咨询与建议

限定检索结果

文献类型

  • 2,948 篇 会议
  • 2,519 篇 期刊文献
  • 164 册 图书

馆藏范围

  • 5,631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,065 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 1,575 篇 软件工程
    • 680 篇 信息与通信工程
    • 386 篇 生物工程
    • 377 篇 生物医学工程(可授...
    • 361 篇 控制科学与工程
    • 311 篇 电气工程
    • 282 篇 光学工程
    • 270 篇 电子科学与技术(可...
    • 208 篇 机械工程
    • 181 篇 仪器科学与技术
    • 163 篇 核科学与技术
    • 139 篇 化学工程与技术
    • 111 篇 动力工程及工程热...
    • 95 篇 材料科学与工程(可...
  • 2,238 篇 理学
    • 999 篇 物理学
    • 877 篇 数学
    • 471 篇 生物学
    • 281 篇 统计学(可授理学、...
    • 178 篇 系统科学
    • 157 篇 化学
  • 772 篇 管理学
    • 451 篇 管理科学与工程(可...
    • 346 篇 图书情报与档案管...
    • 242 篇 工商管理
  • 387 篇 医学
    • 321 篇 临床医学
    • 296 篇 基础医学(可授医学...
    • 195 篇 药学(可授医学、理...
    • 134 篇 公共卫生与预防医...
  • 138 篇 法学
    • 116 篇 社会学
  • 105 篇 经济学
    • 103 篇 应用经济学
  • 72 篇 教育学
  • 61 篇 农学
  • 12 篇 文学
  • 7 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学

主题

  • 205 篇 informatics
  • 144 篇 artificial intel...
  • 93 篇 machine learning
  • 90 篇 hadron colliders
  • 87 篇 computational mo...
  • 86 篇 computer science
  • 77 篇 computer network...
  • 73 篇 computer archite...
  • 73 篇 wireless sensor ...
  • 66 篇 deep learning
  • 66 篇 quality of servi...
  • 63 篇 higgs bosons
  • 62 篇 feature extracti...
  • 61 篇 protocols
  • 60 篇 semantics
  • 59 篇 data mining
  • 58 篇 training
  • 57 篇 image segmentati...
  • 55 篇 costs
  • 54 篇 electronic mail

机构

  • 413 篇 department for p...
  • 404 篇 faculty of scien...
  • 399 篇 department of ph...
  • 399 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 385 篇 department of ph...
  • 377 篇 institute of phy...
  • 365 篇 fakultät für phy...
  • 364 篇 institute of phy...
  • 331 篇 instituto de fís...
  • 307 篇 department of ph...
  • 280 篇 department of ph...
  • 280 篇 graduate school ...
  • 274 篇 department of ph...
  • 272 篇 dipartimento di ...
  • 269 篇 universidade fed...
  • 264 篇 ictp trieste
  • 262 篇 nikhef national ...
  • 259 篇 department of ph...
  • 257 篇 yerevan physics ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 311 篇 s. guindon
  • 305 篇 a. kaczmarska
  • 299 篇 y. tayalati
  • 298 篇 j. schaarschmidt
  • 293 篇 a. d. pilkington
  • 285 篇 l. chevalier
  • 283 篇 m. klein

语言

  • 5,327 篇 英文
  • 256 篇 其他
  • 45 篇 中文
  • 8 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Technology Institute and Department of Computer Engineeringand Informatics"
5631 条 记 录,以下是4741-4750 订阅
排序:
The effect of background knowledge in graph-based learning in the chemoinformatics domain
收藏 引用
作者: Karunaratne, Thashmee Boström, Henrik Department of Computer and Systems Sciences Stockholm University Royal Institute of Technology SE-164 40 Kista Sweden Skövde Cognition and Artificial Intelligence Lab School of Humanities and Informatics University of Skövde SE-541 28 Skövde Sweden
Typical machine learning systems often use a set of previous experiences (examples) to learn concepts, patterns, or relations hidden within the data [1]. Current machine learning approaches are challenged by the growi... 详细信息
来源: 评论
Performance study of the Mobile IPv6 protocol and its variations
Performance study of the Mobile IPv6 protocol and its variat...
收藏 引用
International Symposium on Communication Systems, Networks and Digital Signal Processing, CNSDSP
作者: George Aristomenopoulos Christos Bouras Kostas Stamos Computer Engineering and Informatics Department University슠of슠Patras Greece Computer Engineering and Informatics Department University of Patras Patras Greece Research Academic Computer Technology Institute N.Kazantzaki Str. Patras Univ. GR-26500 Rion Greece
In this paper, we use the OMNET++ simulator in order to evaluate the performance of the basic mobile IPv6 protocol and some of its proposed variations. The most important metric we are interested in is the handover la... 详细信息
来源: 评论
Local peculiarity factor and its application in outlier detection
Local peculiarity factor and its application in outlier dete...
收藏 引用
14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008
作者: Yang, Jian Zhong, Ning Yao, Yiyu Wang, Jue International WIC Institute Key Laboratory of Multimedia and Intelligent Software Beijing University of Technology Beijing 100124 China Department of Life Science and Informatics Maebashi Institute of Technology Maebashi-City 371-0816 Japan Department of Computer Science University of Regina Regina S4S 0A2 Canada Institute of Automation Chinese Academy of Sciences Beijing 100196 China
Peculiarity oriented mining (POM), aiming to discover peculiarity rules hidden in a dataset, is a new data mining method. In the past few years, many results and applications on POM have been reported. However, there ... 详细信息
来源: 评论
biTemporal Session Reconstruction for Visited Sessions Retrieval
biTemporal Session Reconstruction for Visited Sessions Retri...
收藏 引用
International Conference on Information Visualisation (IV)
作者: Ahmed Aburodes Assaid Elkilany Ilias Petrounias Department of Computer Science Sebha University Sebha Libya School of Informatics University of Manchester Institute of Science and Technology Manchester UK
Web mining is an intensive task which may yield significant insights that may revolutionise business and marketing by using effective information distribution, entertainment and communication techniques. For instance,...
来源: 评论
Gait authentication using distributed source coding
Gait authentication using distributed source coding
收藏 引用
IEEE International Conference on Image Processing
作者: S. Argyropoulos D. Tzovaras D. Ioannidis M. G. Strintzis Informatics and Telematics Institute Centre for Research and Technology Hellas Greece Department of Electrical and Computer Engineering Aristotle University of Thessaloniki Greece
A novel gait authentication scheme based on distributed source coding principles is proposed. Biometric recognition is formulated as a coding problem with noisy side information at the decoder and error correcting cod... 详细信息
来源: 评论
Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting
Steganalysis of multi-class JPEG images based on expanded Ma...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Qingzhong Liu Andrew H. Sung Bernardete M. Ribeiro Rita Ferreira Computer Science Department of New Mexico Institute of Mining and Technology Institute for Complex Additive Systems Analysis USA Computer Science Department of New Mexico Institute of Mining and Technology Institute for Complex Additive Systems Analysis Socorro NM USA Department of Informatics Engineering University of Coimbra Portugal
In this article, based on the Markov approach proposed by shi et al. , we expand it to the inter-blocks of the DCT domain, calculate the difference of the expanded Markov features between the testing image and the ca... 详细信息
来源: 评论
Building resilient classifiers for LSB matching steganography
Building resilient classifiers for LSB matching steganograph...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Rita Ferreira Bernardete Ribeiro Catarina Silva Qingzhong Liu Andrew H. Sung Department of Informatics Engineering CISUC University of Coimbra Portugal School of Technology and Management Polytechnic Institute of Leiria Portugal Department of Computer Science New Mexico Technology USA
One of the Internetpsilas hallmark is the rapid spread of the use of information and communication technology. This has boosted methods for hiding stego information inside digital cover content images which is a conce... 详细信息
来源: 评论
Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment
Selecting a Networked Virtual Environment Platform and the D...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Andreas Konstantinidis Thrasyvoulos Tsiatsos Aristotle University of Thessaloniki Thessaloniki GR Research Academic Computer Technology Institute Greece Department of Informatics Aristotle University of Thessaloniki Greece
Our goal was to create a 3D virtual environment which could be used to carry out online lectures and which would offer the most popular features of current CVEs. This paper initially discusses the potential of 3D netw... 详细信息
来源: 评论
A Progress Report and a Proposal: Interactivity in Ubiquitous Learning Enhanced by Virtual Tutors in e-Learning Contents
A Progress Report and a Proposal: Interactivity in Ubiquitou...
收藏 引用
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
作者: Toshiyuki Yamamoto Ryo Miyashita Department of Media Informatics Kanazawa Institute of Technology Japan Graduate Program in Information andComputer Engineering Kanagawa Institute of Technology Japan Graduate Program in Information and Computer Engineering Kanazawa Institute of Technology Japan
It is proposed in this session that the interactivity necessary in ubiquitous learning can be enhanced by the virtual tutor who mediates between the learner and the e-learning contents. Arousing students' intellec... 详细信息
来源: 评论
N-Most Interesting Closed Itemset Mining
N-Most Interesting Closed Itemset Mining
收藏 引用
International Conference on Convergence Information technology
作者: Panida Songram Veera Boonjing Department of Mathematics and Computer Science Faculty of Science King Mongkuts Institute of Technology Ladkrabang Software Systems Engineering Laboratory Bangkok Thailand Department of Computer Science Faculty of Informatics Mahasarakham University Mahasarakham Thailand
In this paper, we propose an efficient algorithm, NCLOSED, for mining the N k-closed itemsets with the highest supports for 1 up to a certain k max value. The algorithm adopts best-first search strategy to generate c... 详细信息
来源: 评论