咨询与建议

限定检索结果

文献类型

  • 3,233 篇 会议
  • 3,158 篇 期刊文献
  • 84 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 2,831 篇 计算机科学与技术...
    • 2,201 篇 软件工程
    • 788 篇 信息与通信工程
    • 532 篇 光学工程
    • 503 篇 生物工程
    • 460 篇 控制科学与工程
    • 441 篇 生物医学工程(可授...
    • 435 篇 电气工程
    • 403 篇 电子科学与技术(可...
    • 198 篇 机械工程
    • 169 篇 化学工程与技术
    • 160 篇 仪器科学与技术
    • 134 篇 材料科学与工程(可...
    • 131 篇 动力工程及工程热...
    • 108 篇 力学(可授工学、理...
  • 2,555 篇 理学
    • 1,205 篇 数学
    • 1,083 篇 物理学
    • 578 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 287 篇 化学
    • 211 篇 系统科学
  • 946 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 430 篇 图书情报与档案管...
    • 270 篇 工商管理
  • 472 篇 医学
    • 407 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 150 篇 法学
    • 131 篇 社会学
  • 94 篇 经济学
  • 91 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 276 篇 computer science
  • 135 篇 computational mo...
  • 131 篇 machine learning
  • 120 篇 deep learning
  • 90 篇 visualization
  • 87 篇 application soft...
  • 79 篇 semantics
  • 78 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 hardware
  • 74 篇 high performance...
  • 72 篇 accuracy
  • 72 篇 training
  • 70 篇 computer archite...
  • 67 篇 distributed comp...
  • 65 篇 data mining
  • 62 篇 costs
  • 59 篇 image segmentati...
  • 56 篇 algorithm design...
  • 55 篇 predictive model...

机构

  • 56 篇 center on fronti...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 45 篇 institut univers...
  • 44 篇 national centre ...
  • 43 篇 université de st...
  • 42 篇 tno technical sc...
  • 42 篇 department of co...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 40 篇 dipartimento di ...
  • 40 篇 yerevan physics ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 university of jo...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 43 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.

语言

  • 5,966 篇 英文
  • 473 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center for Visual Computing and Department of Computer Science"
6475 条 记 录,以下是511-520 订阅
排序:
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 976-983页
作者: Ziming Liu Yang Xu Cheng Zhang Haroon Elahi Xiaokang Zhou College of Information Science and Engineering Northeastern UniversityShenyang110819China College of Computer Science and Electronic Engineering Hunan UniversityChangsha410082China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Zhejiang UniversityHangzhou310058China Department of Computing Science Umea UniversityUmea90187Sweden Faculty of Data Science Shiga UniversityHikone522-8522Japan RIKEN Center for Advanced Intelligence Project RIKENTokyo103-0027Japan
Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services w... 详细信息
来源: 评论
Vehicle Collision Prediction from visual Sizes of Objects via Car Dash Camera
Vehicle Collision Prediction from Visual Sizes of Objects vi...
收藏 引用
International Conference on Information Technology (INCIT)
作者: Siwakorn Sairung Pongporn Yasotarin Sasipa Panthuwadeethorn Suphakant Phimoltares Department of Mathematics and Computer Science Advanced Virtual and Intelligent Computing (AVIC) Center Faculty of Science Chulalongkorn University Bangkok Thailand
The purpose of this research is to develop a method for vehicle collision prediction from visual sizes of objects. There are three main stages in the proposed method. The first stage is object detection and classifica...
来源: 评论
The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges
The Rise of Ransomware: A Review of Attacks, Detection Techn...
收藏 引用
2022 International Conference on Business Analytics for Technology and Security, ICBATS 2022
作者: Kamil, Samar Siti Norul, Huda Sheikh Abdullah Firdaus, Ahmad Usman, Opeyemi Lateef Al-Mansour University College Department of Computer Science and Information Systems Baghdad Iraq Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia University Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pahang Darul Pekan Malaysia Tai Solarin University of Education Department of Computer Science Ogun State Nigeria
Cybersecurity is important in the field of information technology. One most recent pressing issue is information security. When we think of cybersecurity, the first thing that comes to mind is cyber-attacks, which are... 详细信息
来源: 评论
A Practical Multi-Protocol Collaborative Quantum Key Distribution Networking Scheme for Consumer Electronics Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Yao, Jia-Meng Li, Qiong Mao, Hao-Kun El-Latif, Ahmed A. Abd Harbin Institute of Technology Department of the School of Computer Science and Technology Harbin150001 China Prince Sultan University Center of Excellence in Quantum and Intelligent Computing Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science Shibin El Kom6132501 Egypt
The development of emerging consumer technologies such as the Internet of Things (IoT), artificial intelligence (AI), and cloud computing brings convenience but also raises critical concerns about securing communicati... 详细信息
来源: 评论
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time Systems  49
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023
作者: Wang, Xueli Zhao, Shangwei Yang, Ming Wu, Xiaoming Wang, Xin Xu, Shuo Hu, Xu Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Jinan China Shanghai Jiao Tong University Department of Automation Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con... 详细信息
来源: 评论
Towards Semantic Web of Things: Reference Architecture and Gap Analysis
Towards Semantic Web of Things: Reference Architecture and G...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Xiang Su Ekaterina Gilman Xiaoli Liu Department of Computer Science Norwegian University of Science and Technology Gjøvik Norway Center for Ubiquitous Computing University of Oulu Oulu Finland Department of Computer Science University of Helsinki Helsinki Finland
Internet of Things (IoT) connects objects and allows data exchange between smart things and the Internet. Web of Things (WoT) further integrates smart things into the Web architecture by leveraging existing standardiz...
来源: 评论
A hybrid blockchain and AI-based approach for attack protection to secure internet of medical things networks
收藏 引用
Alexandria Engineering Journal 2025年 128卷 223-230页
作者: Hadeel Alsolai Fahd N. Al-Wesabi Ali M. Al-Sharafi Asma Alshuhail Abdulbasit A. Darem Bandar M. Alghamdi Fouad Shoie Alallah Abdulrahman Alzahrani Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computing and Information Technology University of Bisha Bisha 67714 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal University Saudi Arabia Center for Scientific Research and Entrepreneurship Northern Border University Arar 73213 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Saudi Arabia Department of Computer Science and Engineering College of Computer Science and Engineering University of Hafr Al Batin Saudi Arabia
The Internet of Medical Things (IoMT) has revolutionized healthcare by enabling real-time monitoring, remote diagnosis, and seamless data exchange among medical devices and providers. However, the interconnected and d... 详细信息
来源: 评论
Frequency-noise-insensitive universal control of Kerr-cat qubits
arXiv
收藏 引用
arXiv 2025年
作者: Seifert, Lennart Maximilian Hann, Connor T. Noh, Kyungjoo Department of Computer Science University of Chicago ChicagoIL60637 United States AWS Center for Quantum Computing PasadenaCA91125 United States
We theoretically study the influence of frequency uncertainties on the operation of a Kerr-cat qubit. As the mean photon number increases, Kerr-cat qubits provide an increasing level of protection against phase errors... 详细信息
来源: 评论
OneBit: towards extremely low-bit large language models  24
OneBit: towards extremely low-bit large language models
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Yuzhuang Xu Xu Han Zonghan Yang Shuo Wang Qingfu Zhu Zhiyuan Liu Weidong Liu Wanxiang Che Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Harbin China Department of Computer Science & Technology Tsinghua University Beijing China
Model quantification uses low bit-width values to represent the weight matrices of existing models to be quantized, which is a promising approach to reduce both storage and computational overheads of deploying highly ...
来源: 评论
Neural Machine Translation for Kashmiri to English and Hindi using Pre-trained Embeddings  20
Neural Machine Translation for Kashmiri to English and Hindi...
收藏 引用
20th OITS International Conference on Information Technology, OCIT 2022
作者: Sheshadri, Shailashree K Gupta, Deepa Costa-Jussa, Marta R. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India Universitat Politecnica de Catalunya - Upc Talp Research Center Barcelona Spain
Neural Machine Translation (NMT) is one of the advanced approaches of Machine Translation (MT) that has recently gained popularity. A significant amount of parallel corpus is required to achieve a sound translation sy... 详细信息
来源: 评论