咨询与建议

限定检索结果

文献类型

  • 491 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 614 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 374 篇 工学
    • 268 篇 计算机科学与技术...
    • 219 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 50 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 21 篇 化学
  • 111 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 42 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 587 篇 英文
  • 19 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
614 条 记 录,以下是161-170 订阅
排序:
Designing Participatory AI: Creative Professionals’ Worries and Expectations about Generative AI
arXiv
收藏 引用
arXiv 2023年
作者: Inie, Nanna Falk, Jeanette Tanimoto, Steven IT University of Copenhagen Copenhagen Denmark Dep. of Artificial Intelligence and Human Interfaces University of Salzburg Salzburg Austria Paul G. Allen School of Computer Science & Engineering University of Washington Seattle United States
Generative AI, i.e., the group of technologies that automatically generate visual or written content based on text prompts, has undergone a leap in complexity and become widely available within just a few years. Such ...
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
The Influence of Applying Digital Toolkits to Assist 3D Software Development on Individual Work Performance and Perceived Stress
The Influence of Applying Digital Toolkits to Assist 3D Soft...
收藏 引用
International Conference on Applied System Innovation (ICASI)
作者: Wen-Chuan Wu Ming-Han Lee Dep. of Computer Science and Information Engineering National Ilan University Yilan City Taiwan R.O.C. Master Program of E-Learning for Multimedia and Network Communications National Ilan University Yilan City Taiwan R.O.C.
Digital content industry, encompassing areas such as digital games, computer animation, digital audio-visual applications, and digital art, plays a pivotal role in today's and future developmental trends. Maya 3D ... 详细信息
来源: 评论
An Analysis of Haskell Parallel Programming Model in the HaLVM  4
An Analysis of Haskell Parallel Programming Model in the HaL...
收藏 引用
4th International Conference on Computing and Applied Informatics 2019, ICCAI 2019
作者: Cheon, Junseok Kim, Yeoneo Hur, Taekwang Byun, Sugwoo Woo, Gyun Dep. of Electrical and Computer Engineering Pusan National University Korea Republic of Dep. of Computer Science Kyungsung University Korea Republic of Smart Control Center of LG Electronics Korea Republic of
Recently, cloud computers are widely used due to the development of computing environment and network speed. Unikernel is considered to be an attractive operating system in the manycore environment that effectively pr... 详细信息
来源: 评论
Energy-efficient Trajectory Planning with Media Transition for a Hybrid Unmanned Aerial-Underwater Vehicle
Energy-efficient Trajectory Planning with Media Transition f...
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
作者: Pedro M. Pinheiro Armando Alves Neto Douglas G. Macharet Paulo L. J. Drews NAUTEC Center for Computational Science Universidade Federal do Rio Grande - FURG Rio Grande Brazil Dept. of Electronics Engineering Univ. Federal de Minas Gerais Belo Horizonte Brazil Dep. of Computer Science Computer Vision and Robotics Laboratory (VeRLab) Univ. Federal de Minas Gerais Belo Horizonte Brazil
Vehicles capable of operating in more than one environment have been developed to solve real problems. Among them, the hybrid unmanned aerial-underwater vehicle (HUAUV) is receiving attention from the robotics communi... 详细信息
来源: 评论
SSAM: A Haskell Parallel Programming STM Based Simple Actor Model  4
SSAM: A Haskell Parallel Programming STM Based Simple Actor ...
收藏 引用
4th International Conference on Computing and Applied Informatics 2019, ICCAI 2019
作者: Kim, Y. Cheon, J. Hur, T. Byun, S. Woo, G. Dep. of Electrical and Computer Engineering Pusan National University Korea Republic of Dep. of Computer Science Kyungsung University Korea Republic of Smart Control Center of LG Electronics Korea Republic of
As computers with manycore architecture are being widely spread, parallel programming becomes a pending issue. While parallel programming has been a challenging issue, Haskell is known to be of the best available one.... 详细信息
来源: 评论
A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application
A Safety and Security Requirements Management Methodology in...
收藏 引用
IEEE International Workshop on Factory Communication Systems (WFCS)
作者: Ali M. Hosseini Clara Fischer Mukund Bhole Wolfgang Kastner Thilo Sauter Sebastian Schlund Institute of Computer Technology TU Wien Vienna Austria Institute of Management Science TU Wien Vienna Austria Institute of Computer Engineering TU Wien Vienna Austria Dep. of Integrated Sensor Systems Danube Univ. Krems Wiener Neustadt Austria
The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changin...
来源: 评论
Machine Learning Approach to Detection of Offensive Language in Online Communication in Arabic  1
Machine Learning Approach to Detection of Offensive Language...
收藏 引用
1st IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2021
作者: Alakrot, Azalden Fraifer, Muftah Nikolov, Nikola S. The College of Medical Technology Department of Information Technology Yefren Libya The College of Industrial Technologies-CIT Department of Electronic Engineering Misurata Libya University of Limerick Dep. of Computer Science and Information System Limerick Ireland
This paper presents the results of several machine learning experiments, conducted with a dataset of YouTube comments in Arabic. The experiments aim at studying the impact of various text preprocessing, feature-extrac... 详细信息
来源: 评论
Trust your neighbors: A comprehensive survey of neighborhood-based methods for recommender systems
arXiv
收藏 引用
arXiv 2021年
作者: Nikolakopoulos, Athanasios N. Ning, Xia Desrosiers, Christian Karypis, George Amazon Seattle United States Biomedical Informatics Computer Science and Engineering Dep. The Ohio State University Columbus United States Software Engineering and IT Dep. École de Technologie Supérieure Montreal Canada Computer Science & Engineering Dep. University of Minnesota Minneapolis United States
Collaborative recommendation approaches based on nearest-neighbors are still highly popular today due to their simplicity, their efficiency, and their ability to produce accurate and personalized recommendations. This... 详细信息
来源: 评论
A Simplified Variant of Gödel's Ontological Argument
arXiv
收藏 引用
arXiv 2022年
作者: Benzmüller, Christoph Otto-Friedrich-Universität Bamberg AI Systems Engineering Bamberg Germany Freie Universität Berlin Dep. of Mathematics and Computer Science Berlin Germany
A simplified variant of Gödel's ontological argument is presented. The simplified argument is valid already in basic modal logics K or KT, it does not suffer from modal collapse, and it avoids the rather comp... 详细信息
来源: 评论