咨询与建议

限定检索结果

文献类型

  • 9,989 篇 会议
  • 8,690 篇 期刊文献
  • 236 册 图书
  • 3 篇 学位论文

馆藏范围

  • 18,917 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 11,128 篇 工学
    • 5,949 篇 计算机科学与技术...
    • 4,643 篇 软件工程
    • 1,966 篇 信息与通信工程
    • 1,849 篇 电子科学与技术(可...
    • 1,734 篇 电气工程
    • 1,606 篇 控制科学与工程
    • 1,083 篇 生物工程
    • 1,082 篇 光学工程
    • 1,000 篇 化学工程与技术
    • 958 篇 材料科学与工程(可...
    • 853 篇 生物医学工程(可授...
    • 829 篇 机械工程
    • 745 篇 仪器科学与技术
    • 621 篇 动力工程及工程热...
    • 489 篇 力学(可授工学、理...
    • 437 篇 核科学与技术
  • 8,587 篇 理学
    • 4,178 篇 物理学
    • 3,538 篇 数学
    • 1,319 篇 生物学
    • 1,232 篇 统计学(可授理学、...
    • 1,154 篇 化学
    • 753 篇 系统科学
  • 2,250 篇 管理学
    • 1,479 篇 管理科学与工程(可...
    • 829 篇 图书情报与档案管...
    • 746 篇 工商管理
  • 866 篇 医学
    • 726 篇 临床医学
    • 615 篇 基础医学(可授医学...
    • 352 篇 药学(可授医学、理...
    • 339 篇 公共卫生与预防医...
  • 399 篇 法学
    • 335 篇 社会学
  • 313 篇 经济学
  • 230 篇 农学
  • 224 篇 教育学
  • 49 篇 文学
  • 34 篇 军事学
  • 28 篇 艺术学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 411 篇 computer science
  • 361 篇 deep learning
  • 250 篇 machine learning
  • 220 篇 computational mo...
  • 214 篇 optimization
  • 200 篇 accuracy
  • 182 篇 neural networks
  • 149 篇 internet of thin...
  • 147 篇 support vector m...
  • 141 篇 artificial intel...
  • 137 篇 data mining
  • 133 篇 computer archite...
  • 127 篇 image segmentati...
  • 126 篇 educational inst...
  • 125 篇 feature extracti...
  • 113 篇 computational in...
  • 113 篇 predictive model...
  • 107 篇 reliability
  • 102 篇 wireless sensor ...
  • 102 篇 real-time system...

机构

  • 1,103 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 999 篇 physikalisches i...
  • 987 篇 oliver lodge lab...
  • 629 篇 fakultät physik ...
  • 568 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 557 篇 iccub universita...
  • 549 篇 department of ph...
  • 543 篇 school of physic...
  • 532 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 522 篇 stfc rutherford ...
  • 520 篇 university of ch...
  • 516 篇 nikhef national ...
  • 513 篇 infn laboratori ...
  • 511 篇 school of physic...
  • 506 篇 infn sezione di ...
  • 505 篇 physik-institut ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 268 篇 a. gomes
  • 265 篇 beiter a.
  • 255 篇 c. alexa
  • 255 篇 c. amelung
  • 255 篇 bellee v.
  • 253 篇 j. m. izen
  • 253 篇 g. bella
  • 253 篇 j. strandberg
  • 253 篇 d. calvet
  • 253 篇 blake t.
  • 251 篇 g. spigo
  • 249 篇 f. siegert
  • 249 篇 brundu d.
  • 243 篇 bowcock t.j.v.
  • 241 篇 s. chen
  • 239 篇 betancourt c.
  • 235 篇 borsato m.
  • 230 篇 y. tayalati
  • 229 篇 r. ströhmer

语言

  • 16,522 篇 英文
  • 2,251 篇 其他
  • 146 篇 中文
  • 8 篇 德文
  • 6 篇 日文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Applied Science"
18918 条 记 录,以下是4961-4970 订阅
排序:
A Fast Rankability Method Based on Fuzzy Entropy
SSRN
收藏 引用
SSRN 2024年
作者: Kong, Lingping Velasquez, Juan D. Pant, Millie Pan, Jeng-Shyang Snášel, Václav Department of Computer Science VSB-Technical University of Ostrava Listpodu 17 Czech Republic Department of Industrial Engineering University of Chile O’Higgins 1058 Santiago Chile Department of Applied Mathematics and Scientific Computing Indian Institute of Technology Uttarakhand Roorkee247667 India College of Computer Science and Engineering Shandong University of Science and Technology China School of Artificial Intelligence Nanjing University of Information Science and Technology 219 Ningliu Road China Instituto Sistemas Complejos de Ingeniería Santiago Chile Mehta Family School of Data Science and Artificial Intelligence Indian Institute of Technology Uttarakhand Roorkee247667 India
Rankability is a fundamental concept that evaluates a dataset's inherent capacity to establish a meaningful ranking of its elements, with widespread applications in web search, data mining, cybersecurity, and mach... 详细信息
来源: 评论
Generalized Cauchy–Riemann Equations with Power-law Singularities in Coefficients of Lower Order
Generalized Cauchy–Riemann Equations with Power-law Singula...
收藏 引用
International Scientific Conference on Modern Methods, Problems and Applications of Operator Theory and Harmonic Analysis, OTHA 2020
作者: Soldatov, A.P. Rasulov, A.B. Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences Moscow Center for Fundamental and Applied Mathematics Moscow Russia National Research University "Moscow Power Engineering Institute" Moscow Russia
The generalized Cauchy-Riemann equation uz¯+ au+ bū= f is considered with coefficients having power singularities at the origin. More exactly it is assumed that a(z) = O(|z|−α−1), α∈ , and b(z) = O(|z|−1) as... 详细信息
来源: 评论
Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology
Enhancing IoT Intelligence: A Transformer-based Reinforcemen...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Gaith Rjoub Saidul Islam Jamal Bentahar Mohammed Amin Almaiah Rana Alrawashdeh Faculty of Information Technology Aqaba University of Technology Aqaba Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer Science Khalifa University Abu Dhabi UAE King Abdullah II School of Information Technology The University of Jordan Amman Jordan Faculty of Information Technology Applied Science Private University Amman Jordan Department of Information and Computer Science King Fahd University of Petroleum & Minerals Dhahran KSA
The proliferation of the Internet of Things (IoT) has led to an explosion of data generated by interconnected devices, presenting both opportunities and challenges for intelligent decision-making in complex environmen... 详细信息
来源: 评论
ST-GIN: An Uncertainty Quantification Approach in Traffic Data Imputation with Spatio-Temporal Graph Attention and Bidirectional Recurrent United Neural Networks
ST-GIN: An Uncertainty Quantification Approach in Traffic Da...
收藏 引用
International Conference on Intelligent Transportation
作者: Zepu Wang Dingyi Zhuang Yankai Li Jinhua Zhao Peng Sun Shenhao Wang Yulin Hu Department of Computer and Information Science University of Pennsylvania Department of Civil and Environmental Engineering Massachusetts Institute of Technology Department of Natural and Applied Sciences Duke Kunshan University Department of Urban and Regional Planning University of Florida Department of Information and Communication Engineering Wuhan University
Traffic data serves as a fundamental component in both research and applications within intelligent transportation systems. However, real-world transportation data, collected from loop detectors or similar sources, of...
来源: 评论
Leveraging AI Technologies in Libraries through Experimentation-Driven Frameworks
收藏 引用
Internet Reference Services Quarterly 2023年 第4期27卷 211-222页
作者: Varun Gupta Chetna Gupta a Multidisciplinary Research Centre for Innovations in SMEs (MrciS) Gisma University of Applied Sciences Potsdam Germanyb Department of Economics & Business Administration University of Alcala Alcalá de Henares Madrid Spain c Department of Computer Science & Engineering Jaypee Institute of Information Technology Noida India
This column aims to explore the frameworks to help libraries foster digital innovation by leveraging AI technologies through continuous experimentation to innovate their services for their patrons. Additionally, the c... 详细信息
来源: 评论
Integrability and Linearizability of a Family of Three-Dimensional Polynomial Systems
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Bo Mastev, Ivan Romanovski, Valery LMIB School of Mathematical Sciences Beihang University Beijing100191 China Center for Applied Mathematics and Theoretical Physics MariborSI-2000 Slovenia Faculty of Natural Science and Mathematics University of Maribor MariborSI-2000 Slovenia Faculty of Electrical Engineering and Computer Science University of Maribor MariborSI-2000 Slovenia
We investigate the local integrability and linearizability of a family of three-dimensional polynomial systems with the matrix of the linear approximation having the eigenvalues 1, ζ, ζ2, where ζ is a primitive cub... 详细信息
来源: 评论
An equivalent reformulation and multi-proximity gradient algorithms for a class of nonsmooth fractional programming
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Junpeng Zhang, Na Li, Qia School of Computer Sciences and Engineering Sun Yat-Sen University Guangzhou510006 China Department of Applied Mathematics College of Mathematics and Informatics South China Agricultural University Guangzhou510642 China School of Computer Sciences and Engineering Guangdong Province Key Laboratory of Computational Science Sun Yat-Sen University Guangzhou510006 China
In this paper, we consider a class of structured fractional programs, where the numerator part is the sum of a block-separable (possibly nonsmooth nonconvex) function and a locally Lipschitz differentiable (possibly n... 详细信息
来源: 评论
Dynamics of Multi-Strain Malware Epidemics over Duty-Cycled Wireless Sensor Networks  4
Dynamics of Multi-Strain Malware Epidemics over Duty-Cycled ...
收藏 引用
4th International Balkan Conference on Communications and Networking, BalkanCom 2021
作者: Fedorov, Dmitriy Tabarak, Yrys Dadlani, Aresh Kumar, Muthukrishnan Senthil Kizheppatt, Vipin Nazarbayev University Department of Electrical and Computer Engineering Nur-Sultan Kazakhstan PSG College of Technology Department of Applied Mathematics and Computational Sciences Coimbatore India Birla Institute of Technology and Science Pilani Department of Electrical and Electronics Engineering Goa India
Insights on the salient features of malicious software spreading over large-scale wireless sensor networks (WSNs) in low-power Internet of Things (IoT) are not only essential to project, but also mitigate the persiste... 详细信息
来源: 评论
Byzantine-Resilient Decentralized Multi-Armed Bandits
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Jingxuan Koppel, Alec Velasquez, Alvaro Liu, Ji The Department of Applied Mathematics and Statistics Stony Brook University United States J.P. Morgan AI Research United States Department of Computer Science University of Colorado Boulder United States Department of Electrical and Computer Engineering Stony Brook University United States
In decentralized cooperative multi-armed bandits (MAB), each agent observes a distinct stream of rewards, and seeks to exchange information with others to select a sequence of arms so as to minimize its regret. Agents... 详细信息
来源: 评论
Fog Computing Security Assessment for Device Authentication in the Internet of Things  22
Fog Computing Security Assessment for Device Authentication ...
收藏 引用
22nd IEEE International Conference on High Performance Computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on Data science and Systems, HPCC-SmartCity-DSS 2020
作者: Al Harbi, Saud Halabi, Talal Bellaiche, Martine Polytechnique Montreal Department of Computer Engineering Quebec Canada University of Winnipeg Department of Applied Computer Science Manitoba Canada Polytechnique Montreal Department of Computer Engineering Quebec Canada
The Fog is an emergent computing architecture that will support the mobility and geographic distribution of Internet of Things (IoT) nodes and deliver context-Aware applications with low latency to end-users. It forms... 详细信息
来源: 评论