咨询与建议

限定检索结果

文献类型

  • 13,112 篇 会议
  • 7,020 篇 期刊文献
  • 349 册 图书

馆藏范围

  • 20,481 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,705 篇 工学
    • 8,187 篇 计算机科学与技术...
    • 6,689 篇 软件工程
    • 2,771 篇 信息与通信工程
    • 1,708 篇 控制科学与工程
    • 1,542 篇 生物工程
    • 1,487 篇 生物医学工程(可授...
    • 1,273 篇 电气工程
    • 1,142 篇 电子科学与技术(可...
    • 981 篇 光学工程
    • 777 篇 机械工程
    • 649 篇 仪器科学与技术
    • 522 篇 化学工程与技术
    • 476 篇 动力工程及工程热...
    • 410 篇 安全科学与工程
    • 378 篇 交通运输工程
    • 357 篇 建筑学
  • 7,135 篇 理学
    • 3,429 篇 数学
    • 2,375 篇 物理学
    • 1,760 篇 生物学
    • 1,121 篇 统计学(可授理学、...
    • 793 篇 系统科学
    • 584 篇 化学
  • 3,190 篇 管理学
    • 1,836 篇 管理科学与工程(可...
    • 1,527 篇 图书情报与档案管...
    • 983 篇 工商管理
  • 1,426 篇 医学
    • 1,223 篇 临床医学
    • 1,109 篇 基础医学(可授医学...
    • 718 篇 药学(可授医学、理...
    • 512 篇 公共卫生与预防医...
  • 539 篇 法学
    • 449 篇 社会学
  • 319 篇 经济学
  • 288 篇 教育学
  • 265 篇 农学
  • 61 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 295 篇 computational mo...
  • 285 篇 deep learning
  • 277 篇 computer archite...
  • 253 篇 computer science
  • 233 篇 machine learning
  • 213 篇 data mining
  • 205 篇 image segmentati...
  • 203 篇 training
  • 196 篇 internet of thin...
  • 194 篇 feature extracti...
  • 187 篇 accuracy
  • 186 篇 artificial intel...
  • 185 篇 support vector m...
  • 185 篇 optimization
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 149 篇 bandwidth
  • 148 篇 monitoring
  • 135 篇 application soft...

机构

  • 416 篇 department for p...
  • 410 篇 faculty of scien...
  • 404 篇 department of ph...
  • 391 篇 kirchhoff-instit...
  • 386 篇 department of ph...
  • 385 篇 department of ph...
  • 349 篇 fakultät für phy...
  • 325 篇 institute of phy...
  • 307 篇 institute of phy...
  • 306 篇 department of ph...
  • 281 篇 department of ph...
  • 274 篇 instituto de fís...
  • 273 篇 universidade fed...
  • 272 篇 department of ph...
  • 267 篇 graduate school ...
  • 267 篇 ictp trieste
  • 253 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 250 篇 nikhef national ...
  • 248 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 305 篇 s. guindon
  • 301 篇 y. tayalati
  • 291 篇 a. kaczmarska
  • 284 篇 m. klein
  • 269 篇 j. schaarschmidt
  • 261 篇 f. pastore
  • 253 篇 n. orlando

语言

  • 17,672 篇 英文
  • 2,664 篇 其他
  • 148 篇 中文
  • 18 篇 日文
  • 9 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Computer Engineering and Informatics"
20481 条 记 录,以下是1581-1590 订阅
排序:
Social engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Compression through extraction of learned parameters from images in de-correlated image space
收藏 引用
Iran Journal of computer Science 2024年 第2期7卷 259-277页
作者: Hasnat, Abul Halder, Santanu Bhattacharjee, Debotosh Government College of Engineering and Textile Technology West Bengal Berhampore India Government College of Engineering and Leather Technology West Bengal Kolkata India Computer Science and Engineering Jadavpur University Kolkata 700032 India Center for Basic and Applied Science Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove 500 03 Czech Republic
Image compression is a class of algorithms that reduces the storage space requirement for a digital image. Lossy image compression techniques achieve higher compression but the visual quality of the decompressed image... 详细信息
来源: 评论
Perceptual Crack Detection for Rendered 3D Textured Meshes
arXiv
收藏 引用
arXiv 2024年
作者: Sarvestani, Armin Shafiee Zhou, Wei Wang, Zhou Dept. of Electrical & Computer Engineering University of Waterloo Canada School of Computer Science and Informatics Cardiff University United Kingdom
Recent years have witnessed many advancements in the applications of 3D textured meshes. As the demand continues to rise, evaluating the perceptual quality of this new type of media content becomes crucial for quality... 详细信息
来源: 评论
Evaluation Metrics for Automated Typographic Poster Generation
arXiv
收藏 引用
arXiv 2024年
作者: Rebelo, Sérgio M. Merelo, J.J. Bicker, João Machado, Penousal University of Coimbra CISUC/LASI – Centre for Informatics and Systems the University of Coimbra Department of Informatics Engineering Portugal Department of Computer Engineering Automatics and Robotics and CITIC University of Granada Spain
Computational Design approaches facilitate the generation of typographic design, but evaluating these designs remains a challenging task. In this paper, we propose a set of heuristic metrics for typographic design eva... 详细信息
来源: 评论
Latent Communication in Artificial Neural Networks
arXiv
收藏 引用
arXiv 2024年
作者: Moschella, Luca GLADIA research lab Department of Computer Science Faculty of Information Engineering Informatics and Statistics Italy
As NNs (Neural Networks) permeate various scientific and industrial domains, understanding the universality and reusability of their representations becomes crucial. At their core, these networks create intermediate n... 详细信息
来源: 评论
Analyzing the concept of technical debt in the context of agile software development: A systematic literature review
arXiv
收藏 引用
arXiv 2024年
作者: Behutiye, Woubshet Nema Rodriguez, Pilar Oivo, Markku Tosun, Ayşe University of Oulu Oulu Finland Faculty of Computer Engineering and Informatics Istanbul Technical University Turkey
Context: Technical debt (TD) is a metaphor that is used to communicate the consequences of poor software development practices to non-technical stakeholders. In recent years, it has gained significant attention in agi... 详细信息
来源: 评论
A Review of Zero Trust Security Framework (ZTF) for Sustainable and Resilient Smart Cities  23
A Review of Zero Trust Security Framework (ZTF) for Sustaina...
收藏 引用
Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and informatics
作者: Loukas Xagoraris Dimitrios Kogias Panagiotis Karkazis University of West Attica Greece Department of Informatics and Computer Engineering University of West Attica Greece
In recent years, cities as they adopt smart technology in an ever-evolving technological environment, face new complex threats and security challenges. Threats that affect the privacy of citizens but often impact crit... 详细信息
来源: 评论
Classification of Arrhythmias 12-Lead ECG Signals Based on 1 Dimensional Convolutional Neural Networks
Classification of Arrhythmias 12-Lead ECG Signals Based on 1...
收藏 引用
Smart Computing, IoT and Machine Learning (SIML), International Conference on
作者: Arief Kurniawan Bayu Aditya Triwibowo Dion Hayu Fandiantoro Department of Computer Engineering Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., so... 详细信息
来源: 评论
Multiclass Imbalance Resampling Techniques for Network Intrusion Detection
Multiclass Imbalance Resampling Techniques for Network Intru...
收藏 引用
International Conference on Smart Computing & Communications (ICSCC)
作者: Zawiyah Saharuna Tohari Ahmad Department of Informatics Institut Teknologi Sepuluh November Surabaya Indonesia Department of Informatics & Computer Engineering Politeknik Negeri Ujung Pandang Makassar Indonesia
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlookin... 详细信息
来源: 评论
A Communication-Aware and Energy-Efficient Genetic Programming Based Method for Dynamic Resource Allocation in Clouds  28th
A Communication-Aware and Energy-Efficient Genetic Programm...
收藏 引用
28th European Conference on Applications of Evolutionary Computation, EvoApplications 2025, held as part of EvoStar 2025
作者: Fang, Zhengxin Ma, Hui Chen, Gang Hartmann, Sven Chen, Shiping Centre for Data Science and Artificial Intelligence and School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Department of Informatics Clausthal University of Technology Clausthal-Zellerfeld Germany CSIRO Data61 Sydney Australia
Loosely coupled microservices have emerged as a new paradigm for efficiently deploying applications in clouds. However, dynamic resource allocation in clouds introduces significant challenges to microservice applicati... 详细信息
来源: 评论