咨询与建议

限定检索结果

文献类型

  • 1,891 篇 期刊文献
  • 1,862 篇 会议
  • 82 册 图书

馆藏范围

  • 3,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,111 篇 工学
    • 1,319 篇 计算机科学与技术...
    • 1,066 篇 软件工程
    • 473 篇 信息与通信工程
    • 296 篇 生物医学工程(可授...
    • 263 篇 控制科学与工程
    • 261 篇 生物工程
    • 234 篇 电气工程
    • 229 篇 光学工程
    • 216 篇 电子科学与技术(可...
    • 177 篇 核科学与技术
    • 137 篇 仪器科学与技术
    • 124 篇 机械工程
    • 97 篇 化学工程与技术
    • 89 篇 动力工程及工程热...
    • 82 篇 材料科学与工程(可...
    • 75 篇 安全科学与工程
  • 1,649 篇 理学
    • 868 篇 物理学
    • 485 篇 数学
    • 354 篇 生物学
    • 180 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 111 篇 化学
  • 577 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 373 篇 医学
    • 297 篇 临床医学
    • 265 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 134 篇 公共卫生与预防医...
  • 91 篇 法学
    • 78 篇 社会学
  • 70 篇 教育学
  • 68 篇 经济学
  • 62 篇 农学
  • 12 篇 文学
  • 5 篇 军事学
  • 5 篇 艺术学

主题

  • 115 篇 informatics
  • 96 篇 hadron colliders
  • 93 篇 artificial intel...
  • 85 篇 machine learning
  • 68 篇 deep learning
  • 64 篇 higgs bosons
  • 57 篇 computer network...
  • 50 篇 accuracy
  • 48 篇 training
  • 47 篇 proton-proton in...
  • 41 篇 computational mo...
  • 40 篇 internet of thin...
  • 40 篇 computer archite...
  • 37 篇 quality of servi...
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 costs
  • 35 篇 protocols
  • 35 篇 forecasting
  • 34 篇 semantics

机构

  • 409 篇 department for p...
  • 402 篇 faculty of scien...
  • 396 篇 department of ph...
  • 395 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 381 篇 department of ph...
  • 370 篇 institute of phy...
  • 362 篇 fakultät für phy...
  • 360 篇 institute of phy...
  • 328 篇 instituto de fís...
  • 305 篇 department of ph...
  • 281 篇 department of ph...
  • 278 篇 department of ph...
  • 277 篇 nikhef national ...
  • 276 篇 graduate school ...
  • 275 篇 yerevan physics ...
  • 275 篇 dipartimento di ...
  • 273 篇 universidade fed...
  • 270 篇 department of ph...
  • 264 篇 ictp trieste

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 323 篇 g. spigo
  • 322 篇 f. siegert
  • 315 篇 r. ströhmer
  • 315 篇 m. rijssenbeek
  • 315 篇 s. jin
  • 315 篇 g. gaudio
  • 314 篇 s. mohapatra
  • 306 篇 s. guindon
  • 302 篇 a. kaczmarska
  • 297 篇 y. tayalati
  • 296 篇 j. schaarschmidt
  • 287 篇 a. d. pilkington
  • 281 篇 m. klein
  • 281 篇 l. chevalier

语言

  • 3,603 篇 英文
  • 196 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Informatics Department & Research Academic Computer Technology Institute"
3835 条 记 录,以下是421-430 订阅
排序:
Joint Self-Supervised Image-Volume Representation Learning with Intra-inter Contrastive Clustering  37
Joint Self-Supervised Image-Volume Representation Learning w...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Nguyen, Duy M.H. Nguyen, Hoang Mai, Truong T.N. Cao, Tri Nguyen, Binh T. Ho, Nhat Swoboda, Paul Albarqouni, Shadi Xie, Pengtao Sonntag, Daniel Department of Computer Science University of Stuttgart Germany AISIA Lab. University of Science - VNU HCM Viet Nam Department of Multimedia Engineering Dongguk University Korea Republic of Department of Statistics and Data Sciences University of Texas Austin United States Max Planck Institute for Informatics Germany Helmholtz AI Helmholtz Munich Germany Clinic for Diagnostic and Interventional Radiology University of Bonn Germany Department of Electrical and Computer Engineering University of California San Diego United States Department of Computer Science Oldenburg University Germany German Research Center for Artificial Intelligence Germany
Collecting large-scale medical datasets with fully annotated samples for training of deep networks is prohibitively expensive, especially for 3D volume data. Recent breakthroughs in self-supervised learning (SSL) offe... 详细信息
来源: 评论
Exploring the Security of Blockchain Applications: A Review of Current Solutions and Open Challenges
Exploring the Security of Blockchain Applications: A Review ...
收藏 引用
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
作者: Milind Shah Mayur Chauhan Vaishnavi Solanki Bhargav Bharvad Priyanka Jadav Manav Shah Department of Computer Engineering Sardar Vallabhbhai Patel Institute of Technology (S.V.I.T) Vasad Gujarat India Department of Computer Engineering Gujarat Power Engineering & Research Institute(GPERI) A Constitute College of Gujarat Technological University Mehsana Gujarat India IoT Security e-Infochips Pvt Ltd Ahmedabad Gujarat India Department of Computer Engineering Devang Patel Institute of Advance Technology & Research (DEPSTAR) Faculty of Technology & Engineering (FTE) Charotar University of Science & Technology (CHARUSAT) Changa India
Blockchain technology has gained extensive recognition across a range of industries and is currently considered as one of the most essential technologies in the computing industry. The incorporation of private computi... 详细信息
来源: 评论
Uncertainty-Aware Gait-Based Age Estimation and its Applications
IEEE Transactions on Biometrics, Behavior, and Identity Scie...
收藏 引用
IEEE Transactions on Biometrics, Behavior, and Identity Science 2021年 第4期3卷 479-494页
作者: Xu, Chi Sakata, Atsuya Makihara, Yasushi Takemura, Noriko Muramatsu, Daigo Yagi, Yasushi Lu, Jianfeng Institute of Scientific and Industrial Research Osaka University Ibaraki Japan Department of Computer and Information Science Faculty of Science and Technology Seikei University Musashino Japan School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Gait-based age estimation is a key technique for many applications. It is well known that age estimation uncertainty is highly dependent on age (i.e., small for children and large for adults), and it is important to k... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论
Exploring Music Similarity through Siamese CNNs using Triplet Loss on Music Samples
Exploring Music Similarity through Siamese CNNs using Triple...
收藏 引用
International research Conference on Smart Computing and Systems engineering (SCSE)
作者: Gibran Kasif Ganesha Thondilege School of Computer Science and Engineering University of Westminster London UK Department of Computing Informatics Institute of Technology Colombo Sri Lanka
In the rapidly evolving digital music landscape, identifying similarities between musical pieces is essential to help musicians avoid unintended copyright infringement and maintain the originality of their work. Howev...
来源: 评论
Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论
Opportunistic Routing for Mobile Edge Computing: A Community Detected and Task Priority Aware Approach
SSRN
收藏 引用
SSRN 2024年
作者: Wu, Jia Dai, Tingyi Guan, Peiyuan Chen, Ziru Gou, Fangfang Taherkordi, Amir The Department of Informatics University of Oslo Oslo0316 Norway The Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago United States The School of Computer Science and Technology GuiZhou University Guiyang550025 China The Research Center for Artificial Intelligence Faculty of IT Monash University MelbourneVIC3800 Australia
As the 5G era develops quickly, there has been a significant growth in the amount of network data. Concurrently, traditional routing algorithms are encountering growing challenges. Traditional routing algorithms typic... 详细信息
来源: 评论
A Mobility-Aware Reinforcement Learning Proactive Solution for State Data Migration in Edge Computing
A Mobility-Aware Reinforcement Learning Proactive Solution f...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Elias Dritsas Kostas Ramantas Christos Verikoukis Athena Research and Innovation Center Industrial Systems Institute Patras Greece Iquadrat Barcelona Spain Department of Computer Engineering and Informatics University of Patras Patras Greece
To handle the demands of modern applications for storage, computing, low latency, and bandwidth, various services are offloaded from the cloud to edge servers, bringing them closer to end-users. This shift in computin... 详细信息
来源: 评论
Improving Prediction Quality of Face Image Preference Using Combinatorial Fusion Algorithm  16th
Improving Prediction Quality of Face Image Preference Using...
收藏 引用
16th International Conference on Brain informatics, BI 2023
作者: Zhang, Zihan Schweikert, Christina Shimojo, Shinsuke Hsu, D. Frank Laboratory of Informatics and Data Mining Department of Computer and Information Science Fordham University YorkNY10023 United States Division of Computer Science Mathematics and Science St. John’s University QueensNY11439 United States Division of Biology and Biological Engineering/Computation and Neural Systems California Institute of Technology PasadenaCA91125 United States
When two face images are shown to a subject, the subject’s preference choice is influenced by many factors. Although it is a challenging task, one way to detect a subject’s preference is to analyze the eye movement ... 详细信息
来源: 评论
Auto-Handover Gateway LoRaWAN based on Autonomous Vehicles
Auto-Handover Gateway LoRaWAN based on Autonomous Vehicles
收藏 引用
Information technology International Seminar (ITIS)
作者: Iwan Purnama Rahmadani Pane Adri Gabriel Sooai Firman Edi Ahmad Abdul Chamid Puput Dani Prasetyo Adi Department of Information Technology Faculty of Science and Technology Universitas Labuhanbatu Labuhanbatu Indonesia Department of Computer Engineering Faculty of Computer Science Universitas Katolik Widya Mandira Kupang NTT Indonesia Department of Engineering Management Faculty of Industrial Technology Batam Institute of Technology Batam City Indonesia Department of Informatics Engineering Muria Kudus University Kudus Indonesia Department of Telecommunication National Research and Innovation Agency (BRIN) Bandung Indonesia
This article presents a simulation study on the use of LoRaWAN technology in autonomous vehicles. The research focuses on developing an Auto-Handover Gateway for Autonomous Vehicles, utilizing LoRaWAN parameters such ... 详细信息
来源: 评论