咨询与建议

限定检索结果

文献类型

  • 3,485 篇 会议
  • 2,043 篇 期刊文献
  • 46 册 图书

馆藏范围

  • 5,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,483 篇 工学
    • 2,495 篇 计算机科学与技术...
    • 1,991 篇 软件工程
    • 616 篇 生物工程
    • 555 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 448 篇 生物医学工程(可授...
    • 236 篇 机械工程
    • 230 篇 光学工程
    • 209 篇 电气工程
    • 141 篇 仪器科学与技术
    • 138 篇 电子科学与技术(可...
    • 128 篇 化学工程与技术
    • 121 篇 建筑学
    • 103 篇 土木工程
    • 91 篇 安全科学与工程
  • 1,849 篇 理学
    • 768 篇 生物学
    • 665 篇 数学
    • 565 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 144 篇 化学
    • 133 篇 系统科学
  • 855 篇 管理学
    • 449 篇 图书情报与档案管...
    • 402 篇 管理科学与工程(可...
    • 228 篇 工商管理
  • 549 篇 医学
    • 460 篇 临床医学
    • 335 篇 基础医学(可授医学...
    • 181 篇 药学(可授医学、理...
    • 159 篇 公共卫生与预防医...
  • 267 篇 法学
    • 257 篇 社会学
  • 223 篇 教育学
    • 179 篇 教育学
  • 87 篇 农学
  • 60 篇 经济学
  • 42 篇 文学
  • 15 篇 军事学
  • 15 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 179 篇 computer science
  • 158 篇 humans
  • 120 篇 human computer i...
  • 98 篇 speech recogniti...
  • 93 篇 virtual reality
  • 93 篇 user interfaces
  • 92 篇 semantics
  • 83 篇 visualization
  • 83 篇 training
  • 70 篇 machine learning
  • 66 篇 artificial intel...
  • 64 篇 educational inst...
  • 64 篇 students
  • 64 篇 accuracy
  • 63 篇 feature extracti...
  • 54 篇 computational mo...
  • 54 篇 data visualizati...
  • 53 篇 data mining
  • 51 篇 deep learning
  • 51 篇 testing

机构

  • 160 篇 department of co...
  • 115 篇 key laboratory o...
  • 73 篇 moe key lab of a...
  • 43 篇 apptek gmbh aach...
  • 34 篇 human-computer i...
  • 33 篇 human-computer i...
  • 32 篇 human language t...
  • 24 篇 human-computer i...
  • 23 篇 key lab. of shan...
  • 21 篇 human language t...
  • 19 篇 human-computer i...
  • 18 篇 human language t...
  • 18 篇 department of co...
  • 17 篇 tsinghua univers...
  • 17 篇 human computer i...
  • 17 篇 haihe laboratory...
  • 16 篇 department of co...
  • 16 篇 institute of res...
  • 15 篇 human-computer i...
  • 15 篇 shanghai key lab...

作者

  • 199 篇 zhao hai
  • 104 篇 ney hermann
  • 85 篇 zhang zhuosheng
  • 63 篇 schlüter ralf
  • 38 篇 shneiderman ben
  • 36 篇 li zuchao
  • 32 篇 bowman doug a.
  • 32 篇 hermann ney
  • 31 篇 myers brad a.
  • 29 篇 ben shneiderman
  • 29 篇 wu dekai
  • 24 篇 doug a. bowman
  • 23 篇 yu kai
  • 21 篇 habernal ivan
  • 21 篇 bederson benjami...
  • 18 篇 dredze mark
  • 18 篇 yang yang
  • 17 篇 ralf schlüter
  • 17 篇 pascale fung
  • 16 篇 plaisant catheri...

语言

  • 5,412 篇 英文
  • 128 篇 其他
  • 29 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer Science and Human Computer Interaction"
5574 条 记 录,以下是411-420 订阅
排序:
MAIDS: Malicious Agent Identification-based Data Security Model for Cloud Environments
arXiv
收藏 引用
arXiv 2024年
作者: Gupta, Kishu Saxena, Deepika Gupta, Rishabh Singh, Ashutosh Kumar Department of Computer Science & Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan Department of Computer Science & Engineering University of Aizu Fukushima Aizuwakamatsu Japan Department of Computer Science The University of Economics and Human Sciences Warsaw01043 Poland Department of Computer Applications SRM Institute of Science & Technology Delhi-NCR Campus Modinagar Uttar Pradesh Ghaziabad201204 India Department of Computer Science & Engineering Indian Institute of Information Technology Madhya Pradesh Bhopal462003 India
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac... 详细信息
来源: 评论
WaterHCI: Water in human-computer interaction
收藏 引用
Foundations and Trends in human-computer interaction 2024年 第4期18卷 338-412页
作者: Vega, Maria Montoya Smith, Ian Clashing, Christal Patibanda, Rakesh Ananthanarayan, Swamy Pell, Sarah Jane Mueller, Florian Exertion Games Lab Department of Human-Centred Computing Monash University Australia Faculty of Computer Science University of New Brunswick Canada Department of Human-Centred Computing Monash University Australia
Over recent years, there has been an increase in the coming together of interactive technology and water, leading to the emergence of WaterHCI, a distinct subfield of human-computer interaction (HCI). However, there i... 详细信息
来源: 评论
Extremely Lightweight Skin Segmentation Networks to Improve Remote Photoplethysmography Measurement  14th
Extremely Lightweight Skin Segmentation Networks to Improve ...
收藏 引用
14th International Conference on Intelligent human computer interaction, IHCI 2022
作者: Lee, Kunyoung You, Hojoon Oh, Jaemu Lee, Eui Chul Department of Computer Science Graduate School Sangmyung University Seoul Korea Republic of Department of AI and Informatics Graduate School Sangmyung University Seoul Korea Republic of Department of Human-Centered Artificial Intelligence Sangmyung University Seoul Korea Republic of
Recently, remote photoplethysmography (rPPG) has been studied and developed not only in a controlled environment but also in a wild environment such as telemedicine and driver monitoring. Although photoplethysmography... 详细信息
来源: 评论
Autonomous Vision-based Robotic Grasping of Household Objects: A Practical Case Study
Autonomous Vision-based Robotic Grasping of Household Object...
收藏 引用
RSI/ISM International Conference on Robotics and Mechatronics (ICROM)
作者: Asal Roudbari Mahdi Dalvand Navid Pasiar Navid Asadi Mohammad Yousefi Mehdi Tale Masouleh Electrical Engineering Department Sharif University of Technology Tehran Iran Human & Robot Interaction Lab University of Tehran Tehran Iran Human & Robot Interaction Lab School of Electrical&Computer Engineering University of Tehran Tehran Iran
Autonomous robotic grasping has emerged as a valuable capability for automating everyday household tasks like table setting (bossing), cleaning, and meal preparation. Still, accurately detecting and manipulating diver...
来源: 评论
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Yin, Zhaoxia Zhu, Shaowei Su, Hang Peng, Jianteng Lyu, Wanli Luo, Bin East China Normal University School of Communication & Electronic Engineering Shanghai China Anhui University China Tsinghua University Department of Computer Science and Technology Beijing100084 China OPPO Intellisense and Interaction Research Department China
Deep Neural Networks (DNNs) have recently made significant strides in various fields;however, they are susceptible to adversarial examples-crafted inputs with imperceptible perturbations that can mislead these network... 详细信息
来源: 评论
Isoform Function Prediction Based on Heterogeneous Graph Attention Networks
Isoform Function Prediction Based on Heterogeneous Graph Att...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Guo, Kuo Li, Yifan Chen, Hao Shen, Hong-Bin Yang, Yang Shanghai Jiao Tong University Key Lab. of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Department of Computer Science and Engineering Shanghai200240 China Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Institute of Image Processing and Pattern Recognition Shanghai200240 China Carnegie Mellon University School of Computer Science Computational Biology Department PittsburghPA15213 United States
Isoforms refer to different mRNA molecules transcribed from the same gene, which can be translated into proteins with varying structures and functions. Predicting the functions of isoforms is an essential topic in bio... 详细信息
来源: 评论
Towards Automated Support for the Co-Evolution of Meta-Models and Grammars
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Weixing Department of Computer Science & Engineering Division of Interaction Design & Software Engineering Chalmers University of Technology University of Gothenburg Gothenburg Sweden
Blended modeling is an emerging paradigm involving seamless interaction between multiple notations for the same underlying modeling language. We focus on a model-driven engineering (MDE) approach based on meta-models ... 详细信息
来源: 评论
Please don't answer out of context: Personalized Dialogue Generation Fusing Persona and Context
Please don't answer out of context: Personalized Dialogue Ge...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Fucheng Wang Yunfei Yin Faliang Huang Kaigui Wu College of Computer Science Chongqing University Chongqing China Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University Nanning China
In realistic conversations, “responses” are closely related to persona and context. However, current personalized dialogue generation methods only focus on the consistency of the persona of responses and yet ignore ...
来源: 评论
NLP in human Rights Research: Extracting Knowledge Graphs About Police and Army Units and Their Commanders  16
NLP in Human Rights Research: Extracting Knowledge Graphs Ab...
收藏 引用
16th Linguistic Annotation Workshop, LAW 2022
作者: Bauer, Daniel Longley, Tom Ma, Yueen Wilson, Tony Computer Science Department Columbia University United States Security Force Monitor Human Rights Institute Columbia Law School United States
In this paper we explore the use of an NLP system to assist the work of Security Force Monitor (SFM). SFM creates data about the organizational structure, command personnel and operations of police, army and other sec... 详细信息
来源: 评论
LabelEase: A Semi-Automatic Tool for Efficient and Accurate Trace Labeling in Microservices
LabelEase: A Semi-Automatic Tool for Efficient and Accurate ...
收藏 引用
International Symposium on Software Reliability Engineering (ISSRE)
作者: Shenglin Zhang Zeyu Che Zhongjie Pan Xiaohui Nie Yongqian Sun Lemeng Pan Dan Pei Nankai University Haihe Laboratory of Information Technology Application Innovation Computer Network Information Center Chinese Academy of Sciences Tianjin Key Laboratory of Software Experience and Human Computer Interaction Huawei Beijing National Research Center for Information Science and Technology Tsinghua University
Trace data is crucial for system observability and maintainability within microservices architectures, and many operation algorithms depend heavily on trace data, including anomaly detection, root cause analysis, etc.... 详细信息
来源: 评论