咨询与建议

限定检索结果

文献类型

  • 7,012 篇 会议
  • 5,409 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 12,486 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,012 篇 工学
    • 3,896 篇 计算机科学与技术...
    • 3,146 篇 软件工程
    • 1,301 篇 信息与通信工程
    • 951 篇 电子科学与技术(可...
    • 896 篇 控制科学与工程
    • 874 篇 电气工程
    • 715 篇 生物工程
    • 675 篇 化学工程与技术
    • 594 篇 光学工程
    • 558 篇 生物医学工程(可授...
    • 484 篇 机械工程
    • 472 篇 材料科学与工程(可...
    • 462 篇 仪器科学与技术
    • 300 篇 动力工程及工程热...
    • 216 篇 建筑学
    • 212 篇 土木工程
  • 4,962 篇 理学
    • 2,231 篇 物理学
    • 1,760 篇 数学
    • 995 篇 生物学
    • 706 篇 化学
    • 610 篇 统计学(可授理学、...
    • 323 篇 系统科学
    • 305 篇 地球物理学
  • 1,508 篇 管理学
    • 935 篇 管理科学与工程(可...
    • 623 篇 图书情报与档案管...
    • 433 篇 工商管理
  • 720 篇 医学
    • 539 篇 临床医学
    • 419 篇 基础医学(可授医学...
    • 234 篇 药学(可授医学、理...
  • 250 篇 法学
    • 218 篇 社会学
  • 225 篇 农学
  • 180 篇 教育学
  • 163 篇 经济学
  • 32 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 349 篇 computer science
  • 176 篇 computational mo...
  • 150 篇 feature extracti...
  • 147 篇 educational inst...
  • 146 篇 deep learning
  • 143 篇 data mining
  • 119 篇 machine learning
  • 111 篇 visualization
  • 104 篇 semantics
  • 102 篇 support vector m...
  • 101 篇 accuracy
  • 99 篇 optimization
  • 93 篇 cameras
  • 90 篇 bandwidth
  • 89 篇 wireless sensor ...
  • 87 篇 training
  • 86 篇 electronic mail
  • 85 篇 computer archite...
  • 83 篇 image segmentati...
  • 83 篇 neural networks

机构

  • 411 篇 department for p...
  • 408 篇 faculty of scien...
  • 392 篇 department of ph...
  • 386 篇 department of ph...
  • 380 篇 department of ph...
  • 369 篇 kirchhoff-instit...
  • 331 篇 fakultät für phy...
  • 323 篇 institute of phy...
  • 319 篇 institute of phy...
  • 307 篇 department of ph...
  • 277 篇 department of ph...
  • 274 篇 instituto de fís...
  • 269 篇 universidade fed...
  • 266 篇 department of ph...
  • 263 篇 ictp trieste
  • 253 篇 department of ph...
  • 250 篇 graduate school ...
  • 248 篇 graduate school ...
  • 245 篇 nikhef national ...
  • 245 篇 department of ph...

作者

  • 330 篇 c. alexa
  • 330 篇 g. bella
  • 330 篇 d. calvet
  • 330 篇 c. amelung
  • 329 篇 g. spigo
  • 328 篇 j. m. izen
  • 328 篇 j. strandberg
  • 328 篇 f. siegert
  • 317 篇 r. ströhmer
  • 315 篇 m. rijssenbeek
  • 314 篇 s. jin
  • 312 篇 g. gaudio
  • 312 篇 s. mohapatra
  • 301 篇 y. tayalati
  • 283 篇 m. klein
  • 283 篇 s. guindon
  • 276 篇 a. kaczmarska
  • 261 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 255 篇 n. orlando

语言

  • 11,674 篇 英文
  • 493 篇 其他
  • 190 篇 日文
  • 122 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Computer Science Program Graduate School of Science and Technology"
12486 条 记 录,以下是401-410 订阅
排序:
Effects of the Attunement of an Attack Target by Whispering in AIWolf  14
Effects of the Attunement of an Attack Target by Whispering ...
收藏 引用
14th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2023
作者: Murakami, Tomohiro Nakao, Nozomi Miyake, Hikaru Murata, Hayate Amano, Itsuki Kojima, Taisei Ando, Keisuke Ito, Nobuhiro Aichi Institute of Technology Graduate School of Business Administration and Computer Science Toyota Japan Aichi Institute of Technology Department of Information Science Toyota Japan Aichi Institute of Technology Faculty of Information Science Toyota Japan
Recently, research on AIWolf, which is artificial intelligence that plays the Werewolf game, has attracted much attention. Werewolves in the Werewolf game should cooperate using 'whispers;' which are conversat... 详细信息
来源: 评论
Towards Robust Temporal Activity Localization Learning with Noisy Labels  30
Towards Robust Temporal Activity Localization Learning with ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Liu, Daizong Qu, Xiaoye Fang, Xiang Dong, Jianfeng Zhou, Pan Nan, Guoshun Tang, Keke Fang, Wanlong Cheng, Yu Wangxuan Institute of Computer Technology Peking University China School of Cyber Science and Engineering Huazhong University of Science of Technology China Interdisciplinary Graduate Programme Nanyang Technological University Singapore College of Computer Science and Technology Zhejiang Gongshang University China School of Cyberspace Security Beijing University of Posts and Telecommunications China Cyberspace Institute of Advanced Technology Guangzhou University China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
This paper addresses the task of temporal activity localization (TAL). Although recent works have made significant progress in TAL research, almost all of them implicitly assume that the dense frame-level corresponden... 详细信息
来源: 评论
Estimating Person Location in Bathroom with Spatial Ultrasound and Variational autoencoder
Estimating Person Location in Bathroom with Spatial Ultrasou...
收藏 引用
2023 IEEE International Ultrasonics Symposium, IUS 2023
作者: Sato, Shun Yasuda, Yuto Ohara, Ryotaro Hamabe, Riku Genda, Takayuki Imanaka, Shoya Izumi, Shintaro Kawaguchi, Hiroshi Kobe University Graduate School of System Informatics Kobe Japan Kobe University Department of Computer Science and Systems Engineering Kobe Japan Kobe University Graduate School of Science Technology and Innovation Kobe Japan
In bathrooms, a fall can lead to severe injuries or even drowning. While taking preventive measures against such accidents is crucial, it's equally important to swiftly detect and request rescue when they occur. I... 详细信息
来源: 评论
Literature Review: Analysis of Essential Metadata Attributes of Digital Goods for Transaction in The Virtual World  9
Literature Review: Analysis of Essential Metadata Attributes...
收藏 引用
9th International Conference on Information Management and technology, ICIMTech 2024
作者: Martha, Gede Indra Raditya Prabowo, Harjanto Gaol, Ford Lumban Wiputra, Richard BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia BINUS Business School Undergraduate Program Bina Nusantara University Management Department Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia
In online-based virtual worlds such as Metaverse, Online Games, and other online digital spaces, the virtual/digital goods (digital items / digital assets) are fundamental things that must be available to be able to d... 详细信息
来源: 评论
TESTING FACILITY LOCATION WITH CONSTRAINED QUEUE TIME PROBLEM: A CASE STUDY IN FLORIDA, USA
TESTING FACILITY LOCATION WITH CONSTRAINED QUEUE TIME PROBLE...
收藏 引用
2024 Winter Simulation Conference, WSC 2024
作者: Monteiro, Almir Antonio Schneider, Rafael de Almeida Guimarães, Vanessa González, Pedro Henrique System Engineering and Computer Science Program Federal University of Rio de Janeiro Brazil COPPEAD Graduate School of Business Federal University of Rio de Janeiro Brazil
This study addresses the Testing Facility Location with Constrained Queue Time Problem. This optimization problem focuses on determining the best places to deploy testing sites and their available testers for infectio... 详细信息
来源: 评论
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
收藏 引用
China Communications 2022年 第8期19卷 198-213页
作者: Lei Meng Daochao Huang Jiahang An Xianwei Zhou Fuhong Lin School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China Shunde Graduate School of University of Science and Technology Beijing Guangdong528399China
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture *** device-to-device continuous authentication protocol is one of the most... 详细信息
来源: 评论
Layer-Wise External Attention by Well-Localized Attention Map for Efficient Deep Anomaly Detection
收藏 引用
SN computer science 2024年 第5期5卷 592页
作者: Nakanishi, Keiichi Shiroma, Ryo Hayakawa, Tokihisa Katafuchi, Ryoya Tokunaga, Terumasa Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan
The external attention mechanism offers a promising approach to enhance image anomaly detection (Hayakawa et al., in: IMPROVE, pp. 100-–110, 2023). Nevertheless, the effectiveness of this method is contingent upon th... 详细信息
来源: 评论
Evaluating Electric Guitar Strumming Form as Musically Correct Rhythm and Sharpness Using Wrist-Wom Inertial Motion-Tracking Device
Evaluating Electric Guitar Strumming Form as Musically Corre...
收藏 引用
2022 IEEE International Conference on Consumer Electronics, ICCE 2022
作者: Kamo, Fumiyoshi Matsushita, Soichiro Graduate School of Computer Science Tokyo University of Technology Hachioji Japan
A wrist-worn inertial motion-tracking device using a commercially available sensor chip has been investigated for a motion evaluation on a chord strumming technique of electric guitar. Several motion parameters such a... 详细信息
来源: 评论
Experimental study on open-end correction of a Helmholtz resonator narrow slit neck
Noise Control Engineering Journal
收藏 引用
Noise Control Engineering Journal 2022年 第2期70卷 128-135页
作者: Sakamoto, Shuichi Akiba, Yuki Iizuka, Ryo Watanabe, Shunsuke Kominami, Ryota Shintani, Tetsushi Mechanical Engineering Program Faculty of Engineering Niigata University Niigata Japan Graduate School of Science and Technology Niigata University Niigata Japan
In general, the acoustic effective length of the open end of an air column is longer than its geometric length. Here, the effective increment of the geometric length of an air column is called the open-end correction ... 详细信息
来源: 评论
Effectiveness Verification of the Dynamic Volt-VAR Control to Reduce SVC Capacity  4
Effectiveness Verification of the Dynamic Volt-VAR Control t...
收藏 引用
4th International Conference on High Voltage Engineering and Power Systems, ICHVEPS 2023
作者: Maeda, Haruka Sitompul, Sandro Fujita, Goro Shibaura Institute of Technology Graduate School of Engineering and Science Department of Electrical Engineering and Computer Science Tokyo Japan Shibaura Institute of Technology Department of Electrical Engineering Tokyo Japan
The use of high-penetration solar photovoltaics (PV) to transmission networks is complicated by voltage rise. Infractions of voltage occur when voltage levels surpass the permitted limits. Several solutions have been ... 详细信息
来源: 评论