and Energy EngineeringArizona State UniversityTempeAZUSA Computer Electrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Materials Science and Engineering City University of Hong KongHong Kong SARChina
Neuromorphic vision sensors have been extremely beneficial in developing energy-efficient intelligent systems for robotics and privacy-preserving security *** is a dire need for devices to mimic the retina's photo... 详细信息
来源: 评论
Evaluation of text legibility in alternative imaging approaches to microfiche digitization
Evaluation of text legibility in alternative imaging approac...
收藏 引用
Archiving 2021
作者: Deborah, Hilda Mandai, Dipendra J. Norwegian Colour and Visual Computing Laboratory Department of Computer Science NTNU Norwegian University of Science and Technology Gjovik Norway
Microfiche was a common format used in microforms reproductions of documents, extensively used for archival storage before the move to digital formats. While contemporary documents are still available for digitization... 详细信息
来源: 评论
DreamMesh: Jointly Manipulating and Texturing Triangle Meshes for Text-to-3D Generation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haibo Chen, Yang Pan, Yingwei Yao, Ting Chen, Zhineng Wu, Zuxuan Jiang, Yu-Gang Mei, Tao School of Computer Science Fudan University China Shanghai Collaborative Innovation Center of Intelligent Visual Computing China HiDream.ai Inc. China
Learning radiance fields (NeRF) with powerful 2D diffusion models has garnered popularity for text-to-3D generation. Nevertheless, the implicit 3D representations of NeRF lack explicit modeling of meshes and textures ... 详细信息
来源: 评论
MAD-ANET:Malware Detection Using Attention-Based Deep Neural Networks
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 1009-1027页
作者: Waleed Khalid Al-Ghanem Emad Ul Haq Qazi Tanveer Zia Muhammad Hamza Faheem Muhammad Imran Iftikhar Ahmad Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia Centre of Artificial Intelligence Naif Arab University for Security SciencesRiyadh14812Saudi Arabia School of Arts and Sciences The University of Notre DameSydneyNSW 2007Australia Center for Smart Analytics Institute of InnovationScience and SustainabilityFederation University AustraliaBerwickVIC 3806Australia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
In the current digital era,new technologies are becoming an essential part of our ***,the number ofmalicious software ormalware attacks is rapidly *** is no doubt,themajority ofmalware attacks can be detected by most ... 详细信息
来源: 评论
Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4895-4916页
作者: Brij Bhooshan Gupta Akshat Gaurav Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Kwok Tai Chui Department of Computer Science and Information Engineering Asia UniversityTaichung413Taiwan Symbiosis Centre for Information Technology(SCIT) Symbiosis International UniversityPuneMaharashtra411057India Center for Interdisciplinary Research University of Petroleum and Energy Studies(UPES)Dehradun248007India Ronin Institute MontclairNJ 07043USA Management Department College of Business AdministrationPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Business Administration Asia UniversityTaichung413Taiwan Department of Electrical and Computer Engineering Lebanese American UniversityBeirut1102Lebanon Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Electronic Engineering and Computer Science Hong Kong Metropolitan University(HKMU)HomantinHong KongChina
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection *** machine learning approaches to phishing detection have relied... 详细信息
来源: 评论
Testing the Unknown: A Framework for OpenMP Testing via Random Program Generation  24
Testing the Unknown: A Framework for OpenMP Testing via Rand...
收藏 引用
Proceedings of the SC '24 Workshops of the International Conference on High Performance computing, Network, Storage, and Analysis
作者: Ignacio Laguna Patrick Chapman Konstantinos Parasyris Giorgis Georgakoudis Cindy Rubio-González Center for Applied Scientific Computing Lawrence Livermore National Laboratory Department of Computer Science University of California Davis
We present a randomized differential testing approach to test OpenMP implementations. In contrast to previous work that manually creates dozens of verification and validation tests, our approach is able to randomly ge... 详细信息
来源: 评论
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论
DuMo: Dual Encoder Modulation Network for Precise Concept Erasure
arXiv
收藏 引用
arXiv 2025年
作者: Han, Feng Chen, Kai Gong, Chao Wei, Zhipeng Chen, Jingjing Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China
The exceptional generative capability of text-to-image models has raised substantial safety concerns regarding the generation of Not-Safe-For-Work (NSFW) content and potential copyright infringement. To address these ... 详细信息
来源: 评论
Convolutional Neural Network Based Intelligent Handwritten Document Recognition
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4563-4581页
作者: Sagheer Abbas Yousef Alhwaiti Areej Fatima Muhammad A.Khan Muhammad Adnan Khan Taher M.Ghazal Asma Kanwal Munir Ahmad Nouh Sabri Elmitwally School of Computer Science National College of Business administration and EconomicsLahore54000Pakistan College of Computer and Information Sciences Jouf UniversitySakaka72341Saudi Arabia Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13557Korea Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Bangi 43600SelangorMalaysia School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE Department of Computer Science GC UniversityLahorePakistan Department of Computer Science Faculty of Computers and Artificial IntelligenceCairo University12613Egypt
This paper presents a handwritten document recognition system based on the convolutional neural network *** today’s world,handwritten document recognition is rapidly attaining the attention of researchers due to its ... 详细信息
来源: 评论
Federated Learning for Enhanced Intrusion Detection in Smart City Environments
Federated Learning for Enhanced Intrusion Detection in Smart...
收藏 引用
International Conference on Open Source Systems and Technologies (ICOSST)
作者: Soomaiya Hamid Narmeen Zakaria Bawany Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women Karachi Pakistan
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS... 详细信息
来源: 评论