咨询与建议

限定检索结果

文献类型

  • 152 篇 期刊文献
  • 73 篇 会议
  • 1 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 148 篇 工学
    • 100 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 生物工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 光学工程
    • 18 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 9 篇 电子科学与技术(可...
    • 7 篇 建筑学
    • 6 篇 材料科学与工程(可...
  • 117 篇 理学
    • 53 篇 数学
    • 46 篇 生物学
    • 29 篇 物理学
    • 29 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 11 篇 地球物理学
    • 7 篇 化学
  • 42 篇 管理学
    • 24 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 24 篇 医学
    • 17 篇 基础医学(可授医学...
    • 17 篇 临床医学
    • 11 篇 药学(可授医学、理...
    • 9 篇 公共卫生与预防医...
  • 12 篇 农学
    • 6 篇 作物学
  • 11 篇 法学
    • 9 篇 社会学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 经济学

主题

  • 10 篇 feature extracti...
  • 8 篇 machine learning
  • 7 篇 surveys
  • 6 篇 image segmentati...
  • 5 篇 deep learning
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 training
  • 5 篇 convolutional ne...
  • 4 篇 cosmological par...
  • 4 篇 semantics
  • 4 篇 data structures
  • 3 篇 covid-19
  • 3 篇 neurons
  • 3 篇 support vector m...
  • 3 篇 deep neural netw...
  • 3 篇 network topology
  • 3 篇 computational mo...
  • 3 篇 algorithm design...
  • 3 篇 benchmarking

机构

  • 14 篇 department of el...
  • 12 篇 department of el...
  • 9 篇 data analytics l...
  • 9 篇 department of st...
  • 6 篇 computer network...
  • 6 篇 department of co...
  • 5 篇 leeds institute ...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of sc...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 osaka internatio...
  • 5 篇 research departm...
  • 5 篇 department of ve...
  • 5 篇 royal stoke univ...

作者

  • 15 篇 ghojogh benyamin
  • 14 篇 ghodsi ali
  • 12 篇 karray fakhri
  • 12 篇 crowley mark
  • 8 篇 katarya rahul
  • 7 篇 yu zeyun
  • 7 篇 hofmann thomas
  • 6 篇 refregier alexan...
  • 6 篇 fluri janis
  • 6 篇 king irwin
  • 5 篇 zhao tong
  • 5 篇 poonam goyal
  • 5 篇 navneet goyal
  • 5 篇 lucchi aurelien
  • 5 篇 wang peng
  • 5 篇 thomas hofmann
  • 5 篇 kacprzak tomasz
  • 5 篇 smeaton alan f.
  • 4 篇 james s. plank
  • 4 篇 sun lifeng

语言

  • 215 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"机构=Data Analytics Laboratory Department of Computer Science ETH"
226 条 记 录,以下是41-50 订阅
排序:
Cosmological constraints with deep learning from KiDS-450 weak lensing maps
arXiv
收藏 引用
arXiv 2019年
作者: Fluri, Janis Kacprzak, Tomasz Lucchi, Aurelien Refregier, Alexandre Amara, Adam Hofmann, Thomas Schneider, Aurel Institute of Particle Physics and Astrophysics Department of Physics ETH Zurich Switzerland Data Analytics Lab Department of Computer Science ETH Zurich Switzerland
Convolutional Neural Networks (CNN) have recently been demonstrated on synthetic data to improve upon the precision of cosmological inference. In particular they have the potential to yield more precise cosmological c... 详细信息
来源: 评论
Cosmological Parameter Estimation and Inference using Deep Summaries
arXiv
收藏 引用
arXiv 2021年
作者: Fluri, Janis Kacprzak, Tomasz Refregier, Alexandre Lucchi, Aurelien Hofmann, Thomas Institute of Particle Physics and Astrophysics Department of Physics ETH Zurich Switzerland Data Analytics Lab Department of Computer Science ETH Zurich Switzerland
The ability to obtain reliable point estimates of model parameters is of crucial importance in many fields of physics. This is often a difficult task given that the observed data can have a very high number of dimensi... 详细信息
来源: 评论
Robust Perceptual Hashing for Fingerprint Template Protection  1
Robust Perceptual Hashing for Fingerprint Template Protectio...
收藏 引用
1st International Conference on computer Communications and Intelligent Systems, I3CIS 2022
作者: Birouk, Wafa Lahoulou, Atidel Melit, Ali Bouridane, Ahmed University of Bejaia Faculty of Exact Sciences Computer Science Department Bejaia06000 Algeria University Mohammed Seddik Benyahia Computer Science Department Jijel18000 Algeria LaRIA Laboratory University Mohammed Seddik Benyahia Computer Science Department Jijel18000 Algeria University of Sharjah Cybersecurity and Data Analytics Research Center Sharjah United Arab Emirates
Perceptual hashing has proven its robustness in securing biometric templates, where several methods have been proposed in order to have a robust and discriminating hash code against acceptable attacks. This paper prop... 详细信息
来源: 评论
Scalable Parallel Algorithms for Shared Nearest Neighbor Clustering
Scalable Parallel Algorithms for Shared Nearest Neighbor Clu...
收藏 引用
International Conference on High Performance Computing
作者: Sonal Kumari Saurabh Maurya Poonam Goyal Sundar S Balasubramaniam Navneet Goyal Department of Computer Science & Information Systems Advanced Data Analytics & Parallel Technologies Laboratory INDIA
Clustering is a popular data mining technique which discovers structure in unlabeled data by grouping objects together on the basis of a similarity criterion. Traditional similarity measures lose their meaning as the ... 详细信息
来源: 评论
A new algorithm for detection of nodes failures and enhancement of network coverage and energy usage in wireless sensor networks
收藏 引用
Materials Today: Proceedings 2023年 80卷 1717-1722页
作者: Satyanarayana, P. Mahalakshmi, T. Sivakami, R. Alahmari, Saad Ali Rajeyyagari, Sivaram Asadi, Srinivasulu ECE V. R. Siddhartha Engineering College Vijayawada India Department of ECE Prasad V Potluri Siddhartha Institute of Technology India Associate Professor CSE Sona College of Technology TN Salem 5 India Department of Computer Science Shaqra University Saudi Arabia Data Analytics Research Laboratory BlueCrest University College Monrovia Liberia
Present natural lives shows rising attention in various applications of the wireless sensor networks (WSNs). Significant applications are isolated and stiff regions where human involvement is hazardous or unfeasible. ... 详细信息
来源: 评论
Volatile Memory Extraction-Based Approach for Level 0-1 CPS Forensics
Volatile Memory Extraction-Based Approach for Level 0-1 CPS ...
收藏 引用
2019 IEEE International Symposium on Technologies for Homeland Security, HST 2019
作者: Awad, Rima Asmar Lopez, Juan Rogers, Mike National Security Sciences Direct. Oak Ridge National Laboratory Cyber and Data Analytics Division Oak RidgeTN United States Collage of Engineering Tennessee Technological University Computer Science Department CookevilleTN United States
Most security analyzers operate on system state that is far removed from end-point components in cyber-physical systems (CPS) identified as level 0-1 in the Purdue Architecture Reference Architecture (PERA) [1]. For e... 详细信息
来源: 评论
A Parallel Framework for Grid-Based Bottom-Up Subspace Clustering
A Parallel Framework for Grid-Based Bottom-Up Subspace Clust...
收藏 引用
International Conference on data science and Advanced analytics (DSAA)
作者: Poonam Goyal Sonal Kumari Shubham Singh Vivek Kishore Sundar S. Balasubramaniam Navneet Goyal Department of Computer Science & Information Systems Advanced Data Analytics & Parallel Technologies Laboratory Pilani Campus INDIA
Clustering is a popular data mining and machine learning technique which discovers interesting patterns from unlabeled data by grouping similar objects together. Clustering high-dimensional data is a challenging task ... 详细信息
来源: 评论
Classification of Pigmented Skin Lesions using Early Fusion of Multi-Deep Features and Support Vector Machine
Classification of Pigmented Skin Lesions using Early Fusion ...
收藏 引用
Intelligent Computing and Sustainable Innovations in Technology (IC-SIT), International Conference on
作者: Jayanth Chowdam Sibarama Panigrahi Department of Computer Science and Engineering Intelligent Data Analytics Laboratory National Institute of Technology Rourkela Odisha India
One of the primary organ is the skin. It protects and separates humans from various dangers. Nevertheless, the skin is susceptible to damage and can develop pigmented lesions. Manual classification of Pigmented Skin L... 详细信息
来源: 评论
Automatic Histopathological Image Classification using Multi-Deep Features with Handcrafted Features and Shallow Machine Learning Models
Automatic Histopathological Image Classification using Multi...
收藏 引用
Intelligent Systems and Embedded Design (ISED), International Conference on
作者: Sunrit Banerjee Sibarama Panigrahi Department Of Computer Science and Engineering Intelligent Data Analytics Laboratory National Institute Of Technology Rourkela Odisha India
Invasive ductal carcinoma (IDC) is one of the most common variant of breast cancer affecting women more frequently than any other cancer. One crucial clinical duty is to correctly detect and classify breast cancer sub... 详细信息
来源: 评论
A Constraint Programming Approach to the Additional Relay Placement Problem in Wireless Sensor Networks
A Constraint Programming Approach to the Additional Relay Pl...
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Luis Quesada Kenneth N. Brown Barry O'Sullivan Lanny Sitanayah Cormac J. Sreenan INSIGHT Centre for Data Analytics Department of Computer Science University College Cork Mobile and Internet Systems Laboratory Department of Computer Science University College Cork
A Wireless Sensor Network (WSN) is composed of many sensor nodes which transmit their data wirelessly over a multi-hop network to data sinks. Since WSNs are subject to node failures, the network topology should be rob... 详细信息
来源: 评论