咨询与建议

限定检索结果

文献类型

  • 380 篇 期刊文献
  • 327 篇 会议
  • 11 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 381 篇 工学
    • 246 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 50 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 40 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 电气工程
    • 29 篇 化学工程与技术
    • 23 篇 电子科学与技术(可...
    • 19 篇 土木工程
    • 18 篇 材料科学与工程(可...
    • 17 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 14 篇 安全科学与工程
  • 314 篇 理学
    • 195 篇 数学
    • 69 篇 物理学
    • 53 篇 统计学(可授理学、...
    • 48 篇 生物学
    • 40 篇 系统科学
    • 34 篇 化学
  • 116 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 51 篇 工商管理
    • 49 篇 图书情报与档案管...
  • 50 篇 医学
    • 37 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
  • 25 篇 教育学
    • 24 篇 教育学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 16 篇 法学
    • 15 篇 社会学
  • 7 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 14 篇 computer science
  • 14 篇 machine learning
  • 11 篇 training
  • 10 篇 students
  • 8 篇 covid-19
  • 8 篇 software enginee...
  • 8 篇 diffusion
  • 8 篇 semantics
  • 8 篇 decision making
  • 8 篇 positrons
  • 8 篇 artificial intel...
  • 7 篇 computational mo...
  • 7 篇 accuracy
  • 7 篇 mcda
  • 7 篇 evolutionary com...
  • 6 篇 surveys
  • 6 篇 reliability
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 contrastive lear...

机构

  • 24 篇 gaoling school o...
  • 24 篇 beijing key labo...
  • 10 篇 department of co...
  • 9 篇 department of so...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 9 篇 department of ch...
  • 8 篇 faculty of physi...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 department of ap...
  • 7 篇 gamf faculty of ...
  • 7 篇 infn laboratori ...
  • 6 篇 volgograd state ...
  • 6 篇 department of co...
  • 6 篇 department of ph...
  • 6 篇 college of compu...
  • 6 篇 department of co...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 moskal p.
  • 12 篇 silarski m.
  • 12 篇 gorgol m.
  • 12 篇 gajos a.
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 kowalski p.
  • 11 篇 hiesmayr b.c.
  • 11 篇 sharma s.
  • 11 篇 curceanu c.
  • 11 篇 rudy z.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 krawczyk n.
  • 10 篇 mohammed m.
  • 9 篇 olteanu mircea

语言

  • 602 篇 英文
  • 112 篇 其他
  • 3 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Computer Methods"
718 条 记 录,以下是21-30 订阅
排序:
A Large-Scale Group Decision-Making Approach Employing Large Language Models to Detect Assertive Groups  23
A Large-Scale Group Decision-Making Approach Employing Large...
收藏 引用
23rd International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2024
作者: Carbó-García, Santiago Trillo, José Ramón Tapia, Juan Miguel Pérez, Ignacio Javier Herrera-Viedma, Enrique Cabrerizo, Francisco Javier Andalusian Research Institute in Data Science and Computational Intelligence Department of Computer Science and Artificial Intelligence University of Granada Granada Spain Department of Quantitative Methods for Business and Economics University of Granada Granada Spain
Large-Scale Group Decision-Making, propelled by the advent of Large Language Models and the imperative for assertiveness in decision-making processes, emerges as a pivotal area of research. This paper navigates throug... 详细信息
来源: 评论
A High-Capacity Image Steganography Based on LSB Inversion and Summing of Bit Pairs  6
A High-Capacity Image Steganography Based on LSB Inversion a...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2024
作者: Mamdouh, Loay Bekhet, Saddam South Valley University Faculty of Computers and Artificial Intelligence Department of Computer Science Hurghada Egypt South Valley University Faculty of Commerce Department of Quantitative Methods Qena Egypt
Nowadays, computer users face a challenge in maintaining the security of their information. There are many techniques for transferring information safely over networks. Image steganography, one of these techniques, is... 详细信息
来源: 评论
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2515-2532页
作者: Usman Ali Mohd Yamani Idna Idris Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia Department of Computer Science University of SwatSaidu Sharif19130Pakistan Center for Research in Mobile Cloud Computing University of MalayaKuala Lumpur50603Malaysia Department of Quantitative Methods and Economic Informatics Faculty of Operation and Economics of Transport and CommunicationsUniversity of Zilina01026 ZilinaSlovakia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Sciences and Arts in RassQassim UniversityBuraydah51452Saudi Arabia Department of Computer Science Hamdard Institute of Engineering and TechnologyIslamabad44000Pakistan
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... 详细信息
来源: 评论
Learning Shadow Variable Representation for Treatment Effect Estimation under Collider Bias  41
Learning Shadow Variable Representation for Treatment Effect...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Baohong Li, Haoxuan Xiong, Ruoxuan Wu, Anpeng Wu, Fei Kuang, Kun College of Computer Science and Technology Zhejiang University Hangzhou China Center for Data Science Peking University Beijing China Department of Quantitative Theory & Methods Emory University Atlanta United States
One of the significant challenges in treatment effect estimation is collider bias, a specific form of sample selection bias induced by the common causes of both the treatment and outcome. Identifying treatment effects... 详细信息
来源: 评论
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 1049-1070页
作者: Mohamed Medani Yahia Said Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman Applied College of Muhayil Aseer King Khalid UniversityAbha62529Saudi Arabia Center for Scientific Research and Entrepreneurship Northern Border UniversityArar73213Saudi Arabia Department of Computer Engineering College of EngineeringKnowledge UniversityErbil44001Iraq Department of Computer Engineering Al-Kitab UniversityAltun Kupri36001Iraq Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100070Uzbekistan Department of Industrial Engineering College of EngineeringUniversity of BishaBishaP.O.Box 001Saudi Arabia Department of Computer Science Solent UniversitySouthamptonSO140YNUK
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before **... 详细信息
来源: 评论
Towards Developing Digital Twin Enabled Multi-Agent Systems  11th
Towards Developing Digital Twin Enabled Multi-Agent Systems
收藏 引用
11th InternationalWorkshop on EngineeringMulti-Agent Systems, EMAS 2023
作者: Mariani, Stefano Picone, Marco Ricci, Alessandro Department of Sciences and Methods of Engineering University of Modena and Reggio Emilia Reggio Emilia Italy Department of Computer Science and Engineering University of Bologna Cesena Italy
The Multi-Agent Systems (MASs) literature provides abstractions, techniques, and development platforms to design and implement the virtual environment within which agents operate. However, coupling such an environment... 详细信息
来源: 评论
The Experience of Training the Future Teachers to the Implementation of E-learning at School in the Context of Teaching Practice
The Experience of Training the Future Teachers to the Implem...
收藏 引用
Technology Enhanced Learning in Higher Education (TELE), International Conference on
作者: Sergey Kasyanov Tatyana Klevetova Svetlana Komissarova Anastasiya Maksimova The Department of Computer Science and Methods of Teaching Computer Science) Volgograd State Socio-Pedagogical University Volgograd Russia
The article deals with the approaches to the definition of online education. Its basic components are described. There is considered the experience of the training of the students in the pedagogical universities to th... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students  7
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power Engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论
"It’s like an explosion": Cyberwarfare harms for civilian population in Ukraine during the Russian invasion
"It’s like an explosion": Cyberwarfare harms for civilian p...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Kulyk, Oksana Kickbusch, Jari Mayer, Peter IT University of Copenhagen Copenhagen Denmark Department of Mathematics and Computer Science University of Southern Denmark Odense Denmark Institute of Applied Informatics and Formal Description Methods Karlsruhe Institute of Technology Karlsruhe Germany
Studies on civilian costs of cyberwarfare operations are crucial in understanding how to protect the population in large-scale cyberattacks conducted by state actors. In this preliminary study, we conduct interviews (...
来源: 评论
An informed deep learning model of the Omicron wave and the impact of vaccination
收藏 引用
computers in Biology and Medicine 2025年 191卷 109968-109968页
作者: Shamsara, Elham König, Florian Pfeifer, Nico Methods in Medical Informatics Department of Computer Science University of Tübingen Tübingen72076 Germany
The Omicron (B.1.1.529) variant of SARS-CoV-2 emerged in November 2021 and has since evolved into multiple lineages. Understanding its transmission, vaccine efficacy, and potential for reinfection is crucial. This stu... 详细信息
来源: 评论