咨询与建议

限定检索结果

文献类型

  • 3,233 篇 会议
  • 3,158 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 2,831 篇 计算机科学与技术...
    • 2,201 篇 软件工程
    • 788 篇 信息与通信工程
    • 532 篇 光学工程
    • 503 篇 生物工程
    • 460 篇 控制科学与工程
    • 441 篇 生物医学工程(可授...
    • 435 篇 电气工程
    • 403 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 169 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 134 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,555 篇 理学
    • 1,205 篇 数学
    • 1,083 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 287 篇 化学
    • 211 篇 系统科学
  • 946 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 472 篇 医学
    • 407 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 94 篇 经济学
  • 91 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 131 篇 machine learning
  • 120 篇 deep learning
  • 90 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 72 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 59 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,966 篇 英文
  • 473 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Department of Computer Science"
6475 条 记 录,以下是421-430 订阅
排序:
Retrieval Augmented Recipe Generation
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Guoshan Yin, Hailong Zhu, Bin Chen, Jingjing Ngo, Chong-Wah Jiang, Yu-Gang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China Singapore Management University Singapore
The growing interest in generating recipes from food images has drawn substantial research attention in recent years. Existing works for recipe generation primarily utilize a two-stage training method—first predictin... 详细信息
来源: 评论
Investigating fairness in machine learning-based audio sentiment analysis
收藏 引用
AI and Ethics 2024年 第2期5卷 1099-1108页
作者: Luitel, Sophina Liu, Yang Anwar, Mohd Human-Centered AI (HCAI) Lab Department of Computer Science North Carolina Agricultural and Technical State University Greensboro USA Quantum Computing Research Center <QC|RC> Department of Computer Science North Carolina Agricultural and Technical State University Greensboro USA
Audio sentiment analysis is a growing area of research, however little attention has been paid to the fairness of machine learning models in this field. Whilst the current literature covers research on machine learnin...
来源: 评论
SDN control plane security: Attacks and mitigation techniques  2021
SDN control plane security: Attacks and mitigation technique...
收藏 引用
4th International Conference on Networking, Information Systems and Security, NISS 2021
作者: Fatima, Kiran Zahoor, Kanwal Bawany, Narmeen Zakaria Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women
Traditional networks are complex and hard to manage due to many reasons such as manual configuration requirements of dedicated devices, lack of flexibility and a non-dynamic approach. To overcome these limitations and... 详细信息
来源: 评论
The Advanced Encryption Standard with a Dynamic S-Box Using the RC4 Key Schedule  4
The Advanced Encryption Standard with a Dynamic S-Box Using ...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Altigani, Abdelrahman Ghalib, Muhammad Rukunuddin Elshoush, Huwaida T. Elsadig, Muawia A. Alrefai, Nashat Naserelden, Shiraz Higher Colleges of Technology Computer Information Science Al Ain United Arab Emirates School of Engineering & Computing De Monfort University Dubai United Arab Emirates University of Khartoum Faculty of Mathematical Sciences and Informatics Computer Science Department Khartoum Sudan College of Computer Science and Information Technology Imam Abdulrahman bin Faisal University Dammam Saudi Arabia College of Science Imam Abdulrahman Bin Faisal University Basic and Applied Scientific Research Center Imam Abdulrahman Bin Faisal University Department of Mathematics Dammam Saudi Arabia Faculty of Science Universiti Teknologi Malaysia Department of Mathematical Sciences Johor Malaysia
Since the inception of secure communication, safeguarding data confidentiality has been paramount. With the increased reliance on technology, the need for robust security mechanisms is more critical than ever. This pa... 详细信息
来源: 评论
Revenue and User Traffic Maximization in Mobile Short-Video Advertising  21
Revenue and User Traffic Maximization in Mobile Short-Video ...
收藏 引用
21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2022
作者: Ran, Dezhi Zheng, Weiqiang Li, Yunqi Bian, Kaigui Zhang, Jie Deng, Xiaotie School of Computer Science Peking University China Department of Computer Science Yale University United States School of Computer Science National Engineering Laboratory for Big Data Analysis and Applications Peking University China Electronics and Computer Science University of Southampton United Kingdom Center on Frontiers of Computing Studies Peking University China
A new mobile attention economy has emerged with the explosive growth of short-video apps such as TikTok. In this internet market, three types of agents interact with each other: the platform, influencers, and advertis... 详细信息
来源: 评论
An Optimization Method of Primer Design Based on Attention-BiLSTM  2
An Optimization Method of Primer Design Based on Attention-B...
收藏 引用
2nd International Conference on Robotics, Artificial Intelligence and Intelligent Control, RAIIC 2023
作者: Bai, Binhao Long, Jinyu Yang, Zhibo Li, Junli Wei, Ping Sichuan Normal University College of Computer Science Chengdu China Sichuan Normal University Visual Computing and Virtual Reality Key Laboratory of Sichuan Chengdu China Sichuan Center of Translational Medicine Sichuan Key Laboratory of Translational Medicine of Traditional Chinese Medicine Sichuan Academy of Traditional Chinese Medicine Chengdu China
In this paper, we propose a method to predict the success of primer amplification based on the relationship existing between the sequence of primer and template, which can optimize the primer design and select the pri... 详细信息
来源: 评论
Hardware-Accelerated Detection of Unauthorized Mining Activities Using YOLOv11 and FPGA
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 967-979页
作者: Ghodhbani, Refka Saidani, Taoufik Kachoukh, Amani Elsayed, Mahmoud Salaheldin Said, Yahia Ahmed, Rabie Center for Scientific Research and Entrepreneurship Northern Border University Arar73213 Saudi Arabia Department of Information Systems-Faculty of Computing and Information Technology Northern Border University Saudi Arabia Department of Computer Sciences-Faculty of Computing and Information Technology Northern Border University Saudi Arabia DCenter for Scientific Research and Entrepreneurship Northern Border University Arar73213 Saudi Arabia Department of Computer Science-Faculty of Computing and Information Technology Northern Border University Rafha Saudi Arabia Mathematics and Computer Science Department-Faculty of Science Beni-Suef University Beni-Suef Egypt
Illegal mining activities present significant environmental, economic, and safety challenges, particularly in remote and under-monitored regions. Traditional surveillance methods are often inefficient, labor-intensive... 详细信息
来源: 评论
A haptic device-based reproduction system of active finger movement and its evaluation using sensory evoked potentials  15
A haptic device-based reproduction system of active finger m...
收藏 引用
15th Biomedical Engineering International Conference, BMEiCON 2023
作者: Ozawa, Yusuke Yoshimura, Natsue Uehara, Kazumasa Seki, Kazuhiko Tokyo Institute of Technology School of Engineering Yokohama Japan Tokyo Institute of Technology School of Computing Yokohama Japan Toyohashi University of Technology Department of Computer Science and Engineering Toyohashi Japan National Center of Neurology and Psychiatry Department of Neurophysiology Kodaira Japan
To develop an experimental system that could be used for physiological experiments on voluntary finger movements in humans, we developed an experimental system that can realize passive finger movements by reproducing ... 详细信息
来源: 评论
Progress in research on ultrasound radiomics for predicting the prognosis of breast cancer
收藏 引用
Cancer Innovation 2023年 第4期2卷 283-289页
作者: Xuantong Gong Xuefeng Liu Xiaozheng Xie Yong Wang Department of Ultrasound National Cancer Center/National Clinical Research Center for Cancer/Cancer HospitalChinese Academy of Medical Sciences and Peking Union Medical CollegeBijingChina State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBejjing Advanced Innovation Center for Big Data and Brain Computing(BDBC)Beihang UniversityBeijingChina School of Computer and Communication Engi neering.University of Science and Technology Beijing BeijingChina
Breast cancer is the most common malignant tumor and the leading cause of cancer-related deaths in women *** means of predicting the prognosis of breast cancer are very helpful in guiding treatment and improving patie... 详细信息
来源: 评论
HPC Application Parameter Autotuning on Edge Devices: A Bandit Learning Approach
HPC Application Parameter Autotuning on Edge Devices: A Band...
收藏 引用
International Conference on High Performance computing
作者: Abrar Hossain Abdel-Hameed A. Badawy Mohammad A. Islam Tapasya Patki Kishwar Ahmed Department of Electrical Engineering and Computer Science The University of Toledo Department of Electrical and Computer Engineering New Mexico State University Department of Computer Science and Engineering The University of Texas at Arlington Lawrence Livermore National Laboratory Center for Applied Scientific Computing
The growing necessity for enhanced processing capabilities in edge devices with limited resources has led us to develop effective methods for improving high-performance computing (HPC) applications. In this paper, we ... 详细信息
来源: 评论