咨询与建议

限定检索结果

文献类型

  • 34,455 篇 会议
  • 27,323 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 62,143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,656 篇 工学
    • 21,061 篇 计算机科学与技术...
    • 16,338 篇 软件工程
    • 6,843 篇 信息与通信工程
    • 5,743 篇 电气工程
    • 5,741 篇 电子科学与技术(可...
    • 4,987 篇 控制科学与工程
    • 3,721 篇 光学工程
    • 3,438 篇 生物工程
    • 2,815 篇 生物医学工程(可授...
    • 2,506 篇 化学工程与技术
    • 2,475 篇 材料科学与工程(可...
    • 2,398 篇 机械工程
    • 2,098 篇 仪器科学与技术
    • 1,606 篇 动力工程及工程热...
    • 1,199 篇 力学(可授工学、理...
    • 921 篇 土木工程
  • 24,889 篇 理学
    • 10,822 篇 物理学
    • 10,654 篇 数学
    • 4,261 篇 生物学
    • 3,362 篇 统计学(可授理学、...
    • 2,966 篇 化学
    • 2,218 篇 系统科学
    • 1,146 篇 地球物理学
  • 7,395 篇 管理学
    • 4,429 篇 管理科学与工程(可...
    • 3,154 篇 图书情报与档案管...
    • 1,902 篇 工商管理
  • 2,695 篇 医学
    • 2,217 篇 临床医学
    • 1,746 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,088 篇 法学
    • 920 篇 社会学
  • 621 篇 农学
  • 610 篇 经济学
  • 400 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 113 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,110 篇 computational mo...
  • 874 篇 application soft...
  • 703 篇 computer archite...
  • 611 篇 bandwidth
  • 601 篇 feature extracti...
  • 578 篇 artificial intel...
  • 557 篇 testing
  • 548 篇 costs
  • 547 篇 machine learning
  • 544 篇 data mining
  • 532 篇 semantics
  • 524 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 466 篇 deep learning
  • 463 篇 robustness
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 803 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 602 篇 infn sezione di ...
  • 600 篇 department of co...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 523 篇 department of ph...
  • 515 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 510 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 242 篇 beiter a.
  • 232 篇 c. alexa
  • 230 篇 j. m. izen
  • 229 篇 bellee v.
  • 229 篇 blake t.
  • 224 篇 c. amelung
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 222 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 s. chen
  • 218 篇 g. spigo
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,572 篇 英文
  • 2,764 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Graphics Laboratory Department of Computer Science"
62143 条 记 录,以下是481-490 订阅
排序:
Predictive Health: Chronic Kidney Disease Case Study  23
Predictive Health: Chronic Kidney Disease Case Study
收藏 引用
7th International Conference on Information System and Data Mining, ICISDM 2023
作者: Boukenze, Basma Quafafou, Mohammed Department of Computing Computer Science and Systems Laboratory-CNRS Aix-Marseille University France
Kidney failure is a silent chronic disease, without symptoms, and develops into an acute stage quickly. Unfortunately, the majority of patients discover this disease in its advanced stages where hemodialysis or transp... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
USR: Unrolled Super-Resolution with Deep Priors for Structured Illumination Microscopy
USR: Unrolled Super-Resolution with Deep Priors for Structur...
收藏 引用
3D Image Acquisition and Display: Technology, Perception and Applications, 3D, COSI, DH, FLatOptics, IS, pcAOP 2023 - Part of Imaging and Applied Optics Congress 2023
作者: Dajkhosh, S. Parisa Hossain, Mazharul Preza, Chrysanthe Computational Imaging Research Laboratory Electrical and Computer Engineering Department United States Computer Science Department The University of Memphis MemphisTN United States
We introduce a method for enhancing the resolution of Structured Illumination Microscopy images. It uses a deep prior network, unrolled with a model-based analytical process to improve performance, maintain structural... 详细信息
来源: 评论
TinyML on Arduino Nano 33 BLE for Disabled Person  1
收藏 引用
International Conference on Advanced Intelligent Systems for Sustainable Development, AI2SD 2023
作者: Bouh, Youssef Baslam, Mohamed Ouhda, Mohamed TIAD Laboratory Computer Science Department Faculty of Sciences and Technics Sultan Moulay Slimane University Beni Mellal Morocco TIAD Laboratory Department of Computer and Mathematics Higher School of Technology Sultan Moulay Slimane University Khenifra Morocco
In recent years, the embedded machine learning topic has become very popular in AI. With the help of different techniques, it is possible to run pre-trained models or training neural networks directly on embedded mach... 详细信息
来源: 评论
A Framework for Scalable Object Storage and Retrieval Considering Privacy Concerns: A Case Study on the Signature Detection  9
A Framework for Scalable Object Storage and Retrieval Consid...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Khomami, Mohammad Mehdi Daliri Saghiri, Ali Mohammad Rezvanian, Alireza Meybodi, Mohammad Reza Computer Engineering Amirkabir University of Technology Soft Computing Laboratory Department Tehran Iran University of Science and Culture Department of Computer Engineering Tehran Iran
Nowadays, we are faced with a huge amount of private data generated in different ecosystems, including the Internet of Things, social networks, peer-to-peer networks, and e-commerce, to mention a few. The performance ... 详细信息
来源: 评论
Data-driven modeling of power system dynamics:Challenges,state of the art,and future work
收藏 引用
iEnergy 2023年 第3期2卷 200-221页
作者: Heqing Huang Yuzhang Lin Yifan Zhou Yue Zhao Peng Zhang Lingling Fan Department of Electrical and Computer Engineering University of Massachusetts LowellLowellMA 01852USA Department of Electrical and Computer Engineering Stony Brook UniversityStony BrookNY 11794USA Interdisciplinary Science Department Brookhaven National LaboratoryUptonNY 11973USA Department of Electrical and Computer Engineering University of South FloridaTampaFL 33620USA
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi... 详细信息
来源: 评论
Enhanced Multi-Target Surveillance and Tracking Algorithm for Collaborative Drones in IoT Environment  1
Enhanced Multi-Target Surveillance and Tracking Algorithm fo...
收藏 引用
1st International Conference on Engineering and Advanced Technology, ICEEAT 2023
作者: Zahia, Mabrek Brahim, Farou Zineddine, Kouahla Hamid, Seridi University 8 Mai 1945 LabStic Laboratory Department of Computer Science Guelma Algeria
In the realm of IoT-enabled surveillance systems, drones play a pivotal role in detecting and tracking suspects within defined areas. However, a significant challenge arises when a single drone identifies multiple sus... 详细信息
来源: 评论
Extending OpenStack Monasca for Predictive Elasticity Control
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 315-339页
作者: Giacomo Lanciano Filippo Galli Tommaso Cucinotta Davide Bacciu Andrea Passarella Scuola Normale Superiore Pisa 56126Italy the Real-Time Systems Laboratory(RETIS) TelecommunicationsComputer Engineeringand Photonics Institute(TeCIP)Scuola Superiore Sant’AnnaPisa 56127Italy Department of Computer Science University of PisaPisa 56127Italy National Research Council Pisa56127Italy
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resou... 详细信息
来源: 评论
A privacy-preserving approach for detecting smishing attacks using federated deep learning
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第1期17卷 547-553页
作者: Remmide, Mohamed Abdelkarim Boumahdi, Fatima Ilhem, Bousmaha Boustia, Narhimene LRDSI Laboratory Department of Computer Science Faculty of Sciences University of Blida 1 Blida Algeria Electronics Department Faculty of Technology University of Blida 1 Blida Algeria
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com... 详细信息
来源: 评论
Kolmogorov-Smirnov based method for detecting black hole attack in vehicular ad-hoc networks
Kolmogorov-Smirnov based method for detecting black hole att...
收藏 引用
2023 International Symposium on Green Technologies and Applications, ISGTA 2023
作者: Cherkaoui, Badreddine Houssaini, Mohammed-Alamine El Kasri, Mohammed Beni-Hssane, Abderrahim Erritali, Mohammed LAROSERI Laboratory Mathematics and Computer Science Department High School of Technology Chouaïb Doukkali University Sidi Bennour Morocco ESEF Chouaib Doukkali University El Jadida Morocco LAROSERI Laboratory Computer Science Department Facultyof Sciences Chouaïb Doukkali University El Jadida Morocco TIAD Laboratory Computer science department Sciences and Technics Faculty University of Sultan Moulay Slimane Béni-Mellal Morocco
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially in decentralized and open architectures, ad-hoc vehicular networks make prot... 详细信息
来源: 评论