咨询与建议

限定检索结果

文献类型

  • 2,288 篇 会议
  • 1,851 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,505 篇 工学
    • 1,530 篇 计算机科学与技术...
    • 1,246 篇 软件工程
    • 471 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 354 篇 电气工程
    • 295 篇 电子科学与技术(可...
    • 274 篇 光学工程
    • 270 篇 生物工程
    • 238 篇 生物医学工程(可授...
    • 169 篇 机械工程
    • 153 篇 化学工程与技术
    • 128 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 109 篇 材料科学与工程(可...
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
  • 1,525 篇 理学
    • 666 篇 数学
    • 577 篇 物理学
    • 321 篇 生物学
    • 205 篇 统计学(可授理学、...
    • 185 篇 系统科学
    • 177 篇 化学
  • 575 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 177 篇 工商管理
  • 260 篇 医学
    • 222 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 86 篇 公共卫生与预防医...
  • 99 篇 法学
    • 75 篇 社会学
  • 62 篇 经济学
  • 59 篇 教育学
  • 46 篇 农学
  • 20 篇 军事学
  • 16 篇 文学
  • 8 篇 艺术学

主题

  • 136 篇 software enginee...
  • 97 篇 computer science
  • 71 篇 machine learning
  • 63 篇 deep learning
  • 63 篇 neural networks
  • 60 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 51 篇 accuracy
  • 48 篇 computer archite...
  • 48 篇 artificial intel...
  • 45 篇 predictive model...
  • 45 篇 software testing
  • 45 篇 humans
  • 44 篇 costs
  • 42 篇 testing
  • 40 篇 software systems
  • 40 篇 pattern recognit...

机构

  • 86 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 64 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 57 篇 infn sezione di ...
  • 56 篇 warsaw
  • 56 篇 university of ci...

作者

  • 64 篇 beiter a.
  • 64 篇 barter w.
  • 64 篇 brundu d.
  • 64 篇 bellee v.
  • 57 篇 ao d.
  • 56 篇 bobulska d.
  • 56 篇 afsharnia h.
  • 55 篇 aliouche z.
  • 55 篇 blake t.
  • 55 篇 andersson m.
  • 55 篇 borsato m.
  • 55 篇 betancourt c.
  • 55 篇 belin s.
  • 55 篇 carus l.
  • 55 篇 barbetti m.
  • 55 篇 beck a.
  • 55 篇 cali s.
  • 54 篇 casse g.
  • 54 篇 amato s.
  • 54 篇 baryshnikov f.

语言

  • 3,940 篇 英文
  • 168 篇 其他
  • 47 篇 中文
  • 2 篇 日文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4159 条 记 录,以下是411-420 订阅
排序:
Review of Fault Ride Through Support Schemes and a New Strategy for Low-Inertia Power Systems
Review of Fault Ride Through Support Schemes and a New Strat...
收藏 引用
Power Tech Conference
作者: Kyriakos Kyriakou Lenos Hadjidemetriou Christos Panayiotou KIOS Research and Innovation Center of Excellence University of Cyprus Department of Electrical and Computer Engineering University of Cyprus
A massive deployment of renewable energy sources (RESs) is required to enable the decarbonization of the energy infrastructure. The replacement of conventional generators with inverter-based RESs reduces the rotationa...
来源: 评论
A Curious Case of Searching for the Correlation between Training Data and Adversarial Robustness of Transformer Textual Models
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Cuong Le, Dung D. Le, Thai FPT Software AI Center Viet Nam College of Engineering and Computer Science VinUniversity Viet Nam Department of Computer Science Indiana University United States
Existing works have shown that fine-tuned textual transformer models achieve state-of-the-art prediction performances but are also vulnerable to adversarial text perturbations. Traditional adversarial evaluation is of... 详细信息
来源: 评论
A LiDAR-Based Method to Identify Vegetation Encroachment in Power Networks with UAVs
A LiDAR-Based Method to Identify Vegetation Encroachment in ...
收藏 引用
International Conference on Unmanned Aircraft Systems (ICUAS)
作者: Antonis Savva Manos Papageorgiou Christos Kyrkou Panayiotis Kolios Theocharis Theocharides Christos Panayiotou Department of Electrical and Computer Engineering KIOS Research and Innovation Center of Excellence University of Cyprus Nicosia Cyprus
Vegetation encroachment in power transmission and distribution networks constitutes a major hazard for the environment and the networks’ integrity, but also for the society at large, with multifaceted consequences. O...
来源: 评论
UAV-based system for real-time wildfire perimeter propagation tracking
UAV-based system for real-time wildfire perimeter propagatio...
收藏 引用
Mediterranean Conference on Control and Automation (MED)
作者: Constantinos Heracleous Panayiotis Kolios Christos G. Panayiotou Department of Electrical and Computer Engineering KIOS Research and Innovation Center of Excellence University of Cyprus Nicosia Cyprus
Real-time wildfire perimeter tracking provides situational awareness and enhances decision-making during firefighting. This paper proposes a UAV-based system that integrates real-time data collection (using onboard se...
来源: 评论
Machine Learning for Real-Time Anomaly Detection in Optical Networks
arXiv
收藏 引用
arXiv 2023年
作者: Behera, Sadananda Panayiotou, Tania Ellinas, Georgios KIOS Research Innovation Center of Excellence Department of Electrical and Computer Engineering University of Cyprus Nicosia Cyprus
This work proposes a real-time anomaly detection scheme that leverages the multi-step ahead prediction capabilities of encoder-decoder (ED) deep learning models with recurrent units. Specifically, an encoder-decoder i... 详细信息
来源: 评论
Neural Network Visualization in Virtual Reality: A Use Case Analysis and Implementation
Neural Network Visualization in Virtual Reality: A Use Case...
收藏 引用
Thematic area Human Interface and the Management of Information, HIMI 2022 Part of the 24th HCI International Conference, HCII 2022
作者: Queck, Dirk Wohlan, Annika Schreiber, Andreas Department of Electrical and Computer Engineering Serious Games Engineering TU Kaiserslautern Paul-Ehrlich-Straße Kaiserslautern67663 Germany Institute for Software Technology German Aerospace Center Linder Hoehe Cologne51147 Germany
software systems and components increasingly rely on machine learning methods such as Artificial Neural Networks (ANNs) to provide intelligent functionality. Therefore, software developers and machine learning users s... 详细信息
来源: 评论
Integrating Bidirectional Long Short-Term Memory with Subword Embedding for Authorship Attribution
Integrating Bidirectional Long Short-Term Memory with Subwor...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Modupe, Abiodun Celik, Turgay Marivate, Vukosi Olugbara, Oludayo O. University of Pretoria Department of Computer Science South Africa School of Electrical Information Engineering University of the Witwatersrand Johannesburg South Africa Mict Seta Center of Excellence in 4IR Durban University of Technology Durban South Africa
The problem of unveiling the author of a given text document from multiple candidate authors is called authorship attribution. Manifold word-based stylistic markers have been successfully used in deep learning methods...
来源: 评论
Efficient Cartesian Genetic Programming-Based Automatic Synthesis Framework for Reversible Quantum-Flux-Parametron Logic Circuits
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Fu, Rongliang Wille, Robert Yoshikawa, Nobuyuki Ho, Tsung-Yi The Chinese University of Hong Kong Department of Computer Science and Engineering 999077 Hong Kong Technical University of Munich Munich80333 Germany Software Competence Center Hagenberg GmbH Hagenberg4232 Austria Yokohama National University Department of Electrical and Computer Engineering Yokohama240-8501 Japan
Reversible computing has garnered significant attention as a promising avenue for achieving energy-efficient computing systems, particularly within the realm of quantum computing. The reversible quantum-flux-parametro... 详细信息
来源: 评论
An Efficient Steganographic Approach for Securing Text Transmission Using S-Box in Cloud  2
An Efficient Steganographic Approach for Securing Text Trans...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ashraf, Humaira Malik, Javeria Ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Taylor's University Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
In era of modern world and technology where everything is digitalized. Cloud computing emerged as one of the fastest growing parts of digital industry. With the Succor of cloud computing models, business accomplishes ... 详细信息
来源: 评论
Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility  11
Fuzzy Logic-based Steganographic Scheme for high Payload Cap...
收藏 引用
11th International Symposium on Digital Forensics and Security, ISDFS 2023
作者: Theophile, Ingororano De La Croix, Ntivuguruzwa Jean Ahmad, Tohari Yeungnam University Department of Computer Engineering Gyeongsan Korea Republic of Adventist University of Central Africa Department of Information Management Kigali Rwanda Institut Teknologi Sepuluh Nopember Department of Informatics Surabaya Indonesia University of Rwanda African Center of Excellence in Internet of Things Kigali Rwanda
When communicating confidential information between two parties, it is crucial to consider the security of the information. Cryptography, as well as steganography, are essentially used to keep hidden, secret data. Cry... 详细信息
来源: 评论