咨询与建议

限定检索结果

文献类型

  • 13,033 篇 会议
  • 6,971 篇 期刊文献
  • 349 册 图书

馆藏范围

  • 20,353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,650 篇 工学
    • 8,140 篇 计算机科学与技术...
    • 6,666 篇 软件工程
    • 2,734 篇 信息与通信工程
    • 1,685 篇 控制科学与工程
    • 1,541 篇 生物工程
    • 1,490 篇 生物医学工程(可授...
    • 1,259 篇 电气工程
    • 1,139 篇 电子科学与技术(可...
    • 981 篇 光学工程
    • 769 篇 机械工程
    • 629 篇 仪器科学与技术
    • 520 篇 化学工程与技术
    • 473 篇 动力工程及工程热...
    • 407 篇 安全科学与工程
    • 372 篇 交通运输工程
    • 356 篇 建筑学
  • 7,100 篇 理学
    • 3,409 篇 数学
    • 2,368 篇 物理学
    • 1,754 篇 生物学
    • 1,119 篇 统计学(可授理学、...
    • 793 篇 系统科学
    • 563 篇 化学
  • 3,150 篇 管理学
    • 1,803 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 978 篇 工商管理
  • 1,419 篇 医学
    • 1,223 篇 临床医学
    • 1,109 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 513 篇 公共卫生与预防医...
  • 535 篇 法学
    • 446 篇 社会学
  • 318 篇 经济学
  • 286 篇 教育学
  • 262 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 295 篇 computational mo...
  • 278 篇 deep learning
  • 276 篇 computer archite...
  • 254 篇 computer science
  • 232 篇 machine learning
  • 214 篇 data mining
  • 203 篇 training
  • 202 篇 image segmentati...
  • 195 篇 internet of thin...
  • 191 篇 feature extracti...
  • 182 篇 support vector m...
  • 181 篇 optimization
  • 181 篇 accuracy
  • 177 篇 artificial intel...
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 150 篇 bandwidth
  • 148 篇 monitoring
  • 135 篇 application soft...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 department of ph...
  • 385 篇 department of ph...
  • 385 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 319 篇 institute of phy...
  • 305 篇 department of ph...
  • 303 篇 institute of phy...
  • 280 篇 department of ph...
  • 269 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 260 篇 graduate school ...
  • 252 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 330 篇 d. calvet
  • 330 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 317 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 301 篇 s. guindon
  • 299 篇 y. tayalati
  • 289 篇 a. kaczmarska
  • 283 篇 m. klein
  • 265 篇 j. schaarschmidt
  • 259 篇 f. pastore
  • 252 篇 n. orlando

语言

  • 19,339 篇 英文
  • 864 篇 其他
  • 138 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Informatics"
20353 条 记 录,以下是841-850 订阅
排序:
Real-Time Object Detection with IOT Using a Smart Cart  18
Real-Time Object Detection with IOT Using a Smart Cart
收藏 引用
18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024
作者: Omer, Muhammad Ali, Sardar Jaffar Raza, Syed Muhammad Le, Duc-Tai Choo, Hyunseung College of Computing and Informatics Sungkyunkwan University Suwon Korea Republic of Sungkyunkwan University Dept. of Computer Science and Engineering Suwon Korea Republic of Sungkyunkwan University Dept. of AI System Engineering Suwon Korea Republic of Sungkyunkwan University Dept. of Electrical and Computer Engineering Suwon Korea Republic of
With Industry 4.0's technological advancements, the convenience and affordability of Artificial Intelligence (AI) and IoT have increased. However, customers still face long waiting times in payment queues during t... 详细信息
来源: 评论
Traffic Classification For Botnet Detection Using Deep Learning  3
Traffic Classification For Botnet Detection Using Deep Learn...
收藏 引用
3rd International Conference on Smart Cities, Automation and Intelligent Computing Systems, ICON-SONICS 2023
作者: Hossen, Md. Sagar Ahmad, Tohari Institut Teknologi Sepuluh Nopember Department of Informatics Surabaya Indonesia Daffodil International University Department of Computer Science and Engineering Dhaka Bangladesh
In this modern world, we are naturally dependent on technology, which is constantly evolving. At the same time, our fear of data fraud is increasing every day. The ever-increasing number of attacks on our servers indi... 详细信息
来源: 评论
Improved Bare Bones Particle Swarm Optimization based on Cauchy Distribution and its Application in Spectral Reconstruction  8
Improved Bare Bones Particle Swarm Optimization based on Cau...
收藏 引用
8th International Conference on Computational Intelligence and Applications, ICCIA 2023
作者: Zhang, Xinmeng Cui, Guihua Ruan, Xiukai Chen, Qifan Cui, Di Gao, Xiaohong Yao, Yuan Wenzhou University College of Electrical and Electronic Engineering Wenzhou China Middlesex University London Computer Science and Informatics London United Kingdom
In view of the shortcomings that particle swarm optimization is easy to fall into local optima and difficult to solve complex problems, the combination of Gaussian distribution and Cauchy distribution was used in the ... 详细信息
来源: 评论
Velocity-aided Channel Estimation for Spatially Selective mmWave Massive MIMO Communications  31
Velocity-aided Channel Estimation for Spatially Selective mm...
收藏 引用
31st European Signal Processing Conference, EUSIPCO 2023
作者: Vlachos, Evangelos Mavrokefalidis, Christos Berberidis, Kostas Industrial Systems Institute ATHENA Research Center Patras Greece Dept. of Computer Engineering and Informatics University of Patras Patras Greece
This paper focuses on addressing the challenge of estimating multiple-input multiple-output (MIMO) channels for wireless communication between a ground base-station and a moving vehicle. One recently recognised model ... 详细信息
来源: 评论
Opinions Are Not Always Positive: Debiasing Opinion Summarization With Model-Specific and Model-Agnostic Methods  30
Opinions Are Not Always Positive: Debiasing Opinion Summariz...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Yanyue Lai, Yilong Wang, Zhenglin Li, Pengfei Zhou, Deyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King's College London United Kingdom The Alan Turing Institute United Kingdom
As in the existing opinion summary data set, more than 70% are positive texts, the current opinion summarization approaches are reluctant to generate the negative opinion summary given the input of negative opinions. ... 详细信息
来源: 评论
Moodle-based Learning Management System Design as a Learning Media at SMKN 40 Jakarta  7
Moodle-based Learning Management System Design as a Learning...
收藏 引用
7th International Conference on New Media Studies, CONMEDIA 2023
作者: Setya, Oktaviano Nanda Prima Widodo Nugraheni, Murien State Jakarta University Informatics and Computer Engineering Education Jakarta Indonesia State Jakarta University Information System and Technology Jakarta Indonesia
Indonesia is currently in the final stages of the COVID-19 pandemic, which has changed the world of the online learning. Online learning has many benefits, one of which students can learn anywhere and anytime. SMK Neg... 详细信息
来源: 评论
ZKP Protocols for Usowan,Herugolf,and Five Cells
收藏 引用
Tsinghua Science and Technology 2024年 第6期29卷 1651-1666页
作者: Daiki Miyahara Léo Robert Pascal Lafourcade Takaaki Mizuki Graduate School of Informatics and Engineering The University of Electro-CommunicationsTokyo 1828585Japan MIS Lab University of Picardy Jules VerneAmiens 80000France Laboratory of Computer Science Modelling and Systems OptimisationUniversity of Clermont AuvergneClermont-Ferrand 63178France Cyberscience Center Tohoku UniversitySendai 9808578Japan
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a lin... 详细信息
来源: 评论
To Risk Analyse, or Not to Risk Analyse: That’s the Question  18th
To Risk Analyse, or Not to Risk Analyse: That’s the Ques...
收藏 引用
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024
作者: Bergström, Erik Andersson, Simon Lundgren, Martin School of Engineering Jönköping University Jönköping Sweden Computer Science Electrical and Space Engineering Luleå University of Technology Luleå Sweden School of Informatics University of Skövde Skövde Sweden
Risk analysis is a key activity for organisations that are looking to protect their valuable information assets against threats, such as malicious actors. It is one of the essential parts of risk management and is use... 详细信息
来源: 评论
MMDDI-MGPFF: Multi-Modal Drug Representation Learning with Molecular Graph and Pharmacological Feature Fusion for Drug-Drug Interaction Event Prediction
MMDDI-MGPFF: Multi-Modal Drug Representation Learning with M...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Guishen Guo, Zhitong You, Guilin Xu, Ming Cao, Chen Hu, Xiaowen School of Life Sciences Jilin University Changchun China College of Computer Science and Engineering Changchun University of Technology Changchun China Key Laboratory for Bio-Electromagnetic Environment and Advanced Medical Theranostics School of Biomedical Engineering and Informatics Nanjing Medical University Nanjing China School of Biomedical Engineering and Informatics Nanjing Medical University Nanjing China
Drug-drug interactions pose a significant challenge in healthcare, directly impacting patient safety and treatment efficacy. Although recent advances in computational methods have improved drug-drug interaction (DDI) ... 详细信息
来源: 评论
Risk Assessment of Linkedin Profiles  8
Risk Assessment of Linkedin Profiles
收藏 引用
8th International Conference on computer Science and engineering, UBMK 2023
作者: Aydin, Arzum Bahtiyar, Serif Istanbul Technical University Cyber Security and Privacy Research Lab SPFLab. Faculty of Computer and Informatics Engineering Maslak Istanbul Turkey
Fake or fraudulent accounts are a significant problem in social networking that is often addressed by the users of various social networking platforms involving Linkedin. Fraudulent accounts generally try to convince ... 详细信息
来源: 评论