咨询与建议

限定检索结果

文献类型

  • 13,032 篇 会议
  • 6,937 篇 期刊文献
  • 349 册 图书

馆藏范围

  • 20,318 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,623 篇 工学
    • 8,120 篇 计算机科学与技术...
    • 6,665 篇 软件工程
    • 2,721 篇 信息与通信工程
    • 1,667 篇 控制科学与工程
    • 1,537 篇 生物工程
    • 1,488 篇 生物医学工程(可授...
    • 1,251 篇 电气工程
    • 1,136 篇 电子科学与技术(可...
    • 982 篇 光学工程
    • 768 篇 机械工程
    • 628 篇 仪器科学与技术
    • 518 篇 化学工程与技术
    • 472 篇 动力工程及工程热...
    • 404 篇 安全科学与工程
    • 373 篇 交通运输工程
    • 358 篇 建筑学
  • 7,093 篇 理学
    • 3,414 篇 数学
    • 2,358 篇 物理学
    • 1,752 篇 生物学
    • 1,122 篇 统计学(可授理学、...
    • 793 篇 系统科学
    • 558 篇 化学
  • 3,154 篇 管理学
    • 1,809 篇 管理科学与工程(可...
    • 1,497 篇 图书情报与档案管...
    • 980 篇 工商管理
  • 1,415 篇 医学
    • 1,223 篇 临床医学
    • 1,111 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 516 篇 公共卫生与预防医...
  • 537 篇 法学
    • 447 篇 社会学
  • 317 篇 经济学
  • 286 篇 教育学
  • 262 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 275 篇 deep learning
  • 275 篇 computer archite...
  • 254 篇 computer science
  • 226 篇 machine learning
  • 217 篇 data mining
  • 202 篇 image segmentati...
  • 202 篇 training
  • 193 篇 internet of thin...
  • 193 篇 feature extracti...
  • 182 篇 support vector m...
  • 182 篇 optimization
  • 180 篇 accuracy
  • 179 篇 artificial intel...
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 150 篇 bandwidth
  • 149 篇 monitoring
  • 136 篇 resource managem...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 402 篇 department of ph...
  • 385 篇 department of ph...
  • 385 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 319 篇 institute of phy...
  • 305 篇 department of ph...
  • 303 篇 institute of phy...
  • 280 篇 department of ph...
  • 269 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 261 篇 graduate school ...
  • 252 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 330 篇 d. calvet
  • 330 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 302 篇 s. guindon
  • 299 篇 y. tayalati
  • 289 篇 a. kaczmarska
  • 283 篇 m. klein
  • 265 篇 j. schaarschmidt
  • 259 篇 f. pastore
  • 252 篇 n. orlando

语言

  • 19,307 篇 英文
  • 861 篇 其他
  • 138 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Informatics"
20318 条 记 录,以下是1151-1160 订阅
排序:
Comparison of Q&A Classification Using BiLSTM Based on Closed Domain Knowledge
Comparison of Q&A Classification Using BiLSTM Based on Close...
收藏 引用
Electrical Power, Electronics, Communications, Controls and informatics Seminar (EECCIS)
作者: Alifi Lazuardi Gunawan Fitra Abdurrachman Bachtiar Budi Darma Setiawan Informatics Engineering Department Faculty of Computer Science Brawijaya University Malang Indonesia
The Faculty of computer Science, Universitas Brawijaya (Filkom UB) is committed to providing quality services for the users especially internal and external stakeholders, one of which is through the HaloFilkom service... 详细信息
来源: 评论
Anomaly Detection Employing a 5G Core Data Analytics Framework  13
Anomaly Detection Employing a 5G Core Data Analytics Framewo...
收藏 引用
13th IEEE International Conference on Cloud Networking, CloudNet 2024
作者: Oliveira, Junia Maisa Almeida, Jonatan De Britto E Silva, Erik Rodrigues Moreira, Larissa Ferreira Moreira, Rodrigo Silva, Flavio O. MacEdo, Daniel F. Nogueira, Jose Marcos Universidade Federal de Minas Computer Science Department Gerais Brazil University of Bologna Department of Electrical Electronic and Information Engineering Italy Universidade Federal de Minas Electrical Engineering Department Gerais Brazil Brazil Department of Informatics Portugal
The Network Data Analytics Function (NWDAF) within the 5G core is not an inherent feature of open-source 5G cores, making its implementation necessary based on provider demands. However, for those seeking to integrate... 详细信息
来源: 评论
Lightweight YOLOv5-Based Algorithm to Detect Room Nameplates for Autonomous Smart Wheelchair
Lightweight YOLOv5-Based Algorithm to Detect Room Nameplates...
收藏 引用
International Joint Conference on computer Science and Software engineering (JCSSE)
作者: Ainandafiq Muhammad Alqadri Fitri Utaminingrum Departement of Informatics Engineering Faculty of Computer Science Brawijaya University Malang Indonesia
About 10% individuals with visual impairment also use wheelchair, which makes them difficult to ambulate into a room that can only be distinguished by text independently. One thing that could be a solution is to imple... 详细信息
来源: 评论
IoT Service Composition - An Estimation of Distribution Algorithm with Adaptive Bias
IoT Service Composition - An Estimation of Distribution Algo...
收藏 引用
2023 IEEE Congress on Evolutionary Computation, CEC 2023
作者: Sun, Fengyang Ma, Hui Chen, Gang Hartmann, Sven School of Engineering and Computer Science Victoria University of Wellington Wellington6012 New Zealand Clausthal University of Technology Department of Informatics Clausthal-Zellerfeld38678 Germany
Service composition in Internet of Things (SCIoT), as an emerging topic in service computing, aims to select optimal services to complete user requests according to various user requirements such as minimizing energy ... 详细信息
来源: 评论
Modeling heterogeneous behaviors with different strategies in a terrorist attack
收藏 引用
Virtual Reality & Intelligent Hardware 2023年 第4期5卷 351-365页
作者: Le BI Tingting LIU Zhen LIU Jason TEO Yumeng ZHAO Yanjie CHAI Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China College of Science&Technology Ningbo UniversityCixi 315300China Faculty of Computing&Informatics Universiti Malaysia SabahKota Kinabalu 88000Malaysia
Existing simulations of terrorist attacks do not consider individual *** overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist *** constructed an emotional mo... 详细信息
来源: 评论
Data Analytics for Medical Record Data of Covid-19 Patient with Descriptive Predictive Mining  23
Data Analytics for Medical Record Data of Covid-19 Patient w...
收藏 引用
23rd International Electronics Symposium, IES 2021
作者: Hanafiah, Alvintha Maharani Barakbah, Ali Ridho Karlita, Tita Muliawati, Tri Hadiah Department of Informatics and Computer Engineering Surabaya Indonesia
Currently, the number of COVID-19 patients in Indonesia has not shown a significant decline. One of the reasons is the difficulty of analyzing medical record data of COVID-19 patients. The analysis becomes difficult b... 详细信息
来源: 评论
Reconstruct and match: out-of-distribution robustness via topological homogeneity  24
Reconstruct and match: out-of-distribution robustness via to...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Chaoqi Chen Luyao Tang Hui Huang College of Computer Science and Software Engineering Shenzhen University School of Informatics Xiamen University
Since deep learning models are usually deployed in non-stationary environments, it is imperative to improve their robustness to out-of-distribution (OOD) data. A common approach to mitigate distribution shift is to re...
来源: 评论
An enhanced donkey and smuggler optimization algorithm for choosing the precise job applicant
收藏 引用
Iran Journal of computer Science 2023年 第3期6卷 233-243页
作者: Hasan, Nazir M. Rashid, Tarik A. Alsadoon, Abeer Qosaeri, Ahmed S. Abualigah, Laith Yaseen, Zaher Mundher Computer Science and Engineering Department University of Kurdistan Hawler KR Erbil Iraq Charles Sturt University Sydney Australia Faculty of Computer Sciences and Informatics Amman Arab University Amman Jordan Civil and Environmental Engineering Department King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia
Throughout the last few decades, Nature-Inspired Algorithms (NIA) have become very popular in solving real-world problems by getting inspiration from nature. This work suggests the Modified Donkey and Smuggler Optimiz... 详细信息
来源: 评论
Judging Phishing under Uncertainty: How Do Users Handle Inaccurate Automated Advice?  25
Judging Phishing under Uncertainty: How Do Users Handle Inac...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Saka, Tarini Vakali, Kalliopi Jenkins, Adam D G Kokciyan, Nadin Vaniea, Kami School of Informatics University of Edinburgh Edinburgh United Kingdom University of Edinburgh Edinburgh United Kingdom School of Informatics King's College London London United Kingdom Electrical and Computer Engineering University of Waterloo WaterlooON Canada
Providing accurate and actionable advice about phishing emails is challenging. The majority of advice is generic and hard to implement. Phishing emails that pass through filters and land in user inboxes are usually so... 详细信息
来源: 评论
TinyML-based Event Detection: An Edge-Cloud Approach for Smart Agriculture over LoRa WSNs  8
TinyML-based Event Detection: An Edge-Cloud Approach for Sma...
收藏 引用
8th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2023
作者: Karras, Aristeidis Karras, Christos Giannaros, Anastasios Giotopoulos, Konstantinos C. Tsolis, Dimitrios Oikonomou, Konstantinos Sioutas, Spyros University of Patras Computer Engineering and Informatics Department Patras Greece University of Patras Department of Management Science and Technology Patras Greece University of Patras Department of History and Archaeology Patras Greece Ionian University Department of Informatics Corfu Greece
In modern agriculture, the capability to promptly detect and respond to specific events is crucial. This study centres on the transformative potential of TinyML for enhancing event detection in Smart Agriculture, part... 详细信息
来源: 评论